* utils.c (query): Change syntax of query annotations to be
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
35f5886e 1/* Read ELF (Executable and Linking Format) object files for GDB.
0683ac4b 2 Copyright 1991, 1992, 1993, 1994 Free Software Foundation, Inc.
35f5886e
FF
3 Written by Fred Fish at Cygnus Support.
4
5This file is part of GDB.
6
7This program is free software; you can redistribute it and/or modify
8it under the terms of the GNU General Public License as published by
9the Free Software Foundation; either version 2 of the License, or
10(at your option) any later version.
11
12This program is distributed in the hope that it will be useful,
13but WITHOUT ANY WARRANTY; without even the implied warranty of
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15GNU General Public License for more details.
16
17You should have received a copy of the GNU General Public License
18along with this program; if not, write to the Free Software
19Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
20
35f5886e 21#include "defs.h"
35f5886e 22#include "bfd.h"
fc773653 23#include <time.h> /* For time_t in libbfd.h. */
ddf5d7e8 24#include <sys/types.h> /* For time_t, if not in time.h. */
f70be3e4 25#include "libbfd.h" /* For bfd_elf_find_section */
2084a176 26#include "libelf.h"
0683ac4b 27#include "elf/mips.h"
35f5886e 28#include "symtab.h"
1ab3bf1b 29#include "symfile.h"
5e2e79f8 30#include "objfiles.h"
be772100 31#include "buildsym.h"
2731625a 32#include "stabsread.h"
2670f34d 33#include "gdb-stabs.h"
51b80b00 34#include "complaints.h"
740b7efa 35#include <string.h>
2e4964ad 36#include "demangle.h"
35f5886e 37
2670f34d
JG
38/* The struct elfinfo is available only during ELF symbol table and
39 psymtab reading. It is destroyed at the complation of psymtab-reading.
40 It's local to elf_symfile_read. */
41
35f5886e 42struct elfinfo {
d5931d79 43 file_ptr dboffset; /* Offset to dwarf debug section */
35f5886e 44 unsigned int dbsize; /* Size of dwarf debug section */
d5931d79 45 file_ptr lnoffset; /* Offset to dwarf line number section */
35f5886e 46 unsigned int lnsize; /* Size of dwarf line number section */
346168a2
JG
47 asection *stabsect; /* Section pointer for .stab section */
48 asection *stabindexsect; /* Section pointer for .stab.index section */
e03c0cc6 49 asection *mdebugsect; /* Section pointer for .mdebug section */
35f5886e
FF
50};
51
2670f34d
JG
52/* Various things we might complain about... */
53
54struct complaint section_info_complaint =
55 {"elf/stab section information %s without a preceding file symbol", 0, 0};
56
57struct complaint section_info_dup_complaint =
58 {"duplicated elf/stab section information for %s", 0, 0};
59
60struct complaint stab_info_mismatch_complaint =
61 {"elf/stab section information missing for %s", 0, 0};
62
63struct complaint stab_info_questionable_complaint =
64 {"elf/stab section information questionable for %s", 0, 0};
65
1ab3bf1b 66static void
80d68b1d 67elf_symfile_init PARAMS ((struct objfile *));
1ab3bf1b
JG
68
69static void
80d68b1d 70elf_new_init PARAMS ((struct objfile *));
1ab3bf1b
JG
71
72static void
2670f34d 73elf_symfile_read PARAMS ((struct objfile *, struct section_offsets *, int));
80d68b1d
FF
74
75static void
76elf_symfile_finish PARAMS ((struct objfile *));
1ab3bf1b
JG
77
78static void
0683ac4b 79elf_symtab_read PARAMS ((bfd *, CORE_ADDR, struct objfile *, int));
1ab3bf1b 80
2670f34d 81static void
77fe3f84 82free_elfinfo PARAMS ((void *));
2670f34d
JG
83
84static struct section_offsets *
85elf_symfile_offsets PARAMS ((struct objfile *, CORE_ADDR));
86
51b57ded
FF
87static void
88record_minimal_symbol_and_info PARAMS ((char *, CORE_ADDR,
89 enum minimal_symbol_type, char *,
90 struct objfile *));
1ab3bf1b
JG
91
92static void
77fe3f84 93elf_locate_sections PARAMS ((bfd *, asection *, void *));
1ab3bf1b 94
35f5886e
FF
95/* We are called once per section from elf_symfile_read. We
96 need to examine each section we are passed, check to see
97 if it is something we are interested in processing, and
98 if so, stash away some access information for the section.
99
100 For now we recognize the dwarf debug information sections and
101 line number sections from matching their section names. The
102 ELF definition is no real help here since it has no direct
103 knowledge of DWARF (by design, so any debugging format can be
104 used).
105
346168a2
JG
106 We also recognize the ".stab" sections used by the Sun compilers
107 released with Solaris 2.
108
898140fe
JK
109 FIXME: The section names should not be hardwired strings (what
110 should they be? I don't think most object file formats have enough
111 section flags to specify what kind of debug section it is
112 -kingdon). */
35f5886e
FF
113
114static void
be772100
JG
115elf_locate_sections (ignore_abfd, sectp, eip)
116 bfd *ignore_abfd;
1ab3bf1b
JG
117 asection *sectp;
118 PTR eip;
35f5886e 119{
1ab3bf1b
JG
120 register struct elfinfo *ei;
121
122 ei = (struct elfinfo *) eip;
35f5886e
FF
123 if (STREQ (sectp -> name, ".debug"))
124 {
125 ei -> dboffset = sectp -> filepos;
e5849334 126 ei -> dbsize = bfd_get_section_size_before_reloc (sectp);
35f5886e
FF
127 }
128 else if (STREQ (sectp -> name, ".line"))
129 {
130 ei -> lnoffset = sectp -> filepos;
e5849334 131 ei -> lnsize = bfd_get_section_size_before_reloc (sectp);
35f5886e 132 }
346168a2
JG
133 else if (STREQ (sectp -> name, ".stab"))
134 {
135 ei -> stabsect = sectp;
136 }
137 else if (STREQ (sectp -> name, ".stab.index"))
138 {
139 ei -> stabindexsect = sectp;
140 }
e03c0cc6
ILT
141 else if (STREQ (sectp -> name, ".mdebug"))
142 {
143 ei -> mdebugsect = sectp;
144 }
35f5886e
FF
145}
146
1ab3bf1b
JG
147#if 0 /* Currently unused */
148
f8b76e70 149char *
1ab3bf1b
JG
150elf_interpreter (abfd)
151 bfd *abfd;
f8b76e70
FF
152{
153 sec_ptr interp_sec;
154 unsigned size;
155 char *interp = NULL;
156
157 interp_sec = bfd_get_section_by_name (abfd, ".interp");
158 if (interp_sec)
159 {
160 size = bfd_section_size (abfd, interp_sec);
161 interp = alloca (size);
162 if (bfd_get_section_contents (abfd, interp_sec, interp, (file_ptr)0,
163 size))
164 {
165 interp = savestring (interp, size - 1);
166 }
167 else
168 {
169 interp = NULL;
170 }
171 }
172 return (interp);
173}
174
1ab3bf1b
JG
175#endif
176
346168a2
JG
177static void
178record_minimal_symbol_and_info (name, address, ms_type, info, objfile)
179 char *name;
180 CORE_ADDR address;
181 enum minimal_symbol_type ms_type;
182 char *info; /* FIXME, is this really char *? */
183 struct objfile *objfile;
184{
610a7e74
ILT
185 int section;
186
187 /* Guess the section from the type. This is likely to be wrong in
188 some cases. */
189 switch (ms_type)
190 {
191 case mst_text:
192 case mst_file_text:
193 section = SECT_OFF_TEXT;
9fdb3f7a
JK
194#ifdef SMASH_TEXT_ADDRESS
195 SMASH_TEXT_ADDRESS (address);
196#endif
610a7e74
ILT
197 break;
198 case mst_data:
199 case mst_file_data:
200 section = SECT_OFF_DATA;
201 break;
202 case mst_bss:
203 case mst_file_bss:
204 section = SECT_OFF_BSS;
205 break;
206 default:
207 section = -1;
208 break;
209 }
210
346168a2 211 name = obsavestring (name, strlen (name), &objfile -> symbol_obstack);
8d60affd
JK
212 prim_record_minimal_symbol_and_info (name, address, ms_type, info, section,
213 objfile);
346168a2
JG
214}
215
f8b76e70
FF
216/*
217
218LOCAL FUNCTION
219
220 elf_symtab_read -- read the symbol table of an ELF file
221
222SYNOPSIS
223
be772100 224 void elf_symtab_read (bfd *abfd, CORE_ADDR addr,
1ab3bf1b 225 struct objfile *objfile)
f8b76e70
FF
226
227DESCRIPTION
228
229 Given an open bfd, a base address to relocate symbols to, and a
230 flag that specifies whether or not this bfd is for an executable
231 or not (may be shared library for example), add all the global
1ab3bf1b 232 function and data symbols to the minimal symbol table.
f8b76e70 233
2670f34d
JG
234 In stabs-in-ELF, as implemented by Sun, there are some local symbols
235 defined in the ELF symbol table, which can be used to locate
236 the beginnings of sections from each ".o" file that was linked to
237 form the executable objfile. We gather any such info and record it
238 in data structures hung off the objfile's private data.
239
f8b76e70
FF
240*/
241
a7446af6 242static void
0683ac4b 243elf_symtab_read (abfd, addr, objfile, dynamic)
1ab3bf1b
JG
244 bfd *abfd;
245 CORE_ADDR addr;
1ab3bf1b 246 struct objfile *objfile;
0683ac4b 247 int dynamic;
a7446af6 248{
70f42bae 249 long storage_needed;
a7446af6
FF
250 asymbol *sym;
251 asymbol **symbol_table;
70f42bae
ILT
252 long number_of_symbols;
253 long i;
2670f34d 254 int index;
a7446af6 255 struct cleanup *back_to;
f8b76e70 256 CORE_ADDR symaddr;
1ab3bf1b 257 enum minimal_symbol_type ms_type;
6c8f91a1 258 /* If sectinfo is nonNULL, it contains section info that should end up
2670f34d 259 filed in the objfile. */
6c8f91a1 260 struct stab_section_info *sectinfo = NULL;
2670f34d
JG
261 /* If filesym is nonzero, it points to a file symbol, but we haven't
262 seen any section info for it yet. */
263 asymbol *filesym = 0;
264 struct dbx_symfile_info *dbx = (struct dbx_symfile_info *)
965a5c32 265 objfile->sym_stab_info;
6c8f91a1 266 unsigned long size;
0683ac4b
PS
267 int stripped = (bfd_get_symcount (abfd) == 0);
268
269 if (dynamic)
270 storage_needed = bfd_get_dynamic_symtab_upper_bound (abfd);
271 else
272 storage_needed = bfd_get_symtab_upper_bound (abfd);
70f42bae
ILT
273 if (storage_needed < 0)
274 error ("Can't read symbols from %s: %s", bfd_get_filename (abfd),
275 bfd_errmsg (bfd_get_error ()));
a7446af6
FF
276 if (storage_needed > 0)
277 {
3b0b9220 278 symbol_table = (asymbol **) xmalloc (storage_needed);
a7446af6 279 back_to = make_cleanup (free, symbol_table);
0683ac4b
PS
280 if (dynamic)
281 number_of_symbols = bfd_canonicalize_dynamic_symtab (abfd,
282 symbol_table);
283 else
284 number_of_symbols = bfd_canonicalize_symtab (abfd, symbol_table);
70f42bae
ILT
285 if (number_of_symbols < 0)
286 error ("Can't read symbols from %s: %s", bfd_get_filename (abfd),
287 bfd_errmsg (bfd_get_error ()));
a7446af6
FF
288 for (i = 0; i < number_of_symbols; i++)
289 {
2670f34d 290 sym = symbol_table[i];
6c8f91a1 291 if (sym -> name == NULL || *sym -> name == '\0')
379dd965 292 {
6c8f91a1
FF
293 /* Skip names that don't exist (shouldn't happen), or names
294 that are null strings (may happen). */
379dd965
FF
295 continue;
296 }
0683ac4b
PS
297
298 /* If it is a nonstripped executable, do not enter dynamic
299 symbols, as the dynamic symbol table is usually a subset
300 of the main symbol table.
301 On Irix 5 however, the symbols for the procedure linkage
302 table entries have meaningful values only in the dynamic
303 symbol table, so we always examine undefined symbols. */
304 if (dynamic && !stripped && sym -> section != &bfd_und_section)
305 continue;
6c8f91a1
FF
306 if (sym -> flags & BSF_FILE)
307 {
308 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
309 Chain any old one onto the objfile; remember new sym. */
310 if (sectinfo != NULL)
311 {
312 sectinfo -> next = dbx -> stab_section_info;
313 dbx -> stab_section_info = sectinfo;
314 sectinfo = NULL;
315 }
316 filesym = sym;
317 }
318 else if (sym -> flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
a7446af6 319 {
6c8f91a1
FF
320 /* Select global/local/weak symbols. Note that bfd puts abs
321 symbols in their own section, so all symbols we are
322 interested in will have a section. */
a608f919
FF
323 /* Bfd symbols are section relative. */
324 symaddr = sym -> value + sym -> section -> vma;
c2e4669f
JG
325 /* Relocate all non-absolute symbols by base address. */
326 if (sym -> section != &bfd_abs_section)
6c8f91a1
FF
327 {
328 symaddr += addr;
329 }
f8b76e70
FF
330 /* For non-absolute symbols, use the type of the section
331 they are relative to, to intuit text/data. Bfd provides
332 no way of figuring this out for absolute symbols. */
38b90473
PS
333 if (sym -> section == &bfd_und_section
334 && (sym -> flags & BSF_GLOBAL)
335 && (sym -> flags & BSF_FUNCTION))
336 {
337 /* Symbol is a reference to a function defined in
338 a shared library.
339 If its value is non zero then it is usually the
340 absolute address of the corresponding entry in
341 the procedure linkage table.
342 If its value is zero then the dynamic linker has to
343 resolve the symbol. We are unable to find any
344 meaningful address for this symbol in the
345 executable file, so we skip it.
346 Irix 5 has a zero value for all shared library functions
0683ac4b
PS
347 in the main symbol table, but the dynamic symbol table
348 provides the right values. */
38b90473
PS
349 ms_type = mst_solib_trampoline;
350 symaddr = sym -> value;
351 if (symaddr == 0)
352 continue;
353 }
354 else if (sym -> section == &bfd_abs_section)
6c8f91a1 355 {
0683ac4b
PS
356 /* This is a hack to get the minimal symbol type
357 right for Irix 5, which has absolute adresses
358 with special section indices for dynamic symbols. */
359 unsigned short shndx =
360 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
361
362 switch (shndx)
363 {
364 case SHN_MIPS_TEXT:
365 ms_type = mst_text;
366 break;
367 case SHN_MIPS_DATA:
368 ms_type = mst_data;
369 break;
370 case SHN_MIPS_ACOMMON:
371 ms_type = mst_bss;
372 break;
373 default:
374 ms_type = mst_abs;
375 }
6c8f91a1
FF
376 }
377 else if (sym -> section -> flags & SEC_CODE)
f8b76e70 378 {
379dd965
FF
379 if (sym -> flags & BSF_GLOBAL)
380 {
381 ms_type = mst_text;
382 }
5ec3ba25 383 else if (sym->name[0] == '.' && sym->name[1] == 'L')
bbf1ff10
JK
384 /* Looks like a compiler-generated label. Skip it.
385 The assembler should be skipping these (to keep
386 executables small), but apparently with gcc on the
387 delta m88k SVR4, it loses. So to have us check too
388 should be harmless (but I encourage people to fix this
389 in the assembler instead of adding checks here). */
5ec3ba25 390 continue;
379dd965
FF
391 else
392 {
393 ms_type = mst_file_text;
394 }
f8b76e70 395 }
90141f9c 396 else if (sym -> section -> flags & SEC_ALLOC)
f8b76e70 397 {
379dd965
FF
398 if (sym -> flags & BSF_GLOBAL)
399 {
90141f9c 400 if (sym -> section -> flags & SEC_LOAD)
379dd965
FF
401 {
402 ms_type = mst_data;
403 }
404 else
405 {
406 ms_type = mst_bss;
407 }
408 }
6c8f91a1 409 else if (sym -> flags & BSF_LOCAL)
379dd965 410 {
6c8f91a1
FF
411 /* Named Local variable in a Data section. Check its
412 name for stabs-in-elf. The STREQ macro checks the
413 first character inline, so we only actually do a
414 strcmp function call on names that start with 'B'
415 or 'D' */
416 index = SECT_OFF_MAX;
417 if (STREQ ("Bbss.bss", sym -> name))
418 {
419 index = SECT_OFF_BSS;
420 }
421 else if (STREQ ("Ddata.data", sym -> name))
422 {
423 index = SECT_OFF_DATA;
424 }
425 else if (STREQ ("Drodata.rodata", sym -> name))
426 {
427 index = SECT_OFF_RODATA;
428 }
429 if (index != SECT_OFF_MAX)
430 {
431 /* Found a special local symbol. Allocate a
432 sectinfo, if needed, and fill it in. */
433 if (sectinfo == NULL)
434 {
435 sectinfo = (struct stab_section_info *)
436 xmmalloc (objfile -> md, sizeof (*sectinfo));
437 memset ((PTR) sectinfo, 0, sizeof (*sectinfo));
438 if (filesym == NULL)
439 {
440 complain (&section_info_complaint,
441 sym -> name);
442 }
443 else
444 {
445 sectinfo -> filename =
446 (char *) filesym -> name;
447 }
448 }
449 if (sectinfo -> sections[index] != 0)
450 {
451 complain (&section_info_dup_complaint,
452 sectinfo -> filename);
453 }
454 /* Bfd symbols are section relative. */
455 symaddr = sym -> value + sym -> section -> vma;
456 /* Relocate non-absolute symbols by base address. */
457 if (sym -> section != &bfd_abs_section)
458 {
459 symaddr += addr;
460 }
461 sectinfo -> sections[index] = symaddr;
462 /* The special local symbols don't go in the
463 minimal symbol table, so ignore this one. */
464 continue;
465 }
466 /* Not a special stabs-in-elf symbol, do regular
467 symbol processing. */
90141f9c 468 if (sym -> section -> flags & SEC_LOAD)
379dd965
FF
469 {
470 ms_type = mst_file_data;
471 }
472 else
473 {
474 ms_type = mst_file_bss;
475 }
476 }
6c8f91a1
FF
477 else
478 {
479 ms_type = mst_unknown;
480 }
f8b76e70
FF
481 }
482 else
483 {
4c7c6bab
JG
484 /* FIXME: Solaris2 shared libraries include lots of
485 odd "absolute" and "undefined" symbols, that play
486 hob with actions like finding what function the PC
379dd965 487 is in. Ignore them if they aren't text, data, or bss. */
4c7c6bab
JG
488 /* ms_type = mst_unknown; */
489 continue; /* Skip this symbol. */
f8b76e70 490 }
346168a2 491 /* Pass symbol size field in via BFD. FIXME!!! */
538b2068 492 size = ((elf_symbol_type *) sym) -> internal_elf_sym.st_size;
6c8f91a1
FF
493 record_minimal_symbol_and_info ((char *) sym -> name, symaddr,
494 ms_type, (PTR) size, objfile);
2670f34d 495 }
a7446af6
FF
496 }
497 do_cleanups (back_to);
498 }
499}
500
35f5886e
FF
501/* Scan and build partial symbols for a symbol file.
502 We have been initialized by a call to elf_symfile_init, which
503 currently does nothing.
504
2670f34d
JG
505 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
506 in each section. We simplify it down to a single offset for all
507 symbols. FIXME.
35f5886e
FF
508
509 MAINLINE is true if we are reading the main symbol
510 table (as opposed to a shared lib or dynamically loaded file).
511
512 This function only does the minimum work necessary for letting the
513 user "name" things symbolically; it does not read the entire symtab.
514 Instead, it reads the external and static symbols and puts them in partial
515 symbol tables. When more extensive information is requested of a
516 file, the corresponding partial symbol table is mutated into a full
517 fledged symbol table by going back and reading the symbols
346168a2
JG
518 for real.
519
520 We look for sections with specific names, to tell us what debug
521 format to look for: FIXME!!!
522
523 dwarf_build_psymtabs() builds psymtabs for DWARF symbols;
e03c0cc6
ILT
524 elfstab_build_psymtabs() handles STABS symbols;
525 mdebug_build_psymtabs() handles ECOFF debugging information.
a7446af6
FF
526
527 Note that ELF files have a "minimal" symbol table, which looks a lot
528 like a COFF symbol table, but has only the minimal information necessary
346168a2
JG
529 for linking. We process this also, and use the information to
530 build gdb's minimal symbol table. This gives us some minimal debugging
531 capability even for files compiled without -g. */
35f5886e
FF
532
533static void
2670f34d 534elf_symfile_read (objfile, section_offsets, mainline)
80d68b1d 535 struct objfile *objfile;
2670f34d 536 struct section_offsets *section_offsets;
1ab3bf1b 537 int mainline;
35f5886e 538{
80d68b1d 539 bfd *abfd = objfile->obfd;
35f5886e 540 struct elfinfo ei;
a7446af6 541 struct cleanup *back_to;
346168a2 542 CORE_ADDR offset;
35f5886e 543
1ab3bf1b
JG
544 init_minimal_symbol_collection ();
545 back_to = make_cleanup (discard_minimal_symbols, 0);
a7446af6 546
2670f34d 547 memset ((char *) &ei, 0, sizeof (ei));
6b801388 548
2670f34d 549 /* Allocate struct to keep track of the symfile */
965a5c32 550 objfile->sym_stab_info = (PTR)
2670f34d 551 xmmalloc (objfile -> md, sizeof (struct dbx_symfile_info));
965a5c32 552 memset ((char *) objfile->sym_stab_info, 0, sizeof (struct dbx_symfile_info));
2670f34d 553 make_cleanup (free_elfinfo, (PTR) objfile);
6b801388 554
2670f34d 555 /* Process the normal ELF symbol table first. This may write some
965a5c32 556 chain of info into the dbx_symfile_info in objfile->sym_stab_info,
2670f34d 557 which can later be used by elfstab_offset_sections. */
a7446af6 558
2670f34d
JG
559 /* FIXME, should take a section_offsets param, not just an offset. */
560 offset = ANOFFSET (section_offsets, 0);
0683ac4b
PS
561 elf_symtab_read (abfd, offset, objfile, 0);
562
563 /* Add the dynamic symbols if we are reading the main symbol table. */
564
565 if (mainline)
566 elf_symtab_read (abfd, offset, objfile, 1);
a7446af6 567
346168a2 568 /* Now process debugging information, which is contained in
a7446af6
FF
569 special ELF sections. We first have to find them... */
570
1ab3bf1b 571 bfd_map_over_sections (abfd, elf_locate_sections, (PTR) &ei);
35f5886e
FF
572 if (ei.dboffset && ei.lnoffset)
573 {
346168a2 574 /* DWARF sections */
d5931d79 575 dwarf_build_psymtabs (objfile,
2670f34d 576 section_offsets, mainline,
35f5886e 577 ei.dboffset, ei.dbsize,
d5931d79 578 ei.lnoffset, ei.lnsize);
35f5886e 579 }
346168a2
JG
580 if (ei.stabsect)
581 {
582 /* STABS sections */
583
584 /* FIXME: Sun didn't really know how to implement this well.
585 They made .stab sections that don't point to the .stabstr
586 section with the sh_link field. BFD doesn't make string table
587 sections visible to the caller. So we have to search the
588 ELF section table, not the BFD section table, for the string
589 table. */
2084a176 590 struct elf32_internal_shdr *elf_sect;
346168a2 591
872dd3fe 592 elf_sect = bfd_elf_find_section (abfd, ".stabstr");
346168a2
JG
593 if (elf_sect)
594 elfstab_build_psymtabs (objfile,
2670f34d 595 section_offsets,
346168a2
JG
596 mainline,
597 ei.stabsect->filepos, /* .stab offset */
598 bfd_get_section_size_before_reloc (ei.stabsect),/* .stab size */
d5931d79 599 (file_ptr) elf_sect->sh_offset, /* .stabstr offset */
346168a2
JG
600 elf_sect->sh_size); /* .stabstr size */
601 }
e03c0cc6
ILT
602 if (ei.mdebugsect)
603 {
604 const struct ecoff_debug_swap *swap;
605
606 /* .mdebug section, presumably holding ECOFF debugging
607 information. */
608 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
609 if (swap)
610 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect,
611 section_offsets);
612 }
a7446af6 613
1ab3bf1b 614 if (!have_partial_symbols ())
35f5886e
FF
615 {
616 wrap_here ("");
617 printf_filtered ("(no debugging symbols found)...");
618 wrap_here ("");
619 }
a7446af6 620
1ab3bf1b
JG
621 /* Install any minimal symbols that have been collected as the current
622 minimal symbols for this objfile. */
623
80d68b1d 624 install_minimal_symbols (objfile);
1ab3bf1b 625
a7446af6 626 do_cleanups (back_to);
35f5886e
FF
627}
628
965a5c32 629/* This cleans up the objfile's sym_stab_info pointer, and the chain of
2670f34d
JG
630 stab_section_info's, that might be dangling from it. */
631
632static void
633free_elfinfo (objp)
634 PTR objp;
635{
636 struct objfile *objfile = (struct objfile *)objp;
637 struct dbx_symfile_info *dbxinfo = (struct dbx_symfile_info *)
965a5c32 638 objfile->sym_stab_info;
2670f34d
JG
639 struct stab_section_info *ssi, *nssi;
640
641 ssi = dbxinfo->stab_section_info;
642 while (ssi)
643 {
644 nssi = ssi->next;
645 mfree (objfile->md, ssi);
646 ssi = nssi;
647 }
648
649 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
650}
651
652
35f5886e
FF
653/* Initialize anything that needs initializing when a completely new symbol
654 file is specified (not just adding some symbols from another file, e.g. a
655 shared library).
656
346168a2 657 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
35f5886e
FF
658
659static void
be772100
JG
660elf_new_init (ignore)
661 struct objfile *ignore;
80d68b1d 662{
d07734e3 663 stabsread_new_init ();
80d68b1d
FF
664 buildsym_new_init ();
665}
666
667/* Perform any local cleanups required when we are done with a particular
668 objfile. I.E, we are in the process of discarding all symbol information
669 for an objfile, freeing up all memory held for it, and unlinking the
670 objfile struct from the global list of known objfiles. */
671
672static void
673elf_symfile_finish (objfile)
674 struct objfile *objfile;
35f5886e 675{
965a5c32 676 if (objfile -> sym_stab_info != NULL)
80d68b1d 677 {
965a5c32 678 mfree (objfile -> md, objfile -> sym_stab_info);
80d68b1d 679 }
35f5886e
FF
680}
681
682/* ELF specific initialization routine for reading symbols.
683
684 It is passed a pointer to a struct sym_fns which contains, among other
685 things, the BFD for the file whose symbols are being read, and a slot for
686 a pointer to "private data" which we can fill with goodies.
687
688 For now at least, we have nothing in particular to do, so this function is
689 just a stub. */
690
691static void
be772100
JG
692elf_symfile_init (ignore)
693 struct objfile *ignore;
35f5886e
FF
694{
695}
696
2670f34d
JG
697/* ELF specific parsing routine for section offsets.
698
699 Plain and simple for now. */
700
701static
702struct section_offsets *
703elf_symfile_offsets (objfile, addr)
704 struct objfile *objfile;
705 CORE_ADDR addr;
706{
707 struct section_offsets *section_offsets;
708 int i;
4d57c599
JK
709
710 objfile->num_sections = SECT_OFF_MAX;
2670f34d
JG
711 section_offsets = (struct section_offsets *)
712 obstack_alloc (&objfile -> psymbol_obstack,
4d57c599
JK
713 sizeof (struct section_offsets)
714 + sizeof (section_offsets->offsets) * (SECT_OFF_MAX-1));
2670f34d
JG
715
716 for (i = 0; i < SECT_OFF_MAX; i++)
717 ANOFFSET (section_offsets, i) = addr;
4d57c599 718
2670f34d
JG
719 return section_offsets;
720}
721\f
722/* When handling an ELF file that contains Sun STABS debug info,
723 some of the debug info is relative to the particular chunk of the
724 section that was generated in its individual .o file. E.g.
725 offsets to static variables are relative to the start of the data
726 segment *for that module before linking*. This information is
727 painfully squirreled away in the ELF symbol table as local symbols
728 with wierd names. Go get 'em when needed. */
729
730void
731elfstab_offset_sections (objfile, pst)
732 struct objfile *objfile;
733 struct partial_symtab *pst;
734{
735 char *filename = pst->filename;
736 struct dbx_symfile_info *dbx = (struct dbx_symfile_info *)
965a5c32 737 objfile->sym_stab_info;
2670f34d
JG
738 struct stab_section_info *maybe = dbx->stab_section_info;
739 struct stab_section_info *questionable = 0;
740 int i;
741 char *p;
742
743 /* The ELF symbol info doesn't include path names, so strip the path
744 (if any) from the psymtab filename. */
745 while (0 != (p = strchr (filename, '/')))
746 filename = p+1;
747
748 /* FIXME: This linear search could speed up significantly
749 if it was chained in the right order to match how we search it,
750 and if we unchained when we found a match. */
751 for (; maybe; maybe = maybe->next)
752 {
753 if (filename[0] == maybe->filename[0]
2e4964ad 754 && STREQ (filename, maybe->filename))
2670f34d
JG
755 {
756 /* We found a match. But there might be several source files
757 (from different directories) with the same name. */
758 if (0 == maybe->found)
759 break;
760 questionable = maybe; /* Might use it later. */
761 }
762 }
763
764 if (maybe == 0 && questionable != 0)
765 {
766 complain (&stab_info_questionable_complaint, filename);
767 maybe = questionable;
768 }
769
770 if (maybe)
771 {
772 /* Found it! Allocate a new psymtab struct, and fill it in. */
773 maybe->found++;
774 pst->section_offsets = (struct section_offsets *)
775 obstack_alloc (&objfile -> psymbol_obstack,
776 sizeof (struct section_offsets) +
777 sizeof (pst->section_offsets->offsets) * (SECT_OFF_MAX-1));
778
779 for (i = 0; i < SECT_OFF_MAX; i++)
780 ANOFFSET (pst->section_offsets, i) = maybe->sections[i];
781 return;
782 }
783
784 /* We were unable to find any offsets for this file. Complain. */
785 if (dbx->stab_section_info) /* If there *is* any info, */
786 complain (&stab_info_mismatch_complaint, filename);
787}
35f5886e 788\f
4d57c599 789/* Register that we are able to handle ELF object file formats. */
35f5886e 790
80d68b1d
FF
791static struct sym_fns elf_sym_fns =
792{
0eed42de 793 bfd_target_elf_flavour,
35f5886e
FF
794 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
795 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
796 elf_symfile_read, /* sym_read: read a symbol file into symtab */
80d68b1d 797 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
2670f34d 798 elf_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
35f5886e
FF
799 NULL /* next: pointer to next struct sym_fns */
800};
801
802void
1ab3bf1b 803_initialize_elfread ()
35f5886e
FF
804{
805 add_symtab_fns (&elf_sym_fns);
806}
This page took 0.198899 seconds and 4 git commands to generate.