2003-11-23 Michael Chastain <mec.gnu@mindspring.com>
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
c906108c 1/* Read ELF (Executable and Linking Format) object files for GDB.
1bac305b
AC
2
3 Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
4 2000, 2001, 2002, 2003 Free Software Foundation, Inc.
5
c906108c
SS
6 Written by Fred Fish at Cygnus Support.
7
c5aa993b 8 This file is part of GDB.
c906108c 9
c5aa993b
JM
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2 of the License, or
13 (at your option) any later version.
c906108c 14
c5aa993b
JM
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
c906108c 19
c5aa993b
JM
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
22 Foundation, Inc., 59 Temple Place - Suite 330,
23 Boston, MA 02111-1307, USA. */
c906108c
SS
24
25#include "defs.h"
26#include "bfd.h"
27#include "gdb_string.h"
28#include "elf-bfd.h"
29#include "elf/mips.h"
30#include "symtab.h"
31#include "symfile.h"
32#include "objfiles.h"
33#include "buildsym.h"
34#include "stabsread.h"
35#include "gdb-stabs.h"
36#include "complaints.h"
37#include "demangle.h"
38
a14ed312 39extern void _initialize_elfread (void);
392a587b 40
c906108c 41/* The struct elfinfo is available only during ELF symbol table and
6426a772 42 psymtab reading. It is destroyed at the completion of psymtab-reading.
c906108c
SS
43 It's local to elf_symfile_read. */
44
c5aa993b
JM
45struct elfinfo
46 {
47 file_ptr dboffset; /* Offset to dwarf debug section */
48 unsigned int dbsize; /* Size of dwarf debug section */
49 file_ptr lnoffset; /* Offset to dwarf line number section */
50 unsigned int lnsize; /* Size of dwarf line number section */
51 asection *stabsect; /* Section pointer for .stab section */
52 asection *stabindexsect; /* Section pointer for .stab.index section */
53 asection *mdebugsect; /* Section pointer for .mdebug section */
54 };
c906108c 55
12b9c64f 56static void free_elfinfo (void *);
c906108c
SS
57
58/* We are called once per section from elf_symfile_read. We
59 need to examine each section we are passed, check to see
60 if it is something we are interested in processing, and
61 if so, stash away some access information for the section.
62
63 For now we recognize the dwarf debug information sections and
64 line number sections from matching their section names. The
65 ELF definition is no real help here since it has no direct
66 knowledge of DWARF (by design, so any debugging format can be
67 used).
68
69 We also recognize the ".stab" sections used by the Sun compilers
70 released with Solaris 2.
71
72 FIXME: The section names should not be hardwired strings (what
73 should they be? I don't think most object file formats have enough
74 section flags to specify what kind of debug section it is
75 -kingdon). */
76
77static void
12b9c64f 78elf_locate_sections (bfd *ignore_abfd, asection *sectp, void *eip)
c906108c 79{
52f0bd74 80 struct elfinfo *ei;
c906108c
SS
81
82 ei = (struct elfinfo *) eip;
6314a349 83 if (strcmp (sectp->name, ".debug") == 0)
c906108c 84 {
c5aa993b
JM
85 ei->dboffset = sectp->filepos;
86 ei->dbsize = bfd_get_section_size_before_reloc (sectp);
c906108c 87 }
6314a349 88 else if (strcmp (sectp->name, ".line") == 0)
c906108c 89 {
c5aa993b
JM
90 ei->lnoffset = sectp->filepos;
91 ei->lnsize = bfd_get_section_size_before_reloc (sectp);
c906108c 92 }
6314a349 93 else if (strcmp (sectp->name, ".stab") == 0)
c906108c 94 {
c5aa993b 95 ei->stabsect = sectp;
c906108c 96 }
6314a349 97 else if (strcmp (sectp->name, ".stab.index") == 0)
c906108c 98 {
c5aa993b 99 ei->stabindexsect = sectp;
c906108c 100 }
6314a349 101 else if (strcmp (sectp->name, ".mdebug") == 0)
c906108c 102 {
c5aa993b 103 ei->mdebugsect = sectp;
c906108c
SS
104 }
105}
106
c906108c 107static struct minimal_symbol *
f594e5e9
MC
108record_minimal_symbol (char *name, CORE_ADDR address,
109 enum minimal_symbol_type ms_type,
110 asection *bfd_section, struct objfile *objfile)
c906108c 111{
bbeae047 112 if (ms_type == mst_text || ms_type == mst_file_text)
181c1381 113 address = SMASH_TEXT_ADDRESS (address);
c906108c
SS
114
115 return prim_record_minimal_symbol_and_info
f594e5e9 116 (name, address, ms_type, NULL, bfd_section->index, bfd_section, objfile);
c906108c
SS
117}
118
119/*
120
c5aa993b 121 LOCAL FUNCTION
c906108c 122
c5aa993b 123 elf_symtab_read -- read the symbol table of an ELF file
c906108c 124
c5aa993b 125 SYNOPSIS
c906108c 126
d4f3574e 127 void elf_symtab_read (struct objfile *objfile, int dynamic)
c906108c 128
c5aa993b 129 DESCRIPTION
c906108c 130
d4f3574e
SS
131 Given an objfile and a flag that specifies whether or not the objfile
132 is for an executable or not (may be shared library for example), add
133 all the global function and data symbols to the minimal symbol table.
c906108c 134
c5aa993b
JM
135 In stabs-in-ELF, as implemented by Sun, there are some local symbols
136 defined in the ELF symbol table, which can be used to locate
137 the beginnings of sections from each ".o" file that was linked to
138 form the executable objfile. We gather any such info and record it
139 in data structures hung off the objfile's private data.
c906108c 140
c5aa993b 141 */
c906108c
SS
142
143static void
fba45db2 144elf_symtab_read (struct objfile *objfile, int dynamic)
c906108c
SS
145{
146 long storage_needed;
147 asymbol *sym;
148 asymbol **symbol_table;
149 long number_of_symbols;
150 long i;
c906108c
SS
151 struct cleanup *back_to;
152 CORE_ADDR symaddr;
d4f3574e 153 CORE_ADDR offset;
c906108c
SS
154 enum minimal_symbol_type ms_type;
155 /* If sectinfo is nonNULL, it contains section info that should end up
156 filed in the objfile. */
157 struct stab_section_info *sectinfo = NULL;
158 /* If filesym is nonzero, it points to a file symbol, but we haven't
159 seen any section info for it yet. */
160 asymbol *filesym = 0;
161#ifdef SOFUN_ADDRESS_MAYBE_MISSING
162 /* Name of filesym, as saved on the symbol_obstack. */
163 char *filesymname = obsavestring ("", 0, &objfile->symbol_obstack);
164#endif
165 struct dbx_symfile_info *dbx = objfile->sym_stab_info;
d4f3574e 166 int stripped = (bfd_get_symcount (objfile->obfd) == 0);
c5aa993b 167
c906108c
SS
168 if (dynamic)
169 {
d4f3574e 170 storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd);
c906108c
SS
171
172 /* Nothing to be done if there is no dynamic symtab. */
173 if (storage_needed < 0)
174 return;
175 }
176 else
177 {
d4f3574e 178 storage_needed = bfd_get_symtab_upper_bound (objfile->obfd);
c906108c 179 if (storage_needed < 0)
d4f3574e 180 error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd),
c906108c
SS
181 bfd_errmsg (bfd_get_error ()));
182 }
183 if (storage_needed > 0)
184 {
185 symbol_table = (asymbol **) xmalloc (storage_needed);
b8c9b27d 186 back_to = make_cleanup (xfree, symbol_table);
c906108c 187 if (dynamic)
d4f3574e 188 number_of_symbols = bfd_canonicalize_dynamic_symtab (objfile->obfd,
c906108c
SS
189 symbol_table);
190 else
d4f3574e 191 number_of_symbols = bfd_canonicalize_symtab (objfile->obfd, symbol_table);
c906108c 192 if (number_of_symbols < 0)
d4f3574e 193 error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd),
c906108c 194 bfd_errmsg (bfd_get_error ()));
b8d39351 195
c906108c
SS
196 for (i = 0; i < number_of_symbols; i++)
197 {
198 sym = symbol_table[i];
c5aa993b 199 if (sym->name == NULL || *sym->name == '\0')
c906108c
SS
200 {
201 /* Skip names that don't exist (shouldn't happen), or names
c5aa993b 202 that are null strings (may happen). */
c906108c
SS
203 continue;
204 }
205
b8d39351 206 offset = ANOFFSET (objfile->section_offsets, sym->section->index);
c906108c 207 if (dynamic
c5aa993b
JM
208 && sym->section == &bfd_und_section
209 && (sym->flags & BSF_FUNCTION))
c906108c
SS
210 {
211 struct minimal_symbol *msym;
212
213 /* Symbol is a reference to a function defined in
c5aa993b
JM
214 a shared library.
215 If its value is non zero then it is usually the address
216 of the corresponding entry in the procedure linkage table,
d4f3574e 217 plus the desired section offset.
c5aa993b
JM
218 If its value is zero then the dynamic linker has to resolve
219 the symbol. We are unable to find any meaningful address
220 for this symbol in the executable file, so we skip it. */
221 symaddr = sym->value;
c906108c
SS
222 if (symaddr == 0)
223 continue;
d4f3574e 224 symaddr += offset;
f594e5e9 225 msym = record_minimal_symbol
c5aa993b 226 ((char *) sym->name, symaddr,
f594e5e9 227 mst_solib_trampoline, sym->section, objfile);
c906108c
SS
228#ifdef SOFUN_ADDRESS_MAYBE_MISSING
229 if (msym != NULL)
230 msym->filename = filesymname;
231#endif
232 continue;
233 }
234
235 /* If it is a nonstripped executable, do not enter dynamic
236 symbols, as the dynamic symbol table is usually a subset
237 of the main symbol table. */
238 if (dynamic && !stripped)
239 continue;
c5aa993b 240 if (sym->flags & BSF_FILE)
c906108c
SS
241 {
242 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
c5aa993b 243 Chain any old one onto the objfile; remember new sym. */
c906108c
SS
244 if (sectinfo != NULL)
245 {
c5aa993b
JM
246 sectinfo->next = dbx->stab_section_info;
247 dbx->stab_section_info = sectinfo;
c906108c
SS
248 sectinfo = NULL;
249 }
250 filesym = sym;
251#ifdef SOFUN_ADDRESS_MAYBE_MISSING
252 filesymname =
c5aa993b 253 obsavestring ((char *) filesym->name, strlen (filesym->name),
c906108c
SS
254 &objfile->symbol_obstack);
255#endif
256 }
c5aa993b 257 else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
c906108c
SS
258 {
259 struct minimal_symbol *msym;
260
261 /* Select global/local/weak symbols. Note that bfd puts abs
c5aa993b
JM
262 symbols in their own section, so all symbols we are
263 interested in will have a section. */
c906108c 264 /* Bfd symbols are section relative. */
c5aa993b 265 symaddr = sym->value + sym->section->vma;
d4f3574e 266 /* Relocate all non-absolute symbols by the section offset. */
c5aa993b 267 if (sym->section != &bfd_abs_section)
c906108c 268 {
d4f3574e 269 symaddr += offset;
c906108c
SS
270 }
271 /* For non-absolute symbols, use the type of the section
c5aa993b
JM
272 they are relative to, to intuit text/data. Bfd provides
273 no way of figuring this out for absolute symbols. */
274 if (sym->section == &bfd_abs_section)
c906108c
SS
275 {
276 /* This is a hack to get the minimal symbol type
11cf8741 277 right for Irix 5, which has absolute addresses
c906108c
SS
278 with special section indices for dynamic symbols. */
279 unsigned short shndx =
c5aa993b 280 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
c906108c
SS
281
282 switch (shndx)
283 {
284 case SHN_MIPS_TEXT:
285 ms_type = mst_text;
286 break;
287 case SHN_MIPS_DATA:
288 ms_type = mst_data;
289 break;
290 case SHN_MIPS_ACOMMON:
291 ms_type = mst_bss;
292 break;
293 default:
294 ms_type = mst_abs;
295 }
296
297 /* If it is an Irix dynamic symbol, skip section name
d4f3574e 298 symbols, relocate all others by section offset. */
c906108c
SS
299 if (ms_type != mst_abs)
300 {
301 if (sym->name[0] == '.')
302 continue;
d4f3574e 303 symaddr += offset;
c906108c
SS
304 }
305 }
c5aa993b 306 else if (sym->section->flags & SEC_CODE)
c906108c 307 {
389e51db 308 if (sym->flags & BSF_GLOBAL)
c906108c
SS
309 {
310 ms_type = mst_text;
311 }
312 else if ((sym->name[0] == '.' && sym->name[1] == 'L')
c5aa993b 313 || ((sym->flags & BSF_LOCAL)
c906108c
SS
314 && sym->name[0] == '$'
315 && sym->name[1] == 'L'))
7fb623f7
AC
316 /* Looks like a compiler-generated label. Skip
317 it. The assembler should be skipping these (to
318 keep executables small), but apparently with
1b831c93
AC
319 gcc on the (deleted) delta m88k SVR4, it loses.
320 So to have us check too should be harmless (but
321 I encourage people to fix this in the assembler
322 instead of adding checks here). */
c906108c 323 continue;
c906108c
SS
324 else
325 {
326 ms_type = mst_file_text;
327 }
328 }
c5aa993b 329 else if (sym->section->flags & SEC_ALLOC)
c906108c 330 {
bbeae047 331 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
c906108c 332 {
c5aa993b 333 if (sym->section->flags & SEC_LOAD)
c906108c
SS
334 {
335 ms_type = mst_data;
336 }
337 else
338 {
339 ms_type = mst_bss;
340 }
341 }
c5aa993b 342 else if (sym->flags & BSF_LOCAL)
c906108c 343 {
9a90a780
AC
344 /* Named Local variable in a Data section.
345 Check its name for stabs-in-elf. The STREQ
346 macro checks the first character inline, so
347 we only actually do a strcmp function call on
348 names that start with 'B' or 'D'. */
349 int special_local_sect;
350 if (strcmp ("Bbss.bss", sym->name) == 0)
351 special_local_sect = SECT_OFF_BSS (objfile);
352 else if (strcmp ("Ddata.data", sym->name) == 0)
353 special_local_sect = SECT_OFF_DATA (objfile);
354 else if (strcmp ("Drodata.rodata", sym->name) == 0)
355 special_local_sect = SECT_OFF_RODATA (objfile);
356 else
357 special_local_sect = -1;
358 if (special_local_sect >= 0)
c906108c
SS
359 {
360 /* Found a special local symbol. Allocate a
361 sectinfo, if needed, and fill it in. */
362 if (sectinfo == NULL)
363 {
a39a16c4
MM
364 int max_index;
365 size_t size;
366
367 max_index
368 = max (SECT_OFF_BSS (objfile),
369 max (SECT_OFF_DATA (objfile),
370 SECT_OFF_RODATA (objfile)));
e372db49
JB
371
372 /* max_index is the largest index we'll
373 use into this array, so we must
374 allocate max_index+1 elements for it.
375 However, 'struct stab_section_info'
376 already includes one element, so we
377 need to allocate max_index aadditional
378 elements. */
a39a16c4
MM
379 size = (sizeof (struct stab_section_info)
380 + (sizeof (CORE_ADDR)
e372db49 381 * max_index));
c906108c 382 sectinfo = (struct stab_section_info *)
a39a16c4
MM
383 xmmalloc (objfile->md, size);
384 memset (sectinfo, 0, size);
385 sectinfo->num_sections = max_index;
c906108c
SS
386 if (filesym == NULL)
387 {
23136709
KB
388 complaint (&symfile_complaints,
389 "elf/stab section information %s without a preceding file symbol",
390 sym->name);
c906108c
SS
391 }
392 else
393 {
c5aa993b
JM
394 sectinfo->filename =
395 (char *) filesym->name;
c906108c
SS
396 }
397 }
9a90a780
AC
398 if (sectinfo->sections[special_local_sect] != 0)
399 complaint (&symfile_complaints,
400 "duplicated elf/stab section information for %s",
401 sectinfo->filename);
402 /* BFD symbols are section relative. */
c5aa993b 403 symaddr = sym->value + sym->section->vma;
9a90a780
AC
404 /* Relocate non-absolute symbols by the
405 section offset. */
c5aa993b 406 if (sym->section != &bfd_abs_section)
9a90a780
AC
407 symaddr += offset;
408 sectinfo->sections[special_local_sect] = symaddr;
c906108c 409 /* The special local symbols don't go in the
9a90a780 410 minimal symbol table, so ignore this one. */
c906108c
SS
411 continue;
412 }
413 /* Not a special stabs-in-elf symbol, do regular
9a90a780 414 symbol processing. */
c5aa993b 415 if (sym->section->flags & SEC_LOAD)
c906108c
SS
416 {
417 ms_type = mst_file_data;
418 }
419 else
420 {
421 ms_type = mst_file_bss;
422 }
423 }
424 else
425 {
426 ms_type = mst_unknown;
427 }
428 }
429 else
430 {
431 /* FIXME: Solaris2 shared libraries include lots of
432 odd "absolute" and "undefined" symbols, that play
433 hob with actions like finding what function the PC
434 is in. Ignore them if they aren't text, data, or bss. */
435 /* ms_type = mst_unknown; */
c5aa993b 436 continue; /* Skip this symbol. */
c906108c 437 }
f594e5e9 438 msym = record_minimal_symbol
c5aa993b 439 ((char *) sym->name, symaddr,
f594e5e9
MC
440 ms_type, sym->section, objfile);
441 if (msym)
442 {
443 /* Pass symbol size field in via BFD. FIXME!!! */
444 unsigned long size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
445 MSYMBOL_SIZE(msym) = size;
446 }
c906108c
SS
447#ifdef SOFUN_ADDRESS_MAYBE_MISSING
448 if (msym != NULL)
449 msym->filename = filesymname;
450#endif
c5aa993b 451 ELF_MAKE_MSYMBOL_SPECIAL (sym, msym);
c906108c
SS
452 }
453 }
454 do_cleanups (back_to);
455 }
456}
457
458/* Scan and build partial symbols for a symbol file.
459 We have been initialized by a call to elf_symfile_init, which
460 currently does nothing.
461
462 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
463 in each section. We simplify it down to a single offset for all
464 symbols. FIXME.
465
466 MAINLINE is true if we are reading the main symbol
467 table (as opposed to a shared lib or dynamically loaded file).
468
469 This function only does the minimum work necessary for letting the
470 user "name" things symbolically; it does not read the entire symtab.
471 Instead, it reads the external and static symbols and puts them in partial
472 symbol tables. When more extensive information is requested of a
473 file, the corresponding partial symbol table is mutated into a full
474 fledged symbol table by going back and reading the symbols
475 for real.
476
477 We look for sections with specific names, to tell us what debug
478 format to look for: FIXME!!!
479
480 dwarf_build_psymtabs() builds psymtabs for DWARF symbols;
481 elfstab_build_psymtabs() handles STABS symbols;
482 mdebug_build_psymtabs() handles ECOFF debugging information.
483
484 Note that ELF files have a "minimal" symbol table, which looks a lot
485 like a COFF symbol table, but has only the minimal information necessary
486 for linking. We process this also, and use the information to
487 build gdb's minimal symbol table. This gives us some minimal debugging
488 capability even for files compiled without -g. */
489
490static void
fba45db2 491elf_symfile_read (struct objfile *objfile, int mainline)
c906108c
SS
492{
493 bfd *abfd = objfile->obfd;
494 struct elfinfo ei;
495 struct cleanup *back_to;
496 CORE_ADDR offset;
497
498 init_minimal_symbol_collection ();
56e290f4 499 back_to = make_cleanup_discard_minimal_symbols ();
c906108c
SS
500
501 memset ((char *) &ei, 0, sizeof (ei));
502
503 /* Allocate struct to keep track of the symfile */
504 objfile->sym_stab_info = (struct dbx_symfile_info *)
c5aa993b 505 xmmalloc (objfile->md, sizeof (struct dbx_symfile_info));
c906108c 506 memset ((char *) objfile->sym_stab_info, 0, sizeof (struct dbx_symfile_info));
12b9c64f 507 make_cleanup (free_elfinfo, (void *) objfile);
c906108c
SS
508
509 /* Process the normal ELF symbol table first. This may write some
510 chain of info into the dbx_symfile_info in objfile->sym_stab_info,
511 which can later be used by elfstab_offset_sections. */
512
d4f3574e 513 elf_symtab_read (objfile, 0);
c906108c
SS
514
515 /* Add the dynamic symbols. */
516
d4f3574e 517 elf_symtab_read (objfile, 1);
c906108c 518
7134143f
DJ
519 /* Install any minimal symbols that have been collected as the current
520 minimal symbols for this objfile. The debug readers below this point
521 should not generate new minimal symbols; if they do it's their
522 responsibility to install them. "mdebug" appears to be the only one
523 which will do this. */
524
525 install_minimal_symbols (objfile);
526 do_cleanups (back_to);
527
c906108c
SS
528 /* Now process debugging information, which is contained in
529 special ELF sections. */
530
531 /* If we are reinitializing, or if we have never loaded syms yet,
532 set table to empty. MAINLINE is cleared so that *_read_psymtab
533 functions do not all also re-initialize the psymbol table. */
534 if (mainline)
535 {
536 init_psymbol_list (objfile, 0);
537 mainline = 0;
538 }
539
540 /* We first have to find them... */
12b9c64f 541 bfd_map_over_sections (abfd, elf_locate_sections, (void *) & ei);
c906108c
SS
542
543 /* ELF debugging information is inserted into the psymtab in the
544 order of least informative first - most informative last. Since
545 the psymtab table is searched `most recent insertion first' this
546 increases the probability that more detailed debug information
547 for a section is found.
548
549 For instance, an object file might contain both .mdebug (XCOFF)
550 and .debug_info (DWARF2) sections then .mdebug is inserted first
551 (searched last) and DWARF2 is inserted last (searched first). If
552 we don't do this then the XCOFF info is found first - for code in
553 an included file XCOFF info is useless. */
554
555 if (ei.mdebugsect)
556 {
557 const struct ecoff_debug_swap *swap;
558
559 /* .mdebug section, presumably holding ECOFF debugging
c5aa993b 560 information. */
c906108c
SS
561 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
562 if (swap)
d4f3574e 563 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect);
c906108c
SS
564 }
565 if (ei.stabsect)
566 {
567 asection *str_sect;
568
569 /* Stab sections have an associated string table that looks like
c5aa993b 570 a separate section. */
c906108c
SS
571 str_sect = bfd_get_section_by_name (abfd, ".stabstr");
572
573 /* FIXME should probably warn about a stab section without a stabstr. */
574 if (str_sect)
575 elfstab_build_psymtabs (objfile,
c906108c 576 mainline,
086df311 577 ei.stabsect,
c906108c
SS
578 str_sect->filepos,
579 bfd_section_size (abfd, str_sect));
580 }
581 if (dwarf2_has_info (abfd))
582 {
583 /* DWARF 2 sections */
d4f3574e 584 dwarf2_build_psymtabs (objfile, mainline);
c906108c
SS
585 }
586 else if (ei.dboffset && ei.lnoffset)
587 {
588 /* DWARF sections */
589 dwarf_build_psymtabs (objfile,
d4f3574e 590 mainline,
c906108c
SS
591 ei.dboffset, ei.dbsize,
592 ei.lnoffset, ei.lnsize);
593 }
594
625b0b97
AC
595 /* FIXME: kettenis/20030504: This still needs to be integrated with
596 dwarf2read.c in a better way. */
597 dwarf2_build_frame_info (objfile);
c906108c
SS
598}
599
600/* This cleans up the objfile's sym_stab_info pointer, and the chain of
601 stab_section_info's, that might be dangling from it. */
602
603static void
12b9c64f 604free_elfinfo (void *objp)
c906108c 605{
c5aa993b 606 struct objfile *objfile = (struct objfile *) objp;
c906108c
SS
607 struct dbx_symfile_info *dbxinfo = objfile->sym_stab_info;
608 struct stab_section_info *ssi, *nssi;
609
610 ssi = dbxinfo->stab_section_info;
611 while (ssi)
612 {
613 nssi = ssi->next;
aac7f4ea 614 xmfree (objfile->md, ssi);
c906108c
SS
615 ssi = nssi;
616 }
617
618 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
619}
620
621
622/* Initialize anything that needs initializing when a completely new symbol
623 file is specified (not just adding some symbols from another file, e.g. a
624 shared library).
625
626 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
627
628static void
fba45db2 629elf_new_init (struct objfile *ignore)
c906108c
SS
630{
631 stabsread_new_init ();
632 buildsym_new_init ();
633}
634
635/* Perform any local cleanups required when we are done with a particular
636 objfile. I.E, we are in the process of discarding all symbol information
637 for an objfile, freeing up all memory held for it, and unlinking the
638 objfile struct from the global list of known objfiles. */
639
640static void
fba45db2 641elf_symfile_finish (struct objfile *objfile)
c906108c 642{
c5aa993b 643 if (objfile->sym_stab_info != NULL)
c906108c 644 {
aac7f4ea 645 xmfree (objfile->md, objfile->sym_stab_info);
c906108c
SS
646 }
647}
648
649/* ELF specific initialization routine for reading symbols.
650
651 It is passed a pointer to a struct sym_fns which contains, among other
652 things, the BFD for the file whose symbols are being read, and a slot for
653 a pointer to "private data" which we can fill with goodies.
654
655 For now at least, we have nothing in particular to do, so this function is
656 just a stub. */
657
658static void
fba45db2 659elf_symfile_init (struct objfile *objfile)
c906108c
SS
660{
661 /* ELF objects may be reordered, so set OBJF_REORDERED. If we
662 find this causes a significant slowdown in gdb then we could
663 set it in the debug symbol readers only when necessary. */
664 objfile->flags |= OBJF_REORDERED;
665}
666
667/* When handling an ELF file that contains Sun STABS debug info,
668 some of the debug info is relative to the particular chunk of the
669 section that was generated in its individual .o file. E.g.
670 offsets to static variables are relative to the start of the data
671 segment *for that module before linking*. This information is
672 painfully squirreled away in the ELF symbol table as local symbols
673 with wierd names. Go get 'em when needed. */
674
675void
fba45db2 676elfstab_offset_sections (struct objfile *objfile, struct partial_symtab *pst)
c906108c
SS
677{
678 char *filename = pst->filename;
679 struct dbx_symfile_info *dbx = objfile->sym_stab_info;
680 struct stab_section_info *maybe = dbx->stab_section_info;
681 struct stab_section_info *questionable = 0;
682 int i;
683 char *p;
684
685 /* The ELF symbol info doesn't include path names, so strip the path
686 (if any) from the psymtab filename. */
687 while (0 != (p = strchr (filename, '/')))
c5aa993b 688 filename = p + 1;
c906108c
SS
689
690 /* FIXME: This linear search could speed up significantly
691 if it was chained in the right order to match how we search it,
692 and if we unchained when we found a match. */
693 for (; maybe; maybe = maybe->next)
694 {
695 if (filename[0] == maybe->filename[0]
6314a349 696 && strcmp (filename, maybe->filename) == 0)
c906108c
SS
697 {
698 /* We found a match. But there might be several source files
699 (from different directories) with the same name. */
700 if (0 == maybe->found)
701 break;
c5aa993b 702 questionable = maybe; /* Might use it later. */
c906108c
SS
703 }
704 }
705
706 if (maybe == 0 && questionable != 0)
707 {
23136709
KB
708 complaint (&symfile_complaints,
709 "elf/stab section information questionable for %s", filename);
c906108c
SS
710 maybe = questionable;
711 }
712
713 if (maybe)
714 {
715 /* Found it! Allocate a new psymtab struct, and fill it in. */
716 maybe->found++;
717 pst->section_offsets = (struct section_offsets *)
a39a16c4
MM
718 obstack_alloc (&objfile->psymbol_obstack,
719 SIZEOF_N_SECTION_OFFSETS (objfile->num_sections));
720 for (i = 0; i < maybe->num_sections; i++)
a4c8257b 721 (pst->section_offsets)->offsets[i] = maybe->sections[i];
c906108c
SS
722 return;
723 }
724
725 /* We were unable to find any offsets for this file. Complain. */
c5aa993b 726 if (dbx->stab_section_info) /* If there *is* any info, */
23136709
KB
727 complaint (&symfile_complaints,
728 "elf/stab section information missing for %s", filename);
c906108c
SS
729}
730\f
731/* Register that we are able to handle ELF object file formats. */
732
733static struct sym_fns elf_sym_fns =
734{
735 bfd_target_elf_flavour,
c5aa993b
JM
736 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
737 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
738 elf_symfile_read, /* sym_read: read a symbol file into symtab */
739 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
96baa820 740 default_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
c5aa993b 741 NULL /* next: pointer to next struct sym_fns */
c906108c
SS
742};
743
744void
fba45db2 745_initialize_elfread (void)
c906108c
SS
746{
747 add_symtab_fns (&elf_sym_fns);
748}
This page took 0.305987 seconds and 4 git commands to generate.