]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/elfread.c
* config/tc-mips.c (HAVE_64BIT_ADDRESS_CONSTANTS): Remove.
[thirdparty/binutils-gdb.git] / gdb / elfread.c
CommitLineData
c906108c 1/* Read ELF (Executable and Linking Format) object files for GDB.
1bac305b
AC
2
3 Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
4 2000, 2001, 2002, 2003 Free Software Foundation, Inc.
5
c906108c
SS
6 Written by Fred Fish at Cygnus Support.
7
c5aa993b 8 This file is part of GDB.
c906108c 9
c5aa993b
JM
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2 of the License, or
13 (at your option) any later version.
c906108c 14
c5aa993b
JM
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
c906108c 19
c5aa993b
JM
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
22 Foundation, Inc., 59 Temple Place - Suite 330,
23 Boston, MA 02111-1307, USA. */
c906108c
SS
24
25#include "defs.h"
26#include "bfd.h"
27#include "gdb_string.h"
28#include "elf-bfd.h"
29#include "elf/mips.h"
30#include "symtab.h"
31#include "symfile.h"
32#include "objfiles.h"
33#include "buildsym.h"
34#include "stabsread.h"
35#include "gdb-stabs.h"
36#include "complaints.h"
37#include "demangle.h"
38
a14ed312 39extern void _initialize_elfread (void);
392a587b 40
c906108c 41/* The struct elfinfo is available only during ELF symbol table and
6426a772 42 psymtab reading. It is destroyed at the completion of psymtab-reading.
c906108c
SS
43 It's local to elf_symfile_read. */
44
c5aa993b
JM
45struct elfinfo
46 {
47 file_ptr dboffset; /* Offset to dwarf debug section */
48 unsigned int dbsize; /* Size of dwarf debug section */
49 file_ptr lnoffset; /* Offset to dwarf line number section */
50 unsigned int lnsize; /* Size of dwarf line number section */
51 asection *stabsect; /* Section pointer for .stab section */
52 asection *stabindexsect; /* Section pointer for .stab.index section */
53 asection *mdebugsect; /* Section pointer for .mdebug section */
54 };
c906108c 55
12b9c64f 56static void free_elfinfo (void *);
c906108c
SS
57
58/* We are called once per section from elf_symfile_read. We
59 need to examine each section we are passed, check to see
60 if it is something we are interested in processing, and
61 if so, stash away some access information for the section.
62
63 For now we recognize the dwarf debug information sections and
64 line number sections from matching their section names. The
65 ELF definition is no real help here since it has no direct
66 knowledge of DWARF (by design, so any debugging format can be
67 used).
68
69 We also recognize the ".stab" sections used by the Sun compilers
70 released with Solaris 2.
71
72 FIXME: The section names should not be hardwired strings (what
73 should they be? I don't think most object file formats have enough
74 section flags to specify what kind of debug section it is
75 -kingdon). */
76
77static void
12b9c64f 78elf_locate_sections (bfd *ignore_abfd, asection *sectp, void *eip)
c906108c
SS
79{
80 register struct elfinfo *ei;
81
82 ei = (struct elfinfo *) eip;
c5aa993b 83 if (STREQ (sectp->name, ".debug"))
c906108c 84 {
c5aa993b
JM
85 ei->dboffset = sectp->filepos;
86 ei->dbsize = bfd_get_section_size_before_reloc (sectp);
c906108c 87 }
c5aa993b 88 else if (STREQ (sectp->name, ".line"))
c906108c 89 {
c5aa993b
JM
90 ei->lnoffset = sectp->filepos;
91 ei->lnsize = bfd_get_section_size_before_reloc (sectp);
c906108c 92 }
c5aa993b 93 else if (STREQ (sectp->name, ".stab"))
c906108c 94 {
c5aa993b 95 ei->stabsect = sectp;
c906108c 96 }
c5aa993b 97 else if (STREQ (sectp->name, ".stab.index"))
c906108c 98 {
c5aa993b 99 ei->stabindexsect = sectp;
c906108c 100 }
c5aa993b 101 else if (STREQ (sectp->name, ".mdebug"))
c906108c 102 {
c5aa993b 103 ei->mdebugsect = sectp;
c906108c
SS
104 }
105}
106
c5aa993b 107#if 0 /* Currently unused */
c906108c
SS
108
109char *
fba45db2 110elf_interpreter (bfd *abfd)
c906108c
SS
111{
112 sec_ptr interp_sec;
113 unsigned size;
114 char *interp = NULL;
115
116 interp_sec = bfd_get_section_by_name (abfd, ".interp");
117 if (interp_sec)
118 {
119 size = bfd_section_size (abfd, interp_sec);
120 interp = alloca (size);
c5aa993b 121 if (bfd_get_section_contents (abfd, interp_sec, interp, (file_ptr) 0,
c906108c
SS
122 size))
123 {
124 interp = savestring (interp, size - 1);
125 }
126 else
127 {
128 interp = NULL;
129 }
130 }
131 return (interp);
132}
133
134#endif
135
136static struct minimal_symbol *
fba45db2
KB
137record_minimal_symbol_and_info (char *name, CORE_ADDR address,
138 enum minimal_symbol_type ms_type, char *info, /* FIXME, is this really char *? */
139 asection *bfd_section, struct objfile *objfile)
c906108c 140{
bbeae047 141 if (ms_type == mst_text || ms_type == mst_file_text)
181c1381 142 address = SMASH_TEXT_ADDRESS (address);
c906108c
SS
143
144 return prim_record_minimal_symbol_and_info
bbeae047 145 (name, address, ms_type, info, bfd_section->index, bfd_section, objfile);
c906108c
SS
146}
147
148/*
149
c5aa993b 150 LOCAL FUNCTION
c906108c 151
c5aa993b 152 elf_symtab_read -- read the symbol table of an ELF file
c906108c 153
c5aa993b 154 SYNOPSIS
c906108c 155
d4f3574e 156 void elf_symtab_read (struct objfile *objfile, int dynamic)
c906108c 157
c5aa993b 158 DESCRIPTION
c906108c 159
d4f3574e
SS
160 Given an objfile and a flag that specifies whether or not the objfile
161 is for an executable or not (may be shared library for example), add
162 all the global function and data symbols to the minimal symbol table.
c906108c 163
c5aa993b
JM
164 In stabs-in-ELF, as implemented by Sun, there are some local symbols
165 defined in the ELF symbol table, which can be used to locate
166 the beginnings of sections from each ".o" file that was linked to
167 form the executable objfile. We gather any such info and record it
168 in data structures hung off the objfile's private data.
c906108c 169
c5aa993b 170 */
c906108c
SS
171
172static void
fba45db2 173elf_symtab_read (struct objfile *objfile, int dynamic)
c906108c
SS
174{
175 long storage_needed;
176 asymbol *sym;
177 asymbol **symbol_table;
178 long number_of_symbols;
179 long i;
c906108c
SS
180 struct cleanup *back_to;
181 CORE_ADDR symaddr;
d4f3574e 182 CORE_ADDR offset;
c906108c
SS
183 enum minimal_symbol_type ms_type;
184 /* If sectinfo is nonNULL, it contains section info that should end up
185 filed in the objfile. */
186 struct stab_section_info *sectinfo = NULL;
187 /* If filesym is nonzero, it points to a file symbol, but we haven't
188 seen any section info for it yet. */
189 asymbol *filesym = 0;
190#ifdef SOFUN_ADDRESS_MAYBE_MISSING
191 /* Name of filesym, as saved on the symbol_obstack. */
192 char *filesymname = obsavestring ("", 0, &objfile->symbol_obstack);
193#endif
194 struct dbx_symfile_info *dbx = objfile->sym_stab_info;
195 unsigned long size;
d4f3574e 196 int stripped = (bfd_get_symcount (objfile->obfd) == 0);
c5aa993b 197
c906108c
SS
198 if (dynamic)
199 {
d4f3574e 200 storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd);
c906108c
SS
201
202 /* Nothing to be done if there is no dynamic symtab. */
203 if (storage_needed < 0)
204 return;
205 }
206 else
207 {
d4f3574e 208 storage_needed = bfd_get_symtab_upper_bound (objfile->obfd);
c906108c 209 if (storage_needed < 0)
d4f3574e 210 error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd),
c906108c
SS
211 bfd_errmsg (bfd_get_error ()));
212 }
213 if (storage_needed > 0)
214 {
215 symbol_table = (asymbol **) xmalloc (storage_needed);
b8c9b27d 216 back_to = make_cleanup (xfree, symbol_table);
c906108c 217 if (dynamic)
d4f3574e 218 number_of_symbols = bfd_canonicalize_dynamic_symtab (objfile->obfd,
c906108c
SS
219 symbol_table);
220 else
d4f3574e 221 number_of_symbols = bfd_canonicalize_symtab (objfile->obfd, symbol_table);
c906108c 222 if (number_of_symbols < 0)
d4f3574e 223 error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd),
c906108c 224 bfd_errmsg (bfd_get_error ()));
b8d39351 225
c906108c
SS
226 for (i = 0; i < number_of_symbols; i++)
227 {
228 sym = symbol_table[i];
c5aa993b 229 if (sym->name == NULL || *sym->name == '\0')
c906108c
SS
230 {
231 /* Skip names that don't exist (shouldn't happen), or names
c5aa993b 232 that are null strings (may happen). */
c906108c
SS
233 continue;
234 }
235
b8d39351 236 offset = ANOFFSET (objfile->section_offsets, sym->section->index);
c906108c 237 if (dynamic
c5aa993b
JM
238 && sym->section == &bfd_und_section
239 && (sym->flags & BSF_FUNCTION))
c906108c
SS
240 {
241 struct minimal_symbol *msym;
242
243 /* Symbol is a reference to a function defined in
c5aa993b
JM
244 a shared library.
245 If its value is non zero then it is usually the address
246 of the corresponding entry in the procedure linkage table,
d4f3574e 247 plus the desired section offset.
c5aa993b
JM
248 If its value is zero then the dynamic linker has to resolve
249 the symbol. We are unable to find any meaningful address
250 for this symbol in the executable file, so we skip it. */
251 symaddr = sym->value;
c906108c
SS
252 if (symaddr == 0)
253 continue;
d4f3574e 254 symaddr += offset;
c906108c 255 msym = record_minimal_symbol_and_info
c5aa993b
JM
256 ((char *) sym->name, symaddr,
257 mst_solib_trampoline, NULL, sym->section, objfile);
c906108c
SS
258#ifdef SOFUN_ADDRESS_MAYBE_MISSING
259 if (msym != NULL)
260 msym->filename = filesymname;
261#endif
262 continue;
263 }
264
265 /* If it is a nonstripped executable, do not enter dynamic
266 symbols, as the dynamic symbol table is usually a subset
267 of the main symbol table. */
268 if (dynamic && !stripped)
269 continue;
c5aa993b 270 if (sym->flags & BSF_FILE)
c906108c
SS
271 {
272 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
c5aa993b 273 Chain any old one onto the objfile; remember new sym. */
c906108c
SS
274 if (sectinfo != NULL)
275 {
c5aa993b
JM
276 sectinfo->next = dbx->stab_section_info;
277 dbx->stab_section_info = sectinfo;
c906108c
SS
278 sectinfo = NULL;
279 }
280 filesym = sym;
281#ifdef SOFUN_ADDRESS_MAYBE_MISSING
282 filesymname =
c5aa993b 283 obsavestring ((char *) filesym->name, strlen (filesym->name),
c906108c
SS
284 &objfile->symbol_obstack);
285#endif
286 }
c5aa993b 287 else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
c906108c
SS
288 {
289 struct minimal_symbol *msym;
290
291 /* Select global/local/weak symbols. Note that bfd puts abs
c5aa993b
JM
292 symbols in their own section, so all symbols we are
293 interested in will have a section. */
c906108c 294 /* Bfd symbols are section relative. */
c5aa993b 295 symaddr = sym->value + sym->section->vma;
d4f3574e 296 /* Relocate all non-absolute symbols by the section offset. */
c5aa993b 297 if (sym->section != &bfd_abs_section)
c906108c 298 {
d4f3574e 299 symaddr += offset;
c906108c
SS
300 }
301 /* For non-absolute symbols, use the type of the section
c5aa993b
JM
302 they are relative to, to intuit text/data. Bfd provides
303 no way of figuring this out for absolute symbols. */
304 if (sym->section == &bfd_abs_section)
c906108c
SS
305 {
306 /* This is a hack to get the minimal symbol type
11cf8741 307 right for Irix 5, which has absolute addresses
c906108c
SS
308 with special section indices for dynamic symbols. */
309 unsigned short shndx =
c5aa993b 310 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
c906108c
SS
311
312 switch (shndx)
313 {
314 case SHN_MIPS_TEXT:
315 ms_type = mst_text;
316 break;
317 case SHN_MIPS_DATA:
318 ms_type = mst_data;
319 break;
320 case SHN_MIPS_ACOMMON:
321 ms_type = mst_bss;
322 break;
323 default:
324 ms_type = mst_abs;
325 }
326
327 /* If it is an Irix dynamic symbol, skip section name
d4f3574e 328 symbols, relocate all others by section offset. */
c906108c
SS
329 if (ms_type != mst_abs)
330 {
331 if (sym->name[0] == '.')
332 continue;
d4f3574e 333 symaddr += offset;
c906108c
SS
334 }
335 }
c5aa993b 336 else if (sym->section->flags & SEC_CODE)
c906108c 337 {
389e51db 338 if (sym->flags & BSF_GLOBAL)
c906108c
SS
339 {
340 ms_type = mst_text;
341 }
342 else if ((sym->name[0] == '.' && sym->name[1] == 'L')
c5aa993b 343 || ((sym->flags & BSF_LOCAL)
c906108c
SS
344 && sym->name[0] == '$'
345 && sym->name[1] == 'L'))
7fb623f7
AC
346 /* Looks like a compiler-generated label. Skip
347 it. The assembler should be skipping these (to
348 keep executables small), but apparently with
1b831c93
AC
349 gcc on the (deleted) delta m88k SVR4, it loses.
350 So to have us check too should be harmless (but
351 I encourage people to fix this in the assembler
352 instead of adding checks here). */
c906108c 353 continue;
c906108c
SS
354 else
355 {
356 ms_type = mst_file_text;
357 }
358 }
c5aa993b 359 else if (sym->section->flags & SEC_ALLOC)
c906108c 360 {
bbeae047 361 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
c906108c 362 {
c5aa993b 363 if (sym->section->flags & SEC_LOAD)
c906108c
SS
364 {
365 ms_type = mst_data;
366 }
367 else
368 {
369 ms_type = mst_bss;
370 }
371 }
c5aa993b 372 else if (sym->flags & BSF_LOCAL)
c906108c 373 {
9a90a780
AC
374 /* Named Local variable in a Data section.
375 Check its name for stabs-in-elf. The STREQ
376 macro checks the first character inline, so
377 we only actually do a strcmp function call on
378 names that start with 'B' or 'D'. */
379 int special_local_sect;
380 if (strcmp ("Bbss.bss", sym->name) == 0)
381 special_local_sect = SECT_OFF_BSS (objfile);
382 else if (strcmp ("Ddata.data", sym->name) == 0)
383 special_local_sect = SECT_OFF_DATA (objfile);
384 else if (strcmp ("Drodata.rodata", sym->name) == 0)
385 special_local_sect = SECT_OFF_RODATA (objfile);
386 else
387 special_local_sect = -1;
388 if (special_local_sect >= 0)
c906108c
SS
389 {
390 /* Found a special local symbol. Allocate a
391 sectinfo, if needed, and fill it in. */
392 if (sectinfo == NULL)
393 {
a39a16c4
MM
394 int max_index;
395 size_t size;
396
397 max_index
398 = max (SECT_OFF_BSS (objfile),
399 max (SECT_OFF_DATA (objfile),
400 SECT_OFF_RODATA (objfile)));
401 size = (sizeof (struct stab_section_info)
402 + (sizeof (CORE_ADDR)
403 * (max_index - 1)));
c906108c 404 sectinfo = (struct stab_section_info *)
a39a16c4
MM
405 xmmalloc (objfile->md, size);
406 memset (sectinfo, 0, size);
407 sectinfo->num_sections = max_index;
c906108c
SS
408 if (filesym == NULL)
409 {
23136709
KB
410 complaint (&symfile_complaints,
411 "elf/stab section information %s without a preceding file symbol",
412 sym->name);
c906108c
SS
413 }
414 else
415 {
c5aa993b
JM
416 sectinfo->filename =
417 (char *) filesym->name;
c906108c
SS
418 }
419 }
9a90a780
AC
420 if (sectinfo->sections[special_local_sect] != 0)
421 complaint (&symfile_complaints,
422 "duplicated elf/stab section information for %s",
423 sectinfo->filename);
424 /* BFD symbols are section relative. */
c5aa993b 425 symaddr = sym->value + sym->section->vma;
9a90a780
AC
426 /* Relocate non-absolute symbols by the
427 section offset. */
c5aa993b 428 if (sym->section != &bfd_abs_section)
9a90a780
AC
429 symaddr += offset;
430 sectinfo->sections[special_local_sect] = symaddr;
c906108c 431 /* The special local symbols don't go in the
9a90a780 432 minimal symbol table, so ignore this one. */
c906108c
SS
433 continue;
434 }
435 /* Not a special stabs-in-elf symbol, do regular
9a90a780 436 symbol processing. */
c5aa993b 437 if (sym->section->flags & SEC_LOAD)
c906108c
SS
438 {
439 ms_type = mst_file_data;
440 }
441 else
442 {
443 ms_type = mst_file_bss;
444 }
445 }
446 else
447 {
448 ms_type = mst_unknown;
449 }
450 }
451 else
452 {
453 /* FIXME: Solaris2 shared libraries include lots of
454 odd "absolute" and "undefined" symbols, that play
455 hob with actions like finding what function the PC
456 is in. Ignore them if they aren't text, data, or bss. */
457 /* ms_type = mst_unknown; */
c5aa993b 458 continue; /* Skip this symbol. */
c906108c
SS
459 }
460 /* Pass symbol size field in via BFD. FIXME!!! */
c5aa993b 461 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
c906108c 462 msym = record_minimal_symbol_and_info
c5aa993b 463 ((char *) sym->name, symaddr,
12b9c64f 464 ms_type, (void *) size, sym->section, objfile);
c906108c
SS
465#ifdef SOFUN_ADDRESS_MAYBE_MISSING
466 if (msym != NULL)
467 msym->filename = filesymname;
468#endif
c5aa993b 469 ELF_MAKE_MSYMBOL_SPECIAL (sym, msym);
c906108c
SS
470 }
471 }
472 do_cleanups (back_to);
473 }
474}
475
476/* Scan and build partial symbols for a symbol file.
477 We have been initialized by a call to elf_symfile_init, which
478 currently does nothing.
479
480 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
481 in each section. We simplify it down to a single offset for all
482 symbols. FIXME.
483
484 MAINLINE is true if we are reading the main symbol
485 table (as opposed to a shared lib or dynamically loaded file).
486
487 This function only does the minimum work necessary for letting the
488 user "name" things symbolically; it does not read the entire symtab.
489 Instead, it reads the external and static symbols and puts them in partial
490 symbol tables. When more extensive information is requested of a
491 file, the corresponding partial symbol table is mutated into a full
492 fledged symbol table by going back and reading the symbols
493 for real.
494
495 We look for sections with specific names, to tell us what debug
496 format to look for: FIXME!!!
497
498 dwarf_build_psymtabs() builds psymtabs for DWARF symbols;
499 elfstab_build_psymtabs() handles STABS symbols;
500 mdebug_build_psymtabs() handles ECOFF debugging information.
501
502 Note that ELF files have a "minimal" symbol table, which looks a lot
503 like a COFF symbol table, but has only the minimal information necessary
504 for linking. We process this also, and use the information to
505 build gdb's minimal symbol table. This gives us some minimal debugging
506 capability even for files compiled without -g. */
507
508static void
fba45db2 509elf_symfile_read (struct objfile *objfile, int mainline)
c906108c
SS
510{
511 bfd *abfd = objfile->obfd;
512 struct elfinfo ei;
513 struct cleanup *back_to;
514 CORE_ADDR offset;
515
516 init_minimal_symbol_collection ();
56e290f4 517 back_to = make_cleanup_discard_minimal_symbols ();
c906108c
SS
518
519 memset ((char *) &ei, 0, sizeof (ei));
520
521 /* Allocate struct to keep track of the symfile */
522 objfile->sym_stab_info = (struct dbx_symfile_info *)
c5aa993b 523 xmmalloc (objfile->md, sizeof (struct dbx_symfile_info));
c906108c 524 memset ((char *) objfile->sym_stab_info, 0, sizeof (struct dbx_symfile_info));
12b9c64f 525 make_cleanup (free_elfinfo, (void *) objfile);
c906108c
SS
526
527 /* Process the normal ELF symbol table first. This may write some
528 chain of info into the dbx_symfile_info in objfile->sym_stab_info,
529 which can later be used by elfstab_offset_sections. */
530
d4f3574e 531 elf_symtab_read (objfile, 0);
c906108c
SS
532
533 /* Add the dynamic symbols. */
534
d4f3574e 535 elf_symtab_read (objfile, 1);
c906108c 536
7134143f
DJ
537 /* Install any minimal symbols that have been collected as the current
538 minimal symbols for this objfile. The debug readers below this point
539 should not generate new minimal symbols; if they do it's their
540 responsibility to install them. "mdebug" appears to be the only one
541 which will do this. */
542
543 install_minimal_symbols (objfile);
544 do_cleanups (back_to);
545
c906108c
SS
546 /* Now process debugging information, which is contained in
547 special ELF sections. */
548
549 /* If we are reinitializing, or if we have never loaded syms yet,
550 set table to empty. MAINLINE is cleared so that *_read_psymtab
551 functions do not all also re-initialize the psymbol table. */
552 if (mainline)
553 {
554 init_psymbol_list (objfile, 0);
555 mainline = 0;
556 }
557
558 /* We first have to find them... */
12b9c64f 559 bfd_map_over_sections (abfd, elf_locate_sections, (void *) & ei);
c906108c
SS
560
561 /* ELF debugging information is inserted into the psymtab in the
562 order of least informative first - most informative last. Since
563 the psymtab table is searched `most recent insertion first' this
564 increases the probability that more detailed debug information
565 for a section is found.
566
567 For instance, an object file might contain both .mdebug (XCOFF)
568 and .debug_info (DWARF2) sections then .mdebug is inserted first
569 (searched last) and DWARF2 is inserted last (searched first). If
570 we don't do this then the XCOFF info is found first - for code in
571 an included file XCOFF info is useless. */
572
573 if (ei.mdebugsect)
574 {
575 const struct ecoff_debug_swap *swap;
576
577 /* .mdebug section, presumably holding ECOFF debugging
c5aa993b 578 information. */
c906108c
SS
579 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
580 if (swap)
d4f3574e 581 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect);
c906108c
SS
582 }
583 if (ei.stabsect)
584 {
585 asection *str_sect;
586
587 /* Stab sections have an associated string table that looks like
c5aa993b 588 a separate section. */
c906108c
SS
589 str_sect = bfd_get_section_by_name (abfd, ".stabstr");
590
591 /* FIXME should probably warn about a stab section without a stabstr. */
592 if (str_sect)
593 elfstab_build_psymtabs (objfile,
c906108c 594 mainline,
086df311 595 ei.stabsect,
c906108c
SS
596 str_sect->filepos,
597 bfd_section_size (abfd, str_sect));
598 }
599 if (dwarf2_has_info (abfd))
600 {
601 /* DWARF 2 sections */
d4f3574e 602 dwarf2_build_psymtabs (objfile, mainline);
c906108c
SS
603 }
604 else if (ei.dboffset && ei.lnoffset)
605 {
606 /* DWARF sections */
607 dwarf_build_psymtabs (objfile,
d4f3574e 608 mainline,
c906108c
SS
609 ei.dboffset, ei.dbsize,
610 ei.lnoffset, ei.lnsize);
611 }
612
625b0b97
AC
613 /* FIXME: kettenis/20030504: This still needs to be integrated with
614 dwarf2read.c in a better way. */
615 dwarf2_build_frame_info (objfile);
c906108c
SS
616}
617
618/* This cleans up the objfile's sym_stab_info pointer, and the chain of
619 stab_section_info's, that might be dangling from it. */
620
621static void
12b9c64f 622free_elfinfo (void *objp)
c906108c 623{
c5aa993b 624 struct objfile *objfile = (struct objfile *) objp;
c906108c
SS
625 struct dbx_symfile_info *dbxinfo = objfile->sym_stab_info;
626 struct stab_section_info *ssi, *nssi;
627
628 ssi = dbxinfo->stab_section_info;
629 while (ssi)
630 {
631 nssi = ssi->next;
aac7f4ea 632 xmfree (objfile->md, ssi);
c906108c
SS
633 ssi = nssi;
634 }
635
636 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
637}
638
639
640/* Initialize anything that needs initializing when a completely new symbol
641 file is specified (not just adding some symbols from another file, e.g. a
642 shared library).
643
644 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
645
646static void
fba45db2 647elf_new_init (struct objfile *ignore)
c906108c
SS
648{
649 stabsread_new_init ();
650 buildsym_new_init ();
651}
652
653/* Perform any local cleanups required when we are done with a particular
654 objfile. I.E, we are in the process of discarding all symbol information
655 for an objfile, freeing up all memory held for it, and unlinking the
656 objfile struct from the global list of known objfiles. */
657
658static void
fba45db2 659elf_symfile_finish (struct objfile *objfile)
c906108c 660{
c5aa993b 661 if (objfile->sym_stab_info != NULL)
c906108c 662 {
aac7f4ea 663 xmfree (objfile->md, objfile->sym_stab_info);
c906108c
SS
664 }
665}
666
667/* ELF specific initialization routine for reading symbols.
668
669 It is passed a pointer to a struct sym_fns which contains, among other
670 things, the BFD for the file whose symbols are being read, and a slot for
671 a pointer to "private data" which we can fill with goodies.
672
673 For now at least, we have nothing in particular to do, so this function is
674 just a stub. */
675
676static void
fba45db2 677elf_symfile_init (struct objfile *objfile)
c906108c
SS
678{
679 /* ELF objects may be reordered, so set OBJF_REORDERED. If we
680 find this causes a significant slowdown in gdb then we could
681 set it in the debug symbol readers only when necessary. */
682 objfile->flags |= OBJF_REORDERED;
683}
684
685/* When handling an ELF file that contains Sun STABS debug info,
686 some of the debug info is relative to the particular chunk of the
687 section that was generated in its individual .o file. E.g.
688 offsets to static variables are relative to the start of the data
689 segment *for that module before linking*. This information is
690 painfully squirreled away in the ELF symbol table as local symbols
691 with wierd names. Go get 'em when needed. */
692
693void
fba45db2 694elfstab_offset_sections (struct objfile *objfile, struct partial_symtab *pst)
c906108c
SS
695{
696 char *filename = pst->filename;
697 struct dbx_symfile_info *dbx = objfile->sym_stab_info;
698 struct stab_section_info *maybe = dbx->stab_section_info;
699 struct stab_section_info *questionable = 0;
700 int i;
701 char *p;
702
703 /* The ELF symbol info doesn't include path names, so strip the path
704 (if any) from the psymtab filename. */
705 while (0 != (p = strchr (filename, '/')))
c5aa993b 706 filename = p + 1;
c906108c
SS
707
708 /* FIXME: This linear search could speed up significantly
709 if it was chained in the right order to match how we search it,
710 and if we unchained when we found a match. */
711 for (; maybe; maybe = maybe->next)
712 {
713 if (filename[0] == maybe->filename[0]
714 && STREQ (filename, maybe->filename))
715 {
716 /* We found a match. But there might be several source files
717 (from different directories) with the same name. */
718 if (0 == maybe->found)
719 break;
c5aa993b 720 questionable = maybe; /* Might use it later. */
c906108c
SS
721 }
722 }
723
724 if (maybe == 0 && questionable != 0)
725 {
23136709
KB
726 complaint (&symfile_complaints,
727 "elf/stab section information questionable for %s", filename);
c906108c
SS
728 maybe = questionable;
729 }
730
731 if (maybe)
732 {
733 /* Found it! Allocate a new psymtab struct, and fill it in. */
734 maybe->found++;
735 pst->section_offsets = (struct section_offsets *)
a39a16c4
MM
736 obstack_alloc (&objfile->psymbol_obstack,
737 SIZEOF_N_SECTION_OFFSETS (objfile->num_sections));
738 for (i = 0; i < maybe->num_sections; i++)
a4c8257b 739 (pst->section_offsets)->offsets[i] = maybe->sections[i];
c906108c
SS
740 return;
741 }
742
743 /* We were unable to find any offsets for this file. Complain. */
c5aa993b 744 if (dbx->stab_section_info) /* If there *is* any info, */
23136709
KB
745 complaint (&symfile_complaints,
746 "elf/stab section information missing for %s", filename);
c906108c
SS
747}
748\f
749/* Register that we are able to handle ELF object file formats. */
750
751static struct sym_fns elf_sym_fns =
752{
753 bfd_target_elf_flavour,
c5aa993b
JM
754 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
755 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
756 elf_symfile_read, /* sym_read: read a symbol file into symtab */
757 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
96baa820 758 default_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
c5aa993b 759 NULL /* next: pointer to next struct sym_fns */
c906108c
SS
760};
761
762void
fba45db2 763_initialize_elfread (void)
c906108c
SS
764{
765 add_symtab_fns (&elf_sym_fns);
766}