Modified Files:
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
35f5886e 1/* Read ELF (Executable and Linking Format) object files for GDB.
0683ac4b 2 Copyright 1991, 1992, 1993, 1994 Free Software Foundation, Inc.
35f5886e
FF
3 Written by Fred Fish at Cygnus Support.
4
5This file is part of GDB.
6
7This program is free software; you can redistribute it and/or modify
8it under the terms of the GNU General Public License as published by
9the Free Software Foundation; either version 2 of the License, or
10(at your option) any later version.
11
12This program is distributed in the hope that it will be useful,
13but WITHOUT ANY WARRANTY; without even the implied warranty of
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15GNU General Public License for more details.
16
17You should have received a copy of the GNU General Public License
18along with this program; if not, write to the Free Software
19Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
20
35f5886e 21#include "defs.h"
35f5886e 22#include "bfd.h"
fc773653 23#include <time.h> /* For time_t in libbfd.h. */
ddf5d7e8 24#include <sys/types.h> /* For time_t, if not in time.h. */
f70be3e4 25#include "libbfd.h" /* For bfd_elf_find_section */
2084a176 26#include "libelf.h"
0683ac4b 27#include "elf/mips.h"
35f5886e 28#include "symtab.h"
1ab3bf1b 29#include "symfile.h"
5e2e79f8 30#include "objfiles.h"
be772100 31#include "buildsym.h"
2731625a 32#include "stabsread.h"
2670f34d 33#include "gdb-stabs.h"
51b80b00 34#include "complaints.h"
740b7efa 35#include <string.h>
2e4964ad 36#include "demangle.h"
35f5886e 37
2670f34d
JG
38/* The struct elfinfo is available only during ELF symbol table and
39 psymtab reading. It is destroyed at the complation of psymtab-reading.
40 It's local to elf_symfile_read. */
41
35f5886e 42struct elfinfo {
d5931d79 43 file_ptr dboffset; /* Offset to dwarf debug section */
35f5886e 44 unsigned int dbsize; /* Size of dwarf debug section */
d5931d79 45 file_ptr lnoffset; /* Offset to dwarf line number section */
35f5886e 46 unsigned int lnsize; /* Size of dwarf line number section */
346168a2
JG
47 asection *stabsect; /* Section pointer for .stab section */
48 asection *stabindexsect; /* Section pointer for .stab.index section */
e03c0cc6 49 asection *mdebugsect; /* Section pointer for .mdebug section */
35f5886e
FF
50};
51
2670f34d
JG
52/* Various things we might complain about... */
53
54struct complaint section_info_complaint =
55 {"elf/stab section information %s without a preceding file symbol", 0, 0};
56
57struct complaint section_info_dup_complaint =
58 {"duplicated elf/stab section information for %s", 0, 0};
59
60struct complaint stab_info_mismatch_complaint =
61 {"elf/stab section information missing for %s", 0, 0};
62
63struct complaint stab_info_questionable_complaint =
64 {"elf/stab section information questionable for %s", 0, 0};
65
1ab3bf1b 66static void
80d68b1d 67elf_symfile_init PARAMS ((struct objfile *));
1ab3bf1b
JG
68
69static void
80d68b1d 70elf_new_init PARAMS ((struct objfile *));
1ab3bf1b
JG
71
72static void
2670f34d 73elf_symfile_read PARAMS ((struct objfile *, struct section_offsets *, int));
80d68b1d
FF
74
75static void
76elf_symfile_finish PARAMS ((struct objfile *));
1ab3bf1b
JG
77
78static void
0683ac4b 79elf_symtab_read PARAMS ((bfd *, CORE_ADDR, struct objfile *, int));
1ab3bf1b 80
2670f34d 81static void
77fe3f84 82free_elfinfo PARAMS ((void *));
2670f34d
JG
83
84static struct section_offsets *
85elf_symfile_offsets PARAMS ((struct objfile *, CORE_ADDR));
86
51b57ded
FF
87static void
88record_minimal_symbol_and_info PARAMS ((char *, CORE_ADDR,
89 enum minimal_symbol_type, char *,
90 struct objfile *));
1ab3bf1b
JG
91
92static void
77fe3f84 93elf_locate_sections PARAMS ((bfd *, asection *, void *));
1ab3bf1b 94
35f5886e
FF
95/* We are called once per section from elf_symfile_read. We
96 need to examine each section we are passed, check to see
97 if it is something we are interested in processing, and
98 if so, stash away some access information for the section.
99
100 For now we recognize the dwarf debug information sections and
101 line number sections from matching their section names. The
102 ELF definition is no real help here since it has no direct
103 knowledge of DWARF (by design, so any debugging format can be
104 used).
105
346168a2
JG
106 We also recognize the ".stab" sections used by the Sun compilers
107 released with Solaris 2.
108
898140fe
JK
109 FIXME: The section names should not be hardwired strings (what
110 should they be? I don't think most object file formats have enough
111 section flags to specify what kind of debug section it is
112 -kingdon). */
35f5886e
FF
113
114static void
be772100
JG
115elf_locate_sections (ignore_abfd, sectp, eip)
116 bfd *ignore_abfd;
1ab3bf1b
JG
117 asection *sectp;
118 PTR eip;
35f5886e 119{
1ab3bf1b
JG
120 register struct elfinfo *ei;
121
122 ei = (struct elfinfo *) eip;
35f5886e
FF
123 if (STREQ (sectp -> name, ".debug"))
124 {
125 ei -> dboffset = sectp -> filepos;
e5849334 126 ei -> dbsize = bfd_get_section_size_before_reloc (sectp);
35f5886e
FF
127 }
128 else if (STREQ (sectp -> name, ".line"))
129 {
130 ei -> lnoffset = sectp -> filepos;
e5849334 131 ei -> lnsize = bfd_get_section_size_before_reloc (sectp);
35f5886e 132 }
346168a2
JG
133 else if (STREQ (sectp -> name, ".stab"))
134 {
135 ei -> stabsect = sectp;
136 }
137 else if (STREQ (sectp -> name, ".stab.index"))
138 {
139 ei -> stabindexsect = sectp;
140 }
e03c0cc6
ILT
141 else if (STREQ (sectp -> name, ".mdebug"))
142 {
143 ei -> mdebugsect = sectp;
144 }
35f5886e
FF
145}
146
1ab3bf1b
JG
147#if 0 /* Currently unused */
148
f8b76e70 149char *
1ab3bf1b
JG
150elf_interpreter (abfd)
151 bfd *abfd;
f8b76e70
FF
152{
153 sec_ptr interp_sec;
154 unsigned size;
155 char *interp = NULL;
156
157 interp_sec = bfd_get_section_by_name (abfd, ".interp");
158 if (interp_sec)
159 {
160 size = bfd_section_size (abfd, interp_sec);
161 interp = alloca (size);
162 if (bfd_get_section_contents (abfd, interp_sec, interp, (file_ptr)0,
163 size))
164 {
165 interp = savestring (interp, size - 1);
166 }
167 else
168 {
169 interp = NULL;
170 }
171 }
172 return (interp);
173}
174
1ab3bf1b
JG
175#endif
176
346168a2
JG
177static void
178record_minimal_symbol_and_info (name, address, ms_type, info, objfile)
179 char *name;
180 CORE_ADDR address;
181 enum minimal_symbol_type ms_type;
182 char *info; /* FIXME, is this really char *? */
183 struct objfile *objfile;
184{
610a7e74
ILT
185 int section;
186
187 /* Guess the section from the type. This is likely to be wrong in
188 some cases. */
189 switch (ms_type)
190 {
191 case mst_text:
192 case mst_file_text:
193 section = SECT_OFF_TEXT;
9fdb3f7a
JK
194#ifdef SMASH_TEXT_ADDRESS
195 SMASH_TEXT_ADDRESS (address);
196#endif
610a7e74
ILT
197 break;
198 case mst_data:
199 case mst_file_data:
200 section = SECT_OFF_DATA;
201 break;
202 case mst_bss:
203 case mst_file_bss:
204 section = SECT_OFF_BSS;
205 break;
206 default:
207 section = -1;
208 break;
209 }
210
346168a2 211 name = obsavestring (name, strlen (name), &objfile -> symbol_obstack);
8d60affd
JK
212 prim_record_minimal_symbol_and_info (name, address, ms_type, info, section,
213 objfile);
346168a2
JG
214}
215
f8b76e70
FF
216/*
217
218LOCAL FUNCTION
219
220 elf_symtab_read -- read the symbol table of an ELF file
221
222SYNOPSIS
223
be772100 224 void elf_symtab_read (bfd *abfd, CORE_ADDR addr,
1ab3bf1b 225 struct objfile *objfile)
f8b76e70
FF
226
227DESCRIPTION
228
229 Given an open bfd, a base address to relocate symbols to, and a
230 flag that specifies whether or not this bfd is for an executable
231 or not (may be shared library for example), add all the global
1ab3bf1b 232 function and data symbols to the minimal symbol table.
f8b76e70 233
2670f34d
JG
234 In stabs-in-ELF, as implemented by Sun, there are some local symbols
235 defined in the ELF symbol table, which can be used to locate
236 the beginnings of sections from each ".o" file that was linked to
237 form the executable objfile. We gather any such info and record it
238 in data structures hung off the objfile's private data.
239
f8b76e70
FF
240*/
241
a7446af6 242static void
0683ac4b 243elf_symtab_read (abfd, addr, objfile, dynamic)
1ab3bf1b
JG
244 bfd *abfd;
245 CORE_ADDR addr;
1ab3bf1b 246 struct objfile *objfile;
0683ac4b 247 int dynamic;
a7446af6 248{
70f42bae 249 long storage_needed;
a7446af6
FF
250 asymbol *sym;
251 asymbol **symbol_table;
70f42bae
ILT
252 long number_of_symbols;
253 long i;
2670f34d 254 int index;
a7446af6 255 struct cleanup *back_to;
f8b76e70 256 CORE_ADDR symaddr;
1ab3bf1b 257 enum minimal_symbol_type ms_type;
6c8f91a1 258 /* If sectinfo is nonNULL, it contains section info that should end up
2670f34d 259 filed in the objfile. */
6c8f91a1 260 struct stab_section_info *sectinfo = NULL;
2670f34d
JG
261 /* If filesym is nonzero, it points to a file symbol, but we haven't
262 seen any section info for it yet. */
263 asymbol *filesym = 0;
264 struct dbx_symfile_info *dbx = (struct dbx_symfile_info *)
965a5c32 265 objfile->sym_stab_info;
6c8f91a1 266 unsigned long size;
0683ac4b
PS
267 int stripped = (bfd_get_symcount (abfd) == 0);
268
269 if (dynamic)
270 storage_needed = bfd_get_dynamic_symtab_upper_bound (abfd);
271 else
272 storage_needed = bfd_get_symtab_upper_bound (abfd);
70f42bae
ILT
273 if (storage_needed < 0)
274 error ("Can't read symbols from %s: %s", bfd_get_filename (abfd),
275 bfd_errmsg (bfd_get_error ()));
a7446af6
FF
276 if (storage_needed > 0)
277 {
3b0b9220 278 symbol_table = (asymbol **) xmalloc (storage_needed);
a7446af6 279 back_to = make_cleanup (free, symbol_table);
0683ac4b
PS
280 if (dynamic)
281 number_of_symbols = bfd_canonicalize_dynamic_symtab (abfd,
282 symbol_table);
283 else
284 number_of_symbols = bfd_canonicalize_symtab (abfd, symbol_table);
70f42bae
ILT
285 if (number_of_symbols < 0)
286 error ("Can't read symbols from %s: %s", bfd_get_filename (abfd),
287 bfd_errmsg (bfd_get_error ()));
a7446af6
FF
288 for (i = 0; i < number_of_symbols; i++)
289 {
2670f34d 290 sym = symbol_table[i];
6c8f91a1 291 if (sym -> name == NULL || *sym -> name == '\0')
379dd965 292 {
6c8f91a1
FF
293 /* Skip names that don't exist (shouldn't happen), or names
294 that are null strings (may happen). */
379dd965
FF
295 continue;
296 }
0683ac4b
PS
297
298 /* If it is a nonstripped executable, do not enter dynamic
299 symbols, as the dynamic symbol table is usually a subset
300 of the main symbol table.
301 On Irix 5 however, the symbols for the procedure linkage
302 table entries have meaningful values only in the dynamic
303 symbol table, so we always examine undefined symbols. */
304 if (dynamic && !stripped && sym -> section != &bfd_und_section)
305 continue;
6c8f91a1
FF
306 if (sym -> flags & BSF_FILE)
307 {
308 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
309 Chain any old one onto the objfile; remember new sym. */
310 if (sectinfo != NULL)
311 {
312 sectinfo -> next = dbx -> stab_section_info;
313 dbx -> stab_section_info = sectinfo;
314 sectinfo = NULL;
315 }
316 filesym = sym;
317 }
318 else if (sym -> flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
a7446af6 319 {
6c8f91a1
FF
320 /* Select global/local/weak symbols. Note that bfd puts abs
321 symbols in their own section, so all symbols we are
322 interested in will have a section. */
a608f919
FF
323 /* Bfd symbols are section relative. */
324 symaddr = sym -> value + sym -> section -> vma;
c2e4669f
JG
325 /* Relocate all non-absolute symbols by base address. */
326 if (sym -> section != &bfd_abs_section)
6c8f91a1
FF
327 {
328 symaddr += addr;
329 }
f8b76e70
FF
330 /* For non-absolute symbols, use the type of the section
331 they are relative to, to intuit text/data. Bfd provides
332 no way of figuring this out for absolute symbols. */
38b90473
PS
333 if (sym -> section == &bfd_und_section
334 && (sym -> flags & BSF_GLOBAL)
335 && (sym -> flags & BSF_FUNCTION))
336 {
337 /* Symbol is a reference to a function defined in
338 a shared library.
339 If its value is non zero then it is usually the
340 absolute address of the corresponding entry in
341 the procedure linkage table.
342 If its value is zero then the dynamic linker has to
343 resolve the symbol. We are unable to find any
344 meaningful address for this symbol in the
345 executable file, so we skip it.
346 Irix 5 has a zero value for all shared library functions
0683ac4b
PS
347 in the main symbol table, but the dynamic symbol table
348 provides the right values. */
38b90473
PS
349 ms_type = mst_solib_trampoline;
350 symaddr = sym -> value;
351 if (symaddr == 0)
352 continue;
6d9b8a93 353 symaddr += addr;
38b90473
PS
354 }
355 else if (sym -> section == &bfd_abs_section)
6c8f91a1 356 {
0683ac4b
PS
357 /* This is a hack to get the minimal symbol type
358 right for Irix 5, which has absolute adresses
359 with special section indices for dynamic symbols. */
360 unsigned short shndx =
361 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
362
363 switch (shndx)
364 {
365 case SHN_MIPS_TEXT:
366 ms_type = mst_text;
367 break;
368 case SHN_MIPS_DATA:
369 ms_type = mst_data;
370 break;
371 case SHN_MIPS_ACOMMON:
372 ms_type = mst_bss;
373 break;
374 default:
375 ms_type = mst_abs;
376 }
6c8f91a1
FF
377 }
378 else if (sym -> section -> flags & SEC_CODE)
f8b76e70 379 {
379dd965
FF
380 if (sym -> flags & BSF_GLOBAL)
381 {
382 ms_type = mst_text;
383 }
5ec3ba25 384 else if (sym->name[0] == '.' && sym->name[1] == 'L')
bbf1ff10
JK
385 /* Looks like a compiler-generated label. Skip it.
386 The assembler should be skipping these (to keep
387 executables small), but apparently with gcc on the
388 delta m88k SVR4, it loses. So to have us check too
389 should be harmless (but I encourage people to fix this
390 in the assembler instead of adding checks here). */
5ec3ba25 391 continue;
379dd965
FF
392 else
393 {
394 ms_type = mst_file_text;
395 }
f8b76e70 396 }
90141f9c 397 else if (sym -> section -> flags & SEC_ALLOC)
f8b76e70 398 {
379dd965
FF
399 if (sym -> flags & BSF_GLOBAL)
400 {
90141f9c 401 if (sym -> section -> flags & SEC_LOAD)
379dd965
FF
402 {
403 ms_type = mst_data;
404 }
405 else
406 {
407 ms_type = mst_bss;
408 }
409 }
6c8f91a1 410 else if (sym -> flags & BSF_LOCAL)
379dd965 411 {
6c8f91a1
FF
412 /* Named Local variable in a Data section. Check its
413 name for stabs-in-elf. The STREQ macro checks the
414 first character inline, so we only actually do a
415 strcmp function call on names that start with 'B'
416 or 'D' */
417 index = SECT_OFF_MAX;
418 if (STREQ ("Bbss.bss", sym -> name))
419 {
420 index = SECT_OFF_BSS;
421 }
422 else if (STREQ ("Ddata.data", sym -> name))
423 {
424 index = SECT_OFF_DATA;
425 }
426 else if (STREQ ("Drodata.rodata", sym -> name))
427 {
428 index = SECT_OFF_RODATA;
429 }
430 if (index != SECT_OFF_MAX)
431 {
432 /* Found a special local symbol. Allocate a
433 sectinfo, if needed, and fill it in. */
434 if (sectinfo == NULL)
435 {
436 sectinfo = (struct stab_section_info *)
437 xmmalloc (objfile -> md, sizeof (*sectinfo));
438 memset ((PTR) sectinfo, 0, sizeof (*sectinfo));
439 if (filesym == NULL)
440 {
441 complain (&section_info_complaint,
442 sym -> name);
443 }
444 else
445 {
446 sectinfo -> filename =
447 (char *) filesym -> name;
448 }
449 }
450 if (sectinfo -> sections[index] != 0)
451 {
452 complain (&section_info_dup_complaint,
453 sectinfo -> filename);
454 }
455 /* Bfd symbols are section relative. */
456 symaddr = sym -> value + sym -> section -> vma;
457 /* Relocate non-absolute symbols by base address. */
458 if (sym -> section != &bfd_abs_section)
459 {
460 symaddr += addr;
461 }
462 sectinfo -> sections[index] = symaddr;
463 /* The special local symbols don't go in the
464 minimal symbol table, so ignore this one. */
465 continue;
466 }
467 /* Not a special stabs-in-elf symbol, do regular
468 symbol processing. */
90141f9c 469 if (sym -> section -> flags & SEC_LOAD)
379dd965
FF
470 {
471 ms_type = mst_file_data;
472 }
473 else
474 {
475 ms_type = mst_file_bss;
476 }
477 }
6c8f91a1
FF
478 else
479 {
480 ms_type = mst_unknown;
481 }
f8b76e70
FF
482 }
483 else
484 {
4c7c6bab
JG
485 /* FIXME: Solaris2 shared libraries include lots of
486 odd "absolute" and "undefined" symbols, that play
487 hob with actions like finding what function the PC
379dd965 488 is in. Ignore them if they aren't text, data, or bss. */
4c7c6bab
JG
489 /* ms_type = mst_unknown; */
490 continue; /* Skip this symbol. */
f8b76e70 491 }
346168a2 492 /* Pass symbol size field in via BFD. FIXME!!! */
538b2068 493 size = ((elf_symbol_type *) sym) -> internal_elf_sym.st_size;
6c8f91a1
FF
494 record_minimal_symbol_and_info ((char *) sym -> name, symaddr,
495 ms_type, (PTR) size, objfile);
2670f34d 496 }
a7446af6
FF
497 }
498 do_cleanups (back_to);
499 }
500}
501
35f5886e
FF
502/* Scan and build partial symbols for a symbol file.
503 We have been initialized by a call to elf_symfile_init, which
504 currently does nothing.
505
2670f34d
JG
506 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
507 in each section. We simplify it down to a single offset for all
508 symbols. FIXME.
35f5886e
FF
509
510 MAINLINE is true if we are reading the main symbol
511 table (as opposed to a shared lib or dynamically loaded file).
512
513 This function only does the minimum work necessary for letting the
514 user "name" things symbolically; it does not read the entire symtab.
515 Instead, it reads the external and static symbols and puts them in partial
516 symbol tables. When more extensive information is requested of a
517 file, the corresponding partial symbol table is mutated into a full
518 fledged symbol table by going back and reading the symbols
346168a2
JG
519 for real.
520
521 We look for sections with specific names, to tell us what debug
522 format to look for: FIXME!!!
523
524 dwarf_build_psymtabs() builds psymtabs for DWARF symbols;
e03c0cc6
ILT
525 elfstab_build_psymtabs() handles STABS symbols;
526 mdebug_build_psymtabs() handles ECOFF debugging information.
a7446af6
FF
527
528 Note that ELF files have a "minimal" symbol table, which looks a lot
529 like a COFF symbol table, but has only the minimal information necessary
346168a2
JG
530 for linking. We process this also, and use the information to
531 build gdb's minimal symbol table. This gives us some minimal debugging
532 capability even for files compiled without -g. */
35f5886e
FF
533
534static void
2670f34d 535elf_symfile_read (objfile, section_offsets, mainline)
80d68b1d 536 struct objfile *objfile;
2670f34d 537 struct section_offsets *section_offsets;
1ab3bf1b 538 int mainline;
35f5886e 539{
80d68b1d 540 bfd *abfd = objfile->obfd;
35f5886e 541 struct elfinfo ei;
a7446af6 542 struct cleanup *back_to;
346168a2 543 CORE_ADDR offset;
35f5886e 544
1ab3bf1b
JG
545 init_minimal_symbol_collection ();
546 back_to = make_cleanup (discard_minimal_symbols, 0);
a7446af6 547
2670f34d 548 memset ((char *) &ei, 0, sizeof (ei));
6b801388 549
2670f34d 550 /* Allocate struct to keep track of the symfile */
965a5c32 551 objfile->sym_stab_info = (PTR)
2670f34d 552 xmmalloc (objfile -> md, sizeof (struct dbx_symfile_info));
965a5c32 553 memset ((char *) objfile->sym_stab_info, 0, sizeof (struct dbx_symfile_info));
2670f34d 554 make_cleanup (free_elfinfo, (PTR) objfile);
6b801388 555
2670f34d 556 /* Process the normal ELF symbol table first. This may write some
965a5c32 557 chain of info into the dbx_symfile_info in objfile->sym_stab_info,
2670f34d 558 which can later be used by elfstab_offset_sections. */
a7446af6 559
2670f34d
JG
560 /* FIXME, should take a section_offsets param, not just an offset. */
561 offset = ANOFFSET (section_offsets, 0);
0683ac4b
PS
562 elf_symtab_read (abfd, offset, objfile, 0);
563
6d9b8a93 564 /* Add the dynamic symbols. */
0683ac4b 565
6d9b8a93 566 elf_symtab_read (abfd, offset, objfile, 1);
a7446af6 567
346168a2 568 /* Now process debugging information, which is contained in
a7446af6
FF
569 special ELF sections. We first have to find them... */
570
1ab3bf1b 571 bfd_map_over_sections (abfd, elf_locate_sections, (PTR) &ei);
35f5886e
FF
572 if (ei.dboffset && ei.lnoffset)
573 {
346168a2 574 /* DWARF sections */
d5931d79 575 dwarf_build_psymtabs (objfile,
2670f34d 576 section_offsets, mainline,
35f5886e 577 ei.dboffset, ei.dbsize,
d5931d79 578 ei.lnoffset, ei.lnsize);
35f5886e 579 }
346168a2
JG
580 if (ei.stabsect)
581 {
582 /* STABS sections */
583
584 /* FIXME: Sun didn't really know how to implement this well.
585 They made .stab sections that don't point to the .stabstr
586 section with the sh_link field. BFD doesn't make string table
587 sections visible to the caller. So we have to search the
588 ELF section table, not the BFD section table, for the string
589 table. */
2084a176 590 struct elf32_internal_shdr *elf_sect;
346168a2 591
872dd3fe 592 elf_sect = bfd_elf_find_section (abfd, ".stabstr");
346168a2
JG
593 if (elf_sect)
594 elfstab_build_psymtabs (objfile,
2670f34d 595 section_offsets,
346168a2
JG
596 mainline,
597 ei.stabsect->filepos, /* .stab offset */
598 bfd_get_section_size_before_reloc (ei.stabsect),/* .stab size */
d5931d79 599 (file_ptr) elf_sect->sh_offset, /* .stabstr offset */
346168a2
JG
600 elf_sect->sh_size); /* .stabstr size */
601 }
e03c0cc6
ILT
602 if (ei.mdebugsect)
603 {
604 const struct ecoff_debug_swap *swap;
605
606 /* .mdebug section, presumably holding ECOFF debugging
607 information. */
608 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
609 if (swap)
610 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect,
611 section_offsets);
612 }
a7446af6 613
1ab3bf1b
JG
614 /* Install any minimal symbols that have been collected as the current
615 minimal symbols for this objfile. */
616
80d68b1d 617 install_minimal_symbols (objfile);
1ab3bf1b 618
a7446af6 619 do_cleanups (back_to);
35f5886e
FF
620}
621
965a5c32 622/* This cleans up the objfile's sym_stab_info pointer, and the chain of
2670f34d
JG
623 stab_section_info's, that might be dangling from it. */
624
625static void
626free_elfinfo (objp)
627 PTR objp;
628{
629 struct objfile *objfile = (struct objfile *)objp;
630 struct dbx_symfile_info *dbxinfo = (struct dbx_symfile_info *)
965a5c32 631 objfile->sym_stab_info;
2670f34d
JG
632 struct stab_section_info *ssi, *nssi;
633
634 ssi = dbxinfo->stab_section_info;
635 while (ssi)
636 {
637 nssi = ssi->next;
638 mfree (objfile->md, ssi);
639 ssi = nssi;
640 }
641
642 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
643}
644
645
35f5886e
FF
646/* Initialize anything that needs initializing when a completely new symbol
647 file is specified (not just adding some symbols from another file, e.g. a
648 shared library).
649
346168a2 650 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
35f5886e
FF
651
652static void
be772100
JG
653elf_new_init (ignore)
654 struct objfile *ignore;
80d68b1d 655{
d07734e3 656 stabsread_new_init ();
80d68b1d
FF
657 buildsym_new_init ();
658}
659
660/* Perform any local cleanups required when we are done with a particular
661 objfile. I.E, we are in the process of discarding all symbol information
662 for an objfile, freeing up all memory held for it, and unlinking the
663 objfile struct from the global list of known objfiles. */
664
665static void
666elf_symfile_finish (objfile)
667 struct objfile *objfile;
35f5886e 668{
965a5c32 669 if (objfile -> sym_stab_info != NULL)
80d68b1d 670 {
965a5c32 671 mfree (objfile -> md, objfile -> sym_stab_info);
80d68b1d 672 }
35f5886e
FF
673}
674
675/* ELF specific initialization routine for reading symbols.
676
677 It is passed a pointer to a struct sym_fns which contains, among other
678 things, the BFD for the file whose symbols are being read, and a slot for
679 a pointer to "private data" which we can fill with goodies.
680
681 For now at least, we have nothing in particular to do, so this function is
682 just a stub. */
683
684static void
be772100
JG
685elf_symfile_init (ignore)
686 struct objfile *ignore;
35f5886e
FF
687{
688}
689
2670f34d
JG
690/* ELF specific parsing routine for section offsets.
691
692 Plain and simple for now. */
693
694static
695struct section_offsets *
696elf_symfile_offsets (objfile, addr)
697 struct objfile *objfile;
698 CORE_ADDR addr;
699{
700 struct section_offsets *section_offsets;
701 int i;
4d57c599
JK
702
703 objfile->num_sections = SECT_OFF_MAX;
2670f34d
JG
704 section_offsets = (struct section_offsets *)
705 obstack_alloc (&objfile -> psymbol_obstack,
4d57c599
JK
706 sizeof (struct section_offsets)
707 + sizeof (section_offsets->offsets) * (SECT_OFF_MAX-1));
2670f34d
JG
708
709 for (i = 0; i < SECT_OFF_MAX; i++)
710 ANOFFSET (section_offsets, i) = addr;
4d57c599 711
2670f34d
JG
712 return section_offsets;
713}
714\f
715/* When handling an ELF file that contains Sun STABS debug info,
716 some of the debug info is relative to the particular chunk of the
717 section that was generated in its individual .o file. E.g.
718 offsets to static variables are relative to the start of the data
719 segment *for that module before linking*. This information is
720 painfully squirreled away in the ELF symbol table as local symbols
721 with wierd names. Go get 'em when needed. */
722
723void
724elfstab_offset_sections (objfile, pst)
725 struct objfile *objfile;
726 struct partial_symtab *pst;
727{
728 char *filename = pst->filename;
729 struct dbx_symfile_info *dbx = (struct dbx_symfile_info *)
965a5c32 730 objfile->sym_stab_info;
2670f34d
JG
731 struct stab_section_info *maybe = dbx->stab_section_info;
732 struct stab_section_info *questionable = 0;
733 int i;
734 char *p;
735
736 /* The ELF symbol info doesn't include path names, so strip the path
737 (if any) from the psymtab filename. */
738 while (0 != (p = strchr (filename, '/')))
739 filename = p+1;
740
741 /* FIXME: This linear search could speed up significantly
742 if it was chained in the right order to match how we search it,
743 and if we unchained when we found a match. */
744 for (; maybe; maybe = maybe->next)
745 {
746 if (filename[0] == maybe->filename[0]
2e4964ad 747 && STREQ (filename, maybe->filename))
2670f34d
JG
748 {
749 /* We found a match. But there might be several source files
750 (from different directories) with the same name. */
751 if (0 == maybe->found)
752 break;
753 questionable = maybe; /* Might use it later. */
754 }
755 }
756
757 if (maybe == 0 && questionable != 0)
758 {
759 complain (&stab_info_questionable_complaint, filename);
760 maybe = questionable;
761 }
762
763 if (maybe)
764 {
765 /* Found it! Allocate a new psymtab struct, and fill it in. */
766 maybe->found++;
767 pst->section_offsets = (struct section_offsets *)
768 obstack_alloc (&objfile -> psymbol_obstack,
769 sizeof (struct section_offsets) +
770 sizeof (pst->section_offsets->offsets) * (SECT_OFF_MAX-1));
771
772 for (i = 0; i < SECT_OFF_MAX; i++)
773 ANOFFSET (pst->section_offsets, i) = maybe->sections[i];
774 return;
775 }
776
777 /* We were unable to find any offsets for this file. Complain. */
778 if (dbx->stab_section_info) /* If there *is* any info, */
779 complain (&stab_info_mismatch_complaint, filename);
780}
35f5886e 781\f
4d57c599 782/* Register that we are able to handle ELF object file formats. */
35f5886e 783
80d68b1d
FF
784static struct sym_fns elf_sym_fns =
785{
0eed42de 786 bfd_target_elf_flavour,
35f5886e
FF
787 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
788 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
789 elf_symfile_read, /* sym_read: read a symbol file into symtab */
80d68b1d 790 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
2670f34d 791 elf_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
35f5886e
FF
792 NULL /* next: pointer to next struct sym_fns */
793};
794
795void
1ab3bf1b 796_initialize_elfread ()
35f5886e
FF
797{
798 add_symtab_fns (&elf_sym_fns);
799}
This page took 0.173586 seconds and 4 git commands to generate.