* target.h: Add enum target_waitkind, enum target_signal, and
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
35f5886e 1/* Read ELF (Executable and Linking Format) object files for GDB.
c2e4669f 2 Copyright 1991, 1992 Free Software Foundation, Inc.
35f5886e
FF
3 Written by Fred Fish at Cygnus Support.
4
5This file is part of GDB.
6
7This program is free software; you can redistribute it and/or modify
8it under the terms of the GNU General Public License as published by
9the Free Software Foundation; either version 2 of the License, or
10(at your option) any later version.
11
12This program is distributed in the hope that it will be useful,
13but WITHOUT ANY WARRANTY; without even the implied warranty of
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15GNU General Public License for more details.
16
17You should have received a copy of the GNU General Public License
18along with this program; if not, write to the Free Software
19Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
20
35f5886e 21#include "defs.h"
35f5886e 22#include "bfd.h"
fc773653 23#include <time.h> /* For time_t in libbfd.h. */
ddf5d7e8 24#include <sys/types.h> /* For time_t, if not in time.h. */
f70be3e4 25#include "libbfd.h" /* For bfd_elf_find_section */
2084a176 26#include "libelf.h"
35f5886e 27#include "symtab.h"
1ab3bf1b 28#include "symfile.h"
5e2e79f8 29#include "objfiles.h"
be772100 30#include "buildsym.h"
2731625a 31#include "stabsread.h"
2670f34d 32#include "gdb-stabs.h"
51b80b00 33#include "complaints.h"
740b7efa 34#include <string.h>
2e4964ad 35#include "demangle.h"
35f5886e 36
2670f34d
JG
37/* The struct elfinfo is available only during ELF symbol table and
38 psymtab reading. It is destroyed at the complation of psymtab-reading.
39 It's local to elf_symfile_read. */
40
35f5886e 41struct elfinfo {
d5931d79 42 file_ptr dboffset; /* Offset to dwarf debug section */
35f5886e 43 unsigned int dbsize; /* Size of dwarf debug section */
d5931d79 44 file_ptr lnoffset; /* Offset to dwarf line number section */
35f5886e 45 unsigned int lnsize; /* Size of dwarf line number section */
346168a2
JG
46 asection *stabsect; /* Section pointer for .stab section */
47 asection *stabindexsect; /* Section pointer for .stab.index section */
e03c0cc6 48 asection *mdebugsect; /* Section pointer for .mdebug section */
35f5886e
FF
49};
50
2670f34d
JG
51/* Various things we might complain about... */
52
53struct complaint section_info_complaint =
54 {"elf/stab section information %s without a preceding file symbol", 0, 0};
55
56struct complaint section_info_dup_complaint =
57 {"duplicated elf/stab section information for %s", 0, 0};
58
59struct complaint stab_info_mismatch_complaint =
60 {"elf/stab section information missing for %s", 0, 0};
61
62struct complaint stab_info_questionable_complaint =
63 {"elf/stab section information questionable for %s", 0, 0};
64
1ab3bf1b 65static void
80d68b1d 66elf_symfile_init PARAMS ((struct objfile *));
1ab3bf1b
JG
67
68static void
80d68b1d 69elf_new_init PARAMS ((struct objfile *));
1ab3bf1b
JG
70
71static void
2670f34d 72elf_symfile_read PARAMS ((struct objfile *, struct section_offsets *, int));
80d68b1d
FF
73
74static void
75elf_symfile_finish PARAMS ((struct objfile *));
1ab3bf1b
JG
76
77static void
be772100 78elf_symtab_read PARAMS ((bfd *, CORE_ADDR, struct objfile *));
1ab3bf1b 79
2670f34d 80static void
77fe3f84 81free_elfinfo PARAMS ((void *));
2670f34d
JG
82
83static struct section_offsets *
84elf_symfile_offsets PARAMS ((struct objfile *, CORE_ADDR));
85
51b57ded
FF
86static void
87record_minimal_symbol_and_info PARAMS ((char *, CORE_ADDR,
88 enum minimal_symbol_type, char *,
89 struct objfile *));
1ab3bf1b
JG
90
91static void
77fe3f84 92elf_locate_sections PARAMS ((bfd *, asection *, void *));
1ab3bf1b 93
35f5886e
FF
94/* We are called once per section from elf_symfile_read. We
95 need to examine each section we are passed, check to see
96 if it is something we are interested in processing, and
97 if so, stash away some access information for the section.
98
99 For now we recognize the dwarf debug information sections and
100 line number sections from matching their section names. The
101 ELF definition is no real help here since it has no direct
102 knowledge of DWARF (by design, so any debugging format can be
103 used).
104
346168a2
JG
105 We also recognize the ".stab" sections used by the Sun compilers
106 released with Solaris 2.
107
898140fe
JK
108 FIXME: The section names should not be hardwired strings (what
109 should they be? I don't think most object file formats have enough
110 section flags to specify what kind of debug section it is
111 -kingdon). */
35f5886e
FF
112
113static void
be772100
JG
114elf_locate_sections (ignore_abfd, sectp, eip)
115 bfd *ignore_abfd;
1ab3bf1b
JG
116 asection *sectp;
117 PTR eip;
35f5886e 118{
1ab3bf1b
JG
119 register struct elfinfo *ei;
120
121 ei = (struct elfinfo *) eip;
35f5886e
FF
122 if (STREQ (sectp -> name, ".debug"))
123 {
124 ei -> dboffset = sectp -> filepos;
e5849334 125 ei -> dbsize = bfd_get_section_size_before_reloc (sectp);
35f5886e
FF
126 }
127 else if (STREQ (sectp -> name, ".line"))
128 {
129 ei -> lnoffset = sectp -> filepos;
e5849334 130 ei -> lnsize = bfd_get_section_size_before_reloc (sectp);
35f5886e 131 }
346168a2
JG
132 else if (STREQ (sectp -> name, ".stab"))
133 {
134 ei -> stabsect = sectp;
135 }
136 else if (STREQ (sectp -> name, ".stab.index"))
137 {
138 ei -> stabindexsect = sectp;
139 }
e03c0cc6
ILT
140 else if (STREQ (sectp -> name, ".mdebug"))
141 {
142 ei -> mdebugsect = sectp;
143 }
35f5886e
FF
144}
145
1ab3bf1b
JG
146#if 0 /* Currently unused */
147
f8b76e70 148char *
1ab3bf1b
JG
149elf_interpreter (abfd)
150 bfd *abfd;
f8b76e70
FF
151{
152 sec_ptr interp_sec;
153 unsigned size;
154 char *interp = NULL;
155
156 interp_sec = bfd_get_section_by_name (abfd, ".interp");
157 if (interp_sec)
158 {
159 size = bfd_section_size (abfd, interp_sec);
160 interp = alloca (size);
161 if (bfd_get_section_contents (abfd, interp_sec, interp, (file_ptr)0,
162 size))
163 {
164 interp = savestring (interp, size - 1);
165 }
166 else
167 {
168 interp = NULL;
169 }
170 }
171 return (interp);
172}
173
1ab3bf1b
JG
174#endif
175
346168a2
JG
176static void
177record_minimal_symbol_and_info (name, address, ms_type, info, objfile)
178 char *name;
179 CORE_ADDR address;
180 enum minimal_symbol_type ms_type;
181 char *info; /* FIXME, is this really char *? */
182 struct objfile *objfile;
183{
610a7e74
ILT
184 int section;
185
186 /* Guess the section from the type. This is likely to be wrong in
187 some cases. */
188 switch (ms_type)
189 {
190 case mst_text:
191 case mst_file_text:
192 section = SECT_OFF_TEXT;
193 break;
194 case mst_data:
195 case mst_file_data:
196 section = SECT_OFF_DATA;
197 break;
198 case mst_bss:
199 case mst_file_bss:
200 section = SECT_OFF_BSS;
201 break;
202 default:
203 section = -1;
204 break;
205 }
206
346168a2 207 name = obsavestring (name, strlen (name), &objfile -> symbol_obstack);
8d60affd
JK
208 prim_record_minimal_symbol_and_info (name, address, ms_type, info, section,
209 objfile);
346168a2
JG
210}
211
f8b76e70
FF
212/*
213
214LOCAL FUNCTION
215
216 elf_symtab_read -- read the symbol table of an ELF file
217
218SYNOPSIS
219
be772100 220 void elf_symtab_read (bfd *abfd, CORE_ADDR addr,
1ab3bf1b 221 struct objfile *objfile)
f8b76e70
FF
222
223DESCRIPTION
224
225 Given an open bfd, a base address to relocate symbols to, and a
226 flag that specifies whether or not this bfd is for an executable
227 or not (may be shared library for example), add all the global
1ab3bf1b 228 function and data symbols to the minimal symbol table.
f8b76e70 229
2670f34d
JG
230 In stabs-in-ELF, as implemented by Sun, there are some local symbols
231 defined in the ELF symbol table, which can be used to locate
232 the beginnings of sections from each ".o" file that was linked to
233 form the executable objfile. We gather any such info and record it
234 in data structures hung off the objfile's private data.
235
f8b76e70
FF
236*/
237
a7446af6 238static void
be772100 239elf_symtab_read (abfd, addr, objfile)
1ab3bf1b
JG
240 bfd *abfd;
241 CORE_ADDR addr;
1ab3bf1b 242 struct objfile *objfile;
a7446af6
FF
243{
244 unsigned int storage_needed;
245 asymbol *sym;
246 asymbol **symbol_table;
247 unsigned int number_of_symbols;
248 unsigned int i;
2670f34d 249 int index;
a7446af6 250 struct cleanup *back_to;
f8b76e70 251 CORE_ADDR symaddr;
1ab3bf1b 252 enum minimal_symbol_type ms_type;
6c8f91a1 253 /* If sectinfo is nonNULL, it contains section info that should end up
2670f34d 254 filed in the objfile. */
6c8f91a1 255 struct stab_section_info *sectinfo = NULL;
2670f34d
JG
256 /* If filesym is nonzero, it points to a file symbol, but we haven't
257 seen any section info for it yet. */
258 asymbol *filesym = 0;
259 struct dbx_symfile_info *dbx = (struct dbx_symfile_info *)
965a5c32 260 objfile->sym_stab_info;
6c8f91a1 261 unsigned long size;
a7446af6
FF
262
263 storage_needed = get_symtab_upper_bound (abfd);
a7446af6
FF
264 if (storage_needed > 0)
265 {
3b0b9220 266 symbol_table = (asymbol **) xmalloc (storage_needed);
a7446af6
FF
267 back_to = make_cleanup (free, symbol_table);
268 number_of_symbols = bfd_canonicalize_symtab (abfd, symbol_table);
a7446af6
FF
269 for (i = 0; i < number_of_symbols; i++)
270 {
2670f34d 271 sym = symbol_table[i];
6c8f91a1 272 if (sym -> name == NULL || *sym -> name == '\0')
379dd965 273 {
6c8f91a1
FF
274 /* Skip names that don't exist (shouldn't happen), or names
275 that are null strings (may happen). */
379dd965
FF
276 continue;
277 }
6c8f91a1
FF
278 if (sym -> flags & BSF_FILE)
279 {
280 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
281 Chain any old one onto the objfile; remember new sym. */
282 if (sectinfo != NULL)
283 {
284 sectinfo -> next = dbx -> stab_section_info;
285 dbx -> stab_section_info = sectinfo;
286 sectinfo = NULL;
287 }
288 filesym = sym;
289 }
290 else if (sym -> flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
a7446af6 291 {
6c8f91a1
FF
292 /* Select global/local/weak symbols. Note that bfd puts abs
293 symbols in their own section, so all symbols we are
294 interested in will have a section. */
a608f919
FF
295 /* Bfd symbols are section relative. */
296 symaddr = sym -> value + sym -> section -> vma;
c2e4669f
JG
297 /* Relocate all non-absolute symbols by base address. */
298 if (sym -> section != &bfd_abs_section)
6c8f91a1
FF
299 {
300 symaddr += addr;
301 }
f8b76e70
FF
302 /* For non-absolute symbols, use the type of the section
303 they are relative to, to intuit text/data. Bfd provides
304 no way of figuring this out for absolute symbols. */
6c8f91a1
FF
305 if (sym -> section == &bfd_abs_section)
306 {
307 ms_type = mst_abs;
308 }
309 else if (sym -> section -> flags & SEC_CODE)
f8b76e70 310 {
379dd965
FF
311 if (sym -> flags & BSF_GLOBAL)
312 {
313 ms_type = mst_text;
314 }
5ec3ba25 315 else if (sym->name[0] == '.' && sym->name[1] == 'L')
bbf1ff10
JK
316 /* Looks like a compiler-generated label. Skip it.
317 The assembler should be skipping these (to keep
318 executables small), but apparently with gcc on the
319 delta m88k SVR4, it loses. So to have us check too
320 should be harmless (but I encourage people to fix this
321 in the assembler instead of adding checks here). */
5ec3ba25 322 continue;
379dd965
FF
323 else
324 {
325 ms_type = mst_file_text;
326 }
f8b76e70 327 }
90141f9c 328 else if (sym -> section -> flags & SEC_ALLOC)
f8b76e70 329 {
379dd965
FF
330 if (sym -> flags & BSF_GLOBAL)
331 {
90141f9c 332 if (sym -> section -> flags & SEC_LOAD)
379dd965
FF
333 {
334 ms_type = mst_data;
335 }
336 else
337 {
338 ms_type = mst_bss;
339 }
340 }
6c8f91a1 341 else if (sym -> flags & BSF_LOCAL)
379dd965 342 {
6c8f91a1
FF
343 /* Named Local variable in a Data section. Check its
344 name for stabs-in-elf. The STREQ macro checks the
345 first character inline, so we only actually do a
346 strcmp function call on names that start with 'B'
347 or 'D' */
348 index = SECT_OFF_MAX;
349 if (STREQ ("Bbss.bss", sym -> name))
350 {
351 index = SECT_OFF_BSS;
352 }
353 else if (STREQ ("Ddata.data", sym -> name))
354 {
355 index = SECT_OFF_DATA;
356 }
357 else if (STREQ ("Drodata.rodata", sym -> name))
358 {
359 index = SECT_OFF_RODATA;
360 }
361 if (index != SECT_OFF_MAX)
362 {
363 /* Found a special local symbol. Allocate a
364 sectinfo, if needed, and fill it in. */
365 if (sectinfo == NULL)
366 {
367 sectinfo = (struct stab_section_info *)
368 xmmalloc (objfile -> md, sizeof (*sectinfo));
369 memset ((PTR) sectinfo, 0, sizeof (*sectinfo));
370 if (filesym == NULL)
371 {
372 complain (&section_info_complaint,
373 sym -> name);
374 }
375 else
376 {
377 sectinfo -> filename =
378 (char *) filesym -> name;
379 }
380 }
381 if (sectinfo -> sections[index] != 0)
382 {
383 complain (&section_info_dup_complaint,
384 sectinfo -> filename);
385 }
386 /* Bfd symbols are section relative. */
387 symaddr = sym -> value + sym -> section -> vma;
388 /* Relocate non-absolute symbols by base address. */
389 if (sym -> section != &bfd_abs_section)
390 {
391 symaddr += addr;
392 }
393 sectinfo -> sections[index] = symaddr;
394 /* The special local symbols don't go in the
395 minimal symbol table, so ignore this one. */
396 continue;
397 }
398 /* Not a special stabs-in-elf symbol, do regular
399 symbol processing. */
90141f9c 400 if (sym -> section -> flags & SEC_LOAD)
379dd965
FF
401 {
402 ms_type = mst_file_data;
403 }
404 else
405 {
406 ms_type = mst_file_bss;
407 }
408 }
6c8f91a1
FF
409 else
410 {
411 ms_type = mst_unknown;
412 }
f8b76e70
FF
413 }
414 else
415 {
4c7c6bab
JG
416 /* FIXME: Solaris2 shared libraries include lots of
417 odd "absolute" and "undefined" symbols, that play
418 hob with actions like finding what function the PC
379dd965 419 is in. Ignore them if they aren't text, data, or bss. */
4c7c6bab
JG
420 /* ms_type = mst_unknown; */
421 continue; /* Skip this symbol. */
f8b76e70 422 }
346168a2 423 /* Pass symbol size field in via BFD. FIXME!!! */
538b2068 424 size = ((elf_symbol_type *) sym) -> internal_elf_sym.st_size;
6c8f91a1
FF
425 record_minimal_symbol_and_info ((char *) sym -> name, symaddr,
426 ms_type, (PTR) size, objfile);
2670f34d 427 }
a7446af6
FF
428 }
429 do_cleanups (back_to);
430 }
431}
432
35f5886e
FF
433/* Scan and build partial symbols for a symbol file.
434 We have been initialized by a call to elf_symfile_init, which
435 currently does nothing.
436
2670f34d
JG
437 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
438 in each section. We simplify it down to a single offset for all
439 symbols. FIXME.
35f5886e
FF
440
441 MAINLINE is true if we are reading the main symbol
442 table (as opposed to a shared lib or dynamically loaded file).
443
444 This function only does the minimum work necessary for letting the
445 user "name" things symbolically; it does not read the entire symtab.
446 Instead, it reads the external and static symbols and puts them in partial
447 symbol tables. When more extensive information is requested of a
448 file, the corresponding partial symbol table is mutated into a full
449 fledged symbol table by going back and reading the symbols
346168a2
JG
450 for real.
451
452 We look for sections with specific names, to tell us what debug
453 format to look for: FIXME!!!
454
455 dwarf_build_psymtabs() builds psymtabs for DWARF symbols;
e03c0cc6
ILT
456 elfstab_build_psymtabs() handles STABS symbols;
457 mdebug_build_psymtabs() handles ECOFF debugging information.
a7446af6
FF
458
459 Note that ELF files have a "minimal" symbol table, which looks a lot
460 like a COFF symbol table, but has only the minimal information necessary
346168a2
JG
461 for linking. We process this also, and use the information to
462 build gdb's minimal symbol table. This gives us some minimal debugging
463 capability even for files compiled without -g. */
35f5886e
FF
464
465static void
2670f34d 466elf_symfile_read (objfile, section_offsets, mainline)
80d68b1d 467 struct objfile *objfile;
2670f34d 468 struct section_offsets *section_offsets;
1ab3bf1b 469 int mainline;
35f5886e 470{
80d68b1d 471 bfd *abfd = objfile->obfd;
35f5886e 472 struct elfinfo ei;
a7446af6 473 struct cleanup *back_to;
346168a2 474 CORE_ADDR offset;
35f5886e 475
1ab3bf1b
JG
476 init_minimal_symbol_collection ();
477 back_to = make_cleanup (discard_minimal_symbols, 0);
a7446af6 478
2670f34d 479 memset ((char *) &ei, 0, sizeof (ei));
6b801388 480
2670f34d 481 /* Allocate struct to keep track of the symfile */
965a5c32 482 objfile->sym_stab_info = (PTR)
2670f34d 483 xmmalloc (objfile -> md, sizeof (struct dbx_symfile_info));
965a5c32 484 memset ((char *) objfile->sym_stab_info, 0, sizeof (struct dbx_symfile_info));
2670f34d 485 make_cleanup (free_elfinfo, (PTR) objfile);
6b801388 486
2670f34d 487 /* Process the normal ELF symbol table first. This may write some
965a5c32 488 chain of info into the dbx_symfile_info in objfile->sym_stab_info,
2670f34d 489 which can later be used by elfstab_offset_sections. */
a7446af6 490
2670f34d
JG
491 /* FIXME, should take a section_offsets param, not just an offset. */
492 offset = ANOFFSET (section_offsets, 0);
346168a2 493 elf_symtab_read (abfd, offset, objfile);
a7446af6 494
346168a2 495 /* Now process debugging information, which is contained in
a7446af6
FF
496 special ELF sections. We first have to find them... */
497
1ab3bf1b 498 bfd_map_over_sections (abfd, elf_locate_sections, (PTR) &ei);
35f5886e
FF
499 if (ei.dboffset && ei.lnoffset)
500 {
346168a2 501 /* DWARF sections */
d5931d79 502 dwarf_build_psymtabs (objfile,
2670f34d 503 section_offsets, mainline,
35f5886e 504 ei.dboffset, ei.dbsize,
d5931d79 505 ei.lnoffset, ei.lnsize);
35f5886e 506 }
346168a2
JG
507 if (ei.stabsect)
508 {
509 /* STABS sections */
510
511 /* FIXME: Sun didn't really know how to implement this well.
512 They made .stab sections that don't point to the .stabstr
513 section with the sh_link field. BFD doesn't make string table
514 sections visible to the caller. So we have to search the
515 ELF section table, not the BFD section table, for the string
516 table. */
2084a176 517 struct elf32_internal_shdr *elf_sect;
346168a2 518
872dd3fe 519 elf_sect = bfd_elf_find_section (abfd, ".stabstr");
346168a2
JG
520 if (elf_sect)
521 elfstab_build_psymtabs (objfile,
2670f34d 522 section_offsets,
346168a2
JG
523 mainline,
524 ei.stabsect->filepos, /* .stab offset */
525 bfd_get_section_size_before_reloc (ei.stabsect),/* .stab size */
d5931d79 526 (file_ptr) elf_sect->sh_offset, /* .stabstr offset */
346168a2
JG
527 elf_sect->sh_size); /* .stabstr size */
528 }
e03c0cc6
ILT
529 if (ei.mdebugsect)
530 {
531 const struct ecoff_debug_swap *swap;
532
533 /* .mdebug section, presumably holding ECOFF debugging
534 information. */
535 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
536 if (swap)
537 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect,
538 section_offsets);
539 }
a7446af6 540
1ab3bf1b 541 if (!have_partial_symbols ())
35f5886e
FF
542 {
543 wrap_here ("");
544 printf_filtered ("(no debugging symbols found)...");
545 wrap_here ("");
546 }
a7446af6 547
1ab3bf1b
JG
548 /* Install any minimal symbols that have been collected as the current
549 minimal symbols for this objfile. */
550
80d68b1d 551 install_minimal_symbols (objfile);
1ab3bf1b 552
a7446af6 553 do_cleanups (back_to);
35f5886e
FF
554}
555
965a5c32 556/* This cleans up the objfile's sym_stab_info pointer, and the chain of
2670f34d
JG
557 stab_section_info's, that might be dangling from it. */
558
559static void
560free_elfinfo (objp)
561 PTR objp;
562{
563 struct objfile *objfile = (struct objfile *)objp;
564 struct dbx_symfile_info *dbxinfo = (struct dbx_symfile_info *)
965a5c32 565 objfile->sym_stab_info;
2670f34d
JG
566 struct stab_section_info *ssi, *nssi;
567
568 ssi = dbxinfo->stab_section_info;
569 while (ssi)
570 {
571 nssi = ssi->next;
572 mfree (objfile->md, ssi);
573 ssi = nssi;
574 }
575
576 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
577}
578
579
35f5886e
FF
580/* Initialize anything that needs initializing when a completely new symbol
581 file is specified (not just adding some symbols from another file, e.g. a
582 shared library).
583
346168a2 584 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
35f5886e
FF
585
586static void
be772100
JG
587elf_new_init (ignore)
588 struct objfile *ignore;
80d68b1d 589{
d07734e3 590 stabsread_new_init ();
80d68b1d
FF
591 buildsym_new_init ();
592}
593
594/* Perform any local cleanups required when we are done with a particular
595 objfile. I.E, we are in the process of discarding all symbol information
596 for an objfile, freeing up all memory held for it, and unlinking the
597 objfile struct from the global list of known objfiles. */
598
599static void
600elf_symfile_finish (objfile)
601 struct objfile *objfile;
35f5886e 602{
965a5c32 603 if (objfile -> sym_stab_info != NULL)
80d68b1d 604 {
965a5c32 605 mfree (objfile -> md, objfile -> sym_stab_info);
80d68b1d 606 }
35f5886e
FF
607}
608
609/* ELF specific initialization routine for reading symbols.
610
611 It is passed a pointer to a struct sym_fns which contains, among other
612 things, the BFD for the file whose symbols are being read, and a slot for
613 a pointer to "private data" which we can fill with goodies.
614
615 For now at least, we have nothing in particular to do, so this function is
616 just a stub. */
617
618static void
be772100
JG
619elf_symfile_init (ignore)
620 struct objfile *ignore;
35f5886e
FF
621{
622}
623
2670f34d
JG
624/* ELF specific parsing routine for section offsets.
625
626 Plain and simple for now. */
627
628static
629struct section_offsets *
630elf_symfile_offsets (objfile, addr)
631 struct objfile *objfile;
632 CORE_ADDR addr;
633{
634 struct section_offsets *section_offsets;
635 int i;
4d57c599
JK
636
637 objfile->num_sections = SECT_OFF_MAX;
2670f34d
JG
638 section_offsets = (struct section_offsets *)
639 obstack_alloc (&objfile -> psymbol_obstack,
4d57c599
JK
640 sizeof (struct section_offsets)
641 + sizeof (section_offsets->offsets) * (SECT_OFF_MAX-1));
2670f34d
JG
642
643 for (i = 0; i < SECT_OFF_MAX; i++)
644 ANOFFSET (section_offsets, i) = addr;
4d57c599 645
2670f34d
JG
646 return section_offsets;
647}
648\f
649/* When handling an ELF file that contains Sun STABS debug info,
650 some of the debug info is relative to the particular chunk of the
651 section that was generated in its individual .o file. E.g.
652 offsets to static variables are relative to the start of the data
653 segment *for that module before linking*. This information is
654 painfully squirreled away in the ELF symbol table as local symbols
655 with wierd names. Go get 'em when needed. */
656
657void
658elfstab_offset_sections (objfile, pst)
659 struct objfile *objfile;
660 struct partial_symtab *pst;
661{
662 char *filename = pst->filename;
663 struct dbx_symfile_info *dbx = (struct dbx_symfile_info *)
965a5c32 664 objfile->sym_stab_info;
2670f34d
JG
665 struct stab_section_info *maybe = dbx->stab_section_info;
666 struct stab_section_info *questionable = 0;
667 int i;
668 char *p;
669
670 /* The ELF symbol info doesn't include path names, so strip the path
671 (if any) from the psymtab filename. */
672 while (0 != (p = strchr (filename, '/')))
673 filename = p+1;
674
675 /* FIXME: This linear search could speed up significantly
676 if it was chained in the right order to match how we search it,
677 and if we unchained when we found a match. */
678 for (; maybe; maybe = maybe->next)
679 {
680 if (filename[0] == maybe->filename[0]
2e4964ad 681 && STREQ (filename, maybe->filename))
2670f34d
JG
682 {
683 /* We found a match. But there might be several source files
684 (from different directories) with the same name. */
685 if (0 == maybe->found)
686 break;
687 questionable = maybe; /* Might use it later. */
688 }
689 }
690
691 if (maybe == 0 && questionable != 0)
692 {
693 complain (&stab_info_questionable_complaint, filename);
694 maybe = questionable;
695 }
696
697 if (maybe)
698 {
699 /* Found it! Allocate a new psymtab struct, and fill it in. */
700 maybe->found++;
701 pst->section_offsets = (struct section_offsets *)
702 obstack_alloc (&objfile -> psymbol_obstack,
703 sizeof (struct section_offsets) +
704 sizeof (pst->section_offsets->offsets) * (SECT_OFF_MAX-1));
705
706 for (i = 0; i < SECT_OFF_MAX; i++)
707 ANOFFSET (pst->section_offsets, i) = maybe->sections[i];
708 return;
709 }
710
711 /* We were unable to find any offsets for this file. Complain. */
712 if (dbx->stab_section_info) /* If there *is* any info, */
713 complain (&stab_info_mismatch_complaint, filename);
714}
35f5886e 715\f
4d57c599 716/* Register that we are able to handle ELF object file formats. */
35f5886e 717
80d68b1d
FF
718static struct sym_fns elf_sym_fns =
719{
0eed42de 720 bfd_target_elf_flavour,
35f5886e
FF
721 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
722 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
723 elf_symfile_read, /* sym_read: read a symbol file into symtab */
80d68b1d 724 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
2670f34d 725 elf_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
35f5886e
FF
726 NULL /* next: pointer to next struct sym_fns */
727};
728
729void
1ab3bf1b 730_initialize_elfread ()
35f5886e
FF
731{
732 add_symtab_fns (&elf_sym_fns);
733}
This page took 0.159642 seconds and 4 git commands to generate.