crypt32/tests: Add name to test to help identify test failures.
[wine.git] / dlls / dbghelp / pe_module.c
blob1a41f945c2f62aa35190c11965ebedc17ddfbce4
1 /*
2 * File pe_module.c - handle PE module information
4 * Copyright (C) 1996, Eric Youngdale.
5 * Copyright (C) 1999-2000, Ulrich Weigand.
6 * Copyright (C) 2004-2007, Eric Pouech.
8 * This library is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public
10 * License as published by the Free Software Foundation; either
11 * version 2.1 of the License, or (at your option) any later version.
13 * This library is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * Lesser General Public License for more details.
18 * You should have received a copy of the GNU Lesser General Public
19 * License along with this library; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
24 #include "config.h"
25 #include "wine/port.h"
27 #include <stdlib.h>
28 #include <stdio.h>
29 #include <string.h>
30 #include <assert.h>
32 #include "dbghelp_private.h"
33 #include "image_private.h"
34 #include "winternl.h"
35 #include "wine/debug.h"
37 WINE_DEFAULT_DEBUG_CHANNEL(dbghelp);
39 struct pe_module_info
41 struct image_file_map fmap;
44 static void* pe_map_full(struct image_file_map* fmap, IMAGE_NT_HEADERS** nth)
46 if (!fmap->u.pe.full_map)
48 fmap->u.pe.full_map = MapViewOfFile(fmap->u.pe.hMap, FILE_MAP_READ, 0, 0, 0);
50 if (fmap->u.pe.full_map)
52 if (nth) *nth = RtlImageNtHeader(fmap->u.pe.full_map);
53 fmap->u.pe.full_count++;
54 return fmap->u.pe.full_map;
56 return IMAGE_NO_MAP;
59 static void pe_unmap_full(struct image_file_map* fmap)
61 if (fmap->u.pe.full_count && !--fmap->u.pe.full_count)
63 UnmapViewOfFile(fmap->u.pe.full_map);
64 fmap->u.pe.full_map = NULL;
68 /******************************************************************
69 * pe_map_section
71 * Maps a single section into memory from an PE file
73 const char* pe_map_section(struct image_section_map* ism)
75 void* mapping;
76 struct pe_file_map* fmap = &ism->fmap->u.pe;
78 if (ism->sidx >= 0 && ism->sidx < fmap->ntheader.FileHeader.NumberOfSections &&
79 fmap->sect[ism->sidx].mapped == IMAGE_NO_MAP)
81 IMAGE_NT_HEADERS* nth;
83 if (fmap->sect[ism->sidx].shdr.Misc.VirtualSize > fmap->sect[ism->sidx].shdr.SizeOfRawData)
85 FIXME("Section %ld: virtual (0x%x) > raw (0x%x) size - not supported\n",
86 ism->sidx, fmap->sect[ism->sidx].shdr.Misc.VirtualSize,
87 fmap->sect[ism->sidx].shdr.SizeOfRawData);
88 return IMAGE_NO_MAP;
90 /* FIXME: that's rather drastic, but that will do for now
91 * that's ok if the full file map exists, but we could be less agressive otherwise and
92 * only map the relevant section
94 if ((mapping = pe_map_full(ism->fmap, &nth)))
96 fmap->sect[ism->sidx].mapped = RtlImageRvaToVa(nth, mapping,
97 fmap->sect[ism->sidx].shdr.VirtualAddress,
98 NULL);
99 return fmap->sect[ism->sidx].mapped;
102 return IMAGE_NO_MAP;
105 /******************************************************************
106 * pe_find_section
108 * Finds a section by name (and type) into memory from an PE file
109 * or its alternate if any
111 BOOL pe_find_section(struct image_file_map* fmap, const char* name,
112 struct image_section_map* ism)
114 const char* sectname;
115 unsigned i;
116 char tmp[IMAGE_SIZEOF_SHORT_NAME + 1];
118 for (i = 0; i < fmap->u.pe.ntheader.FileHeader.NumberOfSections; i++)
120 sectname = (const char*)fmap->u.pe.sect[i].shdr.Name;
121 /* long section names start with a '/' (at least on MinGW32) */
122 if (sectname[0] == '/' && fmap->u.pe.strtable)
123 sectname = fmap->u.pe.strtable + atoi(sectname + 1);
124 else
126 /* the section name may not be null terminated */
127 sectname = memcpy(tmp, sectname, IMAGE_SIZEOF_SHORT_NAME);
128 tmp[IMAGE_SIZEOF_SHORT_NAME] = '\0';
130 if (!strcasecmp(sectname, name))
132 ism->fmap = fmap;
133 ism->sidx = i;
134 return TRUE;
137 ism->fmap = NULL;
138 ism->sidx = -1;
140 return FALSE;
143 /******************************************************************
144 * pe_unmap_section
146 * Unmaps a single section from memory
148 void pe_unmap_section(struct image_section_map* ism)
150 if (ism->sidx >= 0 && ism->sidx < ism->fmap->u.pe.ntheader.FileHeader.NumberOfSections &&
151 ism->fmap->u.pe.sect[ism->sidx].mapped != IMAGE_NO_MAP)
153 pe_unmap_full(ism->fmap);
154 ism->fmap->u.pe.sect[ism->sidx].mapped = IMAGE_NO_MAP;
158 /******************************************************************
159 * pe_get_map_rva
161 * Get the RVA of an PE section
163 DWORD_PTR pe_get_map_rva(const struct image_section_map* ism)
165 if (ism->sidx < 0 || ism->sidx >= ism->fmap->u.pe.ntheader.FileHeader.NumberOfSections)
166 return 0;
167 return ism->fmap->u.pe.sect[ism->sidx].shdr.VirtualAddress;
170 /******************************************************************
171 * pe_get_map_size
173 * Get the size of a PE section
175 unsigned pe_get_map_size(const struct image_section_map* ism)
177 if (ism->sidx < 0 || ism->sidx >= ism->fmap->u.pe.ntheader.FileHeader.NumberOfSections)
178 return 0;
179 return ism->fmap->u.pe.sect[ism->sidx].shdr.Misc.VirtualSize;
182 /******************************************************************
183 * pe_is_valid_pointer_table
185 * Checks whether the PointerToSymbolTable and NumberOfSymbols in file_header contain
186 * valid information.
188 static BOOL pe_is_valid_pointer_table(const IMAGE_NT_HEADERS* nthdr, const void* mapping, DWORD64 sz)
190 DWORD64 offset;
192 /* is the iSym table inside file size ? (including first DWORD of string table, which is its size) */
193 offset = (DWORD64)nthdr->FileHeader.PointerToSymbolTable;
194 offset += (DWORD64)nthdr->FileHeader.NumberOfSymbols * sizeof(IMAGE_SYMBOL);
195 if (offset + sizeof(DWORD) > sz) return FALSE;
196 /* is string table (following iSym table) inside file size ? */
197 offset += *(DWORD*)((const char*)mapping + offset);
198 return offset <= sz;
201 /******************************************************************
202 * pe_map_file
204 * Maps an PE file into memory (and checks it's a real PE file)
206 static BOOL pe_map_file(HANDLE file, struct image_file_map* fmap, enum module_type mt)
208 void* mapping;
210 fmap->modtype = mt;
211 fmap->u.pe.hMap = CreateFileMappingW(file, NULL, PAGE_READONLY, 0, 0, NULL);
212 if (fmap->u.pe.hMap == 0) return FALSE;
213 fmap->u.pe.full_count = 0;
214 fmap->u.pe.full_map = NULL;
215 if (!(mapping = pe_map_full(fmap, NULL))) goto error;
217 switch (mt)
219 case DMT_PE:
221 IMAGE_NT_HEADERS* nthdr;
222 IMAGE_SECTION_HEADER* section;
223 unsigned i;
225 if (!(nthdr = RtlImageNtHeader(mapping))) goto error;
226 memcpy(&fmap->u.pe.ntheader, nthdr, sizeof(fmap->u.pe.ntheader));
227 section = (IMAGE_SECTION_HEADER*)
228 ((char*)&nthdr->OptionalHeader + nthdr->FileHeader.SizeOfOptionalHeader);
229 fmap->u.pe.sect = HeapAlloc(GetProcessHeap(), 0,
230 nthdr->FileHeader.NumberOfSections * sizeof(fmap->u.pe.sect[0]));
231 if (!fmap->u.pe.sect) goto error;
232 for (i = 0; i < nthdr->FileHeader.NumberOfSections; i++)
234 memcpy(&fmap->u.pe.sect[i].shdr, section + i, sizeof(IMAGE_SECTION_HEADER));
235 fmap->u.pe.sect[i].mapped = IMAGE_NO_MAP;
237 if (nthdr->FileHeader.PointerToSymbolTable && nthdr->FileHeader.NumberOfSymbols)
239 LARGE_INTEGER li;
241 if (GetFileSizeEx(file, &li) && pe_is_valid_pointer_table(nthdr, mapping, li.QuadPart))
243 /* FIXME ugly: should rather map the relevant content instead of copying it */
244 const char* src = (const char*)mapping +
245 nthdr->FileHeader.PointerToSymbolTable +
246 nthdr->FileHeader.NumberOfSymbols * sizeof(IMAGE_SYMBOL);
247 char* dst;
248 DWORD sz = *(DWORD*)src;
250 if ((dst = HeapAlloc(GetProcessHeap(), 0, sz)))
251 memcpy(dst, src, sz);
252 fmap->u.pe.strtable = dst;
254 else
256 WARN("Bad coff table... wipping out\n");
257 /* we have bad information here, wipe it out */
258 fmap->u.pe.ntheader.FileHeader.PointerToSymbolTable = 0;
259 fmap->u.pe.ntheader.FileHeader.NumberOfSymbols = 0;
260 fmap->u.pe.strtable = NULL;
263 else fmap->u.pe.strtable = NULL;
265 break;
266 default: assert(0); goto error;
268 pe_unmap_full(fmap);
270 return TRUE;
271 error:
272 pe_unmap_full(fmap);
273 CloseHandle(fmap->u.pe.hMap);
274 return FALSE;
277 /******************************************************************
278 * pe_unmap_file
280 * Unmaps an PE file from memory (previously mapped with pe_map_file)
282 static void pe_unmap_file(struct image_file_map* fmap)
284 if (fmap->u.pe.hMap != 0)
286 struct image_section_map ism;
287 ism.fmap = fmap;
288 for (ism.sidx = 0; ism.sidx < fmap->u.pe.ntheader.FileHeader.NumberOfSections; ism.sidx++)
290 pe_unmap_section(&ism);
292 while (fmap->u.pe.full_count) pe_unmap_full(fmap);
293 HeapFree(GetProcessHeap(), 0, fmap->u.pe.sect);
294 HeapFree(GetProcessHeap(), 0, (void*)fmap->u.pe.strtable); /* FIXME ugly (see pe_map_file) */
295 CloseHandle(fmap->u.pe.hMap);
296 fmap->u.pe.hMap = NULL;
300 /******************************************************************
301 * pe_map_directory
303 * Maps a directory content out of a PE file
305 const char* pe_map_directory(struct module* module, int dirno, DWORD* size)
307 IMAGE_NT_HEADERS* nth;
308 void* mapping;
310 if (module->type != DMT_PE || !module->format_info[DFI_PE]) return NULL;
311 if (dirno >= IMAGE_NUMBEROF_DIRECTORY_ENTRIES ||
312 !(mapping = pe_map_full(&module->format_info[DFI_PE]->u.pe_info->fmap, &nth)))
313 return NULL;
314 if (size) *size = nth->OptionalHeader.DataDirectory[dirno].Size;
315 return RtlImageRvaToVa(nth, mapping,
316 nth->OptionalHeader.DataDirectory[dirno].VirtualAddress, NULL);
319 /******************************************************************
320 * pe_unmap_directory
322 * Unmaps a directory content
324 void pe_unmap_directory(struct image_file_map* fmap, int dirno)
326 pe_unmap_full(fmap);
329 static void pe_module_remove(struct process* pcs, struct module_format* modfmt)
331 pe_unmap_file(&modfmt->u.pe_info->fmap);
332 HeapFree(GetProcessHeap(), 0, modfmt);
335 /******************************************************************
336 * pe_locate_with_coff_symbol_table
338 * Use the COFF symbol table (if any) from the IMAGE_FILE_HEADER to set the absolute address
339 * of global symbols.
340 * Mingw32 requires this for stabs debug information as address for global variables isn't filled in
341 * (this is similar to what is done in elf_module.c when using the .symtab ELF section)
343 static BOOL pe_locate_with_coff_symbol_table(struct module* module)
345 struct image_file_map* fmap = &module->format_info[DFI_PE]->u.pe_info->fmap;
346 const IMAGE_SYMBOL* isym;
347 int i, numsym, naux;
348 char tmp[9];
349 const char* name;
350 struct hash_table_iter hti;
351 void* ptr;
352 struct symt_data* sym;
353 const char* mapping;
355 numsym = fmap->u.pe.ntheader.FileHeader.NumberOfSymbols;
356 if (!fmap->u.pe.ntheader.FileHeader.PointerToSymbolTable || !numsym)
357 return TRUE;
358 if (!(mapping = pe_map_full(fmap, NULL))) return FALSE;
359 isym = (const IMAGE_SYMBOL*)(mapping + fmap->u.pe.ntheader.FileHeader.PointerToSymbolTable);
361 for (i = 0; i < numsym; i+= naux, isym += naux)
363 if (isym->StorageClass == IMAGE_SYM_CLASS_EXTERNAL &&
364 isym->SectionNumber > 0 && isym->SectionNumber <= fmap->u.pe.ntheader.FileHeader.NumberOfSections)
366 if (isym->N.Name.Short)
368 name = memcpy(tmp, isym->N.ShortName, 8);
369 tmp[8] = '\0';
371 else name = fmap->u.pe.strtable + isym->N.Name.Long;
372 if (name[0] == '_') name++;
373 hash_table_iter_init(&module->ht_symbols, &hti, name);
374 while ((ptr = hash_table_iter_up(&hti)))
376 sym = GET_ENTRY(ptr, struct symt_data, hash_elt);
377 if (sym->symt.tag == SymTagData &&
378 (sym->kind == DataIsGlobal || sym->kind == DataIsFileStatic) &&
379 !strcmp(sym->hash_elt.name, name))
381 TRACE("Changing absolute address for %d.%s: %lx -> %s\n",
382 isym->SectionNumber, name, sym->u.var.offset,
383 wine_dbgstr_longlong(module->module.BaseOfImage +
384 fmap->u.pe.sect[isym->SectionNumber - 1].shdr.VirtualAddress +
385 isym->Value));
386 sym->u.var.offset = module->module.BaseOfImage +
387 fmap->u.pe.sect[isym->SectionNumber - 1].shdr.VirtualAddress + isym->Value;
388 break;
392 naux = isym->NumberOfAuxSymbols + 1;
394 pe_unmap_full(fmap);
395 return TRUE;
398 /******************************************************************
399 * pe_load_coff_symbol_table
401 * Load public symbols out of the COFF symbol table (if any).
403 static BOOL pe_load_coff_symbol_table(struct module* module)
405 struct image_file_map* fmap = &module->format_info[DFI_PE]->u.pe_info->fmap;
406 const IMAGE_SYMBOL* isym;
407 int i, numsym, naux;
408 const char* strtable;
409 char tmp[9];
410 const char* name;
411 const char* lastfilename = NULL;
412 struct symt_compiland* compiland = NULL;
413 const IMAGE_SECTION_HEADER* sect;
414 const char* mapping;
416 numsym = fmap->u.pe.ntheader.FileHeader.NumberOfSymbols;
417 if (!fmap->u.pe.ntheader.FileHeader.PointerToSymbolTable || !numsym)
418 return TRUE;
419 if (!(mapping = pe_map_full(fmap, NULL))) return FALSE;
420 isym = (const IMAGE_SYMBOL*)((const char*)mapping + fmap->u.pe.ntheader.FileHeader.PointerToSymbolTable);
421 /* FIXME: no way to get strtable size */
422 strtable = (const char*)&isym[numsym];
423 sect = IMAGE_FIRST_SECTION(RtlImageNtHeader((HMODULE)mapping));
425 for (i = 0; i < numsym; i+= naux, isym += naux)
427 if (isym->StorageClass == IMAGE_SYM_CLASS_FILE)
429 lastfilename = (const char*)(isym + 1);
430 compiland = NULL;
432 if (isym->StorageClass == IMAGE_SYM_CLASS_EXTERNAL &&
433 isym->SectionNumber > 0 && isym->SectionNumber <= fmap->u.pe.ntheader.FileHeader.NumberOfSections)
435 if (isym->N.Name.Short)
437 name = memcpy(tmp, isym->N.ShortName, 8);
438 tmp[8] = '\0';
440 else name = strtable + isym->N.Name.Long;
441 if (name[0] == '_') name++;
443 if (!compiland && lastfilename)
444 compiland = symt_new_compiland(module, 0,
445 source_new(module, NULL, lastfilename));
447 if (!(dbghelp_options & SYMOPT_NO_PUBLICS))
448 symt_new_public(module, compiland, name,
449 module->module.BaseOfImage + sect[isym->SectionNumber - 1].VirtualAddress +
450 isym->Value,
453 naux = isym->NumberOfAuxSymbols + 1;
455 module->module.SymType = SymCoff;
456 module->module.LineNumbers = FALSE;
457 module->module.GlobalSymbols = FALSE;
458 module->module.TypeInfo = FALSE;
459 module->module.SourceIndexed = FALSE;
460 module->module.Publics = TRUE;
461 pe_unmap_full(fmap);
463 return TRUE;
466 /******************************************************************
467 * pe_load_stabs
469 * look for stabs information in PE header (it's how the mingw compiler provides
470 * its debugging information)
472 static BOOL pe_load_stabs(const struct process* pcs, struct module* module)
474 struct image_file_map* fmap = &module->format_info[DFI_PE]->u.pe_info->fmap;
475 struct image_section_map sect_stabs, sect_stabstr;
476 BOOL ret = FALSE;
478 if (pe_find_section(fmap, ".stab", &sect_stabs) && pe_find_section(fmap, ".stabstr", &sect_stabstr))
480 const char* stab;
481 const char* stabstr;
483 stab = image_map_section(&sect_stabs);
484 stabstr = image_map_section(&sect_stabstr);
485 if (stab != IMAGE_NO_MAP && stabstr != IMAGE_NO_MAP)
487 ret = stabs_parse(module,
488 module->module.BaseOfImage - fmap->u.pe.ntheader.OptionalHeader.ImageBase,
489 stab, image_get_map_size(&sect_stabs),
490 stabstr, image_get_map_size(&sect_stabstr),
491 NULL, NULL);
493 image_unmap_section(&sect_stabs);
494 image_unmap_section(&sect_stabstr);
495 if (ret) pe_locate_with_coff_symbol_table(module);
497 TRACE("%s the STABS debug info\n", ret ? "successfully loaded" : "failed to load");
499 return ret;
502 /******************************************************************
503 * pe_load_dwarf
505 * look for dwarf information in PE header (it's also a way for the mingw compiler
506 * to provide its debugging information)
508 static BOOL pe_load_dwarf(struct module* module)
510 struct image_file_map* fmap = &module->format_info[DFI_PE]->u.pe_info->fmap;
511 BOOL ret = FALSE;
513 ret = dwarf2_parse(module,
514 module->module.BaseOfImage - fmap->u.pe.ntheader.OptionalHeader.ImageBase,
515 NULL, /* FIXME: some thunks to deal with ? */
516 fmap);
517 TRACE("%s the DWARF debug info\n", ret ? "successfully loaded" : "failed to load");
519 return ret;
522 /******************************************************************
523 * pe_load_dbg_file
525 * loads a .dbg file
527 static BOOL pe_load_dbg_file(const struct process* pcs, struct module* module,
528 const char* dbg_name, DWORD timestamp)
530 char tmp[MAX_PATH];
531 HANDLE hFile = INVALID_HANDLE_VALUE, hMap = 0;
532 const BYTE* dbg_mapping = NULL;
533 BOOL ret = FALSE;
535 TRACE("Processing DBG file %s\n", debugstr_a(dbg_name));
537 if (path_find_symbol_file(pcs, dbg_name, NULL, timestamp, 0, tmp, &module->module.DbgUnmatched) &&
538 (hFile = CreateFileA(tmp, GENERIC_READ, FILE_SHARE_READ, NULL,
539 OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL)) != INVALID_HANDLE_VALUE &&
540 ((hMap = CreateFileMappingW(hFile, NULL, PAGE_READONLY, 0, 0, NULL)) != 0) &&
541 ((dbg_mapping = MapViewOfFile(hMap, FILE_MAP_READ, 0, 0, 0)) != NULL))
543 const IMAGE_SEPARATE_DEBUG_HEADER* hdr;
544 const IMAGE_SECTION_HEADER* sectp;
545 const IMAGE_DEBUG_DIRECTORY* dbg;
547 hdr = (const IMAGE_SEPARATE_DEBUG_HEADER*)dbg_mapping;
548 /* section headers come immediately after debug header */
549 sectp = (const IMAGE_SECTION_HEADER*)(hdr + 1);
550 /* and after that and the exported names comes the debug directory */
551 dbg = (const IMAGE_DEBUG_DIRECTORY*)
552 (dbg_mapping + sizeof(*hdr) +
553 hdr->NumberOfSections * sizeof(IMAGE_SECTION_HEADER) +
554 hdr->ExportedNamesSize);
556 ret = pe_load_debug_directory(pcs, module, dbg_mapping, sectp,
557 hdr->NumberOfSections, dbg,
558 hdr->DebugDirectorySize / sizeof(*dbg));
560 else
561 ERR("Couldn't find .DBG file %s (%s)\n", debugstr_a(dbg_name), debugstr_a(tmp));
563 if (dbg_mapping) UnmapViewOfFile(dbg_mapping);
564 if (hMap) CloseHandle(hMap);
565 if (hFile != INVALID_HANDLE_VALUE) CloseHandle(hFile);
566 return ret;
569 /******************************************************************
570 * pe_load_msc_debug_info
572 * Process MSC debug information in PE file.
574 static BOOL pe_load_msc_debug_info(const struct process* pcs, struct module* module)
576 struct image_file_map* fmap = &module->format_info[DFI_PE]->u.pe_info->fmap;
577 BOOL ret = FALSE;
578 const IMAGE_DATA_DIRECTORY* dir;
579 const IMAGE_DEBUG_DIRECTORY*dbg = NULL;
580 int nDbg;
581 void* mapping;
582 IMAGE_NT_HEADERS* nth;
584 if (!(mapping = pe_map_full(fmap, &nth))) return FALSE;
585 /* Read in debug directory */
586 dir = nth->OptionalHeader.DataDirectory + IMAGE_DIRECTORY_ENTRY_DEBUG;
587 nDbg = dir->Size / sizeof(IMAGE_DEBUG_DIRECTORY);
588 if (!nDbg) goto done;
590 dbg = RtlImageRvaToVa(nth, mapping, dir->VirtualAddress, NULL);
592 /* Parse debug directory */
593 if (nth->FileHeader.Characteristics & IMAGE_FILE_DEBUG_STRIPPED)
595 /* Debug info is stripped to .DBG file */
596 const IMAGE_DEBUG_MISC* misc = (const IMAGE_DEBUG_MISC*)
597 ((const char*)mapping + dbg->PointerToRawData);
599 if (nDbg != 1 || dbg->Type != IMAGE_DEBUG_TYPE_MISC ||
600 misc->DataType != IMAGE_DEBUG_MISC_EXENAME)
602 WINE_ERR("-Debug info stripped, but no .DBG file in module %s\n",
603 debugstr_w(module->module.ModuleName));
605 else
607 ret = pe_load_dbg_file(pcs, module, (const char*)misc->Data, nth->FileHeader.TimeDateStamp);
610 else
612 const IMAGE_SECTION_HEADER *sectp = (const IMAGE_SECTION_HEADER*)((const char*)&nth->OptionalHeader + nth->FileHeader.SizeOfOptionalHeader);
613 /* Debug info is embedded into PE module */
614 ret = pe_load_debug_directory(pcs, module, mapping, sectp,
615 nth->FileHeader.NumberOfSections, dbg, nDbg);
617 done:
618 pe_unmap_full(fmap);
619 return ret;
622 /***********************************************************************
623 * pe_load_export_debug_info
625 static BOOL pe_load_export_debug_info(const struct process* pcs, struct module* module)
627 struct image_file_map* fmap = &module->format_info[DFI_PE]->u.pe_info->fmap;
628 unsigned int i;
629 const IMAGE_EXPORT_DIRECTORY* exports;
630 DWORD base = module->module.BaseOfImage;
631 DWORD size;
632 IMAGE_NT_HEADERS* nth;
633 void* mapping;
635 if (dbghelp_options & SYMOPT_NO_PUBLICS) return TRUE;
637 if (!(mapping = pe_map_full(fmap, &nth))) return FALSE;
638 #if 0
639 /* Add start of DLL (better use the (yet unimplemented) Exe SymTag for this) */
640 /* FIXME: module.ModuleName isn't correctly set yet if it's passed in SymLoadModule */
641 symt_new_public(module, NULL, module->module.ModuleName, base, 1);
642 #endif
644 /* Add entry point */
645 symt_new_public(module, NULL, "EntryPoint",
646 base + nth->OptionalHeader.AddressOfEntryPoint, 1);
647 #if 0
648 /* FIXME: we'd better store addresses linked to sections rather than
649 absolute values */
650 IMAGE_SECTION_HEADER* section;
651 /* Add start of sections */
652 section = (IMAGE_SECTION_HEADER*)
653 ((char*)&nth->OptionalHeader + nth->FileHeader.SizeOfOptionalHeader);
654 for (i = 0; i < nth->FileHeader.NumberOfSections; i++, section++)
656 symt_new_public(module, NULL, section->Name,
657 RtlImageRvaToVa(nth, mapping, section->VirtualAddress, NULL), 1);
659 #endif
661 /* Add exported functions */
662 if ((exports = RtlImageDirectoryEntryToData(mapping, FALSE,
663 IMAGE_DIRECTORY_ENTRY_EXPORT, &size)))
665 const WORD* ordinals = NULL;
666 const DWORD_PTR* functions = NULL;
667 const DWORD* names = NULL;
668 unsigned int j;
669 char buffer[16];
671 functions = RtlImageRvaToVa(nth, mapping, exports->AddressOfFunctions, NULL);
672 ordinals = RtlImageRvaToVa(nth, mapping, exports->AddressOfNameOrdinals, NULL);
673 names = RtlImageRvaToVa(nth, mapping, exports->AddressOfNames, NULL);
675 if (functions && ordinals && names)
677 for (i = 0; i < exports->NumberOfNames; i++)
679 if (!names[i]) continue;
680 symt_new_public(module, NULL,
681 RtlImageRvaToVa(nth, mapping, names[i], NULL),
682 base + functions[ordinals[i]], 1);
685 for (i = 0; i < exports->NumberOfFunctions; i++)
687 if (!functions[i]) continue;
688 /* Check if we already added it with a name */
689 for (j = 0; j < exports->NumberOfNames; j++)
690 if ((ordinals[j] == i) && names[j]) break;
691 if (j < exports->NumberOfNames) continue;
692 snprintf(buffer, sizeof(buffer), "%d", i + exports->Base);
693 symt_new_public(module, NULL, buffer, base + (DWORD)functions[i], 1);
697 /* no real debug info, only entry points */
698 if (module->module.SymType == SymDeferred)
699 module->module.SymType = SymExport;
700 pe_unmap_full(fmap);
702 return TRUE;
705 /******************************************************************
706 * pe_load_debug_info
709 BOOL pe_load_debug_info(const struct process* pcs, struct module* module)
711 BOOL ret = FALSE;
713 if (!(dbghelp_options & SYMOPT_PUBLICS_ONLY))
715 ret = pe_load_stabs(pcs, module);
716 ret = pe_load_dwarf(module) || ret;
717 ret = pe_load_msc_debug_info(pcs, module) || ret;
718 ret = ret || pe_load_coff_symbol_table(module); /* FIXME */
719 /* if we still have no debug info (we could only get SymExport at this
720 * point), then do the SymExport except if we have an ELF container,
721 * in which case we'll rely on the export's on the ELF side
724 /* FIXME shouldn't we check that? if (!module_get_debug(pcs, module)) */
725 if (pe_load_export_debug_info(pcs, module) && !ret)
726 ret = TRUE;
728 return ret;
731 /******************************************************************
732 * pe_load_native_module
735 struct module* pe_load_native_module(struct process* pcs, const WCHAR* name,
736 HANDLE hFile, DWORD base, DWORD size)
738 struct module* module = NULL;
739 BOOL opened = FALSE;
740 struct module_format* modfmt;
741 WCHAR loaded_name[MAX_PATH];
743 loaded_name[0] = '\0';
744 if (!hFile)
746 assert(name);
748 if ((hFile = FindExecutableImageExW(name, pcs->search_path, loaded_name, NULL, NULL)) == NULL)
749 return NULL;
750 opened = TRUE;
752 else if (name) strcpyW(loaded_name, name);
753 else if (dbghelp_options & SYMOPT_DEFERRED_LOADS)
754 FIXME("Trouble ahead (no module name passed in deferred mode)\n");
755 if (!(modfmt = HeapAlloc(GetProcessHeap(), 0, sizeof(struct module_format) + sizeof(struct pe_module_info))))
756 return NULL;
757 modfmt->u.pe_info = (struct pe_module_info*)(modfmt + 1);
758 if (pe_map_file(hFile, &modfmt->u.pe_info->fmap, DMT_PE))
760 if (!base) base = modfmt->u.pe_info->fmap.u.pe.ntheader.OptionalHeader.ImageBase;
761 if (!size) size = modfmt->u.pe_info->fmap.u.pe.ntheader.OptionalHeader.SizeOfImage;
763 module = module_new(pcs, loaded_name, DMT_PE, FALSE, base, size,
764 modfmt->u.pe_info->fmap.u.pe.ntheader.FileHeader.TimeDateStamp,
765 modfmt->u.pe_info->fmap.u.pe.ntheader.OptionalHeader.CheckSum);
766 if (module)
768 modfmt->module = module;
769 modfmt->remove = pe_module_remove;
770 modfmt->loc_compute = NULL;
772 module->format_info[DFI_PE] = modfmt;
773 if (dbghelp_options & SYMOPT_DEFERRED_LOADS)
774 module->module.SymType = SymDeferred;
775 else
776 pe_load_debug_info(pcs, module);
778 else
780 ERR("could not load the module '%s'\n", debugstr_w(loaded_name));
781 pe_unmap_file(&modfmt->u.pe_info->fmap);
784 if (!module) HeapFree(GetProcessHeap(), 0, modfmt);
786 if (opened) CloseHandle(hFile);
788 return module;
791 /******************************************************************
792 * pe_load_nt_header
795 BOOL pe_load_nt_header(HANDLE hProc, DWORD64 base, IMAGE_NT_HEADERS* nth)
797 IMAGE_DOS_HEADER dos;
799 return ReadProcessMemory(hProc, (char*)(DWORD_PTR)base, &dos, sizeof(dos), NULL) &&
800 dos.e_magic == IMAGE_DOS_SIGNATURE &&
801 ReadProcessMemory(hProc, (char*)(DWORD_PTR)(base + dos.e_lfanew),
802 nth, sizeof(*nth), NULL) &&
803 nth->Signature == IMAGE_NT_SIGNATURE;
806 /******************************************************************
807 * pe_load_builtin_module
810 struct module* pe_load_builtin_module(struct process* pcs, const WCHAR* name,
811 DWORD64 base, DWORD64 size)
813 struct module* module = NULL;
815 if (base && pcs->dbg_hdr_addr)
817 IMAGE_NT_HEADERS nth;
819 if (pe_load_nt_header(pcs->handle, base, &nth))
821 if (!size) size = nth.OptionalHeader.SizeOfImage;
822 module = module_new(pcs, name, DMT_PE, FALSE, base, size,
823 nth.FileHeader.TimeDateStamp,
824 nth.OptionalHeader.CheckSum);
827 return module;
830 /***********************************************************************
831 * ImageDirectoryEntryToDataEx (DBGHELP.@)
833 * Search for specified directory in PE image
835 * PARAMS
837 * base [in] Image base address
838 * image [in] TRUE - image has been loaded by loader, FALSE - raw file image
839 * dir [in] Target directory index
840 * size [out] Receives directory size
841 * section [out] Receives pointer to section header of section containing directory data
843 * RETURNS
844 * Success: pointer to directory data
845 * Failure: NULL
848 PVOID WINAPI ImageDirectoryEntryToDataEx( PVOID base, BOOLEAN image, USHORT dir, PULONG size, PIMAGE_SECTION_HEADER *section )
850 const IMAGE_NT_HEADERS *nt;
851 DWORD addr;
853 *size = 0;
854 if (section) *section = NULL;
856 if (!(nt = RtlImageNtHeader( base ))) return NULL;
857 if (dir >= nt->OptionalHeader.NumberOfRvaAndSizes) return NULL;
858 if (!(addr = nt->OptionalHeader.DataDirectory[dir].VirtualAddress)) return NULL;
860 *size = nt->OptionalHeader.DataDirectory[dir].Size;
861 if (image || addr < nt->OptionalHeader.SizeOfHeaders) return (char *)base + addr;
863 return RtlImageRvaToVa( nt, base, addr, section );
866 /***********************************************************************
867 * ImageDirectoryEntryToData (DBGHELP.@)
869 * NOTES
870 * See ImageDirectoryEntryToDataEx
872 PVOID WINAPI ImageDirectoryEntryToData( PVOID base, BOOLEAN image, USHORT dir, PULONG size )
874 return ImageDirectoryEntryToDataEx( base, image, dir, size, NULL );