Snapshot of stand alone i386 NLM debugging stub. Currently sanitized
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
35f5886e 1/* Read ELF (Executable and Linking Format) object files for GDB.
c2e4669f 2 Copyright 1991, 1992 Free Software Foundation, Inc.
35f5886e
FF
3 Written by Fred Fish at Cygnus Support.
4
5This file is part of GDB.
6
7This program is free software; you can redistribute it and/or modify
8it under the terms of the GNU General Public License as published by
9the Free Software Foundation; either version 2 of the License, or
10(at your option) any later version.
11
12This program is distributed in the hope that it will be useful,
13but WITHOUT ANY WARRANTY; without even the implied warranty of
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15GNU General Public License for more details.
16
17You should have received a copy of the GNU General Public License
18along with this program; if not, write to the Free Software
19Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
20
35f5886e 21#include "defs.h"
35f5886e 22#include "bfd.h"
f70be3e4 23#include "libbfd.h" /* For bfd_elf_find_section */
2084a176 24#include "libelf.h"
35f5886e 25#include "symtab.h"
1ab3bf1b 26#include "symfile.h"
5e2e79f8 27#include "objfiles.h"
be772100 28#include "buildsym.h"
2731625a 29#include "stabsread.h"
2670f34d 30#include "gdb-stabs.h"
51b80b00 31#include "complaints.h"
740b7efa 32#include <string.h>
2e4964ad 33#include "demangle.h"
35f5886e 34
2670f34d
JG
35/* The struct elfinfo is available only during ELF symbol table and
36 psymtab reading. It is destroyed at the complation of psymtab-reading.
37 It's local to elf_symfile_read. */
38
35f5886e 39struct elfinfo {
d5931d79 40 file_ptr dboffset; /* Offset to dwarf debug section */
35f5886e 41 unsigned int dbsize; /* Size of dwarf debug section */
d5931d79 42 file_ptr lnoffset; /* Offset to dwarf line number section */
35f5886e 43 unsigned int lnsize; /* Size of dwarf line number section */
346168a2
JG
44 asection *stabsect; /* Section pointer for .stab section */
45 asection *stabindexsect; /* Section pointer for .stab.index section */
35f5886e
FF
46};
47
2670f34d
JG
48/* Various things we might complain about... */
49
50struct complaint section_info_complaint =
51 {"elf/stab section information %s without a preceding file symbol", 0, 0};
52
53struct complaint section_info_dup_complaint =
54 {"duplicated elf/stab section information for %s", 0, 0};
55
56struct complaint stab_info_mismatch_complaint =
57 {"elf/stab section information missing for %s", 0, 0};
58
59struct complaint stab_info_questionable_complaint =
60 {"elf/stab section information questionable for %s", 0, 0};
61
1ab3bf1b 62static void
80d68b1d 63elf_symfile_init PARAMS ((struct objfile *));
1ab3bf1b
JG
64
65static void
80d68b1d 66elf_new_init PARAMS ((struct objfile *));
1ab3bf1b
JG
67
68static void
2670f34d 69elf_symfile_read PARAMS ((struct objfile *, struct section_offsets *, int));
80d68b1d
FF
70
71static void
72elf_symfile_finish PARAMS ((struct objfile *));
1ab3bf1b
JG
73
74static void
be772100 75elf_symtab_read PARAMS ((bfd *, CORE_ADDR, struct objfile *));
1ab3bf1b 76
2670f34d
JG
77static void
78free_elfinfo PARAMS ((PTR));
79
80static struct section_offsets *
81elf_symfile_offsets PARAMS ((struct objfile *, CORE_ADDR));
82
51b57ded
FF
83static void
84record_minimal_symbol_and_info PARAMS ((char *, CORE_ADDR,
85 enum minimal_symbol_type, char *,
86 struct objfile *));
1ab3bf1b
JG
87
88static void
89elf_locate_sections PARAMS ((bfd *, asection *, PTR));
90
35f5886e
FF
91/* We are called once per section from elf_symfile_read. We
92 need to examine each section we are passed, check to see
93 if it is something we are interested in processing, and
94 if so, stash away some access information for the section.
95
96 For now we recognize the dwarf debug information sections and
97 line number sections from matching their section names. The
98 ELF definition is no real help here since it has no direct
99 knowledge of DWARF (by design, so any debugging format can be
100 used).
101
346168a2
JG
102 We also recognize the ".stab" sections used by the Sun compilers
103 released with Solaris 2.
104
35f5886e
FF
105 FIXME: The section names should not be hardwired strings. */
106
107static void
be772100
JG
108elf_locate_sections (ignore_abfd, sectp, eip)
109 bfd *ignore_abfd;
1ab3bf1b
JG
110 asection *sectp;
111 PTR eip;
35f5886e 112{
1ab3bf1b
JG
113 register struct elfinfo *ei;
114
115 ei = (struct elfinfo *) eip;
35f5886e
FF
116 if (STREQ (sectp -> name, ".debug"))
117 {
118 ei -> dboffset = sectp -> filepos;
e5849334 119 ei -> dbsize = bfd_get_section_size_before_reloc (sectp);
35f5886e
FF
120 }
121 else if (STREQ (sectp -> name, ".line"))
122 {
123 ei -> lnoffset = sectp -> filepos;
e5849334 124 ei -> lnsize = bfd_get_section_size_before_reloc (sectp);
35f5886e 125 }
346168a2
JG
126 else if (STREQ (sectp -> name, ".stab"))
127 {
128 ei -> stabsect = sectp;
129 }
130 else if (STREQ (sectp -> name, ".stab.index"))
131 {
132 ei -> stabindexsect = sectp;
133 }
35f5886e
FF
134}
135
1ab3bf1b
JG
136#if 0 /* Currently unused */
137
f8b76e70 138char *
1ab3bf1b
JG
139elf_interpreter (abfd)
140 bfd *abfd;
f8b76e70
FF
141{
142 sec_ptr interp_sec;
143 unsigned size;
144 char *interp = NULL;
145
146 interp_sec = bfd_get_section_by_name (abfd, ".interp");
147 if (interp_sec)
148 {
149 size = bfd_section_size (abfd, interp_sec);
150 interp = alloca (size);
151 if (bfd_get_section_contents (abfd, interp_sec, interp, (file_ptr)0,
152 size))
153 {
154 interp = savestring (interp, size - 1);
155 }
156 else
157 {
158 interp = NULL;
159 }
160 }
161 return (interp);
162}
163
1ab3bf1b
JG
164#endif
165
346168a2
JG
166static void
167record_minimal_symbol_and_info (name, address, ms_type, info, objfile)
168 char *name;
169 CORE_ADDR address;
170 enum minimal_symbol_type ms_type;
171 char *info; /* FIXME, is this really char *? */
172 struct objfile *objfile;
173{
174 name = obsavestring (name, strlen (name), &objfile -> symbol_obstack);
3c02636b 175 prim_record_minimal_symbol_and_info (name, address, ms_type, info, -1);
346168a2
JG
176}
177
f8b76e70
FF
178/*
179
180LOCAL FUNCTION
181
182 elf_symtab_read -- read the symbol table of an ELF file
183
184SYNOPSIS
185
be772100 186 void elf_symtab_read (bfd *abfd, CORE_ADDR addr,
1ab3bf1b 187 struct objfile *objfile)
f8b76e70
FF
188
189DESCRIPTION
190
191 Given an open bfd, a base address to relocate symbols to, and a
192 flag that specifies whether or not this bfd is for an executable
193 or not (may be shared library for example), add all the global
1ab3bf1b 194 function and data symbols to the minimal symbol table.
f8b76e70 195
2670f34d
JG
196 In stabs-in-ELF, as implemented by Sun, there are some local symbols
197 defined in the ELF symbol table, which can be used to locate
198 the beginnings of sections from each ".o" file that was linked to
199 form the executable objfile. We gather any such info and record it
200 in data structures hung off the objfile's private data.
201
f8b76e70
FF
202*/
203
a7446af6 204static void
be772100 205elf_symtab_read (abfd, addr, objfile)
1ab3bf1b
JG
206 bfd *abfd;
207 CORE_ADDR addr;
1ab3bf1b 208 struct objfile *objfile;
a7446af6
FF
209{
210 unsigned int storage_needed;
211 asymbol *sym;
212 asymbol **symbol_table;
213 unsigned int number_of_symbols;
214 unsigned int i;
2670f34d 215 int index;
a7446af6 216 struct cleanup *back_to;
f8b76e70 217 CORE_ADDR symaddr;
1ab3bf1b 218 enum minimal_symbol_type ms_type;
6c8f91a1 219 /* If sectinfo is nonNULL, it contains section info that should end up
2670f34d 220 filed in the objfile. */
6c8f91a1 221 struct stab_section_info *sectinfo = NULL;
2670f34d
JG
222 /* If filesym is nonzero, it points to a file symbol, but we haven't
223 seen any section info for it yet. */
224 asymbol *filesym = 0;
225 struct dbx_symfile_info *dbx = (struct dbx_symfile_info *)
226 objfile->sym_private;
6c8f91a1 227 unsigned long size;
a7446af6
FF
228
229 storage_needed = get_symtab_upper_bound (abfd);
a7446af6
FF
230 if (storage_needed > 0)
231 {
3b0b9220 232 symbol_table = (asymbol **) xmalloc (storage_needed);
a7446af6
FF
233 back_to = make_cleanup (free, symbol_table);
234 number_of_symbols = bfd_canonicalize_symtab (abfd, symbol_table);
a7446af6
FF
235 for (i = 0; i < number_of_symbols; i++)
236 {
2670f34d 237 sym = symbol_table[i];
6c8f91a1 238 if (sym -> name == NULL || *sym -> name == '\0')
379dd965 239 {
6c8f91a1
FF
240 /* Skip names that don't exist (shouldn't happen), or names
241 that are null strings (may happen). */
379dd965
FF
242 continue;
243 }
6c8f91a1
FF
244 if (sym -> flags & BSF_FILE)
245 {
246 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
247 Chain any old one onto the objfile; remember new sym. */
248 if (sectinfo != NULL)
249 {
250 sectinfo -> next = dbx -> stab_section_info;
251 dbx -> stab_section_info = sectinfo;
252 sectinfo = NULL;
253 }
254 filesym = sym;
255 }
256 else if (sym -> flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
a7446af6 257 {
6c8f91a1
FF
258 /* Select global/local/weak symbols. Note that bfd puts abs
259 symbols in their own section, so all symbols we are
260 interested in will have a section. */
a608f919
FF
261 /* Bfd symbols are section relative. */
262 symaddr = sym -> value + sym -> section -> vma;
c2e4669f
JG
263 /* Relocate all non-absolute symbols by base address. */
264 if (sym -> section != &bfd_abs_section)
6c8f91a1
FF
265 {
266 symaddr += addr;
267 }
f8b76e70
FF
268 /* For non-absolute symbols, use the type of the section
269 they are relative to, to intuit text/data. Bfd provides
270 no way of figuring this out for absolute symbols. */
6c8f91a1
FF
271 if (sym -> section == &bfd_abs_section)
272 {
273 ms_type = mst_abs;
274 }
275 else if (sym -> section -> flags & SEC_CODE)
f8b76e70 276 {
379dd965
FF
277 if (sym -> flags & BSF_GLOBAL)
278 {
279 ms_type = mst_text;
280 }
5ec3ba25 281 else if (sym->name[0] == '.' && sym->name[1] == 'L')
bbf1ff10
JK
282 /* Looks like a compiler-generated label. Skip it.
283 The assembler should be skipping these (to keep
284 executables small), but apparently with gcc on the
285 delta m88k SVR4, it loses. So to have us check too
286 should be harmless (but I encourage people to fix this
287 in the assembler instead of adding checks here). */
5ec3ba25 288 continue;
379dd965
FF
289 else
290 {
291 ms_type = mst_file_text;
292 }
f8b76e70 293 }
d35bf52d 294 else if (sym -> section -> flags & SEC_DATA)
f8b76e70 295 {
379dd965
FF
296 if (sym -> flags & BSF_GLOBAL)
297 {
298 if (sym -> section -> flags & SEC_HAS_CONTENTS)
299 {
300 ms_type = mst_data;
301 }
302 else
303 {
304 ms_type = mst_bss;
305 }
306 }
6c8f91a1 307 else if (sym -> flags & BSF_LOCAL)
379dd965 308 {
6c8f91a1
FF
309 /* Named Local variable in a Data section. Check its
310 name for stabs-in-elf. The STREQ macro checks the
311 first character inline, so we only actually do a
312 strcmp function call on names that start with 'B'
313 or 'D' */
314 index = SECT_OFF_MAX;
315 if (STREQ ("Bbss.bss", sym -> name))
316 {
317 index = SECT_OFF_BSS;
318 }
319 else if (STREQ ("Ddata.data", sym -> name))
320 {
321 index = SECT_OFF_DATA;
322 }
323 else if (STREQ ("Drodata.rodata", sym -> name))
324 {
325 index = SECT_OFF_RODATA;
326 }
327 if (index != SECT_OFF_MAX)
328 {
329 /* Found a special local symbol. Allocate a
330 sectinfo, if needed, and fill it in. */
331 if (sectinfo == NULL)
332 {
333 sectinfo = (struct stab_section_info *)
334 xmmalloc (objfile -> md, sizeof (*sectinfo));
335 memset ((PTR) sectinfo, 0, sizeof (*sectinfo));
336 if (filesym == NULL)
337 {
338 complain (&section_info_complaint,
339 sym -> name);
340 }
341 else
342 {
343 sectinfo -> filename =
344 (char *) filesym -> name;
345 }
346 }
347 if (sectinfo -> sections[index] != 0)
348 {
349 complain (&section_info_dup_complaint,
350 sectinfo -> filename);
351 }
352 /* Bfd symbols are section relative. */
353 symaddr = sym -> value + sym -> section -> vma;
354 /* Relocate non-absolute symbols by base address. */
355 if (sym -> section != &bfd_abs_section)
356 {
357 symaddr += addr;
358 }
359 sectinfo -> sections[index] = symaddr;
360 /* The special local symbols don't go in the
361 minimal symbol table, so ignore this one. */
362 continue;
363 }
364 /* Not a special stabs-in-elf symbol, do regular
365 symbol processing. */
379dd965
FF
366 if (sym -> section -> flags & SEC_HAS_CONTENTS)
367 {
368 ms_type = mst_file_data;
369 }
370 else
371 {
372 ms_type = mst_file_bss;
373 }
374 }
6c8f91a1
FF
375 else
376 {
377 ms_type = mst_unknown;
378 }
f8b76e70
FF
379 }
380 else
381 {
4c7c6bab
JG
382 /* FIXME: Solaris2 shared libraries include lots of
383 odd "absolute" and "undefined" symbols, that play
384 hob with actions like finding what function the PC
379dd965 385 is in. Ignore them if they aren't text, data, or bss. */
4c7c6bab
JG
386 /* ms_type = mst_unknown; */
387 continue; /* Skip this symbol. */
f8b76e70 388 }
346168a2 389 /* Pass symbol size field in via BFD. FIXME!!! */
6c8f91a1
FF
390 size = ((elf32_symbol_type *) sym) -> internal_elf_sym.st_size;
391 record_minimal_symbol_and_info ((char *) sym -> name, symaddr,
392 ms_type, (PTR) size, objfile);
2670f34d 393 }
a7446af6
FF
394 }
395 do_cleanups (back_to);
396 }
397}
398
35f5886e
FF
399/* Scan and build partial symbols for a symbol file.
400 We have been initialized by a call to elf_symfile_init, which
401 currently does nothing.
402
2670f34d
JG
403 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
404 in each section. We simplify it down to a single offset for all
405 symbols. FIXME.
35f5886e
FF
406
407 MAINLINE is true if we are reading the main symbol
408 table (as opposed to a shared lib or dynamically loaded file).
409
410 This function only does the minimum work necessary for letting the
411 user "name" things symbolically; it does not read the entire symtab.
412 Instead, it reads the external and static symbols and puts them in partial
413 symbol tables. When more extensive information is requested of a
414 file, the corresponding partial symbol table is mutated into a full
415 fledged symbol table by going back and reading the symbols
346168a2
JG
416 for real.
417
418 We look for sections with specific names, to tell us what debug
419 format to look for: FIXME!!!
420
421 dwarf_build_psymtabs() builds psymtabs for DWARF symbols;
422 elfstab_build_psymtabs() handles STABS symbols.
a7446af6
FF
423
424 Note that ELF files have a "minimal" symbol table, which looks a lot
425 like a COFF symbol table, but has only the minimal information necessary
346168a2
JG
426 for linking. We process this also, and use the information to
427 build gdb's minimal symbol table. This gives us some minimal debugging
428 capability even for files compiled without -g. */
35f5886e
FF
429
430static void
2670f34d 431elf_symfile_read (objfile, section_offsets, mainline)
80d68b1d 432 struct objfile *objfile;
2670f34d 433 struct section_offsets *section_offsets;
1ab3bf1b 434 int mainline;
35f5886e 435{
80d68b1d 436 bfd *abfd = objfile->obfd;
35f5886e 437 struct elfinfo ei;
a7446af6 438 struct cleanup *back_to;
346168a2 439 CORE_ADDR offset;
35f5886e 440
1ab3bf1b
JG
441 init_minimal_symbol_collection ();
442 back_to = make_cleanup (discard_minimal_symbols, 0);
a7446af6 443
2670f34d 444 memset ((char *) &ei, 0, sizeof (ei));
6b801388 445
2670f34d
JG
446 /* Allocate struct to keep track of the symfile */
447 objfile->sym_private = (PTR)
448 xmmalloc (objfile -> md, sizeof (struct dbx_symfile_info));
449 memset ((char *) objfile->sym_private, 0, sizeof (struct dbx_symfile_info));
450 make_cleanup (free_elfinfo, (PTR) objfile);
6b801388 451
2670f34d
JG
452 /* Process the normal ELF symbol table first. This may write some
453 chain of info into the dbx_symfile_info in objfile->sym_private,
454 which can later be used by elfstab_offset_sections. */
a7446af6 455
2670f34d
JG
456 /* FIXME, should take a section_offsets param, not just an offset. */
457 offset = ANOFFSET (section_offsets, 0);
346168a2 458 elf_symtab_read (abfd, offset, objfile);
a7446af6 459
346168a2 460 /* Now process debugging information, which is contained in
a7446af6
FF
461 special ELF sections. We first have to find them... */
462
1ab3bf1b 463 bfd_map_over_sections (abfd, elf_locate_sections, (PTR) &ei);
35f5886e
FF
464 if (ei.dboffset && ei.lnoffset)
465 {
346168a2 466 /* DWARF sections */
d5931d79 467 dwarf_build_psymtabs (objfile,
2670f34d 468 section_offsets, mainline,
35f5886e 469 ei.dboffset, ei.dbsize,
d5931d79 470 ei.lnoffset, ei.lnsize);
35f5886e 471 }
346168a2
JG
472 if (ei.stabsect)
473 {
474 /* STABS sections */
475
476 /* FIXME: Sun didn't really know how to implement this well.
477 They made .stab sections that don't point to the .stabstr
478 section with the sh_link field. BFD doesn't make string table
479 sections visible to the caller. So we have to search the
480 ELF section table, not the BFD section table, for the string
481 table. */
2084a176 482 struct elf32_internal_shdr *elf_sect;
346168a2 483
872dd3fe 484 elf_sect = bfd_elf_find_section (abfd, ".stabstr");
346168a2
JG
485 if (elf_sect)
486 elfstab_build_psymtabs (objfile,
2670f34d 487 section_offsets,
346168a2
JG
488 mainline,
489 ei.stabsect->filepos, /* .stab offset */
490 bfd_get_section_size_before_reloc (ei.stabsect),/* .stab size */
d5931d79 491 (file_ptr) elf_sect->sh_offset, /* .stabstr offset */
346168a2
JG
492 elf_sect->sh_size); /* .stabstr size */
493 }
a7446af6 494
1ab3bf1b 495 if (!have_partial_symbols ())
35f5886e
FF
496 {
497 wrap_here ("");
498 printf_filtered ("(no debugging symbols found)...");
499 wrap_here ("");
500 }
a7446af6 501
1ab3bf1b
JG
502 /* Install any minimal symbols that have been collected as the current
503 minimal symbols for this objfile. */
504
80d68b1d 505 install_minimal_symbols (objfile);
1ab3bf1b 506
a7446af6 507 do_cleanups (back_to);
35f5886e
FF
508}
509
2670f34d
JG
510/* This cleans up the objfile's sym_private pointer, and the chain of
511 stab_section_info's, that might be dangling from it. */
512
513static void
514free_elfinfo (objp)
515 PTR objp;
516{
517 struct objfile *objfile = (struct objfile *)objp;
518 struct dbx_symfile_info *dbxinfo = (struct dbx_symfile_info *)
519 objfile->sym_private;
520 struct stab_section_info *ssi, *nssi;
521
522 ssi = dbxinfo->stab_section_info;
523 while (ssi)
524 {
525 nssi = ssi->next;
526 mfree (objfile->md, ssi);
527 ssi = nssi;
528 }
529
530 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
531}
532
533
35f5886e
FF
534/* Initialize anything that needs initializing when a completely new symbol
535 file is specified (not just adding some symbols from another file, e.g. a
536 shared library).
537
346168a2 538 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
35f5886e
FF
539
540static void
be772100
JG
541elf_new_init (ignore)
542 struct objfile *ignore;
80d68b1d 543{
d07734e3 544 stabsread_new_init ();
80d68b1d
FF
545 buildsym_new_init ();
546}
547
548/* Perform any local cleanups required when we are done with a particular
549 objfile. I.E, we are in the process of discarding all symbol information
550 for an objfile, freeing up all memory held for it, and unlinking the
551 objfile struct from the global list of known objfiles. */
552
553static void
554elf_symfile_finish (objfile)
555 struct objfile *objfile;
35f5886e 556{
80d68b1d
FF
557 if (objfile -> sym_private != NULL)
558 {
559 mfree (objfile -> md, objfile -> sym_private);
560 }
35f5886e
FF
561}
562
563/* ELF specific initialization routine for reading symbols.
564
565 It is passed a pointer to a struct sym_fns which contains, among other
566 things, the BFD for the file whose symbols are being read, and a slot for
567 a pointer to "private data" which we can fill with goodies.
568
569 For now at least, we have nothing in particular to do, so this function is
570 just a stub. */
571
572static void
be772100
JG
573elf_symfile_init (ignore)
574 struct objfile *ignore;
35f5886e
FF
575{
576}
577
2670f34d
JG
578/* ELF specific parsing routine for section offsets.
579
580 Plain and simple for now. */
581
582static
583struct section_offsets *
584elf_symfile_offsets (objfile, addr)
585 struct objfile *objfile;
586 CORE_ADDR addr;
587{
588 struct section_offsets *section_offsets;
589 int i;
590
591 section_offsets = (struct section_offsets *)
592 obstack_alloc (&objfile -> psymbol_obstack,
593 sizeof (struct section_offsets) +
594 sizeof (section_offsets->offsets) * (SECT_OFF_MAX-1));
595
596 for (i = 0; i < SECT_OFF_MAX; i++)
597 ANOFFSET (section_offsets, i) = addr;
598
599 return section_offsets;
600}
601\f
602/* When handling an ELF file that contains Sun STABS debug info,
603 some of the debug info is relative to the particular chunk of the
604 section that was generated in its individual .o file. E.g.
605 offsets to static variables are relative to the start of the data
606 segment *for that module before linking*. This information is
607 painfully squirreled away in the ELF symbol table as local symbols
608 with wierd names. Go get 'em when needed. */
609
610void
611elfstab_offset_sections (objfile, pst)
612 struct objfile *objfile;
613 struct partial_symtab *pst;
614{
615 char *filename = pst->filename;
616 struct dbx_symfile_info *dbx = (struct dbx_symfile_info *)
617 objfile->sym_private;
618 struct stab_section_info *maybe = dbx->stab_section_info;
619 struct stab_section_info *questionable = 0;
620 int i;
621 char *p;
622
623 /* The ELF symbol info doesn't include path names, so strip the path
624 (if any) from the psymtab filename. */
625 while (0 != (p = strchr (filename, '/')))
626 filename = p+1;
627
628 /* FIXME: This linear search could speed up significantly
629 if it was chained in the right order to match how we search it,
630 and if we unchained when we found a match. */
631 for (; maybe; maybe = maybe->next)
632 {
633 if (filename[0] == maybe->filename[0]
2e4964ad 634 && STREQ (filename, maybe->filename))
2670f34d
JG
635 {
636 /* We found a match. But there might be several source files
637 (from different directories) with the same name. */
638 if (0 == maybe->found)
639 break;
640 questionable = maybe; /* Might use it later. */
641 }
642 }
643
644 if (maybe == 0 && questionable != 0)
645 {
646 complain (&stab_info_questionable_complaint, filename);
647 maybe = questionable;
648 }
649
650 if (maybe)
651 {
652 /* Found it! Allocate a new psymtab struct, and fill it in. */
653 maybe->found++;
654 pst->section_offsets = (struct section_offsets *)
655 obstack_alloc (&objfile -> psymbol_obstack,
656 sizeof (struct section_offsets) +
657 sizeof (pst->section_offsets->offsets) * (SECT_OFF_MAX-1));
658
659 for (i = 0; i < SECT_OFF_MAX; i++)
660 ANOFFSET (pst->section_offsets, i) = maybe->sections[i];
661 return;
662 }
663
664 /* We were unable to find any offsets for this file. Complain. */
665 if (dbx->stab_section_info) /* If there *is* any info, */
666 complain (&stab_info_mismatch_complaint, filename);
667}
35f5886e
FF
668\f
669/* Register that we are able to handle ELF object file formats and DWARF
670 debugging formats.
671
672 Unlike other object file formats, where the debugging information format
673 is implied by the object file format, the ELF object file format and the
674 DWARF debugging information format are two distinct, and potentially
675 separate entities. I.E. it is perfectly possible to have ELF objects
676 with debugging formats other than DWARF. And it is conceivable that the
677 DWARF debugging format might be used with another object file format,
678 like COFF, by simply using COFF's custom section feature.
679
680 GDB, and to a lesser extent BFD, should support the notion of separate
681 object file formats and debugging information formats. For now, we just
682 use "elf" in the same sense as "a.out" or "coff", to imply both the ELF
683 object file format and the DWARF debugging format. */
684
80d68b1d
FF
685static struct sym_fns elf_sym_fns =
686{
35f5886e
FF
687 "elf", /* sym_name: name or name prefix of BFD target type */
688 3, /* sym_namelen: number of significant sym_name chars */
689 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
690 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
691 elf_symfile_read, /* sym_read: read a symbol file into symtab */
80d68b1d 692 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
2670f34d 693 elf_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
35f5886e
FF
694 NULL /* next: pointer to next struct sym_fns */
695};
696
697void
1ab3bf1b 698_initialize_elfread ()
35f5886e
FF
699{
700 add_symtab_fns (&elf_sym_fns);
701}
This page took 0.129567 seconds and 4 git commands to generate.