mirror of
https://github.com/reactos/reactos.git
synced 2024-12-28 10:04:49 +00:00
1416 lines
46 KiB
C
1416 lines
46 KiB
C
/*
|
|
* File module.c - module handling for the wine debugger
|
|
*
|
|
* Copyright (C) 1993, Eric Youngdale.
|
|
* 2000-2007, Eric Pouech
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <assert.h>
|
|
|
|
#include "dbghelp_private.h"
|
|
#include "image_private.h"
|
|
#ifndef DBGHELP_STATIC_LIB
|
|
#include "psapi.h"
|
|
#include "winternl.h"
|
|
#include "wine/debug.h"
|
|
#include "wine/heap.h"
|
|
#endif
|
|
|
|
WINE_DEFAULT_DEBUG_CHANNEL(dbghelp);
|
|
|
|
#define NOTE_GNU_BUILD_ID 3
|
|
|
|
const WCHAR S_ElfW[] = {'<','e','l','f','>','\0'};
|
|
#ifndef __REACTOS__
|
|
const WCHAR S_WineLoaderW[] = {'<','w','i','n','e','-','l','o','a','d','e','r','>','\0'};
|
|
#endif
|
|
static const WCHAR S_DotSoW[] = {'.','s','o','\0'};
|
|
const WCHAR S_SlashW[] = {'/','\0'};
|
|
|
|
static const WCHAR S_AcmW[] = {'.','a','c','m','\0'};
|
|
static const WCHAR S_DllW[] = {'.','d','l','l','\0'};
|
|
static const WCHAR S_DrvW[] = {'.','d','r','v','\0'};
|
|
static const WCHAR S_ExeW[] = {'.','e','x','e','\0'};
|
|
static const WCHAR S_OcxW[] = {'.','o','c','x','\0'};
|
|
static const WCHAR S_VxdW[] = {'.','v','x','d','\0'};
|
|
static const WCHAR * const ext[] = {S_AcmW, S_DllW, S_DrvW, S_ExeW, S_OcxW, S_VxdW, NULL};
|
|
|
|
static int match_ext(const WCHAR* ptr, size_t len)
|
|
{
|
|
const WCHAR* const *e;
|
|
size_t l;
|
|
|
|
for (e = ext; *e; e++)
|
|
{
|
|
l = lstrlenW(*e);
|
|
if (l >= len) return 0;
|
|
if (wcsnicmp(&ptr[len - l], *e, l)) continue;
|
|
return l;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static const WCHAR* get_filename(const WCHAR* name, const WCHAR* endptr)
|
|
{
|
|
const WCHAR* ptr;
|
|
|
|
if (!endptr) endptr = name + lstrlenW(name);
|
|
for (ptr = endptr - 1; ptr >= name; ptr--)
|
|
{
|
|
if (*ptr == '/' || *ptr == '\\') break;
|
|
}
|
|
return ++ptr;
|
|
}
|
|
|
|
#ifndef __REACTOS__
|
|
static BOOL is_wine_loader(const WCHAR *module)
|
|
{
|
|
static const WCHAR wineW[] = {'w','i','n','e',0};
|
|
static const WCHAR suffixW[] = {'6','4',0};
|
|
const WCHAR *filename = get_filename(module, NULL);
|
|
const char *ptr;
|
|
BOOL ret = FALSE;
|
|
WCHAR *buffer;
|
|
DWORD len;
|
|
|
|
if ((ptr = getenv("WINELOADER")))
|
|
{
|
|
ptr = file_nameA(ptr);
|
|
len = 2 + MultiByteToWideChar( CP_UNIXCP, 0, ptr, -1, NULL, 0 );
|
|
buffer = heap_alloc( len * sizeof(WCHAR) );
|
|
MultiByteToWideChar( CP_UNIXCP, 0, ptr, -1, buffer, len );
|
|
}
|
|
else
|
|
{
|
|
buffer = heap_alloc( sizeof(wineW) + 2 * sizeof(WCHAR) );
|
|
lstrcpyW( buffer, wineW );
|
|
}
|
|
|
|
if (!wcscmp( filename, buffer ))
|
|
ret = TRUE;
|
|
|
|
lstrcatW( buffer, suffixW );
|
|
if (!wcscmp( filename, buffer ))
|
|
ret = TRUE;
|
|
|
|
heap_free( buffer );
|
|
return ret;
|
|
}
|
|
#endif
|
|
|
|
static void module_fill_module(const WCHAR* in, WCHAR* out, size_t size)
|
|
{
|
|
const WCHAR *ptr, *endptr;
|
|
size_t len, l;
|
|
|
|
ptr = get_filename(in, endptr = in + lstrlenW(in));
|
|
len = min(endptr - ptr, size - 1);
|
|
memcpy(out, ptr, len * sizeof(WCHAR));
|
|
out[len] = '\0';
|
|
if (len > 4 && (l = match_ext(out, len)))
|
|
out[len - l] = '\0';
|
|
#ifndef __REACTOS__
|
|
else if (is_wine_loader(out))
|
|
lstrcpynW(out, S_WineLoaderW, size);
|
|
#endif
|
|
else
|
|
{
|
|
if (len > 3 && !wcsicmp(&out[len - 3], S_DotSoW) &&
|
|
(l = match_ext(out, len - 3)))
|
|
lstrcpyW(&out[len - l - 3], S_ElfW);
|
|
}
|
|
while ((*out = towlower(*out))) out++;
|
|
}
|
|
|
|
void module_set_module(struct module* module, const WCHAR* name)
|
|
{
|
|
module_fill_module(name, module->module.ModuleName, ARRAY_SIZE(module->module.ModuleName));
|
|
module_fill_module(name, module->modulename, ARRAY_SIZE(module->modulename));
|
|
}
|
|
|
|
#ifndef __REACTOS__
|
|
/* Returned string must be freed by caller */
|
|
WCHAR *get_wine_loader_name(struct process *pcs)
|
|
{
|
|
static const WCHAR wineW[] = {'w','i','n','e',0};
|
|
static const WCHAR suffixW[] = {'6','4',0};
|
|
WCHAR *buffer, *p;
|
|
const char *env;
|
|
|
|
/* All binaries are loaded with WINELOADER (if run from tree) or by the
|
|
* main executable
|
|
*/
|
|
if ((env = getenv("WINELOADER")))
|
|
{
|
|
DWORD len = 2 + MultiByteToWideChar( CP_UNIXCP, 0, env, -1, NULL, 0 );
|
|
buffer = heap_alloc( len * sizeof(WCHAR) );
|
|
MultiByteToWideChar( CP_UNIXCP, 0, env, -1, buffer, len );
|
|
}
|
|
else
|
|
{
|
|
buffer = heap_alloc( sizeof(wineW) + 2 * sizeof(WCHAR) );
|
|
lstrcpyW( buffer, wineW );
|
|
}
|
|
|
|
p = buffer + lstrlenW( buffer ) - lstrlenW( suffixW );
|
|
if (p > buffer && !wcscmp( p, suffixW ))
|
|
*p = 0;
|
|
|
|
if (pcs->is_64bit)
|
|
lstrcatW(buffer, suffixW);
|
|
|
|
TRACE( "returning %s\n", debugstr_w(buffer) );
|
|
return buffer;
|
|
}
|
|
#endif
|
|
|
|
static const char* get_module_type(enum module_type type, BOOL virtual)
|
|
{
|
|
switch (type)
|
|
{
|
|
case DMT_ELF: return virtual ? "Virtual ELF" : "ELF";
|
|
case DMT_PE: return virtual ? "Virtual PE" : "PE";
|
|
case DMT_MACHO: return virtual ? "Virtual Mach-O" : "Mach-O";
|
|
default: return "---";
|
|
}
|
|
}
|
|
|
|
/***********************************************************************
|
|
* Creates and links a new module to a process
|
|
*/
|
|
struct module* module_new(struct process* pcs, const WCHAR* name,
|
|
enum module_type type, BOOL virtual,
|
|
DWORD64 mod_addr, DWORD64 size,
|
|
ULONG_PTR stamp, ULONG_PTR checksum)
|
|
{
|
|
struct module* module;
|
|
unsigned i;
|
|
|
|
assert(type == DMT_ELF || type == DMT_PE || type == DMT_MACHO);
|
|
if (!(module = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(*module))))
|
|
return NULL;
|
|
|
|
module->next = pcs->lmodules;
|
|
pcs->lmodules = module;
|
|
|
|
TRACE("=> %s %s-%s %s\n",
|
|
get_module_type(type, virtual),
|
|
wine_dbgstr_longlong(mod_addr), wine_dbgstr_longlong(mod_addr + size),
|
|
debugstr_w(name));
|
|
|
|
pool_init(&module->pool, 65536);
|
|
|
|
module->process = pcs;
|
|
module->module.SizeOfStruct = sizeof(module->module);
|
|
module->module.BaseOfImage = mod_addr;
|
|
module->module.ImageSize = size;
|
|
module_set_module(module, name);
|
|
module->module.ImageName[0] = '\0';
|
|
lstrcpynW(module->module.LoadedImageName, name, ARRAY_SIZE(module->module.LoadedImageName));
|
|
module->module.SymType = SymNone;
|
|
module->module.NumSyms = 0;
|
|
module->module.TimeDateStamp = stamp;
|
|
module->module.CheckSum = checksum;
|
|
|
|
memset(module->module.LoadedPdbName, 0, sizeof(module->module.LoadedPdbName));
|
|
module->module.CVSig = 0;
|
|
memset(module->module.CVData, 0, sizeof(module->module.CVData));
|
|
module->module.PdbSig = 0;
|
|
memset(&module->module.PdbSig70, 0, sizeof(module->module.PdbSig70));
|
|
module->module.PdbAge = 0;
|
|
module->module.PdbUnmatched = FALSE;
|
|
module->module.DbgUnmatched = FALSE;
|
|
module->module.LineNumbers = FALSE;
|
|
module->module.GlobalSymbols = FALSE;
|
|
module->module.TypeInfo = FALSE;
|
|
module->module.SourceIndexed = FALSE;
|
|
module->module.Publics = FALSE;
|
|
|
|
module->reloc_delta = 0;
|
|
module->type = type;
|
|
module->is_virtual = virtual;
|
|
for (i = 0; i < DFI_LAST; i++) module->format_info[i] = NULL;
|
|
module->sortlist_valid = FALSE;
|
|
module->sorttab_size = 0;
|
|
module->addr_sorttab = NULL;
|
|
module->num_sorttab = 0;
|
|
module->num_symbols = 0;
|
|
|
|
vector_init(&module->vsymt, sizeof(struct symt*), 128);
|
|
/* FIXME: this seems a bit too high (on a per module basis)
|
|
* need some statistics about this
|
|
*/
|
|
hash_table_init(&module->pool, &module->ht_symbols, 4096);
|
|
hash_table_init(&module->pool, &module->ht_types, 4096);
|
|
#ifdef __x86_64__
|
|
hash_table_init(&module->pool, &module->ht_symaddr, 4096);
|
|
#endif
|
|
vector_init(&module->vtypes, sizeof(struct symt*), 32);
|
|
|
|
module->sources_used = 0;
|
|
module->sources_alloc = 0;
|
|
module->sources = 0;
|
|
wine_rb_init(&module->sources_offsets_tree, source_rb_compare);
|
|
|
|
return module;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* module_find_by_nameW
|
|
*
|
|
*/
|
|
struct module* module_find_by_nameW(const struct process* pcs, const WCHAR* name)
|
|
{
|
|
struct module* module;
|
|
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if (!wcsicmp(name, module->module.ModuleName)) return module;
|
|
}
|
|
SetLastError(ERROR_INVALID_NAME);
|
|
return NULL;
|
|
}
|
|
|
|
struct module* module_find_by_nameA(const struct process* pcs, const char* name)
|
|
{
|
|
WCHAR wname[MAX_PATH];
|
|
|
|
MultiByteToWideChar(CP_ACP, 0, name, -1, wname, ARRAY_SIZE(wname));
|
|
return module_find_by_nameW(pcs, wname);
|
|
}
|
|
|
|
/***********************************************************************
|
|
* module_is_already_loaded
|
|
*
|
|
*/
|
|
struct module* module_is_already_loaded(const struct process* pcs, const WCHAR* name)
|
|
{
|
|
struct module* module;
|
|
const WCHAR* filename;
|
|
|
|
/* first compare the loaded image name... */
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if (!wcsicmp(name, module->module.LoadedImageName))
|
|
return module;
|
|
}
|
|
/* then compare the standard filenames (without the path) ... */
|
|
filename = get_filename(name, NULL);
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if (!wcsicmp(filename, get_filename(module->module.LoadedImageName, NULL)))
|
|
return module;
|
|
}
|
|
SetLastError(ERROR_INVALID_NAME);
|
|
return NULL;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* module_get_container
|
|
*
|
|
*/
|
|
static struct module* module_get_container(const struct process* pcs,
|
|
const struct module* inner)
|
|
{
|
|
struct module* module;
|
|
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if (module != inner &&
|
|
module->module.BaseOfImage <= inner->module.BaseOfImage &&
|
|
module->module.BaseOfImage + module->module.ImageSize >=
|
|
inner->module.BaseOfImage + inner->module.ImageSize)
|
|
return module;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* module_get_containee
|
|
*
|
|
*/
|
|
struct module* module_get_containee(const struct process* pcs, const struct module* outer)
|
|
{
|
|
struct module* module;
|
|
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if (module != outer &&
|
|
outer->module.BaseOfImage <= module->module.BaseOfImage &&
|
|
outer->module.BaseOfImage + outer->module.ImageSize >=
|
|
module->module.BaseOfImage + module->module.ImageSize)
|
|
return module;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/******************************************************************
|
|
* module_get_debug
|
|
*
|
|
* get the debug information from a module:
|
|
* - if the module's type is deferred, then force loading of debug info (and return
|
|
* the module itself)
|
|
* - if the module has no debug info and has an ELF container, then return the ELF
|
|
* container (and also force the ELF container's debug info loading if deferred)
|
|
* - otherwise return the module itself if it has some debug info
|
|
*/
|
|
BOOL module_get_debug(struct module_pair* pair)
|
|
{
|
|
IMAGEHLP_DEFERRED_SYMBOL_LOADW64 idslW64;
|
|
|
|
if (!pair->requested) return FALSE;
|
|
/* for a PE builtin, always get info from container */
|
|
if (!(pair->effective = module_get_container(pair->pcs, pair->requested)))
|
|
pair->effective = pair->requested;
|
|
/* if deferred, force loading */
|
|
if (pair->effective->module.SymType == SymDeferred)
|
|
{
|
|
BOOL ret;
|
|
|
|
if (pair->effective->is_virtual) ret = FALSE;
|
|
else if (pair->effective->type == DMT_PE)
|
|
{
|
|
idslW64.SizeOfStruct = sizeof(idslW64);
|
|
idslW64.BaseOfImage = pair->effective->module.BaseOfImage;
|
|
idslW64.CheckSum = pair->effective->module.CheckSum;
|
|
idslW64.TimeDateStamp = pair->effective->module.TimeDateStamp;
|
|
memcpy(idslW64.FileName, pair->effective->module.ImageName,
|
|
sizeof(pair->effective->module.ImageName));
|
|
idslW64.Reparse = FALSE;
|
|
idslW64.hFile = INVALID_HANDLE_VALUE;
|
|
|
|
pcs_callback(pair->pcs, CBA_DEFERRED_SYMBOL_LOAD_START, &idslW64);
|
|
ret = pe_load_debug_info(pair->pcs, pair->effective);
|
|
pcs_callback(pair->pcs,
|
|
ret ? CBA_DEFERRED_SYMBOL_LOAD_COMPLETE : CBA_DEFERRED_SYMBOL_LOAD_FAILURE,
|
|
&idslW64);
|
|
}
|
|
else ret = pair->pcs->loader->load_debug_info(pair->pcs, pair->effective);
|
|
|
|
if (!ret) pair->effective->module.SymType = SymNone;
|
|
assert(pair->effective->module.SymType != SymDeferred);
|
|
pair->effective->module.NumSyms = pair->effective->ht_symbols.num_elts;
|
|
}
|
|
return pair->effective->module.SymType != SymNone;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* module_find_by_addr
|
|
*
|
|
* either the addr where module is loaded, or any address inside the
|
|
* module
|
|
*/
|
|
struct module* module_find_by_addr(const struct process* pcs, DWORD64 addr,
|
|
enum module_type type)
|
|
{
|
|
struct module* module;
|
|
|
|
if (type == DMT_UNKNOWN)
|
|
{
|
|
if ((module = module_find_by_addr(pcs, addr, DMT_PE)) ||
|
|
(module = module_find_by_addr(pcs, addr, DMT_ELF)) ||
|
|
(module = module_find_by_addr(pcs, addr, DMT_MACHO)))
|
|
return module;
|
|
}
|
|
else
|
|
{
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if (type == module->type && addr >= module->module.BaseOfImage &&
|
|
addr < module->module.BaseOfImage + module->module.ImageSize)
|
|
return module;
|
|
}
|
|
}
|
|
SetLastError(ERROR_MOD_NOT_FOUND);
|
|
return module;
|
|
}
|
|
|
|
/******************************************************************
|
|
* module_is_container_loaded
|
|
*
|
|
* checks whether the native container, for a (supposed) PE builtin is
|
|
* already loaded
|
|
*/
|
|
static BOOL module_is_container_loaded(const struct process* pcs,
|
|
const WCHAR* ImageName, DWORD64 base)
|
|
{
|
|
size_t len;
|
|
struct module* module;
|
|
PCWSTR filename, modname;
|
|
|
|
if (!base) return FALSE;
|
|
filename = get_filename(ImageName, NULL);
|
|
len = lstrlenW(filename);
|
|
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if ((module->type == DMT_ELF || module->type == DMT_MACHO) &&
|
|
base >= module->module.BaseOfImage &&
|
|
base < module->module.BaseOfImage + module->module.ImageSize)
|
|
{
|
|
modname = get_filename(module->module.LoadedImageName, NULL);
|
|
if (!wcsnicmp(modname, filename, len) &&
|
|
!memcmp(modname + len, S_DotSoW, 3 * sizeof(WCHAR)))
|
|
{
|
|
return TRUE;
|
|
}
|
|
}
|
|
}
|
|
/* likely a native PE module */
|
|
WARN("Couldn't find container for %s\n", debugstr_w(ImageName));
|
|
return FALSE;
|
|
}
|
|
|
|
static BOOL image_check_debug_link(const WCHAR* file, struct image_file_map* fmap, DWORD link_crc)
|
|
{
|
|
DWORD read_bytes;
|
|
HANDLE handle;
|
|
#ifndef DBGHELP_STATIC_LIB
|
|
WCHAR *path;
|
|
#endif
|
|
WORD magic;
|
|
BOOL ret;
|
|
|
|
#ifndef DBGHELP_STATIC_LIB
|
|
path = get_dos_file_name(file);
|
|
handle = CreateFileW(path, GENERIC_READ, FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL);
|
|
heap_free(path);
|
|
#else
|
|
handle = CreateFileW(file, GENERIC_READ, FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL);
|
|
#endif
|
|
if (handle == INVALID_HANDLE_VALUE) return FALSE;
|
|
|
|
if (link_crc)
|
|
{
|
|
DWORD crc = calc_crc32(handle);
|
|
if (crc != link_crc)
|
|
{
|
|
WARN("Bad CRC for file %s (got %08x while expecting %08x)\n", debugstr_w(file), crc, link_crc);
|
|
CloseHandle(handle);
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
SetFilePointer(handle, 0, 0, FILE_BEGIN);
|
|
if (ReadFile(handle, &magic, sizeof(magic), &read_bytes, NULL) && magic == IMAGE_DOS_SIGNATURE)
|
|
ret = pe_map_file(handle, fmap, DMT_PE);
|
|
else
|
|
#ifndef __REACTOS__
|
|
ret = elf_map_handle(handle, fmap);
|
|
#else
|
|
ret = FALSE;
|
|
#endif
|
|
CloseHandle(handle);
|
|
return ret;
|
|
}
|
|
|
|
/******************************************************************
|
|
* image_locate_debug_link
|
|
*
|
|
* Locate a filename from a .gnu_debuglink section, using the same
|
|
* strategy as gdb:
|
|
* "If the full name of the directory containing the executable is
|
|
* execdir, and the executable has a debug link that specifies the
|
|
* name debugfile, then GDB will automatically search for the
|
|
* debugging information file in three places:
|
|
* - the directory containing the executable file (that is, it
|
|
* will look for a file named `execdir/debugfile',
|
|
* - a subdirectory of that directory named `.debug' (that is, the
|
|
* file `execdir/.debug/debugfile', and
|
|
* - a subdirectory of the global debug file directory that includes
|
|
* the executable's full path, and the name from the link (that is,
|
|
* the file `globaldebugdir/execdir/debugfile', where globaldebugdir
|
|
* is the global debug file directory, and execdir has been turned
|
|
* into a relative path)." (from GDB manual)
|
|
*/
|
|
static BOOL image_locate_debug_link(const struct module* module, struct image_file_map* fmap, const char* filename, DWORD crc)
|
|
{
|
|
#ifndef __REACTOS__
|
|
static const WCHAR globalDebugDirW[] = {'/','u','s','r','/','l','i','b','/','d','e','b','u','g','/'};
|
|
#else
|
|
static const WCHAR globalDebugDirW[] = {'\0'};
|
|
#endif
|
|
static const WCHAR dotDebugW[] = {'.','d','e','b','u','g','/'};
|
|
const size_t globalDebugDirLen = ARRAY_SIZE(globalDebugDirW);
|
|
size_t filename_len, path_len;
|
|
WCHAR* p = NULL;
|
|
WCHAR* slash;
|
|
WCHAR* slash2;
|
|
struct image_file_map* fmap_link = NULL;
|
|
|
|
fmap_link = HeapAlloc(GetProcessHeap(), 0, sizeof(*fmap_link));
|
|
if (!fmap_link) return FALSE;
|
|
|
|
filename_len = MultiByteToWideChar(CP_UNIXCP, 0, filename, -1, NULL, 0);
|
|
path_len = lstrlenW(module->module.LoadedImageName);
|
|
if (module->real_path) path_len = max(path_len, lstrlenW(module->real_path));
|
|
p = HeapAlloc(GetProcessHeap(), 0,
|
|
(globalDebugDirLen + path_len + 6 + 1 + filename_len + 1) * sizeof(WCHAR));
|
|
if (!p) goto found;
|
|
|
|
/* we prebuild the string with "execdir" */
|
|
lstrcpyW(p, module->module.LoadedImageName);
|
|
slash = p;
|
|
if ((slash2 = wcsrchr(slash, '/'))) slash = slash2 + 1;
|
|
if ((slash2 = wcsrchr(slash, '\\'))) slash = slash2 + 1;
|
|
|
|
/* testing execdir/filename */
|
|
MultiByteToWideChar(CP_UNIXCP, 0, filename, -1, slash, filename_len);
|
|
if (image_check_debug_link(p, fmap_link, crc)) goto found;
|
|
|
|
/* testing execdir/.debug/filename */
|
|
memcpy(slash, dotDebugW, sizeof(dotDebugW));
|
|
MultiByteToWideChar(CP_UNIXCP, 0, filename, -1, slash + ARRAY_SIZE(dotDebugW), filename_len);
|
|
if (image_check_debug_link(p, fmap_link, crc)) goto found;
|
|
|
|
if (module->real_path)
|
|
{
|
|
lstrcpyW(p, module->real_path);
|
|
slash = p;
|
|
if ((slash2 = wcsrchr(slash, '/'))) slash = slash2 + 1;
|
|
if ((slash2 = wcsrchr(slash, '\\'))) slash = slash2 + 1;
|
|
MultiByteToWideChar(CP_UNIXCP, 0, filename, -1, slash, filename_len);
|
|
if (image_check_debug_link(p, fmap_link, crc)) goto found;
|
|
}
|
|
|
|
/* testing globaldebugdir/execdir/filename */
|
|
memmove(p + globalDebugDirLen, p, (slash - p) * sizeof(WCHAR));
|
|
memcpy(p, globalDebugDirW, globalDebugDirLen * sizeof(WCHAR));
|
|
slash += globalDebugDirLen;
|
|
MultiByteToWideChar(CP_UNIXCP, 0, filename, -1, slash, filename_len);
|
|
if (image_check_debug_link(p, fmap_link, crc)) goto found;
|
|
|
|
/* finally testing filename */
|
|
if (image_check_debug_link(slash, fmap_link, crc)) goto found;
|
|
|
|
|
|
WARN("Couldn't locate or map %s\n", filename);
|
|
HeapFree(GetProcessHeap(), 0, p);
|
|
HeapFree(GetProcessHeap(), 0, fmap_link);
|
|
return FALSE;
|
|
|
|
found:
|
|
TRACE("Located debug information file %s at %s\n", filename, debugstr_w(p));
|
|
HeapFree(GetProcessHeap(), 0, p);
|
|
fmap->alternate = fmap_link;
|
|
return TRUE;
|
|
}
|
|
|
|
/******************************************************************
|
|
* image_locate_build_id_target
|
|
*
|
|
* Try to find the .so file containing the debug info out of the build-id note information
|
|
*/
|
|
static BOOL image_locate_build_id_target(struct image_file_map* fmap, const BYTE* id, unsigned idlen)
|
|
{
|
|
static const WCHAR globalDebugDirW[] = {'/','u','s','r','/','l','i','b','/','d','e','b','u','g','/'};
|
|
static const WCHAR buildidW[] = {'.','b','u','i','l','d','-','i','d','/'};
|
|
static const WCHAR dotDebug0W[] = {'.','d','e','b','u','g',0};
|
|
struct image_file_map* fmap_link = NULL;
|
|
WCHAR* p;
|
|
WCHAR* z;
|
|
const BYTE* idend = id + idlen;
|
|
|
|
fmap_link = HeapAlloc(GetProcessHeap(), 0, sizeof(*fmap_link));
|
|
if (!fmap_link) return FALSE;
|
|
|
|
p = HeapAlloc(GetProcessHeap(), 0,
|
|
sizeof(globalDebugDirW) + sizeof(buildidW) +
|
|
(idlen * 2 + 1) * sizeof(WCHAR) + sizeof(dotDebug0W));
|
|
z = p;
|
|
memcpy(z, globalDebugDirW, sizeof(globalDebugDirW));
|
|
z += ARRAY_SIZE(globalDebugDirW);
|
|
memcpy(z, buildidW, sizeof(buildidW));
|
|
z += ARRAY_SIZE(buildidW);
|
|
|
|
if (id < idend)
|
|
{
|
|
*z++ = "0123456789abcdef"[*id >> 4 ];
|
|
*z++ = "0123456789abcdef"[*id & 0x0F];
|
|
id++;
|
|
}
|
|
if (id < idend)
|
|
*z++ = '/';
|
|
while (id < idend)
|
|
{
|
|
*z++ = "0123456789abcdef"[*id >> 4 ];
|
|
*z++ = "0123456789abcdef"[*id & 0x0F];
|
|
id++;
|
|
}
|
|
memcpy(z, dotDebug0W, sizeof(dotDebug0W));
|
|
TRACE("checking %s\n", wine_dbgstr_w(p));
|
|
|
|
if (image_check_debug_link(p, fmap_link, 0))
|
|
{
|
|
struct image_section_map buildid_sect;
|
|
if (image_find_section(fmap_link, ".note.gnu.build-id", &buildid_sect))
|
|
{
|
|
const UINT32* note;
|
|
|
|
note = (const UINT32*)image_map_section(&buildid_sect);
|
|
if (note != IMAGE_NO_MAP)
|
|
{
|
|
/* the usual ELF note structure: name-size desc-size type <name> <desc> */
|
|
if (note[2] == NOTE_GNU_BUILD_ID)
|
|
{
|
|
if (note[1] == idlen &&
|
|
!memcmp(note + 3 + ((note[0] + 3) >> 2), idend - idlen, idlen))
|
|
{
|
|
TRACE("Located debug information file at %s\n", debugstr_w(p));
|
|
HeapFree(GetProcessHeap(), 0, p);
|
|
fmap->alternate = fmap_link;
|
|
return TRUE;
|
|
}
|
|
WARN("mismatch in buildid information for %s\n", wine_dbgstr_w(p));
|
|
}
|
|
}
|
|
image_unmap_section(&buildid_sect);
|
|
}
|
|
image_unmap_file(fmap_link);
|
|
}
|
|
|
|
TRACE("not found\n");
|
|
HeapFree(GetProcessHeap(), 0, p);
|
|
HeapFree(GetProcessHeap(), 0, fmap_link);
|
|
return FALSE;
|
|
}
|
|
|
|
/******************************************************************
|
|
* image_check_alternate
|
|
*
|
|
* Load alternate files for a given image file, looking at either .note.gnu_build-id
|
|
* or .gnu_debuglink sections.
|
|
*/
|
|
BOOL image_check_alternate(struct image_file_map* fmap, const struct module* module)
|
|
{
|
|
BOOL ret = FALSE;
|
|
BOOL found = FALSE;
|
|
struct image_section_map buildid_sect, debuglink_sect;
|
|
|
|
/* if present, add the .gnu_debuglink file as an alternate to current one */
|
|
if (image_find_section(fmap, ".note.gnu.build-id", &buildid_sect))
|
|
{
|
|
const UINT32* note;
|
|
|
|
found = TRUE;
|
|
note = (const UINT32*)image_map_section(&buildid_sect);
|
|
if (note != IMAGE_NO_MAP)
|
|
{
|
|
/* the usual ELF note structure: name-size desc-size type <name> <desc> */
|
|
if (note[2] == NOTE_GNU_BUILD_ID)
|
|
{
|
|
ret = image_locate_build_id_target(fmap, (const BYTE*)(note + 3 + ((note[0] + 3) >> 2)), note[1]);
|
|
}
|
|
}
|
|
image_unmap_section(&buildid_sect);
|
|
}
|
|
/* if present, add the .gnu_debuglink file as an alternate to current one */
|
|
if (!ret && image_find_section(fmap, ".gnu_debuglink", &debuglink_sect))
|
|
{
|
|
const char* dbg_link;
|
|
|
|
found = TRUE;
|
|
dbg_link = (const char*)image_map_section(&debuglink_sect);
|
|
if (dbg_link != IMAGE_NO_MAP)
|
|
{
|
|
/* The content of a debug link section is:
|
|
* 1/ a NULL terminated string, containing the file name for the
|
|
* debug info
|
|
* 2/ padding on 4 byte boundary
|
|
* 3/ CRC of the linked file
|
|
*/
|
|
DWORD crc = *(const DWORD*)(dbg_link + ((DWORD_PTR)(strlen(dbg_link) + 4) & ~3));
|
|
ret = image_locate_debug_link(module, fmap, dbg_link, crc);
|
|
if (!ret)
|
|
WARN("Couldn't load linked debug file for %s\n",
|
|
debugstr_w(module->module.ModuleName));
|
|
}
|
|
image_unmap_section(&debuglink_sect);
|
|
}
|
|
return found ? ret : TRUE;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymLoadModule (DBGHELP.@)
|
|
*/
|
|
DWORD WINAPI SymLoadModule(HANDLE hProcess, HANDLE hFile, PCSTR ImageName,
|
|
PCSTR ModuleName, DWORD BaseOfDll, DWORD SizeOfDll)
|
|
{
|
|
return SymLoadModuleEx(hProcess, hFile, ImageName, ModuleName, BaseOfDll,
|
|
SizeOfDll, NULL, 0);
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymLoadModuleEx (DBGHELP.@)
|
|
*/
|
|
DWORD64 WINAPI SymLoadModuleEx(HANDLE hProcess, HANDLE hFile, PCSTR ImageName,
|
|
PCSTR ModuleName, DWORD64 BaseOfDll, DWORD DllSize,
|
|
PMODLOAD_DATA Data, DWORD Flags)
|
|
{
|
|
PWSTR wImageName, wModuleName;
|
|
unsigned len;
|
|
DWORD64 ret;
|
|
|
|
TRACE("(%p %p %s %s %s %08x %p %08x)\n",
|
|
hProcess, hFile, debugstr_a(ImageName), debugstr_a(ModuleName),
|
|
wine_dbgstr_longlong(BaseOfDll), DllSize, Data, Flags);
|
|
|
|
if (ImageName)
|
|
{
|
|
len = MultiByteToWideChar(CP_ACP, 0, ImageName, -1, NULL, 0);
|
|
wImageName = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR));
|
|
MultiByteToWideChar(CP_ACP, 0, ImageName, -1, wImageName, len);
|
|
}
|
|
else wImageName = NULL;
|
|
if (ModuleName)
|
|
{
|
|
len = MultiByteToWideChar(CP_ACP, 0, ModuleName, -1, NULL, 0);
|
|
wModuleName = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR));
|
|
MultiByteToWideChar(CP_ACP, 0, ModuleName, -1, wModuleName, len);
|
|
}
|
|
else wModuleName = NULL;
|
|
|
|
ret = SymLoadModuleExW(hProcess, hFile, wImageName, wModuleName,
|
|
BaseOfDll, DllSize, Data, Flags);
|
|
HeapFree(GetProcessHeap(), 0, wImageName);
|
|
HeapFree(GetProcessHeap(), 0, wModuleName);
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymLoadModuleExW (DBGHELP.@)
|
|
*/
|
|
DWORD64 WINAPI SymLoadModuleExW(HANDLE hProcess, HANDLE hFile, PCWSTR wImageName,
|
|
PCWSTR wModuleName, DWORD64 BaseOfDll, DWORD SizeOfDll,
|
|
PMODLOAD_DATA Data, DWORD Flags)
|
|
{
|
|
struct process* pcs;
|
|
struct module* module = NULL;
|
|
|
|
TRACE("(%p %p %s %s %s %08x %p %08x)\n",
|
|
hProcess, hFile, debugstr_w(wImageName), debugstr_w(wModuleName),
|
|
wine_dbgstr_longlong(BaseOfDll), SizeOfDll, Data, Flags);
|
|
|
|
if (Data)
|
|
FIXME("Unsupported load data parameter %p for %s\n",
|
|
Data, debugstr_w(wImageName));
|
|
if (!validate_addr64(BaseOfDll)) return FALSE;
|
|
|
|
if (!(pcs = process_find_by_handle(hProcess))) return FALSE;
|
|
|
|
if (Flags & SLMFLAG_VIRTUAL)
|
|
{
|
|
if (!wImageName) return FALSE;
|
|
module = module_new(pcs, wImageName, DMT_PE, TRUE, BaseOfDll, SizeOfDll, 0, 0);
|
|
if (!module) return FALSE;
|
|
if (wModuleName) module_set_module(module, wModuleName);
|
|
module->module.SymType = SymVirtual;
|
|
|
|
return TRUE;
|
|
}
|
|
if (Flags & ~(SLMFLAG_VIRTUAL))
|
|
FIXME("Unsupported Flags %08x for %s\n", Flags, debugstr_w(wImageName));
|
|
|
|
pcs->loader->synchronize_module_list(pcs);
|
|
|
|
/* this is a Wine extension to the API just to redo the synchronisation */
|
|
if (!wImageName && !hFile) return 0;
|
|
|
|
/* check if the module is already loaded, or if it's a builtin PE module with
|
|
* an containing ELF module
|
|
*/
|
|
if (wImageName)
|
|
{
|
|
module = module_is_already_loaded(pcs, wImageName);
|
|
if (!module && module_is_container_loaded(pcs, wImageName, BaseOfDll))
|
|
{
|
|
/* force the loading of DLL as builtin */
|
|
module = pe_load_builtin_module(pcs, wImageName, BaseOfDll, SizeOfDll);
|
|
}
|
|
}
|
|
if (!module)
|
|
{
|
|
/* otherwise, try a regular PE module */
|
|
if (!(module = pe_load_native_module(pcs, wImageName, hFile, BaseOfDll, SizeOfDll)) &&
|
|
wImageName)
|
|
{
|
|
/* and finally an ELF or Mach-O module */
|
|
module = pcs->loader->load_module(pcs, wImageName, BaseOfDll);
|
|
}
|
|
}
|
|
if (!module)
|
|
{
|
|
WARN("Couldn't locate %s\n", debugstr_w(wImageName));
|
|
return 0;
|
|
}
|
|
module->module.NumSyms = module->ht_symbols.num_elts;
|
|
/* by default module_new fills module.ModuleName from a derivation
|
|
* of LoadedImageName. Overwrite it, if we have better information
|
|
*/
|
|
if (wModuleName)
|
|
module_set_module(module, wModuleName);
|
|
if (wImageName)
|
|
lstrcpynW(module->module.ImageName, wImageName, ARRAY_SIZE(module->module.ImageName));
|
|
|
|
return module->module.BaseOfImage;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymLoadModule64 (DBGHELP.@)
|
|
*/
|
|
DWORD64 WINAPI SymLoadModule64(HANDLE hProcess, HANDLE hFile, PCSTR ImageName,
|
|
PCSTR ModuleName, DWORD64 BaseOfDll, DWORD SizeOfDll)
|
|
{
|
|
return SymLoadModuleEx(hProcess, hFile, ImageName, ModuleName, BaseOfDll, SizeOfDll,
|
|
NULL, 0);
|
|
}
|
|
|
|
/******************************************************************
|
|
* module_remove
|
|
*
|
|
*/
|
|
BOOL module_remove(struct process* pcs, struct module* module)
|
|
{
|
|
struct module_format*modfmt;
|
|
struct module** p;
|
|
unsigned i;
|
|
|
|
TRACE("%s (%p)\n", debugstr_w(module->module.ModuleName), module);
|
|
|
|
for (i = 0; i < DFI_LAST; i++)
|
|
{
|
|
if ((modfmt = module->format_info[i]) && modfmt->remove)
|
|
modfmt->remove(pcs, module->format_info[i]);
|
|
}
|
|
hash_table_destroy(&module->ht_symbols);
|
|
hash_table_destroy(&module->ht_types);
|
|
HeapFree(GetProcessHeap(), 0, module->sources);
|
|
HeapFree(GetProcessHeap(), 0, module->addr_sorttab);
|
|
HeapFree(GetProcessHeap(), 0, module->real_path);
|
|
pool_destroy(&module->pool);
|
|
/* native dbghelp doesn't invoke registered callback(,CBA_SYMBOLS_UNLOADED,) here
|
|
* so do we
|
|
*/
|
|
for (p = &pcs->lmodules; *p; p = &(*p)->next)
|
|
{
|
|
if (*p == module)
|
|
{
|
|
*p = module->next;
|
|
HeapFree(GetProcessHeap(), 0, module);
|
|
return TRUE;
|
|
}
|
|
}
|
|
FIXME("This shouldn't happen\n");
|
|
return FALSE;
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymUnloadModule (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI SymUnloadModule(HANDLE hProcess, DWORD BaseOfDll)
|
|
{
|
|
struct process* pcs;
|
|
struct module* module;
|
|
|
|
pcs = process_find_by_handle(hProcess);
|
|
if (!pcs) return FALSE;
|
|
module = module_find_by_addr(pcs, BaseOfDll, DMT_UNKNOWN);
|
|
if (!module) return FALSE;
|
|
return module_remove(pcs, module);
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymUnloadModule64 (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI SymUnloadModule64(HANDLE hProcess, DWORD64 BaseOfDll)
|
|
{
|
|
struct process* pcs;
|
|
struct module* module;
|
|
|
|
pcs = process_find_by_handle(hProcess);
|
|
if (!pcs) return FALSE;
|
|
if (!validate_addr64(BaseOfDll)) return FALSE;
|
|
module = module_find_by_addr(pcs, BaseOfDll, DMT_UNKNOWN);
|
|
if (!module) return FALSE;
|
|
return module_remove(pcs, module);
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymEnumerateModules (DBGHELP.@)
|
|
*
|
|
*/
|
|
struct enum_modW64_32
|
|
{
|
|
PSYM_ENUMMODULES_CALLBACK cb;
|
|
PVOID user;
|
|
char module[MAX_PATH];
|
|
};
|
|
|
|
static BOOL CALLBACK enum_modW64_32(PCWSTR name, DWORD64 base, PVOID user)
|
|
{
|
|
struct enum_modW64_32* x = user;
|
|
|
|
WideCharToMultiByte(CP_ACP, 0, name, -1, x->module, sizeof(x->module), NULL, NULL);
|
|
return x->cb(x->module, (DWORD)base, x->user);
|
|
}
|
|
|
|
BOOL WINAPI SymEnumerateModules(HANDLE hProcess,
|
|
PSYM_ENUMMODULES_CALLBACK EnumModulesCallback,
|
|
PVOID UserContext)
|
|
{
|
|
struct enum_modW64_32 x;
|
|
|
|
x.cb = EnumModulesCallback;
|
|
x.user = UserContext;
|
|
|
|
return SymEnumerateModulesW64(hProcess, enum_modW64_32, &x);
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymEnumerateModules64 (DBGHELP.@)
|
|
*
|
|
*/
|
|
struct enum_modW64_64
|
|
{
|
|
PSYM_ENUMMODULES_CALLBACK64 cb;
|
|
PVOID user;
|
|
char module[MAX_PATH];
|
|
};
|
|
|
|
static BOOL CALLBACK enum_modW64_64(PCWSTR name, DWORD64 base, PVOID user)
|
|
{
|
|
struct enum_modW64_64* x = user;
|
|
|
|
WideCharToMultiByte(CP_ACP, 0, name, -1, x->module, sizeof(x->module), NULL, NULL);
|
|
return x->cb(x->module, base, x->user);
|
|
}
|
|
|
|
BOOL WINAPI SymEnumerateModules64(HANDLE hProcess,
|
|
PSYM_ENUMMODULES_CALLBACK64 EnumModulesCallback,
|
|
PVOID UserContext)
|
|
{
|
|
struct enum_modW64_64 x;
|
|
|
|
x.cb = EnumModulesCallback;
|
|
x.user = UserContext;
|
|
|
|
return SymEnumerateModulesW64(hProcess, enum_modW64_64, &x);
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymEnumerateModulesW64 (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI SymEnumerateModulesW64(HANDLE hProcess,
|
|
PSYM_ENUMMODULES_CALLBACKW64 EnumModulesCallback,
|
|
PVOID UserContext)
|
|
{
|
|
struct process* pcs = process_find_by_handle(hProcess);
|
|
struct module* module;
|
|
|
|
if (!pcs) return FALSE;
|
|
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if (!dbghelp_opt_native &&
|
|
(module->type == DMT_ELF || module->type == DMT_MACHO))
|
|
continue;
|
|
if (!EnumModulesCallback(module->modulename,
|
|
module->module.BaseOfImage, UserContext))
|
|
break;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
#ifndef DBGHELP_STATIC_LIB
|
|
/******************************************************************
|
|
* EnumerateLoadedModules64 (DBGHELP.@)
|
|
*
|
|
*/
|
|
struct enum_load_modW64_64
|
|
{
|
|
PENUMLOADED_MODULES_CALLBACK64 cb;
|
|
PVOID user;
|
|
char module[MAX_PATH];
|
|
};
|
|
|
|
static BOOL CALLBACK enum_load_modW64_64(PCWSTR name, DWORD64 base, ULONG size,
|
|
PVOID user)
|
|
{
|
|
struct enum_load_modW64_64* x = user;
|
|
|
|
WideCharToMultiByte(CP_ACP, 0, name, -1, x->module, sizeof(x->module), NULL, NULL);
|
|
return x->cb(x->module, base, size, x->user);
|
|
}
|
|
|
|
BOOL WINAPI EnumerateLoadedModules64(HANDLE hProcess,
|
|
PENUMLOADED_MODULES_CALLBACK64 EnumLoadedModulesCallback,
|
|
PVOID UserContext)
|
|
{
|
|
struct enum_load_modW64_64 x;
|
|
|
|
x.cb = EnumLoadedModulesCallback;
|
|
x.user = UserContext;
|
|
|
|
return EnumerateLoadedModulesW64(hProcess, enum_load_modW64_64, &x);
|
|
}
|
|
|
|
/******************************************************************
|
|
* EnumerateLoadedModules (DBGHELP.@)
|
|
*
|
|
*/
|
|
struct enum_load_modW64_32
|
|
{
|
|
PENUMLOADED_MODULES_CALLBACK cb;
|
|
PVOID user;
|
|
char module[MAX_PATH];
|
|
};
|
|
|
|
static BOOL CALLBACK enum_load_modW64_32(PCWSTR name, DWORD64 base, ULONG size,
|
|
PVOID user)
|
|
{
|
|
struct enum_load_modW64_32* x = user;
|
|
WideCharToMultiByte(CP_ACP, 0, name, -1, x->module, sizeof(x->module), NULL, NULL);
|
|
return x->cb(x->module, (DWORD)base, size, x->user);
|
|
}
|
|
|
|
BOOL WINAPI EnumerateLoadedModules(HANDLE hProcess,
|
|
PENUMLOADED_MODULES_CALLBACK EnumLoadedModulesCallback,
|
|
PVOID UserContext)
|
|
{
|
|
struct enum_load_modW64_32 x;
|
|
|
|
x.cb = EnumLoadedModulesCallback;
|
|
x.user = UserContext;
|
|
|
|
return EnumerateLoadedModulesW64(hProcess, enum_load_modW64_32, &x);
|
|
}
|
|
|
|
/******************************************************************
|
|
* EnumerateLoadedModulesW64 (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI EnumerateLoadedModulesW64(HANDLE hProcess,
|
|
PENUMLOADED_MODULES_CALLBACKW64 EnumLoadedModulesCallback,
|
|
PVOID UserContext)
|
|
{
|
|
HMODULE* hMods;
|
|
WCHAR baseW[256], modW[256];
|
|
DWORD i, sz;
|
|
MODULEINFO mi;
|
|
|
|
hMods = HeapAlloc(GetProcessHeap(), 0, 256 * sizeof(hMods[0]));
|
|
if (!hMods) return FALSE;
|
|
|
|
if (!EnumProcessModules(hProcess, hMods, 256 * sizeof(hMods[0]), &sz))
|
|
{
|
|
/* hProcess should also be a valid process handle !! */
|
|
FIXME("If this happens, bump the number in mod\n");
|
|
HeapFree(GetProcessHeap(), 0, hMods);
|
|
return FALSE;
|
|
}
|
|
sz /= sizeof(HMODULE);
|
|
for (i = 0; i < sz; i++)
|
|
{
|
|
if (!GetModuleInformation(hProcess, hMods[i], &mi, sizeof(mi)) ||
|
|
!GetModuleBaseNameW(hProcess, hMods[i], baseW, ARRAY_SIZE(baseW)))
|
|
continue;
|
|
module_fill_module(baseW, modW, ARRAY_SIZE(modW));
|
|
EnumLoadedModulesCallback(modW, (DWORD_PTR)mi.lpBaseOfDll, mi.SizeOfImage,
|
|
UserContext);
|
|
}
|
|
HeapFree(GetProcessHeap(), 0, hMods);
|
|
|
|
return sz != 0 && i == sz;
|
|
}
|
|
|
|
#endif /* DBGHELP_STATIC_LIB */
|
|
|
|
static void dbghelp_str_WtoA(const WCHAR *src, char *dst, int dst_len)
|
|
{
|
|
WideCharToMultiByte(CP_ACP, 0, src, -1, dst, dst_len - 1, NULL, NULL);
|
|
dst[dst_len - 1] = 0;
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymGetModuleInfo (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI SymGetModuleInfo(HANDLE hProcess, DWORD dwAddr,
|
|
PIMAGEHLP_MODULE ModuleInfo)
|
|
{
|
|
IMAGEHLP_MODULE mi;
|
|
IMAGEHLP_MODULEW64 miw64;
|
|
|
|
if (sizeof(mi) < ModuleInfo->SizeOfStruct) FIXME("Wrong size\n");
|
|
|
|
miw64.SizeOfStruct = sizeof(miw64);
|
|
if (!SymGetModuleInfoW64(hProcess, dwAddr, &miw64)) return FALSE;
|
|
|
|
mi.SizeOfStruct = ModuleInfo->SizeOfStruct;
|
|
mi.BaseOfImage = miw64.BaseOfImage;
|
|
mi.ImageSize = miw64.ImageSize;
|
|
mi.TimeDateStamp = miw64.TimeDateStamp;
|
|
mi.CheckSum = miw64.CheckSum;
|
|
mi.NumSyms = miw64.NumSyms;
|
|
mi.SymType = miw64.SymType;
|
|
dbghelp_str_WtoA(miw64.ModuleName, mi.ModuleName, sizeof(mi.ModuleName));
|
|
dbghelp_str_WtoA(miw64.ImageName, mi.ImageName, sizeof(mi.ImageName));
|
|
dbghelp_str_WtoA(miw64.LoadedImageName, mi.LoadedImageName, sizeof(mi.LoadedImageName));
|
|
|
|
memcpy(ModuleInfo, &mi, ModuleInfo->SizeOfStruct);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymGetModuleInfoW (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI SymGetModuleInfoW(HANDLE hProcess, DWORD dwAddr,
|
|
PIMAGEHLP_MODULEW ModuleInfo)
|
|
{
|
|
IMAGEHLP_MODULEW64 miw64;
|
|
IMAGEHLP_MODULEW miw;
|
|
|
|
if (sizeof(miw) < ModuleInfo->SizeOfStruct) FIXME("Wrong size\n");
|
|
|
|
miw64.SizeOfStruct = sizeof(miw64);
|
|
if (!SymGetModuleInfoW64(hProcess, dwAddr, &miw64)) return FALSE;
|
|
|
|
miw.SizeOfStruct = ModuleInfo->SizeOfStruct;
|
|
miw.BaseOfImage = miw64.BaseOfImage;
|
|
miw.ImageSize = miw64.ImageSize;
|
|
miw.TimeDateStamp = miw64.TimeDateStamp;
|
|
miw.CheckSum = miw64.CheckSum;
|
|
miw.NumSyms = miw64.NumSyms;
|
|
miw.SymType = miw64.SymType;
|
|
lstrcpyW(miw.ModuleName, miw64.ModuleName);
|
|
lstrcpyW(miw.ImageName, miw64.ImageName);
|
|
lstrcpyW(miw.LoadedImageName, miw64.LoadedImageName);
|
|
memcpy(ModuleInfo, &miw, ModuleInfo->SizeOfStruct);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymGetModuleInfo64 (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI SymGetModuleInfo64(HANDLE hProcess, DWORD64 dwAddr,
|
|
PIMAGEHLP_MODULE64 ModuleInfo)
|
|
{
|
|
IMAGEHLP_MODULE64 mi64;
|
|
IMAGEHLP_MODULEW64 miw64;
|
|
|
|
if (sizeof(mi64) < ModuleInfo->SizeOfStruct)
|
|
{
|
|
SetLastError(ERROR_MOD_NOT_FOUND); /* NOTE: native returns this error */
|
|
WARN("Wrong size %u\n", ModuleInfo->SizeOfStruct);
|
|
return FALSE;
|
|
}
|
|
|
|
miw64.SizeOfStruct = sizeof(miw64);
|
|
if (!SymGetModuleInfoW64(hProcess, dwAddr, &miw64)) return FALSE;
|
|
|
|
mi64.SizeOfStruct = ModuleInfo->SizeOfStruct;
|
|
mi64.BaseOfImage = miw64.BaseOfImage;
|
|
mi64.ImageSize = miw64.ImageSize;
|
|
mi64.TimeDateStamp = miw64.TimeDateStamp;
|
|
mi64.CheckSum = miw64.CheckSum;
|
|
mi64.NumSyms = miw64.NumSyms;
|
|
mi64.SymType = miw64.SymType;
|
|
dbghelp_str_WtoA(miw64.ModuleName, mi64.ModuleName, sizeof(mi64.ModuleName));
|
|
dbghelp_str_WtoA(miw64.ImageName, mi64.ImageName, sizeof(mi64.ImageName));
|
|
dbghelp_str_WtoA(miw64.LoadedImageName, mi64.LoadedImageName, sizeof(mi64.LoadedImageName));
|
|
dbghelp_str_WtoA(miw64.LoadedPdbName, mi64.LoadedPdbName, sizeof(mi64.LoadedPdbName));
|
|
|
|
mi64.CVSig = miw64.CVSig;
|
|
dbghelp_str_WtoA(miw64.CVData, mi64.CVData, sizeof(mi64.CVData));
|
|
mi64.PdbSig = miw64.PdbSig;
|
|
mi64.PdbSig70 = miw64.PdbSig70;
|
|
mi64.PdbAge = miw64.PdbAge;
|
|
mi64.PdbUnmatched = miw64.PdbUnmatched;
|
|
mi64.DbgUnmatched = miw64.DbgUnmatched;
|
|
mi64.LineNumbers = miw64.LineNumbers;
|
|
mi64.GlobalSymbols = miw64.GlobalSymbols;
|
|
mi64.TypeInfo = miw64.TypeInfo;
|
|
mi64.SourceIndexed = miw64.SourceIndexed;
|
|
mi64.Publics = miw64.Publics;
|
|
|
|
memcpy(ModuleInfo, &mi64, ModuleInfo->SizeOfStruct);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymGetModuleInfoW64 (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI SymGetModuleInfoW64(HANDLE hProcess, DWORD64 dwAddr,
|
|
PIMAGEHLP_MODULEW64 ModuleInfo)
|
|
{
|
|
struct process* pcs = process_find_by_handle(hProcess);
|
|
struct module* module;
|
|
IMAGEHLP_MODULEW64 miw64;
|
|
|
|
TRACE("%p %s %p\n", hProcess, wine_dbgstr_longlong(dwAddr), ModuleInfo);
|
|
|
|
if (!pcs) return FALSE;
|
|
if (ModuleInfo->SizeOfStruct > sizeof(*ModuleInfo)) return FALSE;
|
|
module = module_find_by_addr(pcs, dwAddr, DMT_UNKNOWN);
|
|
if (!module) return FALSE;
|
|
|
|
miw64 = module->module;
|
|
|
|
/* update debug information from container if any */
|
|
if (module->module.SymType == SymNone)
|
|
{
|
|
module = module_get_container(pcs, module);
|
|
if (module && module->module.SymType != SymNone)
|
|
{
|
|
miw64.SymType = module->module.SymType;
|
|
miw64.NumSyms = module->module.NumSyms;
|
|
}
|
|
}
|
|
memcpy(ModuleInfo, &miw64, ModuleInfo->SizeOfStruct);
|
|
return TRUE;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymGetModuleBase (DBGHELP.@)
|
|
*/
|
|
DWORD WINAPI SymGetModuleBase(HANDLE hProcess, DWORD dwAddr)
|
|
{
|
|
DWORD64 ret;
|
|
|
|
ret = SymGetModuleBase64(hProcess, dwAddr);
|
|
return validate_addr64(ret) ? ret : 0;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymGetModuleBase64 (DBGHELP.@)
|
|
*/
|
|
DWORD64 WINAPI SymGetModuleBase64(HANDLE hProcess, DWORD64 dwAddr)
|
|
{
|
|
struct process* pcs = process_find_by_handle(hProcess);
|
|
struct module* module;
|
|
|
|
if (!pcs) return 0;
|
|
module = module_find_by_addr(pcs, dwAddr, DMT_UNKNOWN);
|
|
if (!module) return 0;
|
|
return module->module.BaseOfImage;
|
|
}
|
|
|
|
/******************************************************************
|
|
* module_reset_debug_info
|
|
* Removes any debug information linked to a given module.
|
|
*/
|
|
void module_reset_debug_info(struct module* module)
|
|
{
|
|
module->sortlist_valid = TRUE;
|
|
module->sorttab_size = 0;
|
|
module->addr_sorttab = NULL;
|
|
module->num_sorttab = module->num_symbols = 0;
|
|
hash_table_destroy(&module->ht_symbols);
|
|
module->ht_symbols.num_buckets = 0;
|
|
module->ht_symbols.buckets = NULL;
|
|
hash_table_destroy(&module->ht_types);
|
|
module->ht_types.num_buckets = 0;
|
|
module->ht_types.buckets = NULL;
|
|
module->vtypes.num_elts = 0;
|
|
hash_table_destroy(&module->ht_symbols);
|
|
module->sources_used = module->sources_alloc = 0;
|
|
module->sources = NULL;
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymRefreshModuleList (DBGHELP.@)
|
|
*/
|
|
BOOL WINAPI SymRefreshModuleList(HANDLE hProcess)
|
|
{
|
|
struct process* pcs;
|
|
|
|
TRACE("(%p)\n", hProcess);
|
|
|
|
if (!(pcs = process_find_by_handle(hProcess))) return FALSE;
|
|
|
|
return pcs->loader->synchronize_module_list(pcs);
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymFunctionTableAccess (DBGHELP.@)
|
|
*/
|
|
PVOID WINAPI SymFunctionTableAccess(HANDLE hProcess, DWORD AddrBase)
|
|
{
|
|
return SymFunctionTableAccess64(hProcess, AddrBase);
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymFunctionTableAccess64 (DBGHELP.@)
|
|
*/
|
|
PVOID WINAPI SymFunctionTableAccess64(HANDLE hProcess, DWORD64 AddrBase)
|
|
{
|
|
struct process* pcs = process_find_by_handle(hProcess);
|
|
struct module* module;
|
|
|
|
if (!pcs || !dbghelp_current_cpu->find_runtime_function) return NULL;
|
|
module = module_find_by_addr(pcs, AddrBase, DMT_UNKNOWN);
|
|
if (!module) return NULL;
|
|
|
|
return dbghelp_current_cpu->find_runtime_function(module, AddrBase);
|
|
}
|
|
|
|
static BOOL native_synchronize_module_list(struct process* pcs)
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
static struct module* native_load_module(struct process* pcs, const WCHAR* name, ULONG_PTR addr)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
static BOOL native_load_debug_info(struct process* process, struct module* module)
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
static BOOL native_enum_modules(struct process *process, enum_modules_cb cb, void* user)
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
static BOOL native_fetch_file_info(struct process* process, const WCHAR* name, ULONG_PTR load_addr, DWORD_PTR* base,
|
|
DWORD* size, DWORD* checksum)
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
const struct loader_ops no_loader_ops =
|
|
{
|
|
native_synchronize_module_list,
|
|
native_load_module,
|
|
native_load_debug_info,
|
|
native_enum_modules,
|
|
native_fetch_file_info,
|
|
};
|