* config/tc-m68k.c (m68k_ip): Call frag_grow before adding a
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
35f5886e 1/* Read ELF (Executable and Linking Format) object files for GDB.
436d4143 2 Copyright 1991, 1992, 1993, 1994, 1995, 1996 Free Software Foundation, Inc.
35f5886e
FF
3 Written by Fred Fish at Cygnus Support.
4
5This file is part of GDB.
6
7This program is free software; you can redistribute it and/or modify
8it under the terms of the GNU General Public License as published by
9the Free Software Foundation; either version 2 of the License, or
10(at your option) any later version.
11
12This program is distributed in the hope that it will be useful,
13but WITHOUT ANY WARRANTY; without even the implied warranty of
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15GNU General Public License for more details.
16
17You should have received a copy of the GNU General Public License
18along with this program; if not, write to the Free Software
6c9638b4 19Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
35f5886e 20
35f5886e 21#include "defs.h"
35f5886e 22#include "bfd.h"
2b576293 23#include "gdb_string.h"
a99d0ef1 24#include "elf-bfd.h"
0683ac4b 25#include "elf/mips.h"
35f5886e 26#include "symtab.h"
1ab3bf1b 27#include "symfile.h"
5e2e79f8 28#include "objfiles.h"
be772100 29#include "buildsym.h"
2731625a 30#include "stabsread.h"
2670f34d 31#include "gdb-stabs.h"
51b80b00 32#include "complaints.h"
2e4964ad 33#include "demangle.h"
35f5886e 34
2670f34d
JG
35/* The struct elfinfo is available only during ELF symbol table and
36 psymtab reading. It is destroyed at the complation of psymtab-reading.
37 It's local to elf_symfile_read. */
38
35f5886e 39struct elfinfo {
d5931d79 40 file_ptr dboffset; /* Offset to dwarf debug section */
35f5886e 41 unsigned int dbsize; /* Size of dwarf debug section */
d5931d79 42 file_ptr lnoffset; /* Offset to dwarf line number section */
35f5886e 43 unsigned int lnsize; /* Size of dwarf line number section */
346168a2
JG
44 asection *stabsect; /* Section pointer for .stab section */
45 asection *stabindexsect; /* Section pointer for .stab.index section */
e03c0cc6 46 asection *mdebugsect; /* Section pointer for .mdebug section */
35f5886e
FF
47};
48
2670f34d
JG
49/* Various things we might complain about... */
50
51struct complaint section_info_complaint =
52 {"elf/stab section information %s without a preceding file symbol", 0, 0};
53
54struct complaint section_info_dup_complaint =
55 {"duplicated elf/stab section information for %s", 0, 0};
56
57struct complaint stab_info_mismatch_complaint =
58 {"elf/stab section information missing for %s", 0, 0};
59
60struct complaint stab_info_questionable_complaint =
61 {"elf/stab section information questionable for %s", 0, 0};
62
1ab3bf1b 63static void
80d68b1d 64elf_symfile_init PARAMS ((struct objfile *));
1ab3bf1b
JG
65
66static void
80d68b1d 67elf_new_init PARAMS ((struct objfile *));
1ab3bf1b
JG
68
69static void
2670f34d 70elf_symfile_read PARAMS ((struct objfile *, struct section_offsets *, int));
80d68b1d
FF
71
72static void
73elf_symfile_finish PARAMS ((struct objfile *));
1ab3bf1b
JG
74
75static void
0683ac4b 76elf_symtab_read PARAMS ((bfd *, CORE_ADDR, struct objfile *, int));
1ab3bf1b 77
2670f34d 78static void
77fe3f84 79free_elfinfo PARAMS ((void *));
2670f34d 80
2d336b1b 81static struct minimal_symbol *
51b57ded
FF
82record_minimal_symbol_and_info PARAMS ((char *, CORE_ADDR,
83 enum minimal_symbol_type, char *,
84 struct objfile *));
1ab3bf1b
JG
85
86static void
77fe3f84 87elf_locate_sections PARAMS ((bfd *, asection *, void *));
1ab3bf1b 88
35f5886e
FF
89/* We are called once per section from elf_symfile_read. We
90 need to examine each section we are passed, check to see
91 if it is something we are interested in processing, and
92 if so, stash away some access information for the section.
93
94 For now we recognize the dwarf debug information sections and
95 line number sections from matching their section names. The
96 ELF definition is no real help here since it has no direct
97 knowledge of DWARF (by design, so any debugging format can be
98 used).
99
346168a2
JG
100 We also recognize the ".stab" sections used by the Sun compilers
101 released with Solaris 2.
102
898140fe
JK
103 FIXME: The section names should not be hardwired strings (what
104 should they be? I don't think most object file formats have enough
105 section flags to specify what kind of debug section it is
106 -kingdon). */
35f5886e
FF
107
108static void
be772100
JG
109elf_locate_sections (ignore_abfd, sectp, eip)
110 bfd *ignore_abfd;
1ab3bf1b
JG
111 asection *sectp;
112 PTR eip;
35f5886e 113{
1ab3bf1b
JG
114 register struct elfinfo *ei;
115
116 ei = (struct elfinfo *) eip;
35f5886e
FF
117 if (STREQ (sectp -> name, ".debug"))
118 {
119 ei -> dboffset = sectp -> filepos;
e5849334 120 ei -> dbsize = bfd_get_section_size_before_reloc (sectp);
35f5886e
FF
121 }
122 else if (STREQ (sectp -> name, ".line"))
123 {
124 ei -> lnoffset = sectp -> filepos;
e5849334 125 ei -> lnsize = bfd_get_section_size_before_reloc (sectp);
35f5886e 126 }
346168a2
JG
127 else if (STREQ (sectp -> name, ".stab"))
128 {
129 ei -> stabsect = sectp;
130 }
131 else if (STREQ (sectp -> name, ".stab.index"))
132 {
133 ei -> stabindexsect = sectp;
134 }
e03c0cc6
ILT
135 else if (STREQ (sectp -> name, ".mdebug"))
136 {
137 ei -> mdebugsect = sectp;
138 }
35f5886e
FF
139}
140
1ab3bf1b
JG
141#if 0 /* Currently unused */
142
f8b76e70 143char *
1ab3bf1b
JG
144elf_interpreter (abfd)
145 bfd *abfd;
f8b76e70
FF
146{
147 sec_ptr interp_sec;
148 unsigned size;
149 char *interp = NULL;
150
151 interp_sec = bfd_get_section_by_name (abfd, ".interp");
152 if (interp_sec)
153 {
154 size = bfd_section_size (abfd, interp_sec);
155 interp = alloca (size);
156 if (bfd_get_section_contents (abfd, interp_sec, interp, (file_ptr)0,
157 size))
158 {
159 interp = savestring (interp, size - 1);
160 }
161 else
162 {
163 interp = NULL;
164 }
165 }
166 return (interp);
167}
168
1ab3bf1b
JG
169#endif
170
2d336b1b 171static struct minimal_symbol *
346168a2
JG
172record_minimal_symbol_and_info (name, address, ms_type, info, objfile)
173 char *name;
174 CORE_ADDR address;
175 enum minimal_symbol_type ms_type;
176 char *info; /* FIXME, is this really char *? */
177 struct objfile *objfile;
178{
610a7e74
ILT
179 int section;
180
181 /* Guess the section from the type. This is likely to be wrong in
182 some cases. */
183 switch (ms_type)
184 {
185 case mst_text:
186 case mst_file_text:
187 section = SECT_OFF_TEXT;
9fdb3f7a
JK
188#ifdef SMASH_TEXT_ADDRESS
189 SMASH_TEXT_ADDRESS (address);
190#endif
610a7e74
ILT
191 break;
192 case mst_data:
193 case mst_file_data:
194 section = SECT_OFF_DATA;
195 break;
196 case mst_bss:
197 case mst_file_bss:
198 section = SECT_OFF_BSS;
199 break;
200 default:
201 section = -1;
202 break;
203 }
204
2d336b1b
JK
205 return prim_record_minimal_symbol_and_info
206 (name, address, ms_type, info, section, objfile);
346168a2
JG
207}
208
f8b76e70
FF
209/*
210
211LOCAL FUNCTION
212
213 elf_symtab_read -- read the symbol table of an ELF file
214
215SYNOPSIS
216
be772100 217 void elf_symtab_read (bfd *abfd, CORE_ADDR addr,
a1a0d974 218 struct objfile *objfile, int dynamic)
f8b76e70
FF
219
220DESCRIPTION
221
222 Given an open bfd, a base address to relocate symbols to, and a
223 flag that specifies whether or not this bfd is for an executable
224 or not (may be shared library for example), add all the global
1ab3bf1b 225 function and data symbols to the minimal symbol table.
f8b76e70 226
2670f34d
JG
227 In stabs-in-ELF, as implemented by Sun, there are some local symbols
228 defined in the ELF symbol table, which can be used to locate
229 the beginnings of sections from each ".o" file that was linked to
230 form the executable objfile. We gather any such info and record it
231 in data structures hung off the objfile's private data.
232
f8b76e70
FF
233*/
234
a7446af6 235static void
0683ac4b 236elf_symtab_read (abfd, addr, objfile, dynamic)
1ab3bf1b
JG
237 bfd *abfd;
238 CORE_ADDR addr;
1ab3bf1b 239 struct objfile *objfile;
0683ac4b 240 int dynamic;
a7446af6 241{
70f42bae 242 long storage_needed;
a7446af6
FF
243 asymbol *sym;
244 asymbol **symbol_table;
70f42bae
ILT
245 long number_of_symbols;
246 long i;
2670f34d 247 int index;
a7446af6 248 struct cleanup *back_to;
f8b76e70 249 CORE_ADDR symaddr;
1ab3bf1b 250 enum minimal_symbol_type ms_type;
6c8f91a1 251 /* If sectinfo is nonNULL, it contains section info that should end up
2670f34d 252 filed in the objfile. */
6c8f91a1 253 struct stab_section_info *sectinfo = NULL;
2670f34d
JG
254 /* If filesym is nonzero, it points to a file symbol, but we haven't
255 seen any section info for it yet. */
256 asymbol *filesym = 0;
2d336b1b
JK
257#ifdef SOFUN_ADDRESS_MAYBE_MISSING
258 /* Name of filesym, as saved on the symbol_obstack. */
a1a0d974 259 char *filesymname = obsavestring ("", 0, &objfile->symbol_obstack);
2d336b1b 260#endif
2670f34d 261 struct dbx_symfile_info *dbx = (struct dbx_symfile_info *)
965a5c32 262 objfile->sym_stab_info;
6c8f91a1 263 unsigned long size;
0683ac4b
PS
264 int stripped = (bfd_get_symcount (abfd) == 0);
265
266 if (dynamic)
00306b1e
PS
267 {
268 storage_needed = bfd_get_dynamic_symtab_upper_bound (abfd);
269
270 /* Nothing to be done if there is no dynamic symtab. */
271 if (storage_needed < 0)
272 return;
273 }
0683ac4b 274 else
00306b1e
PS
275 {
276 storage_needed = bfd_get_symtab_upper_bound (abfd);
277 if (storage_needed < 0)
278 error ("Can't read symbols from %s: %s", bfd_get_filename (abfd),
279 bfd_errmsg (bfd_get_error ()));
280 }
a7446af6
FF
281 if (storage_needed > 0)
282 {
3b0b9220 283 symbol_table = (asymbol **) xmalloc (storage_needed);
a7446af6 284 back_to = make_cleanup (free, symbol_table);
0683ac4b
PS
285 if (dynamic)
286 number_of_symbols = bfd_canonicalize_dynamic_symtab (abfd,
287 symbol_table);
288 else
289 number_of_symbols = bfd_canonicalize_symtab (abfd, symbol_table);
70f42bae
ILT
290 if (number_of_symbols < 0)
291 error ("Can't read symbols from %s: %s", bfd_get_filename (abfd),
292 bfd_errmsg (bfd_get_error ()));
a7446af6
FF
293 for (i = 0; i < number_of_symbols; i++)
294 {
2670f34d 295 sym = symbol_table[i];
6c8f91a1 296 if (sym -> name == NULL || *sym -> name == '\0')
379dd965 297 {
6c8f91a1
FF
298 /* Skip names that don't exist (shouldn't happen), or names
299 that are null strings (may happen). */
379dd965
FF
300 continue;
301 }
0683ac4b 302
a1a0d974
PS
303 if (dynamic
304 && sym -> section == &bfd_und_section
de537409
PS
305 && (sym -> flags & BSF_FUNCTION))
306 {
a1a0d974
PS
307 struct minimal_symbol *msym;
308
de537409
PS
309 /* Symbol is a reference to a function defined in
310 a shared library.
311 If its value is non zero then it is usually the address
312 of the corresponding entry in the procedure linkage table,
313 relative to the base address.
314 If its value is zero then the dynamic linker has to resolve
315 the symbol. We are unable to find any meaningful address
a1a0d974 316 for this symbol in the executable file, so we skip it. */
de537409
PS
317 symaddr = sym -> value;
318 if (symaddr == 0)
319 continue;
320 symaddr += addr;
a1a0d974
PS
321 msym = record_minimal_symbol_and_info
322 ((char *) sym -> name, symaddr,
323 mst_solib_trampoline, NULL, objfile);
324#ifdef SOFUN_ADDRESS_MAYBE_MISSING
6b14af2b
FF
325 if (msym != NULL)
326 msym->filename = filesymname;
a1a0d974 327#endif
de537409
PS
328 continue;
329 }
330
0683ac4b
PS
331 /* If it is a nonstripped executable, do not enter dynamic
332 symbols, as the dynamic symbol table is usually a subset
de537409
PS
333 of the main symbol table. */
334 if (dynamic && !stripped)
0683ac4b 335 continue;
6c8f91a1
FF
336 if (sym -> flags & BSF_FILE)
337 {
338 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
339 Chain any old one onto the objfile; remember new sym. */
340 if (sectinfo != NULL)
341 {
342 sectinfo -> next = dbx -> stab_section_info;
343 dbx -> stab_section_info = sectinfo;
344 sectinfo = NULL;
345 }
346 filesym = sym;
2d336b1b
JK
347#ifdef SOFUN_ADDRESS_MAYBE_MISSING
348 filesymname =
349 obsavestring ((char *)filesym->name, strlen (filesym->name),
350 &objfile->symbol_obstack);
351#endif
6c8f91a1
FF
352 }
353 else if (sym -> flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
a7446af6 354 {
2d336b1b
JK
355 struct minimal_symbol *msym;
356
6c8f91a1
FF
357 /* Select global/local/weak symbols. Note that bfd puts abs
358 symbols in their own section, so all symbols we are
359 interested in will have a section. */
a608f919
FF
360 /* Bfd symbols are section relative. */
361 symaddr = sym -> value + sym -> section -> vma;
c2e4669f
JG
362 /* Relocate all non-absolute symbols by base address. */
363 if (sym -> section != &bfd_abs_section)
6c8f91a1
FF
364 {
365 symaddr += addr;
366 }
f8b76e70
FF
367 /* For non-absolute symbols, use the type of the section
368 they are relative to, to intuit text/data. Bfd provides
369 no way of figuring this out for absolute symbols. */
de537409 370 if (sym -> section == &bfd_abs_section)
6c8f91a1 371 {
0683ac4b
PS
372 /* This is a hack to get the minimal symbol type
373 right for Irix 5, which has absolute adresses
374 with special section indices for dynamic symbols. */
375 unsigned short shndx =
376 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
377
378 switch (shndx)
379 {
380 case SHN_MIPS_TEXT:
381 ms_type = mst_text;
382 break;
383 case SHN_MIPS_DATA:
384 ms_type = mst_data;
385 break;
386 case SHN_MIPS_ACOMMON:
387 ms_type = mst_bss;
388 break;
389 default:
390 ms_type = mst_abs;
391 }
0db3fe94
PS
392
393 /* If it is an Irix dynamic symbol, skip section name
394 symbols, relocate all others. */
395 if (ms_type != mst_abs)
396 {
397 if (sym->name[0] == '.')
398 continue;
399 symaddr += addr;
400 }
6c8f91a1
FF
401 }
402 else if (sym -> section -> flags & SEC_CODE)
f8b76e70 403 {
379dd965
FF
404 if (sym -> flags & BSF_GLOBAL)
405 {
406 ms_type = mst_text;
407 }
d54b2c50
SS
408 else if ((sym->name[0] == '.' && sym->name[1] == 'L')
409 || ((sym -> flags & BSF_LOCAL)
d97d5b48 410 && sym->name[0] == '$'
d54b2c50 411 && sym->name[1] == 'L'))
bbf1ff10
JK
412 /* Looks like a compiler-generated label. Skip it.
413 The assembler should be skipping these (to keep
414 executables small), but apparently with gcc on the
415 delta m88k SVR4, it loses. So to have us check too
416 should be harmless (but I encourage people to fix this
417 in the assembler instead of adding checks here). */
5ec3ba25 418 continue;
fcf05549
SS
419#ifdef HARRIS_TARGET
420 else if (sym->name[0] == '.' && sym->name[1] == '.')
421 {
422 /* Looks like a Harris compiler generated label for the
423 purpose of marking instructions that are relevant to
424 DWARF dies. The assembler can't get rid of these
425 because they are relocatable addresses that the
426 linker needs to resolve. */
427 continue;
428 }
429#endif
379dd965
FF
430 else
431 {
432 ms_type = mst_file_text;
433 }
f8b76e70 434 }
90141f9c 435 else if (sym -> section -> flags & SEC_ALLOC)
f8b76e70 436 {
379dd965
FF
437 if (sym -> flags & BSF_GLOBAL)
438 {
90141f9c 439 if (sym -> section -> flags & SEC_LOAD)
379dd965
FF
440 {
441 ms_type = mst_data;
442 }
443 else
444 {
445 ms_type = mst_bss;
446 }
447 }
6c8f91a1 448 else if (sym -> flags & BSF_LOCAL)
379dd965 449 {
6c8f91a1
FF
450 /* Named Local variable in a Data section. Check its
451 name for stabs-in-elf. The STREQ macro checks the
452 first character inline, so we only actually do a
453 strcmp function call on names that start with 'B'
454 or 'D' */
455 index = SECT_OFF_MAX;
456 if (STREQ ("Bbss.bss", sym -> name))
457 {
458 index = SECT_OFF_BSS;
459 }
460 else if (STREQ ("Ddata.data", sym -> name))
461 {
462 index = SECT_OFF_DATA;
463 }
464 else if (STREQ ("Drodata.rodata", sym -> name))
465 {
466 index = SECT_OFF_RODATA;
467 }
468 if (index != SECT_OFF_MAX)
469 {
470 /* Found a special local symbol. Allocate a
471 sectinfo, if needed, and fill it in. */
472 if (sectinfo == NULL)
473 {
474 sectinfo = (struct stab_section_info *)
475 xmmalloc (objfile -> md, sizeof (*sectinfo));
476 memset ((PTR) sectinfo, 0, sizeof (*sectinfo));
477 if (filesym == NULL)
478 {
479 complain (&section_info_complaint,
480 sym -> name);
481 }
482 else
483 {
484 sectinfo -> filename =
485 (char *) filesym -> name;
486 }
487 }
488 if (sectinfo -> sections[index] != 0)
489 {
490 complain (&section_info_dup_complaint,
491 sectinfo -> filename);
492 }
493 /* Bfd symbols are section relative. */
494 symaddr = sym -> value + sym -> section -> vma;
495 /* Relocate non-absolute symbols by base address. */
496 if (sym -> section != &bfd_abs_section)
497 {
498 symaddr += addr;
499 }
500 sectinfo -> sections[index] = symaddr;
501 /* The special local symbols don't go in the
502 minimal symbol table, so ignore this one. */
503 continue;
504 }
505 /* Not a special stabs-in-elf symbol, do regular
506 symbol processing. */
90141f9c 507 if (sym -> section -> flags & SEC_LOAD)
379dd965
FF
508 {
509 ms_type = mst_file_data;
510 }
511 else
512 {
513 ms_type = mst_file_bss;
514 }
515 }
6c8f91a1
FF
516 else
517 {
518 ms_type = mst_unknown;
519 }
f8b76e70
FF
520 }
521 else
522 {
4c7c6bab
JG
523 /* FIXME: Solaris2 shared libraries include lots of
524 odd "absolute" and "undefined" symbols, that play
525 hob with actions like finding what function the PC
379dd965 526 is in. Ignore them if they aren't text, data, or bss. */
4c7c6bab
JG
527 /* ms_type = mst_unknown; */
528 continue; /* Skip this symbol. */
f8b76e70 529 }
346168a2 530 /* Pass symbol size field in via BFD. FIXME!!! */
538b2068 531 size = ((elf_symbol_type *) sym) -> internal_elf_sym.st_size;
2d336b1b
JK
532 msym = record_minimal_symbol_and_info
533 ((char *) sym -> name, symaddr,
534 ms_type, (PTR) size, objfile);
535#ifdef SOFUN_ADDRESS_MAYBE_MISSING
6b14af2b
FF
536 if (msym != NULL)
537 msym->filename = filesymname;
2d336b1b 538#endif
2670f34d 539 }
a7446af6
FF
540 }
541 do_cleanups (back_to);
542 }
543}
544
35f5886e
FF
545/* Scan and build partial symbols for a symbol file.
546 We have been initialized by a call to elf_symfile_init, which
547 currently does nothing.
548
2670f34d
JG
549 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
550 in each section. We simplify it down to a single offset for all
551 symbols. FIXME.
35f5886e
FF
552
553 MAINLINE is true if we are reading the main symbol
554 table (as opposed to a shared lib or dynamically loaded file).
555
556 This function only does the minimum work necessary for letting the
557 user "name" things symbolically; it does not read the entire symtab.
558 Instead, it reads the external and static symbols and puts them in partial
559 symbol tables. When more extensive information is requested of a
560 file, the corresponding partial symbol table is mutated into a full
561 fledged symbol table by going back and reading the symbols
346168a2
JG
562 for real.
563
564 We look for sections with specific names, to tell us what debug
565 format to look for: FIXME!!!
566
567 dwarf_build_psymtabs() builds psymtabs for DWARF symbols;
e03c0cc6
ILT
568 elfstab_build_psymtabs() handles STABS symbols;
569 mdebug_build_psymtabs() handles ECOFF debugging information.
a7446af6
FF
570
571 Note that ELF files have a "minimal" symbol table, which looks a lot
572 like a COFF symbol table, but has only the minimal information necessary
346168a2
JG
573 for linking. We process this also, and use the information to
574 build gdb's minimal symbol table. This gives us some minimal debugging
575 capability even for files compiled without -g. */
35f5886e
FF
576
577static void
2670f34d 578elf_symfile_read (objfile, section_offsets, mainline)
80d68b1d 579 struct objfile *objfile;
2670f34d 580 struct section_offsets *section_offsets;
1ab3bf1b 581 int mainline;
35f5886e 582{
80d68b1d 583 bfd *abfd = objfile->obfd;
35f5886e 584 struct elfinfo ei;
a7446af6 585 struct cleanup *back_to;
346168a2 586 CORE_ADDR offset;
35f5886e 587
1ab3bf1b
JG
588 init_minimal_symbol_collection ();
589 back_to = make_cleanup (discard_minimal_symbols, 0);
a7446af6 590
2670f34d 591 memset ((char *) &ei, 0, sizeof (ei));
6b801388 592
2670f34d 593 /* Allocate struct to keep track of the symfile */
965a5c32 594 objfile->sym_stab_info = (PTR)
2670f34d 595 xmmalloc (objfile -> md, sizeof (struct dbx_symfile_info));
965a5c32 596 memset ((char *) objfile->sym_stab_info, 0, sizeof (struct dbx_symfile_info));
2670f34d 597 make_cleanup (free_elfinfo, (PTR) objfile);
6b801388 598
2670f34d 599 /* Process the normal ELF symbol table first. This may write some
965a5c32 600 chain of info into the dbx_symfile_info in objfile->sym_stab_info,
2670f34d 601 which can later be used by elfstab_offset_sections. */
a7446af6 602
2670f34d
JG
603 /* FIXME, should take a section_offsets param, not just an offset. */
604 offset = ANOFFSET (section_offsets, 0);
0683ac4b
PS
605 elf_symtab_read (abfd, offset, objfile, 0);
606
6d9b8a93 607 /* Add the dynamic symbols. */
0683ac4b 608
6d9b8a93 609 elf_symtab_read (abfd, offset, objfile, 1);
a7446af6 610
346168a2 611 /* Now process debugging information, which is contained in
a7446af6
FF
612 special ELF sections. We first have to find them... */
613
1ab3bf1b 614 bfd_map_over_sections (abfd, elf_locate_sections, (PTR) &ei);
0db3fe94 615 if (dwarf2_has_info (abfd))
fcf05549
SS
616 {
617 /* DWARF 2 sections */
618 dwarf2_build_psymtabs (objfile, section_offsets, mainline);
619 }
620 else if (ei.dboffset && ei.lnoffset)
35f5886e 621 {
346168a2 622 /* DWARF sections */
d5931d79 623 dwarf_build_psymtabs (objfile,
2670f34d 624 section_offsets, mainline,
35f5886e 625 ei.dboffset, ei.dbsize,
d5931d79 626 ei.lnoffset, ei.lnsize);
35f5886e 627 }
346168a2
JG
628 if (ei.stabsect)
629 {
8e3ff823
SS
630 asection *str_sect;
631
632 /* Stab sections have an associated string table that looks like
633 a separate section. */
634 str_sect = bfd_get_section_by_name (abfd, ".stabstr");
635
636 /* FIXME should probably warn about a stab section without a stabstr. */
637 if (str_sect)
346168a2 638 elfstab_build_psymtabs (objfile,
8e3ff823
SS
639 section_offsets,
640 mainline,
641 ei.stabsect->filepos,
642 bfd_section_size (abfd, ei.stabsect),
643 str_sect->filepos,
644 bfd_section_size (abfd, str_sect));
346168a2 645 }
e03c0cc6
ILT
646 if (ei.mdebugsect)
647 {
648 const struct ecoff_debug_swap *swap;
649
650 /* .mdebug section, presumably holding ECOFF debugging
651 information. */
652 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
653 if (swap)
654 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect,
655 section_offsets);
656 }
a7446af6 657
1ab3bf1b
JG
658 /* Install any minimal symbols that have been collected as the current
659 minimal symbols for this objfile. */
660
80d68b1d 661 install_minimal_symbols (objfile);
1ab3bf1b 662
a7446af6 663 do_cleanups (back_to);
35f5886e
FF
664}
665
965a5c32 666/* This cleans up the objfile's sym_stab_info pointer, and the chain of
2670f34d
JG
667 stab_section_info's, that might be dangling from it. */
668
669static void
670free_elfinfo (objp)
671 PTR objp;
672{
673 struct objfile *objfile = (struct objfile *)objp;
674 struct dbx_symfile_info *dbxinfo = (struct dbx_symfile_info *)
965a5c32 675 objfile->sym_stab_info;
2670f34d
JG
676 struct stab_section_info *ssi, *nssi;
677
678 ssi = dbxinfo->stab_section_info;
679 while (ssi)
680 {
681 nssi = ssi->next;
682 mfree (objfile->md, ssi);
683 ssi = nssi;
684 }
685
686 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
687}
688
689
35f5886e
FF
690/* Initialize anything that needs initializing when a completely new symbol
691 file is specified (not just adding some symbols from another file, e.g. a
692 shared library).
693
346168a2 694 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
35f5886e
FF
695
696static void
be772100
JG
697elf_new_init (ignore)
698 struct objfile *ignore;
80d68b1d 699{
d07734e3 700 stabsread_new_init ();
80d68b1d
FF
701 buildsym_new_init ();
702}
703
704/* Perform any local cleanups required when we are done with a particular
705 objfile. I.E, we are in the process of discarding all symbol information
706 for an objfile, freeing up all memory held for it, and unlinking the
707 objfile struct from the global list of known objfiles. */
708
709static void
710elf_symfile_finish (objfile)
711 struct objfile *objfile;
35f5886e 712{
965a5c32 713 if (objfile -> sym_stab_info != NULL)
80d68b1d 714 {
965a5c32 715 mfree (objfile -> md, objfile -> sym_stab_info);
80d68b1d 716 }
35f5886e
FF
717}
718
719/* ELF specific initialization routine for reading symbols.
720
721 It is passed a pointer to a struct sym_fns which contains, among other
722 things, the BFD for the file whose symbols are being read, and a slot for
723 a pointer to "private data" which we can fill with goodies.
724
725 For now at least, we have nothing in particular to do, so this function is
726 just a stub. */
727
728static void
436d4143
JL
729elf_symfile_init (objfile)
730 struct objfile *objfile;
35f5886e 731{
436d4143
JL
732 /* ELF objects may be reordered, so set OBJF_REORDERED. If we
733 find this causes a significant slowdown in gdb then we could
734 set it in the debug symbol readers only when necessary. */
735 objfile->flags |= OBJF_REORDERED;
35f5886e
FF
736}
737
2670f34d
JG
738/* When handling an ELF file that contains Sun STABS debug info,
739 some of the debug info is relative to the particular chunk of the
740 section that was generated in its individual .o file. E.g.
741 offsets to static variables are relative to the start of the data
742 segment *for that module before linking*. This information is
743 painfully squirreled away in the ELF symbol table as local symbols
744 with wierd names. Go get 'em when needed. */
745
746void
747elfstab_offset_sections (objfile, pst)
748 struct objfile *objfile;
749 struct partial_symtab *pst;
750{
751 char *filename = pst->filename;
752 struct dbx_symfile_info *dbx = (struct dbx_symfile_info *)
965a5c32 753 objfile->sym_stab_info;
2670f34d
JG
754 struct stab_section_info *maybe = dbx->stab_section_info;
755 struct stab_section_info *questionable = 0;
756 int i;
757 char *p;
758
759 /* The ELF symbol info doesn't include path names, so strip the path
760 (if any) from the psymtab filename. */
761 while (0 != (p = strchr (filename, '/')))
762 filename = p+1;
763
764 /* FIXME: This linear search could speed up significantly
765 if it was chained in the right order to match how we search it,
766 and if we unchained when we found a match. */
767 for (; maybe; maybe = maybe->next)
768 {
769 if (filename[0] == maybe->filename[0]
2e4964ad 770 && STREQ (filename, maybe->filename))
2670f34d
JG
771 {
772 /* We found a match. But there might be several source files
773 (from different directories) with the same name. */
774 if (0 == maybe->found)
775 break;
776 questionable = maybe; /* Might use it later. */
777 }
778 }
779
780 if (maybe == 0 && questionable != 0)
781 {
782 complain (&stab_info_questionable_complaint, filename);
783 maybe = questionable;
784 }
785
786 if (maybe)
787 {
788 /* Found it! Allocate a new psymtab struct, and fill it in. */
789 maybe->found++;
790 pst->section_offsets = (struct section_offsets *)
791 obstack_alloc (&objfile -> psymbol_obstack,
792 sizeof (struct section_offsets) +
793 sizeof (pst->section_offsets->offsets) * (SECT_OFF_MAX-1));
794
795 for (i = 0; i < SECT_OFF_MAX; i++)
796 ANOFFSET (pst->section_offsets, i) = maybe->sections[i];
797 return;
798 }
799
800 /* We were unable to find any offsets for this file. Complain. */
801 if (dbx->stab_section_info) /* If there *is* any info, */
802 complain (&stab_info_mismatch_complaint, filename);
803}
35f5886e 804\f
4d57c599 805/* Register that we are able to handle ELF object file formats. */
35f5886e 806
80d68b1d
FF
807static struct sym_fns elf_sym_fns =
808{
0eed42de 809 bfd_target_elf_flavour,
35f5886e
FF
810 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
811 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
812 elf_symfile_read, /* sym_read: read a symbol file into symtab */
80d68b1d 813 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
e74acce4
MA
814 default_symfile_offsets,
815 /* sym_offsets: Translate ext. to int. relocation */
35f5886e
FF
816 NULL /* next: pointer to next struct sym_fns */
817};
818
819void
1ab3bf1b 820_initialize_elfread ()
35f5886e
FF
821{
822 add_symtab_fns (&elf_sym_fns);
823}
This page took 0.266458 seconds and 4 git commands to generate.