]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/elfread.c
2001-01-16 Michael Snyder <msnyder@cleaver.cygnus.com>
[thirdparty/binutils-gdb.git] / gdb / elfread.c
CommitLineData
c906108c
SS
1/* Read ELF (Executable and Linking Format) object files for GDB.
2 Copyright 1991, 92, 93, 94, 95, 96, 1998 Free Software Foundation, Inc.
3 Written by Fred Fish at Cygnus Support.
4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b
JM
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330,
20 Boston, MA 02111-1307, USA. */
c906108c
SS
21
22#include "defs.h"
23#include "bfd.h"
24#include "gdb_string.h"
25#include "elf-bfd.h"
26#include "elf/mips.h"
27#include "symtab.h"
28#include "symfile.h"
29#include "objfiles.h"
30#include "buildsym.h"
31#include "stabsread.h"
32#include "gdb-stabs.h"
33#include "complaints.h"
34#include "demangle.h"
35
a14ed312 36extern void _initialize_elfread (void);
392a587b 37
c906108c 38/* The struct elfinfo is available only during ELF symbol table and
6426a772 39 psymtab reading. It is destroyed at the completion of psymtab-reading.
c906108c
SS
40 It's local to elf_symfile_read. */
41
c5aa993b
JM
42struct elfinfo
43 {
44 file_ptr dboffset; /* Offset to dwarf debug section */
45 unsigned int dbsize; /* Size of dwarf debug section */
46 file_ptr lnoffset; /* Offset to dwarf line number section */
47 unsigned int lnsize; /* Size of dwarf line number section */
48 asection *stabsect; /* Section pointer for .stab section */
49 asection *stabindexsect; /* Section pointer for .stab.index section */
50 asection *mdebugsect; /* Section pointer for .mdebug section */
51 };
c906108c
SS
52
53/* Various things we might complain about... */
54
c5aa993b
JM
55struct complaint section_info_complaint =
56{"elf/stab section information %s without a preceding file symbol", 0, 0};
c906108c 57
c5aa993b
JM
58struct complaint section_info_dup_complaint =
59{"duplicated elf/stab section information for %s", 0, 0};
c906108c 60
c5aa993b
JM
61struct complaint stab_info_mismatch_complaint =
62{"elf/stab section information missing for %s", 0, 0};
c906108c 63
c5aa993b
JM
64struct complaint stab_info_questionable_complaint =
65{"elf/stab section information questionable for %s", 0, 0};
c906108c 66
a14ed312 67static void elf_symfile_init (struct objfile *);
c906108c 68
a14ed312 69static void elf_new_init (struct objfile *);
c906108c 70
a14ed312 71static void elf_symfile_read (struct objfile *, int);
c906108c 72
a14ed312 73static void elf_symfile_finish (struct objfile *);
c906108c 74
a14ed312 75static void elf_symtab_read (struct objfile *, int);
c906108c 76
a14ed312 77static void free_elfinfo (void *);
c906108c 78
a14ed312
KB
79static struct minimal_symbol *record_minimal_symbol_and_info (char *,
80 CORE_ADDR,
81 enum
82 minimal_symbol_type,
83 char *,
84 asection *
85 bfd_section,
86 struct objfile
87 *);
c906108c 88
a14ed312 89static void elf_locate_sections (bfd *, asection *, void *);
c906108c
SS
90
91/* We are called once per section from elf_symfile_read. We
92 need to examine each section we are passed, check to see
93 if it is something we are interested in processing, and
94 if so, stash away some access information for the section.
95
96 For now we recognize the dwarf debug information sections and
97 line number sections from matching their section names. The
98 ELF definition is no real help here since it has no direct
99 knowledge of DWARF (by design, so any debugging format can be
100 used).
101
102 We also recognize the ".stab" sections used by the Sun compilers
103 released with Solaris 2.
104
105 FIXME: The section names should not be hardwired strings (what
106 should they be? I don't think most object file formats have enough
107 section flags to specify what kind of debug section it is
108 -kingdon). */
109
110static void
fba45db2 111elf_locate_sections (bfd *ignore_abfd, asection *sectp, PTR eip)
c906108c
SS
112{
113 register struct elfinfo *ei;
114
115 ei = (struct elfinfo *) eip;
c5aa993b 116 if (STREQ (sectp->name, ".debug"))
c906108c 117 {
c5aa993b
JM
118 ei->dboffset = sectp->filepos;
119 ei->dbsize = bfd_get_section_size_before_reloc (sectp);
c906108c 120 }
c5aa993b 121 else if (STREQ (sectp->name, ".line"))
c906108c 122 {
c5aa993b
JM
123 ei->lnoffset = sectp->filepos;
124 ei->lnsize = bfd_get_section_size_before_reloc (sectp);
c906108c 125 }
c5aa993b 126 else if (STREQ (sectp->name, ".stab"))
c906108c 127 {
c5aa993b 128 ei->stabsect = sectp;
c906108c 129 }
c5aa993b 130 else if (STREQ (sectp->name, ".stab.index"))
c906108c 131 {
c5aa993b 132 ei->stabindexsect = sectp;
c906108c 133 }
c5aa993b 134 else if (STREQ (sectp->name, ".mdebug"))
c906108c 135 {
c5aa993b 136 ei->mdebugsect = sectp;
c906108c
SS
137 }
138}
139
c5aa993b 140#if 0 /* Currently unused */
c906108c
SS
141
142char *
fba45db2 143elf_interpreter (bfd *abfd)
c906108c
SS
144{
145 sec_ptr interp_sec;
146 unsigned size;
147 char *interp = NULL;
148
149 interp_sec = bfd_get_section_by_name (abfd, ".interp");
150 if (interp_sec)
151 {
152 size = bfd_section_size (abfd, interp_sec);
153 interp = alloca (size);
c5aa993b 154 if (bfd_get_section_contents (abfd, interp_sec, interp, (file_ptr) 0,
c906108c
SS
155 size))
156 {
157 interp = savestring (interp, size - 1);
158 }
159 else
160 {
161 interp = NULL;
162 }
163 }
164 return (interp);
165}
166
167#endif
168
169static struct minimal_symbol *
fba45db2
KB
170record_minimal_symbol_and_info (char *name, CORE_ADDR address,
171 enum minimal_symbol_type ms_type, char *info, /* FIXME, is this really char *? */
172 asection *bfd_section, struct objfile *objfile)
c906108c 173{
c906108c 174#ifdef SMASH_TEXT_ADDRESS
bbeae047
KB
175 if (ms_type == mst_text || ms_type == mst_file_text)
176 SMASH_TEXT_ADDRESS (address);
c906108c 177#endif
c906108c
SS
178
179 return prim_record_minimal_symbol_and_info
bbeae047 180 (name, address, ms_type, info, bfd_section->index, bfd_section, objfile);
c906108c
SS
181}
182
183/*
184
c5aa993b 185 LOCAL FUNCTION
c906108c 186
c5aa993b 187 elf_symtab_read -- read the symbol table of an ELF file
c906108c 188
c5aa993b 189 SYNOPSIS
c906108c 190
d4f3574e 191 void elf_symtab_read (struct objfile *objfile, int dynamic)
c906108c 192
c5aa993b 193 DESCRIPTION
c906108c 194
d4f3574e
SS
195 Given an objfile and a flag that specifies whether or not the objfile
196 is for an executable or not (may be shared library for example), add
197 all the global function and data symbols to the minimal symbol table.
c906108c 198
c5aa993b
JM
199 In stabs-in-ELF, as implemented by Sun, there are some local symbols
200 defined in the ELF symbol table, which can be used to locate
201 the beginnings of sections from each ".o" file that was linked to
202 form the executable objfile. We gather any such info and record it
203 in data structures hung off the objfile's private data.
c906108c 204
c5aa993b 205 */
c906108c
SS
206
207static void
fba45db2 208elf_symtab_read (struct objfile *objfile, int dynamic)
c906108c
SS
209{
210 long storage_needed;
211 asymbol *sym;
212 asymbol **symbol_table;
213 long number_of_symbols;
214 long i;
215 int index;
216 struct cleanup *back_to;
217 CORE_ADDR symaddr;
d4f3574e 218 CORE_ADDR offset;
c906108c
SS
219 enum minimal_symbol_type ms_type;
220 /* If sectinfo is nonNULL, it contains section info that should end up
221 filed in the objfile. */
222 struct stab_section_info *sectinfo = NULL;
223 /* If filesym is nonzero, it points to a file symbol, but we haven't
224 seen any section info for it yet. */
225 asymbol *filesym = 0;
226#ifdef SOFUN_ADDRESS_MAYBE_MISSING
227 /* Name of filesym, as saved on the symbol_obstack. */
228 char *filesymname = obsavestring ("", 0, &objfile->symbol_obstack);
229#endif
230 struct dbx_symfile_info *dbx = objfile->sym_stab_info;
231 unsigned long size;
d4f3574e 232 int stripped = (bfd_get_symcount (objfile->obfd) == 0);
c5aa993b 233
c906108c
SS
234 if (dynamic)
235 {
d4f3574e 236 storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd);
c906108c
SS
237
238 /* Nothing to be done if there is no dynamic symtab. */
239 if (storage_needed < 0)
240 return;
241 }
242 else
243 {
d4f3574e 244 storage_needed = bfd_get_symtab_upper_bound (objfile->obfd);
c906108c 245 if (storage_needed < 0)
d4f3574e 246 error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd),
c906108c
SS
247 bfd_errmsg (bfd_get_error ()));
248 }
249 if (storage_needed > 0)
250 {
251 symbol_table = (asymbol **) xmalloc (storage_needed);
b8c9b27d 252 back_to = make_cleanup (xfree, symbol_table);
c906108c 253 if (dynamic)
d4f3574e 254 number_of_symbols = bfd_canonicalize_dynamic_symtab (objfile->obfd,
c906108c
SS
255 symbol_table);
256 else
d4f3574e 257 number_of_symbols = bfd_canonicalize_symtab (objfile->obfd, symbol_table);
c906108c 258 if (number_of_symbols < 0)
d4f3574e 259 error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd),
c906108c 260 bfd_errmsg (bfd_get_error ()));
b8d39351 261
c906108c
SS
262 for (i = 0; i < number_of_symbols; i++)
263 {
264 sym = symbol_table[i];
c5aa993b 265 if (sym->name == NULL || *sym->name == '\0')
c906108c
SS
266 {
267 /* Skip names that don't exist (shouldn't happen), or names
c5aa993b 268 that are null strings (may happen). */
c906108c
SS
269 continue;
270 }
271
b8d39351 272 offset = ANOFFSET (objfile->section_offsets, sym->section->index);
c906108c 273 if (dynamic
c5aa993b
JM
274 && sym->section == &bfd_und_section
275 && (sym->flags & BSF_FUNCTION))
c906108c
SS
276 {
277 struct minimal_symbol *msym;
278
279 /* Symbol is a reference to a function defined in
c5aa993b
JM
280 a shared library.
281 If its value is non zero then it is usually the address
282 of the corresponding entry in the procedure linkage table,
d4f3574e 283 plus the desired section offset.
c5aa993b
JM
284 If its value is zero then the dynamic linker has to resolve
285 the symbol. We are unable to find any meaningful address
286 for this symbol in the executable file, so we skip it. */
287 symaddr = sym->value;
c906108c
SS
288 if (symaddr == 0)
289 continue;
d4f3574e 290 symaddr += offset;
c906108c 291 msym = record_minimal_symbol_and_info
c5aa993b
JM
292 ((char *) sym->name, symaddr,
293 mst_solib_trampoline, NULL, sym->section, objfile);
c906108c
SS
294#ifdef SOFUN_ADDRESS_MAYBE_MISSING
295 if (msym != NULL)
296 msym->filename = filesymname;
297#endif
298 continue;
299 }
300
301 /* If it is a nonstripped executable, do not enter dynamic
302 symbols, as the dynamic symbol table is usually a subset
303 of the main symbol table. */
304 if (dynamic && !stripped)
305 continue;
c5aa993b 306 if (sym->flags & BSF_FILE)
c906108c
SS
307 {
308 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
c5aa993b 309 Chain any old one onto the objfile; remember new sym. */
c906108c
SS
310 if (sectinfo != NULL)
311 {
c5aa993b
JM
312 sectinfo->next = dbx->stab_section_info;
313 dbx->stab_section_info = sectinfo;
c906108c
SS
314 sectinfo = NULL;
315 }
316 filesym = sym;
317#ifdef SOFUN_ADDRESS_MAYBE_MISSING
318 filesymname =
c5aa993b 319 obsavestring ((char *) filesym->name, strlen (filesym->name),
c906108c
SS
320 &objfile->symbol_obstack);
321#endif
322 }
c5aa993b 323 else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
c906108c
SS
324 {
325 struct minimal_symbol *msym;
326
327 /* Select global/local/weak symbols. Note that bfd puts abs
c5aa993b
JM
328 symbols in their own section, so all symbols we are
329 interested in will have a section. */
c906108c 330 /* Bfd symbols are section relative. */
c5aa993b 331 symaddr = sym->value + sym->section->vma;
d4f3574e 332 /* Relocate all non-absolute symbols by the section offset. */
c5aa993b 333 if (sym->section != &bfd_abs_section)
c906108c 334 {
d4f3574e 335 symaddr += offset;
c906108c
SS
336 }
337 /* For non-absolute symbols, use the type of the section
c5aa993b
JM
338 they are relative to, to intuit text/data. Bfd provides
339 no way of figuring this out for absolute symbols. */
340 if (sym->section == &bfd_abs_section)
c906108c
SS
341 {
342 /* This is a hack to get the minimal symbol type
11cf8741 343 right for Irix 5, which has absolute addresses
c906108c
SS
344 with special section indices for dynamic symbols. */
345 unsigned short shndx =
c5aa993b 346 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
c906108c
SS
347
348 switch (shndx)
349 {
350 case SHN_MIPS_TEXT:
351 ms_type = mst_text;
352 break;
353 case SHN_MIPS_DATA:
354 ms_type = mst_data;
355 break;
356 case SHN_MIPS_ACOMMON:
357 ms_type = mst_bss;
358 break;
359 default:
360 ms_type = mst_abs;
361 }
362
363 /* If it is an Irix dynamic symbol, skip section name
d4f3574e 364 symbols, relocate all others by section offset. */
c906108c
SS
365 if (ms_type != mst_abs)
366 {
367 if (sym->name[0] == '.')
368 continue;
d4f3574e 369 symaddr += offset;
c906108c
SS
370 }
371 }
c5aa993b 372 else if (sym->section->flags & SEC_CODE)
c906108c 373 {
c5aa993b 374 if (sym->flags & BSF_GLOBAL)
c906108c
SS
375 {
376 ms_type = mst_text;
377 }
378 else if ((sym->name[0] == '.' && sym->name[1] == 'L')
c5aa993b 379 || ((sym->flags & BSF_LOCAL)
c906108c
SS
380 && sym->name[0] == '$'
381 && sym->name[1] == 'L'))
382 /* Looks like a compiler-generated label. Skip it.
383 The assembler should be skipping these (to keep
384 executables small), but apparently with gcc on the
385 delta m88k SVR4, it loses. So to have us check too
386 should be harmless (but I encourage people to fix this
387 in the assembler instead of adding checks here). */
388 continue;
389#ifdef HARRIS_TARGET
390 else if (sym->name[0] == '.' && sym->name[1] == '.')
391 {
392 /* Looks like a Harris compiler generated label for the
c5aa993b
JM
393 purpose of marking instructions that are relevant to
394 DWARF dies. The assembler can't get rid of these
395 because they are relocatable addresses that the
396 linker needs to resolve. */
c906108c
SS
397 continue;
398 }
c5aa993b 399#endif
c906108c
SS
400 else
401 {
402 ms_type = mst_file_text;
403 }
404 }
c5aa993b 405 else if (sym->section->flags & SEC_ALLOC)
c906108c 406 {
bbeae047 407 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
c906108c 408 {
c5aa993b 409 if (sym->section->flags & SEC_LOAD)
c906108c
SS
410 {
411 ms_type = mst_data;
412 }
413 else
414 {
415 ms_type = mst_bss;
416 }
417 }
c5aa993b 418 else if (sym->flags & BSF_LOCAL)
c906108c
SS
419 {
420 /* Named Local variable in a Data section. Check its
c5aa993b
JM
421 name for stabs-in-elf. The STREQ macro checks the
422 first character inline, so we only actually do a
423 strcmp function call on names that start with 'B'
424 or 'D' */
c906108c 425 index = SECT_OFF_MAX;
c5aa993b 426 if (STREQ ("Bbss.bss", sym->name))
c906108c 427 {
b8fbeb18 428 index = SECT_OFF_BSS (objfile);
c906108c 429 }
c5aa993b 430 else if (STREQ ("Ddata.data", sym->name))
c906108c 431 {
b8fbeb18 432 index = SECT_OFF_DATA (objfile);
c906108c 433 }
c5aa993b 434 else if (STREQ ("Drodata.rodata", sym->name))
c906108c 435 {
b8fbeb18 436 index = SECT_OFF_RODATA (objfile);
c906108c
SS
437 }
438 if (index != SECT_OFF_MAX)
439 {
440 /* Found a special local symbol. Allocate a
441 sectinfo, if needed, and fill it in. */
442 if (sectinfo == NULL)
443 {
444 sectinfo = (struct stab_section_info *)
c5aa993b 445 xmmalloc (objfile->md, sizeof (*sectinfo));
c906108c
SS
446 memset ((PTR) sectinfo, 0, sizeof (*sectinfo));
447 if (filesym == NULL)
448 {
449 complain (&section_info_complaint,
c5aa993b 450 sym->name);
c906108c
SS
451 }
452 else
453 {
c5aa993b
JM
454 sectinfo->filename =
455 (char *) filesym->name;
c906108c
SS
456 }
457 }
a4c8257b
EZ
458 if (index != -1)
459 {
460 if (sectinfo->sections[index] != 0)
461 {
462 complain (&section_info_dup_complaint,
463 sectinfo->filename);
464 }
c906108c 465 }
a4c8257b
EZ
466 else
467 internal_error ("Section index uninitialized.");
c906108c 468 /* Bfd symbols are section relative. */
c5aa993b 469 symaddr = sym->value + sym->section->vma;
d4f3574e 470 /* Relocate non-absolute symbols by the section offset. */
c5aa993b 471 if (sym->section != &bfd_abs_section)
c906108c 472 {
d4f3574e 473 symaddr += offset;
c906108c 474 }
a4c8257b
EZ
475 if (index != -1)
476 sectinfo->sections[index] = symaddr;
477 else
478 internal_error ("Section index uninitialized.");
c906108c
SS
479 /* The special local symbols don't go in the
480 minimal symbol table, so ignore this one. */
481 continue;
482 }
483 /* Not a special stabs-in-elf symbol, do regular
c5aa993b
JM
484 symbol processing. */
485 if (sym->section->flags & SEC_LOAD)
c906108c
SS
486 {
487 ms_type = mst_file_data;
488 }
489 else
490 {
491 ms_type = mst_file_bss;
492 }
493 }
494 else
495 {
496 ms_type = mst_unknown;
497 }
498 }
499 else
500 {
501 /* FIXME: Solaris2 shared libraries include lots of
502 odd "absolute" and "undefined" symbols, that play
503 hob with actions like finding what function the PC
504 is in. Ignore them if they aren't text, data, or bss. */
505 /* ms_type = mst_unknown; */
c5aa993b 506 continue; /* Skip this symbol. */
c906108c
SS
507 }
508 /* Pass symbol size field in via BFD. FIXME!!! */
c5aa993b 509 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
c906108c 510 msym = record_minimal_symbol_and_info
c5aa993b
JM
511 ((char *) sym->name, symaddr,
512 ms_type, (PTR) size, sym->section, objfile);
c906108c
SS
513#ifdef SOFUN_ADDRESS_MAYBE_MISSING
514 if (msym != NULL)
515 msym->filename = filesymname;
516#endif
517#ifdef ELF_MAKE_MSYMBOL_SPECIAL
c5aa993b 518 ELF_MAKE_MSYMBOL_SPECIAL (sym, msym);
c906108c
SS
519#endif
520 }
521 }
522 do_cleanups (back_to);
523 }
524}
525
526/* Scan and build partial symbols for a symbol file.
527 We have been initialized by a call to elf_symfile_init, which
528 currently does nothing.
529
530 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
531 in each section. We simplify it down to a single offset for all
532 symbols. FIXME.
533
534 MAINLINE is true if we are reading the main symbol
535 table (as opposed to a shared lib or dynamically loaded file).
536
537 This function only does the minimum work necessary for letting the
538 user "name" things symbolically; it does not read the entire symtab.
539 Instead, it reads the external and static symbols and puts them in partial
540 symbol tables. When more extensive information is requested of a
541 file, the corresponding partial symbol table is mutated into a full
542 fledged symbol table by going back and reading the symbols
543 for real.
544
545 We look for sections with specific names, to tell us what debug
546 format to look for: FIXME!!!
547
548 dwarf_build_psymtabs() builds psymtabs for DWARF symbols;
549 elfstab_build_psymtabs() handles STABS symbols;
550 mdebug_build_psymtabs() handles ECOFF debugging information.
551
552 Note that ELF files have a "minimal" symbol table, which looks a lot
553 like a COFF symbol table, but has only the minimal information necessary
554 for linking. We process this also, and use the information to
555 build gdb's minimal symbol table. This gives us some minimal debugging
556 capability even for files compiled without -g. */
557
558static void
fba45db2 559elf_symfile_read (struct objfile *objfile, int mainline)
c906108c
SS
560{
561 bfd *abfd = objfile->obfd;
562 struct elfinfo ei;
563 struct cleanup *back_to;
564 CORE_ADDR offset;
565
566 init_minimal_symbol_collection ();
56e290f4 567 back_to = make_cleanup_discard_minimal_symbols ();
c906108c
SS
568
569 memset ((char *) &ei, 0, sizeof (ei));
570
571 /* Allocate struct to keep track of the symfile */
572 objfile->sym_stab_info = (struct dbx_symfile_info *)
c5aa993b 573 xmmalloc (objfile->md, sizeof (struct dbx_symfile_info));
c906108c
SS
574 memset ((char *) objfile->sym_stab_info, 0, sizeof (struct dbx_symfile_info));
575 make_cleanup (free_elfinfo, (PTR) objfile);
576
577 /* Process the normal ELF symbol table first. This may write some
578 chain of info into the dbx_symfile_info in objfile->sym_stab_info,
579 which can later be used by elfstab_offset_sections. */
580
d4f3574e 581 elf_symtab_read (objfile, 0);
c906108c
SS
582
583 /* Add the dynamic symbols. */
584
d4f3574e 585 elf_symtab_read (objfile, 1);
c906108c
SS
586
587 /* Now process debugging information, which is contained in
588 special ELF sections. */
589
590 /* If we are reinitializing, or if we have never loaded syms yet,
591 set table to empty. MAINLINE is cleared so that *_read_psymtab
592 functions do not all also re-initialize the psymbol table. */
593 if (mainline)
594 {
595 init_psymbol_list (objfile, 0);
596 mainline = 0;
597 }
598
599 /* We first have to find them... */
c5aa993b 600 bfd_map_over_sections (abfd, elf_locate_sections, (PTR) & ei);
c906108c
SS
601
602 /* ELF debugging information is inserted into the psymtab in the
603 order of least informative first - most informative last. Since
604 the psymtab table is searched `most recent insertion first' this
605 increases the probability that more detailed debug information
606 for a section is found.
607
608 For instance, an object file might contain both .mdebug (XCOFF)
609 and .debug_info (DWARF2) sections then .mdebug is inserted first
610 (searched last) and DWARF2 is inserted last (searched first). If
611 we don't do this then the XCOFF info is found first - for code in
612 an included file XCOFF info is useless. */
613
614 if (ei.mdebugsect)
615 {
616 const struct ecoff_debug_swap *swap;
617
618 /* .mdebug section, presumably holding ECOFF debugging
c5aa993b 619 information. */
c906108c
SS
620 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
621 if (swap)
d4f3574e 622 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect);
c906108c
SS
623 }
624 if (ei.stabsect)
625 {
626 asection *str_sect;
627
628 /* Stab sections have an associated string table that looks like
c5aa993b 629 a separate section. */
c906108c
SS
630 str_sect = bfd_get_section_by_name (abfd, ".stabstr");
631
632 /* FIXME should probably warn about a stab section without a stabstr. */
633 if (str_sect)
634 elfstab_build_psymtabs (objfile,
c906108c
SS
635 mainline,
636 ei.stabsect->filepos,
637 bfd_section_size (abfd, ei.stabsect),
638 str_sect->filepos,
639 bfd_section_size (abfd, str_sect));
640 }
641 if (dwarf2_has_info (abfd))
642 {
643 /* DWARF 2 sections */
d4f3574e 644 dwarf2_build_psymtabs (objfile, mainline);
c906108c
SS
645 }
646 else if (ei.dboffset && ei.lnoffset)
647 {
648 /* DWARF sections */
649 dwarf_build_psymtabs (objfile,
d4f3574e 650 mainline,
c906108c
SS
651 ei.dboffset, ei.dbsize,
652 ei.lnoffset, ei.lnsize);
653 }
654
655 /* Install any minimal symbols that have been collected as the current
656 minimal symbols for this objfile. */
657
658 install_minimal_symbols (objfile);
659
660 do_cleanups (back_to);
661}
662
663/* This cleans up the objfile's sym_stab_info pointer, and the chain of
664 stab_section_info's, that might be dangling from it. */
665
666static void
fba45db2 667free_elfinfo (PTR objp)
c906108c 668{
c5aa993b 669 struct objfile *objfile = (struct objfile *) objp;
c906108c
SS
670 struct dbx_symfile_info *dbxinfo = objfile->sym_stab_info;
671 struct stab_section_info *ssi, *nssi;
672
673 ssi = dbxinfo->stab_section_info;
674 while (ssi)
675 {
676 nssi = ssi->next;
677 mfree (objfile->md, ssi);
678 ssi = nssi;
679 }
680
681 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
682}
683
684
685/* Initialize anything that needs initializing when a completely new symbol
686 file is specified (not just adding some symbols from another file, e.g. a
687 shared library).
688
689 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
690
691static void
fba45db2 692elf_new_init (struct objfile *ignore)
c906108c
SS
693{
694 stabsread_new_init ();
695 buildsym_new_init ();
696}
697
698/* Perform any local cleanups required when we are done with a particular
699 objfile. I.E, we are in the process of discarding all symbol information
700 for an objfile, freeing up all memory held for it, and unlinking the
701 objfile struct from the global list of known objfiles. */
702
703static void
fba45db2 704elf_symfile_finish (struct objfile *objfile)
c906108c 705{
c5aa993b 706 if (objfile->sym_stab_info != NULL)
c906108c 707 {
c5aa993b 708 mfree (objfile->md, objfile->sym_stab_info);
c906108c
SS
709 }
710}
711
712/* ELF specific initialization routine for reading symbols.
713
714 It is passed a pointer to a struct sym_fns which contains, among other
715 things, the BFD for the file whose symbols are being read, and a slot for
716 a pointer to "private data" which we can fill with goodies.
717
718 For now at least, we have nothing in particular to do, so this function is
719 just a stub. */
720
721static void
fba45db2 722elf_symfile_init (struct objfile *objfile)
c906108c
SS
723{
724 /* ELF objects may be reordered, so set OBJF_REORDERED. If we
725 find this causes a significant slowdown in gdb then we could
726 set it in the debug symbol readers only when necessary. */
727 objfile->flags |= OBJF_REORDERED;
728}
729
730/* When handling an ELF file that contains Sun STABS debug info,
731 some of the debug info is relative to the particular chunk of the
732 section that was generated in its individual .o file. E.g.
733 offsets to static variables are relative to the start of the data
734 segment *for that module before linking*. This information is
735 painfully squirreled away in the ELF symbol table as local symbols
736 with wierd names. Go get 'em when needed. */
737
738void
fba45db2 739elfstab_offset_sections (struct objfile *objfile, struct partial_symtab *pst)
c906108c
SS
740{
741 char *filename = pst->filename;
742 struct dbx_symfile_info *dbx = objfile->sym_stab_info;
743 struct stab_section_info *maybe = dbx->stab_section_info;
744 struct stab_section_info *questionable = 0;
745 int i;
746 char *p;
747
748 /* The ELF symbol info doesn't include path names, so strip the path
749 (if any) from the psymtab filename. */
750 while (0 != (p = strchr (filename, '/')))
c5aa993b 751 filename = p + 1;
c906108c
SS
752
753 /* FIXME: This linear search could speed up significantly
754 if it was chained in the right order to match how we search it,
755 and if we unchained when we found a match. */
756 for (; maybe; maybe = maybe->next)
757 {
758 if (filename[0] == maybe->filename[0]
759 && STREQ (filename, maybe->filename))
760 {
761 /* We found a match. But there might be several source files
762 (from different directories) with the same name. */
763 if (0 == maybe->found)
764 break;
c5aa993b 765 questionable = maybe; /* Might use it later. */
c906108c
SS
766 }
767 }
768
769 if (maybe == 0 && questionable != 0)
770 {
771 complain (&stab_info_questionable_complaint, filename);
772 maybe = questionable;
773 }
774
775 if (maybe)
776 {
777 /* Found it! Allocate a new psymtab struct, and fill it in. */
778 maybe->found++;
779 pst->section_offsets = (struct section_offsets *)
96baa820 780 obstack_alloc (&objfile->psymbol_obstack, SIZEOF_SECTION_OFFSETS);
c906108c 781 for (i = 0; i < SECT_OFF_MAX; i++)
a4c8257b 782 (pst->section_offsets)->offsets[i] = maybe->sections[i];
c906108c
SS
783 return;
784 }
785
786 /* We were unable to find any offsets for this file. Complain. */
c5aa993b 787 if (dbx->stab_section_info) /* If there *is* any info, */
c906108c
SS
788 complain (&stab_info_mismatch_complaint, filename);
789}
790\f
791/* Register that we are able to handle ELF object file formats. */
792
793static struct sym_fns elf_sym_fns =
794{
795 bfd_target_elf_flavour,
c5aa993b
JM
796 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
797 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
798 elf_symfile_read, /* sym_read: read a symbol file into symtab */
799 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
96baa820 800 default_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
c5aa993b 801 NULL /* next: pointer to next struct sym_fns */
c906108c
SS
802};
803
804void
fba45db2 805_initialize_elfread (void)
c906108c
SS
806{
807 add_symtab_fns (&elf_sym_fns);
808}