2 * File elf.c - processing of ELF files
4 * Copyright (C) 1996, Eric Youngdale.
5 * 1999-2007 Eric Pouech
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation; either
10 * version 2.1 of the License, or (at your option) any later version.
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
23 #include "wine/port.h"
25 #if defined(__svr4__) || defined(__sun)
27 /* large files are not supported by libelf */
28 #undef _FILE_OFFSET_BITS
29 #define _FILE_OFFSET_BITS 32
35 #ifdef HAVE_SYS_STAT_H
36 # include <sys/stat.h>
39 #ifdef HAVE_SYS_MMAN_H
46 #define PATH_MAX MAX_PATH
49 #include "dbghelp_private.h"
54 #ifdef HAVE_SYS_ELF32_H
55 # include <sys/elf32.h>
57 #ifdef HAVE_SYS_EXEC_ELF_H
58 # include <sys/exec_elf.h>
61 # if defined(DT_COUNT)
62 # define DT_NUM DT_COUNT
64 /* this seems to be a satisfactory value on Solaris, which doesn't support this AFAICT */
71 #ifdef HAVE_SYS_LINK_H
72 # include <sys/link.h>
75 #include "wine/library.h"
76 #include "wine/debug.h"
78 struct elf_module_info
80 unsigned long elf_addr;
81 unsigned short elf_mark : 1,
87 #define ELF_INFO_DEBUG_HEADER 0x0001
88 #define ELF_INFO_MODULE 0x0002
89 #define ELF_INFO_NAME 0x0004
91 WINE_DEFAULT_DEBUG_CHANNEL(dbghelp);
95 unsigned flags; /* IN one (or several) of the ELF_INFO constants */
96 unsigned long dbg_hdr_addr; /* OUT address of debug header (if ELF_INFO_DEBUG_HEADER is set) */
97 struct module* module; /* OUT loaded module (if ELF_INFO_MODULE is set) */
98 const WCHAR* module_name; /* OUT found module name (if ELF_INFO_NAME is set) */
101 /* structure holding information while handling an ELF image
102 * allows one by one section mapping for memory savings
115 const char* shstrtab;
116 struct elf_file_map* alternate; /* another ELF file (linked to this one) */
119 struct elf_section_map
121 struct elf_file_map* fmap;
127 struct hash_table_elt ht_elt;
128 const Elf32_Sym* symp;
129 struct symt_compiland* compiland;
133 struct elf_thunk_area
136 THUNK_ORDINAL ordinal;
137 unsigned long rva_start;
138 unsigned long rva_end;
141 /******************************************************************
144 * Maps a single section into memory from an ELF file
146 static const char* elf_map_section(struct elf_section_map* esm)
148 unsigned pgsz = getpagesize();
151 if (esm->sidx < 0 || esm->sidx >= esm->fmap->elfhdr.e_shnum ||
152 esm->fmap->sect[esm->sidx].shdr.sh_type == SHT_NOBITS)
155 /* align required information on page size (we assume pagesize is a power of 2) */
156 ofst = esm->fmap->sect[esm->sidx].shdr.sh_offset & ~(pgsz - 1);
157 size = ((esm->fmap->sect[esm->sidx].shdr.sh_offset +
158 esm->fmap->sect[esm->sidx].shdr.sh_size + pgsz - 1) & ~(pgsz - 1)) - ofst;
159 esm->fmap->sect[esm->sidx].mapped = mmap(NULL, size, PROT_READ, MAP_PRIVATE,
160 esm->fmap->fd, ofst);
161 if (esm->fmap->sect[esm->sidx].mapped == ELF_NO_MAP) return ELF_NO_MAP;
162 return esm->fmap->sect[esm->sidx].mapped + (esm->fmap->sect[esm->sidx].shdr.sh_offset & (pgsz - 1));
165 /******************************************************************
168 * Finds a section by name (and type) into memory from an ELF file
169 * or its alternate if any
171 static BOOL elf_find_section(struct elf_file_map* fmap, const char* name,
172 unsigned sht, struct elf_section_map* esm)
178 if (fmap->shstrtab == ELF_NO_MAP)
180 struct elf_section_map hdr_esm = {fmap, fmap->elfhdr.e_shstrndx};
181 if ((fmap->shstrtab = elf_map_section(&hdr_esm)) == ELF_NO_MAP) break;
183 for (i = 0; i < fmap->elfhdr.e_shnum; i++)
185 if (strcmp(fmap->shstrtab + fmap->sect[i].shdr.sh_name, name) == 0 &&
186 (sht == SHT_NULL || sht == fmap->sect[i].shdr.sh_type))
193 fmap = fmap->alternate;
200 /******************************************************************
203 * Unmaps a single section from memory
205 static void elf_unmap_section(struct elf_section_map* esm)
207 if (esm->sidx >= 0 && esm->sidx < esm->fmap->elfhdr.e_shnum && esm->fmap->sect[esm->sidx].mapped != ELF_NO_MAP)
209 unsigned pgsz = getpagesize();
212 ofst = esm->fmap->sect[esm->sidx].shdr.sh_offset & ~(pgsz - 1);
213 size = ((esm->fmap->sect[esm->sidx].shdr.sh_offset +
214 esm->fmap->sect[esm->sidx].shdr.sh_size + pgsz - 1) & ~(pgsz - 1)) - ofst;
215 if (munmap((char*)esm->fmap->sect[esm->sidx].mapped, size) < 0)
216 WARN("Couldn't unmap the section\n");
217 esm->fmap->sect[esm->sidx].mapped = ELF_NO_MAP;
221 static void elf_end_find(struct elf_file_map* fmap)
223 struct elf_section_map esm;
228 esm.sidx = fmap->elfhdr.e_shstrndx;
229 elf_unmap_section(&esm);
230 fmap->shstrtab = ELF_NO_MAP;
231 fmap = fmap->alternate;
235 /******************************************************************
238 * Get the size of an ELF section
240 static inline unsigned elf_get_map_size(struct elf_section_map* esm)
242 if (esm->sidx < 0 || esm->sidx >= esm->fmap->elfhdr.e_shnum)
244 return esm->fmap->sect[esm->sidx].shdr.sh_size;
247 /******************************************************************
250 * Maps an ELF file into memory (and checks it's a real ELF file)
252 static BOOL elf_map_file(const WCHAR* filenameW, struct elf_file_map* fmap)
254 static const BYTE elf_signature[4] = { ELFMAG0, ELFMAG1, ELFMAG2, ELFMAG3 };
258 unsigned tmp, page_mask = getpagesize() - 1;
263 len = WideCharToMultiByte(CP_UNIXCP, 0, filenameW, -1, NULL, 0, NULL, NULL);
264 if (!(filename = HeapAlloc(GetProcessHeap(), 0, len))) return FALSE;
265 WideCharToMultiByte(CP_UNIXCP, 0, filenameW, -1, filename, len, NULL, NULL);
268 fmap->shstrtab = ELF_NO_MAP;
269 fmap->alternate = NULL;
271 /* check that the file exists, and that the module hasn't been loaded yet */
272 if (stat(filename, &statbuf) == -1 || S_ISDIR(statbuf.st_mode)) goto done;
274 /* Now open the file, so that we can mmap() it. */
275 if ((fmap->fd = open(filename, O_RDONLY)) == -1) goto done;
277 if (read(fmap->fd, &fmap->elfhdr, sizeof(fmap->elfhdr)) != sizeof(fmap->elfhdr))
279 /* and check for an ELF header */
280 if (memcmp(fmap->elfhdr.e_ident,
281 elf_signature, sizeof(elf_signature))) goto done;
283 fmap->sect = HeapAlloc(GetProcessHeap(), 0,
284 fmap->elfhdr.e_shnum * sizeof(fmap->sect[0]));
285 if (!fmap->sect) goto done;
287 lseek(fmap->fd, fmap->elfhdr.e_shoff, SEEK_SET);
288 for (i = 0; i < fmap->elfhdr.e_shnum; i++)
290 read(fmap->fd, &fmap->sect[i].shdr, sizeof(fmap->sect[i].shdr));
291 fmap->sect[i].mapped = ELF_NO_MAP;
294 /* grab size of module once loaded in memory */
295 lseek(fmap->fd, fmap->elfhdr.e_phoff, SEEK_SET);
297 fmap->elf_start = ~0L;
298 for (i = 0; i < fmap->elfhdr.e_phnum; i++)
300 if (read(fmap->fd, &phdr, sizeof(phdr)) == sizeof(phdr) &&
301 phdr.p_type == PT_LOAD)
303 tmp = (phdr.p_vaddr + phdr.p_memsz + page_mask) & ~page_mask;
304 if (fmap->elf_size < tmp) fmap->elf_size = tmp;
305 if (phdr.p_vaddr < fmap->elf_start) fmap->elf_start = phdr.p_vaddr;
308 /* if non relocatable ELF, then remove fixed address from computation
309 * otherwise, all addresses are zero based and start has no effect
311 fmap->elf_size -= fmap->elf_start;
314 HeapFree(GetProcessHeap(), 0, filename);
318 /******************************************************************
321 * Unmaps an ELF file from memory (previously mapped with elf_map_file)
323 static void elf_unmap_file(struct elf_file_map* fmap)
329 struct elf_section_map esm;
331 for (esm.sidx = 0; esm.sidx < fmap->elfhdr.e_shnum; esm.sidx++)
333 elf_unmap_section(&esm);
335 HeapFree(GetProcessHeap(), 0, fmap->sect);
338 fmap = fmap->alternate;
342 /******************************************************************
343 * elf_is_in_thunk_area
345 * Check whether an address lies within one of the thunk area we
348 int elf_is_in_thunk_area(unsigned long addr,
349 const struct elf_thunk_area* thunks)
353 for (i = 0; thunks[i].symname; i++)
355 if (addr >= thunks[i].rva_start && addr < thunks[i].rva_end)
361 /******************************************************************
364 * creating an internal hash table to ease use ELF symtab information lookup
366 static void elf_hash_symtab(struct module* module, struct pool* pool,
367 struct hash_table* ht_symtab, struct elf_file_map* fmap,
368 struct elf_thunk_area* thunks)
373 struct symt_compiland* compiland = NULL;
375 const Elf32_Sym* symp;
376 struct symtab_elt* ste;
377 struct elf_section_map esm, esm_str;
379 if (!elf_find_section(fmap, ".symtab", SHT_SYMTAB, &esm) &&
380 !elf_find_section(fmap, ".dynsym", SHT_DYNSYM, &esm)) return;
381 if ((symp = (const Elf32_Sym*)elf_map_section(&esm)) == ELF_NO_MAP) return;
383 esm_str.sidx = fmap->sect[esm.sidx].shdr.sh_link;
384 if ((strp = elf_map_section(&esm_str)) == ELF_NO_MAP) return;
386 nsym = elf_get_map_size(&esm) / sizeof(*symp);
388 for (j = 0; thunks[j].symname; j++)
389 thunks[j].rva_start = thunks[j].rva_end = 0;
391 for (i = 0; i < nsym; i++, symp++)
393 /* Ignore certain types of entries which really aren't of that much
396 if ((ELF32_ST_TYPE(symp->st_info) != STT_NOTYPE &&
397 ELF32_ST_TYPE(symp->st_info) != STT_FILE &&
398 ELF32_ST_TYPE(symp->st_info) != STT_OBJECT &&
399 ELF32_ST_TYPE(symp->st_info) != STT_FUNC) ||
400 symp->st_shndx == SHN_UNDEF)
405 symname = strp + symp->st_name;
407 /* handle some specific symtab (that we'll throw away when done) */
408 switch (ELF32_ST_TYPE(symp->st_info))
412 compiland = symt_new_compiland(module, symp->st_value,
413 source_new(module, NULL, symname));
418 /* we are only interested in wine markers inserted by winebuild */
419 for (j = 0; thunks[j].symname; j++)
421 if (!strcmp(symname, thunks[j].symname))
423 thunks[j].rva_start = symp->st_value;
424 thunks[j].rva_end = symp->st_value + symp->st_size;
431 /* FIXME: we don't need to handle them (GCC internals)
432 * Moreover, they screw up our symbol lookup :-/
434 if (symname[0] == '.' && symname[1] == 'L' && isdigit(symname[2]))
437 ste = pool_alloc(pool, sizeof(*ste));
438 ste->ht_elt.name = symname;
439 /* GCC emits, in some cases, a .<digit>+ suffix.
440 * This is used for static variable inside functions, so
441 * that we can have several such variables with same name in
442 * the same compilation unit
443 * We simply ignore that suffix when present (we also get rid
444 * of it in stabs parsing)
446 ptr = symname + strlen(symname) - 1;
449 while (isdigit(*ptr) && ptr >= symname) ptr--;
450 if (ptr > symname && *ptr == '.')
452 char* n = pool_alloc(pool, ptr - symname + 1);
453 memcpy(n, symname, ptr - symname + 1);
454 n[ptr - symname] = '\0';
455 ste->ht_elt.name = n;
459 ste->compiland = compiland;
461 hash_table_add(ht_symtab, &ste->ht_elt);
463 /* as we added in the ht_symtab pointers to the symbols themselves,
464 * we cannot unmap yet the sections, it will be done when we're over
469 /******************************************************************
472 * lookup a symbol by name in our internal hash table for the symtab
474 static const Elf32_Sym* elf_lookup_symtab(const struct module* module,
475 const struct hash_table* ht_symtab,
476 const char* name, struct symt* compiland)
478 struct symtab_elt* weak_result = NULL; /* without compiland name */
479 struct symtab_elt* result = NULL;
480 struct hash_table_iter hti;
481 struct symtab_elt* ste;
482 const char* compiland_name;
483 const char* compiland_basename;
486 /* we need weak match up (at least) when symbols of same name,
487 * defined several times in different compilation units,
488 * are merged in a single one (hence a different filename for c.u.)
492 compiland_name = source_get(module,
493 ((struct symt_compiland*)compiland)->source);
494 compiland_basename = strrchr(compiland_name, '/');
495 if (!compiland_basename++) compiland_basename = compiland_name;
497 else compiland_name = compiland_basename = NULL;
499 hash_table_iter_init(ht_symtab, &hti, name);
500 while ((ste = hash_table_iter_up(&hti)))
502 if (ste->used || strcmp(ste->ht_elt.name, name)) continue;
505 if ((ste->compiland && !compiland_name) || (!ste->compiland && compiland_name))
507 if (ste->compiland && compiland_name)
509 const char* filename = source_get(module, ste->compiland->source);
510 if (strcmp(filename, compiland_name))
512 base = strrchr(filename, '/');
513 if (!base++) base = filename;
514 if (strcmp(base, compiland_basename)) continue;
519 FIXME("Already found symbol %s (%s) in symtab %s @%08x and %s @%08x\n",
520 name, compiland_name,
521 source_get(module, result->compiland->source), (unsigned int)result->symp->st_value,
522 source_get(module, ste->compiland->source), (unsigned int)ste->symp->st_value);
530 if (!result && !(result = weak_result))
532 FIXME("Couldn't find symbol %s!%s in symtab\n",
533 debugstr_w(module->module.ModuleName), name);
539 /******************************************************************
540 * elf_finish_stabs_info
542 * - get any relevant information (address & size) from the bits we got from the
543 * stabs debugging information
545 static void elf_finish_stabs_info(struct module* module, struct hash_table* symtab)
547 struct hash_table_iter hti;
550 const Elf32_Sym* symp;
552 hash_table_iter_init(&module->ht_symbols, &hti, NULL);
553 while ((ptr = hash_table_iter_up(&hti)))
555 sym = GET_ENTRY(ptr, struct symt_ht, hash_elt);
556 switch (sym->symt.tag)
559 if (((struct symt_function*)sym)->address != module->elf_info->elf_addr &&
560 ((struct symt_function*)sym)->size)
564 symp = elf_lookup_symtab(module, symtab, sym->hash_elt.name,
565 ((struct symt_function*)sym)->container);
568 if (((struct symt_function*)sym)->address != module->elf_info->elf_addr &&
569 ((struct symt_function*)sym)->address != module->elf_info->elf_addr + symp->st_value)
570 FIXME("Changing address for %p/%s!%s from %08lx to %08lx\n",
571 sym, debugstr_w(module->module.ModuleName), sym->hash_elt.name,
572 ((struct symt_function*)sym)->address, module->elf_info->elf_addr + symp->st_value);
573 if (((struct symt_function*)sym)->size && ((struct symt_function*)sym)->size != symp->st_size)
574 FIXME("Changing size for %p/%s!%s from %08lx to %08x\n",
575 sym, debugstr_w(module->module.ModuleName), sym->hash_elt.name,
576 ((struct symt_function*)sym)->size, (unsigned int)symp->st_size);
578 ((struct symt_function*)sym)->address = module->elf_info->elf_addr +
580 ((struct symt_function*)sym)->size = symp->st_size;
582 FIXME("Couldn't find %s!%s\n",
583 debugstr_w(module->module.ModuleName), sym->hash_elt.name);
586 switch (((struct symt_data*)sym)->kind)
589 case DataIsFileStatic:
590 if (((struct symt_data*)sym)->u.var.offset != module->elf_info->elf_addr)
592 symp = elf_lookup_symtab(module, symtab, sym->hash_elt.name,
593 ((struct symt_data*)sym)->container);
596 if (((struct symt_data*)sym)->u.var.offset != module->elf_info->elf_addr &&
597 ((struct symt_data*)sym)->u.var.offset != module->elf_info->elf_addr + symp->st_value)
598 FIXME("Changing address for %p/%s!%s from %08lx to %08lx\n",
599 sym, debugstr_w(module->module.ModuleName), sym->hash_elt.name,
600 ((struct symt_function*)sym)->address, module->elf_info->elf_addr + symp->st_value);
601 ((struct symt_data*)sym)->u.var.offset = module->elf_info->elf_addr +
603 ((struct symt_data*)sym)->kind = (ELF32_ST_BIND(symp->st_info) == STB_LOCAL) ?
604 DataIsFileStatic : DataIsGlobal;
606 FIXME("Couldn't find %s!%s\n",
607 debugstr_w(module->module.ModuleName), sym->hash_elt.name);
613 FIXME("Unsupported tag %u\n", sym->symt.tag);
617 /* since we may have changed some addresses & sizes, mark the module to be resorted */
618 module->sortlist_valid = FALSE;
621 /******************************************************************
622 * elf_load_wine_thunks
624 * creating the thunk objects for a wine native DLL
626 static int elf_new_wine_thunks(struct module* module, struct hash_table* ht_symtab,
627 const struct elf_thunk_area* thunks)
630 struct hash_table_iter hti;
631 struct symtab_elt* ste;
633 struct symt_ht* symt;
635 hash_table_iter_init(ht_symtab, &hti, NULL);
636 while ((ste = hash_table_iter_up(&hti)))
638 if (ste->used) continue;
640 addr = module->elf_info->elf_addr + ste->symp->st_value;
642 j = elf_is_in_thunk_area(ste->symp->st_value, thunks);
643 if (j >= 0) /* thunk found */
645 symt_new_thunk(module, ste->compiland, ste->ht_elt.name, thunks[j].ordinal,
646 addr, ste->symp->st_size);
652 symt = symt_find_nearest(module, addr);
654 symt_get_info(&symt->symt, TI_GET_ADDRESS, &ref_addr);
655 if (!symt || addr != ref_addr)
657 /* creating public symbols for all the ELF symbols which haven't been
658 * used yet (ie we have no debug information on them)
659 * That's the case, for example, of the .spec.c files
661 switch (ELF32_ST_TYPE(ste->symp->st_info))
664 symt_new_function(module, ste->compiland, ste->ht_elt.name,
665 addr, ste->symp->st_size, NULL);
668 symt_new_global_variable(module, ste->compiland, ste->ht_elt.name,
669 ELF32_ST_BIND(ste->symp->st_info) == STB_LOCAL,
670 addr, ste->symp->st_size, NULL);
673 FIXME("Shouldn't happen\n");
676 /* FIXME: this is a hack !!!
677 * we are adding new symbols, but as we're parsing a symbol table
678 * (hopefully without duplicate symbols) we delay rebuilding the sorted
679 * module table until we're done with the symbol table
680 * Otherwise, as we intertwine symbols's add and lookup, performance
683 module->sortlist_valid = TRUE;
685 else if (strcmp(ste->ht_elt.name, symt->hash_elt.name))
687 ULONG64 xaddr = 0, xsize = 0;
690 symt_get_info(&symt->symt, TI_GET_ADDRESS, &xaddr);
691 symt_get_info(&symt->symt, TI_GET_LENGTH, &xsize);
692 symt_get_info(&symt->symt, TI_GET_DATAKIND, &kind);
694 /* If none of symbols has a correct size, we consider they are both markers
695 * Hence, we can silence this warning
696 * Also, we check that we don't have two symbols, one local, the other
697 * global which is legal
699 if ((xsize || ste->symp->st_size) &&
700 (kind == (ELF32_ST_BIND(ste->symp->st_info) == STB_LOCAL) ? DataIsFileStatic : DataIsGlobal))
701 FIXME("Duplicate in %s: %s<%08x-%08x> %s<%s-%s>\n",
702 debugstr_w(module->module.ModuleName),
703 ste->ht_elt.name, addr, (unsigned int)ste->symp->st_size,
705 wine_dbgstr_longlong(xaddr), wine_dbgstr_longlong(xsize));
709 /* see comment above */
710 module->sortlist_valid = FALSE;
714 /******************************************************************
715 * elf_new_public_symbols
717 * Creates a set of public symbols from an ELF symtab
719 static int elf_new_public_symbols(struct module* module, struct hash_table* symtab)
721 struct hash_table_iter hti;
722 struct symtab_elt* ste;
724 if (dbghelp_options & SYMOPT_NO_PUBLICS) return TRUE;
726 /* FIXME: we're missing the ELF entry point here */
728 hash_table_iter_init(symtab, &hti, NULL);
729 while ((ste = hash_table_iter_up(&hti)))
731 symt_new_public(module, ste->compiland, ste->ht_elt.name,
732 module->elf_info->elf_addr + ste->symp->st_value,
733 ste->symp->st_size, TRUE /* FIXME */,
734 ELF32_ST_TYPE(ste->symp->st_info) == STT_FUNC);
739 /* Copyright (C) 1986 Gary S. Brown. Modified by Robert Shearman. You may use
740 the following calc_crc32 code or tables extracted from it, as desired without
743 /**********************************************************************\
744 |* Demonstration program to compute the 32-bit CRC used as the frame *|
745 |* check sequence in ADCCP (ANSI X3.66, also known as FIPS PUB 71 *|
746 |* and FED-STD-1003, the U.S. versions of CCITT's X.25 link-level *|
747 |* protocol). The 32-bit FCS was added via the Federal Register, *|
748 |* 1 June 1982, p.23798. I presume but don't know for certain that *|
749 |* this polynomial is or will be included in CCITT V.41, which *|
750 |* defines the 16-bit CRC (often called CRC-CCITT) polynomial. FIPS *|
751 |* PUB 78 says that the 32-bit FCS reduces otherwise undetected *|
752 |* errors by a factor of 10^-5 over 16-bit FCS. *|
753 \**********************************************************************/
755 /* First, the polynomial itself and its table of feedback terms. The */
757 /* X^32+X^26+X^23+X^22+X^16+X^12+X^11+X^10+X^8+X^7+X^5+X^4+X^2+X^1+X^0 */
758 /* Note that we take it "backwards" and put the highest-order term in */
759 /* the lowest-order bit. The X^32 term is "implied"; the LSB is the */
760 /* X^31 term, etc. The X^0 term (usually shown as "+1") results in */
761 /* the MSB being 1. */
763 /* Note that the usual hardware shift register implementation, which */
764 /* is what we're using (we're merely optimizing it by doing eight-bit */
765 /* chunks at a time) shifts bits into the lowest-order term. In our */
766 /* implementation, that means shifting towards the right. Why do we */
767 /* do it this way? Because the calculated CRC must be transmitted in */
768 /* order from highest-order term to lowest-order term. UARTs transmit */
769 /* characters in order from LSB to MSB. By storing the CRC this way, */
770 /* we hand it to the UART in the order low-byte to high-byte; the UART */
771 /* sends each low-bit to hight-bit; and the result is transmission bit */
772 /* by bit from highest- to lowest-order term without requiring any bit */
773 /* shuffling on our part. Reception works similarly. */
775 /* The feedback terms table consists of 256, 32-bit entries. Notes: */
777 /* 1. The table can be generated at runtime if desired; code to do so */
778 /* is shown later. It might not be obvious, but the feedback */
779 /* terms simply represent the results of eight shift/xor opera- */
780 /* tions for all combinations of data and CRC register values. */
782 /* 2. The CRC accumulation logic is the same for all CRC polynomials, */
783 /* be they sixteen or thirty-two bits wide. You simply choose the */
784 /* appropriate table. Alternatively, because the table can be */
785 /* generated at runtime, you can start by generating the table for */
786 /* the polynomial in question and use exactly the same "updcrc", */
787 /* if your application needn't simultaneously handle two CRC */
788 /* polynomials. (Note, however, that XMODEM is strange.) */
790 /* 3. For 16-bit CRCs, the table entries need be only 16 bits wide; */
791 /* of course, 32-bit entries work OK if the high 16 bits are zero. */
793 /* 4. The values must be right-shifted by eight bits by the "updcrc" */
794 /* logic; the shift must be unsigned (bring in zeroes). On some */
795 /* hardware you could probably optimize the shift in assembler by */
796 /* using byte-swap instructions. */
799 static DWORD calc_crc32(struct elf_file_map* fmap)
801 #define UPDC32(octet,crc) (crc_32_tab[((crc) ^ (octet)) & 0xff] ^ ((crc) >> 8))
802 static const DWORD crc_32_tab[] =
803 { /* CRC polynomial 0xedb88320 */
804 0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, 0x706af48f,
805 0xe963a535, 0x9e6495a3, 0x0edb8832, 0x79dcb8a4, 0xe0d5e91e, 0x97d2d988,
806 0x09b64c2b, 0x7eb17cbd, 0xe7b82d07, 0x90bf1d91, 0x1db71064, 0x6ab020f2,
807 0xf3b97148, 0x84be41de, 0x1adad47d, 0x6ddde4eb, 0xf4d4b551, 0x83d385c7,
808 0x136c9856, 0x646ba8c0, 0xfd62f97a, 0x8a65c9ec, 0x14015c4f, 0x63066cd9,
809 0xfa0f3d63, 0x8d080df5, 0x3b6e20c8, 0x4c69105e, 0xd56041e4, 0xa2677172,
810 0x3c03e4d1, 0x4b04d447, 0xd20d85fd, 0xa50ab56b, 0x35b5a8fa, 0x42b2986c,
811 0xdbbbc9d6, 0xacbcf940, 0x32d86ce3, 0x45df5c75, 0xdcd60dcf, 0xabd13d59,
812 0x26d930ac, 0x51de003a, 0xc8d75180, 0xbfd06116, 0x21b4f4b5, 0x56b3c423,
813 0xcfba9599, 0xb8bda50f, 0x2802b89e, 0x5f058808, 0xc60cd9b2, 0xb10be924,
814 0x2f6f7c87, 0x58684c11, 0xc1611dab, 0xb6662d3d, 0x76dc4190, 0x01db7106,
815 0x98d220bc, 0xefd5102a, 0x71b18589, 0x06b6b51f, 0x9fbfe4a5, 0xe8b8d433,
816 0x7807c9a2, 0x0f00f934, 0x9609a88e, 0xe10e9818, 0x7f6a0dbb, 0x086d3d2d,
817 0x91646c97, 0xe6635c01, 0x6b6b51f4, 0x1c6c6162, 0x856530d8, 0xf262004e,
818 0x6c0695ed, 0x1b01a57b, 0x8208f4c1, 0xf50fc457, 0x65b0d9c6, 0x12b7e950,
819 0x8bbeb8ea, 0xfcb9887c, 0x62dd1ddf, 0x15da2d49, 0x8cd37cf3, 0xfbd44c65,
820 0x4db26158, 0x3ab551ce, 0xa3bc0074, 0xd4bb30e2, 0x4adfa541, 0x3dd895d7,
821 0xa4d1c46d, 0xd3d6f4fb, 0x4369e96a, 0x346ed9fc, 0xad678846, 0xda60b8d0,
822 0x44042d73, 0x33031de5, 0xaa0a4c5f, 0xdd0d7cc9, 0x5005713c, 0x270241aa,
823 0xbe0b1010, 0xc90c2086, 0x5768b525, 0x206f85b3, 0xb966d409, 0xce61e49f,
824 0x5edef90e, 0x29d9c998, 0xb0d09822, 0xc7d7a8b4, 0x59b33d17, 0x2eb40d81,
825 0xb7bd5c3b, 0xc0ba6cad, 0xedb88320, 0x9abfb3b6, 0x03b6e20c, 0x74b1d29a,
826 0xead54739, 0x9dd277af, 0x04db2615, 0x73dc1683, 0xe3630b12, 0x94643b84,
827 0x0d6d6a3e, 0x7a6a5aa8, 0xe40ecf0b, 0x9309ff9d, 0x0a00ae27, 0x7d079eb1,
828 0xf00f9344, 0x8708a3d2, 0x1e01f268, 0x6906c2fe, 0xf762575d, 0x806567cb,
829 0x196c3671, 0x6e6b06e7, 0xfed41b76, 0x89d32be0, 0x10da7a5a, 0x67dd4acc,
830 0xf9b9df6f, 0x8ebeeff9, 0x17b7be43, 0x60b08ed5, 0xd6d6a3e8, 0xa1d1937e,
831 0x38d8c2c4, 0x4fdff252, 0xd1bb67f1, 0xa6bc5767, 0x3fb506dd, 0x48b2364b,
832 0xd80d2bda, 0xaf0a1b4c, 0x36034af6, 0x41047a60, 0xdf60efc3, 0xa867df55,
833 0x316e8eef, 0x4669be79, 0xcb61b38c, 0xbc66831a, 0x256fd2a0, 0x5268e236,
834 0xcc0c7795, 0xbb0b4703, 0x220216b9, 0x5505262f, 0xc5ba3bbe, 0xb2bd0b28,
835 0x2bb45a92, 0x5cb36a04, 0xc2d7ffa7, 0xb5d0cf31, 0x2cd99e8b, 0x5bdeae1d,
836 0x9b64c2b0, 0xec63f226, 0x756aa39c, 0x026d930a, 0x9c0906a9, 0xeb0e363f,
837 0x72076785, 0x05005713, 0x95bf4a82, 0xe2b87a14, 0x7bb12bae, 0x0cb61b38,
838 0x92d28e9b, 0xe5d5be0d, 0x7cdcefb7, 0x0bdbdf21, 0x86d3d2d4, 0xf1d4e242,
839 0x68ddb3f8, 0x1fda836e, 0x81be16cd, 0xf6b9265b, 0x6fb077e1, 0x18b74777,
840 0x88085ae6, 0xff0f6a70, 0x66063bca, 0x11010b5c, 0x8f659eff, 0xf862ae69,
841 0x616bffd3, 0x166ccf45, 0xa00ae278, 0xd70dd2ee, 0x4e048354, 0x3903b3c2,
842 0xa7672661, 0xd06016f7, 0x4969474d, 0x3e6e77db, 0xaed16a4a, 0xd9d65adc,
843 0x40df0b66, 0x37d83bf0, 0xa9bcae53, 0xdebb9ec5, 0x47b2cf7f, 0x30b5ffe9,
844 0xbdbdf21c, 0xcabac28a, 0x53b39330, 0x24b4a3a6, 0xbad03605, 0xcdd70693,
845 0x54de5729, 0x23d967bf, 0xb3667a2e, 0xc4614ab8, 0x5d681b02, 0x2a6f2b94,
846 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, 0x2d02ef8d
849 unsigned char buffer[256];
852 lseek(fmap->fd, 0, SEEK_SET);
853 while ((r = read(fmap->fd, buffer, sizeof(buffer))) > 0)
855 for (i = 0; i < r; i++) crc = UPDC32(buffer[i], crc);
861 static BOOL elf_check_debug_link(const WCHAR* file, struct elf_file_map* fmap, DWORD crc)
864 if (!elf_map_file(file, fmap)) return FALSE;
865 if (!(ret = crc == calc_crc32(fmap)))
867 WARN("Bad CRC for file %s (got %08x while expecting %08x)\n",
868 debugstr_w(file), calc_crc32(fmap), crc);
869 elf_unmap_file(fmap);
874 /******************************************************************
875 * elf_locate_debug_link
877 * Locate a filename from a .gnu_debuglink section, using the same
879 * "If the full name of the directory containing the executable is
880 * execdir, and the executable has a debug link that specifies the
881 * name debugfile, then GDB will automatically search for the
882 * debugging information file in three places:
883 * - the directory containing the executable file (that is, it
884 * will look for a file named `execdir/debugfile',
885 * - a subdirectory of that directory named `.debug' (that is, the
886 * file `execdir/.debug/debugfile', and
887 * - a subdirectory of the global debug file directory that includes
888 * the executable's full path, and the name from the link (that is,
889 * the file `globaldebugdir/execdir/debugfile', where globaldebugdir
890 * is the global debug file directory, and execdir has been turned
891 * into a relative path)." (from GDB manual)
893 static BOOL elf_locate_debug_link(struct elf_file_map* fmap, const char* filename,
894 const WCHAR* loaded_file, DWORD crc)
896 static const WCHAR globalDebugDirW[] = {'/','u','s','r','/','l','i','b','/','d','e','b','u','g','/'};
897 static const WCHAR dotDebugW[] = {'.','d','e','b','u','g','/'};
898 const size_t globalDebugDirLen = sizeof(globalDebugDirW) / sizeof(WCHAR);
902 struct elf_file_map* fmap_link = NULL;
904 fmap_link = HeapAlloc(GetProcessHeap(), 0, sizeof(*fmap_link));
905 if (!fmap_link) return FALSE;
907 filename_len = MultiByteToWideChar(CP_UNIXCP, 0, filename, -1, NULL, 0);
908 p = HeapAlloc(GetProcessHeap(), 0,
909 (globalDebugDirLen + strlenW(loaded_file) + 6 + 1 + filename_len + 1) * sizeof(WCHAR));
912 /* we prebuild the string with "execdir" */
913 strcpyW(p, loaded_file);
914 slash = strrchrW(p, '/');
915 if (slash == NULL) slash = p; else slash++;
917 /* testing execdir/filename */
918 MultiByteToWideChar(CP_UNIXCP, 0, filename, -1, slash, filename_len);
919 if (elf_check_debug_link(p, fmap_link, crc)) goto found;
921 /* testing execdir/.debug/filename */
922 memcpy(slash, dotDebugW, sizeof(dotDebugW));
923 MultiByteToWideChar(CP_UNIXCP, 0, filename, -1, slash + sizeof(dotDebugW) / sizeof(WCHAR), filename_len);
924 if (elf_check_debug_link(p, fmap_link, crc)) goto found;
926 /* testing globaldebugdir/execdir/filename */
927 memmove(p + globalDebugDirLen, p, (slash - p) * sizeof(WCHAR));
928 memcpy(p, globalDebugDirW, globalDebugDirLen * sizeof(WCHAR));
929 slash += globalDebugDirLen;
930 MultiByteToWideChar(CP_UNIXCP, 0, filename, -1, slash, filename_len);
931 if (elf_check_debug_link(p, fmap_link, crc)) goto found;
933 /* finally testing filename */
934 if (elf_check_debug_link(slash, fmap_link, crc)) goto found;
937 WARN("Couldn't locate or map %s\n", filename);
938 HeapFree(GetProcessHeap(), 0, p);
939 HeapFree(GetProcessHeap(), 0, fmap_link);
943 TRACE("Located debug information file %s at %s\n", filename, debugstr_w(p));
944 HeapFree(GetProcessHeap(), 0, p);
945 fmap->alternate = fmap_link;
949 /******************************************************************
950 * elf_debuglink_parse
952 * Parses a .gnu_debuglink section and loads the debug info from
953 * the external file specified there.
955 static BOOL elf_debuglink_parse(struct elf_file_map* fmap, struct module* module,
956 const BYTE* debuglink)
958 /* The content of a debug link section is:
959 * 1/ a NULL terminated string, containing the file name for the
961 * 2/ padding on 4 byte boundary
962 * 3/ CRC of the linked ELF file
964 const char* dbg_link = (const char*)debuglink;
967 crc = *(const DWORD*)(dbg_link + ((DWORD_PTR)(strlen(dbg_link) + 4) & ~3));
968 return elf_locate_debug_link(fmap, dbg_link, module->module.LoadedImageName, crc);
971 /******************************************************************
972 * elf_load_debug_info_from_map
974 * Loads the symbolic information from ELF module which mapping is described
976 * the module has been loaded at 'load_offset' address, so symbols' address
977 * relocation is performed.
978 * CRC is checked if fmap->with_crc is TRUE
980 * 0 if the file doesn't contain symbolic info (or this info cannot be
984 static BOOL elf_load_debug_info_from_map(struct module* module,
985 struct elf_file_map* fmap,
987 struct hash_table* ht_symtab)
989 BOOL ret = FALSE, lret;
990 struct elf_thunk_area thunks[] =
992 {"__wine_spec_import_thunks", THUNK_ORDINAL_NOTYPE, 0, 0}, /* inter DLL calls */
993 {"__wine_spec_delayed_import_loaders", THUNK_ORDINAL_LOAD, 0, 0}, /* delayed inter DLL calls */
994 {"__wine_spec_delayed_import_thunks", THUNK_ORDINAL_LOAD, 0, 0}, /* delayed inter DLL calls */
995 {"__wine_delay_load", THUNK_ORDINAL_LOAD, 0, 0}, /* delayed inter DLL calls */
996 {"__wine_spec_thunk_text_16", -16, 0, 0}, /* 16 => 32 thunks */
997 {"__wine_spec_thunk_text_32", -32, 0, 0}, /* 32 => 16 thunks */
1001 module->module.SymType = SymExport;
1003 /* create a hash table for the symtab */
1004 elf_hash_symtab(module, pool, ht_symtab, fmap, thunks);
1006 if (!(dbghelp_options & SYMOPT_PUBLICS_ONLY))
1008 struct elf_section_map stab_sect, stabstr_sect;
1009 struct elf_section_map debug_sect, debug_str_sect, debug_abbrev_sect,
1010 debug_line_sect, debug_loclist_sect;
1011 struct elf_section_map debuglink_sect;
1013 /* if present, add the .gnu_debuglink file as an alternate to current one */
1014 if (elf_find_section(fmap, ".gnu_debuglink", SHT_NULL, &debuglink_sect))
1016 const BYTE* dbg_link;
1018 dbg_link = (const BYTE*)elf_map_section(&debuglink_sect);
1019 if (dbg_link != ELF_NO_MAP)
1021 lret = elf_debuglink_parse(fmap, module, dbg_link);
1023 WARN("Couldn't load linked debug file for %s\n",
1024 debugstr_w(module->module.ModuleName));
1027 elf_unmap_section(&debuglink_sect);
1029 if (elf_find_section(fmap, ".stab", SHT_NULL, &stab_sect) &&
1030 elf_find_section(fmap, ".stabstr", SHT_NULL, &stabstr_sect))
1033 const char* stabstr;
1035 stab = elf_map_section(&stab_sect);
1036 stabstr = elf_map_section(&stabstr_sect);
1037 if (stab != ELF_NO_MAP && stabstr != ELF_NO_MAP)
1039 /* OK, now just parse all of the stabs. */
1040 lret = stabs_parse(module, module->elf_info->elf_addr,
1041 stab, elf_get_map_size(&stab_sect),
1042 stabstr, elf_get_map_size(&stabstr_sect));
1044 /* and fill in the missing information for stabs */
1045 elf_finish_stabs_info(module, ht_symtab);
1047 WARN("Couldn't correctly read stabs\n");
1051 elf_unmap_section(&stab_sect);
1052 elf_unmap_section(&stabstr_sect);
1054 if (elf_find_section(fmap, ".debug_info", SHT_NULL, &debug_sect))
1056 /* Dwarf 2 debug information */
1057 const BYTE* dw2_debug;
1058 const BYTE* dw2_debug_abbrev;
1059 const BYTE* dw2_debug_str;
1060 const BYTE* dw2_debug_line;
1061 const BYTE* dw2_debug_loclist;
1063 /* debug info might have a different base address than .so file
1064 * when elf file is prelinked after splitting off debug info
1065 * adjust symbol base addresses accordingly
1067 unsigned long load_offset = module->elf_info->elf_addr +
1068 fmap->elf_start - debug_sect.fmap->elf_start;
1070 TRACE("Loading Dwarf2 information for %s\n", debugstr_w(module->module.ModuleName));
1072 elf_find_section(fmap, ".debug_str", SHT_NULL, &debug_str_sect);
1073 elf_find_section(fmap, ".debug_abbrev", SHT_NULL, &debug_abbrev_sect);
1074 elf_find_section(fmap, ".debug_line", SHT_NULL, &debug_line_sect);
1075 elf_find_section(fmap, ".debug_loc", SHT_NULL, &debug_loclist_sect);
1077 dw2_debug = (const BYTE*)elf_map_section(&debug_sect);
1078 dw2_debug_abbrev = (const BYTE*)elf_map_section(&debug_abbrev_sect);
1079 dw2_debug_str = (const BYTE*)elf_map_section(&debug_str_sect);
1080 dw2_debug_line = (const BYTE*)elf_map_section(&debug_line_sect);
1081 dw2_debug_loclist = (const BYTE*)elf_map_section(&debug_loclist_sect);
1082 if (dw2_debug != ELF_NO_MAP && dw2_debug_abbrev != ELF_NO_MAP && dw2_debug_str != ELF_NO_MAP)
1084 /* OK, now just parse dwarf2 debug infos. */
1085 lret = dwarf2_parse(module, load_offset, thunks,
1086 dw2_debug, elf_get_map_size(&debug_sect),
1087 dw2_debug_abbrev, elf_get_map_size(&debug_abbrev_sect),
1088 dw2_debug_str, elf_get_map_size(&debug_str_sect),
1089 dw2_debug_line, elf_get_map_size(&debug_line_sect),
1090 dw2_debug_loclist, elf_get_map_size(&debug_loclist_sect));
1093 WARN("Couldn't correctly read dwarf2\n");
1096 elf_unmap_section(&debug_sect);
1097 elf_unmap_section(&debug_abbrev_sect);
1098 elf_unmap_section(&debug_str_sect);
1099 elf_unmap_section(&debug_line_sect);
1100 elf_unmap_section(&debug_loclist_sect);
1103 if (strstrW(module->module.ModuleName, S_ElfW) ||
1104 !strcmpW(module->module.ModuleName, S_WineLoaderW))
1106 /* add the thunks for native libraries */
1107 if (!(dbghelp_options & SYMOPT_PUBLICS_ONLY))
1108 elf_new_wine_thunks(module, ht_symtab, thunks);
1110 /* add all the public symbols from symtab */
1111 if (elf_new_public_symbols(module, ht_symtab) && !ret) ret = TRUE;
1116 /******************************************************************
1117 * elf_load_debug_info
1119 * Loads ELF debugging information from the module image file.
1121 BOOL elf_load_debug_info(struct module* module, struct elf_file_map* fmap)
1125 struct hash_table ht_symtab;
1126 struct elf_file_map my_fmap;
1128 if (module->type != DMT_ELF || !module->elf_info)
1130 ERR("Bad elf module '%s'\n", debugstr_w(module->module.LoadedImageName));
1134 pool_init(&pool, 65536);
1135 hash_table_init(&pool, &ht_symtab, 256);
1140 ret = elf_map_file(module->module.LoadedImageName, fmap);
1143 ret = elf_load_debug_info_from_map(module, fmap, &pool, &ht_symtab);
1145 pool_destroy(&pool);
1146 if (fmap == &my_fmap) elf_unmap_file(fmap);
1150 /******************************************************************
1151 * elf_fetch_file_info
1153 * Gathers some more information for an ELF module from a given file
1155 BOOL elf_fetch_file_info(const WCHAR* name, DWORD* base,
1156 DWORD* size, DWORD* checksum)
1158 struct elf_file_map fmap;
1160 if (!elf_map_file(name, &fmap)) return FALSE;
1161 if (base) *base = fmap.elf_start;
1162 *size = fmap.elf_size;
1163 *checksum = calc_crc32(&fmap);
1164 elf_unmap_file(&fmap);
1168 /******************************************************************
1171 * Loads the information for ELF module stored in 'filename'
1172 * the module has been loaded at 'load_offset' address
1174 * -1 if the file cannot be found/opened
1175 * 0 if the file doesn't contain symbolic info (or this info cannot be
1179 static BOOL elf_load_file(struct process* pcs, const WCHAR* filename,
1180 unsigned long load_offset, struct elf_info* elf_info)
1183 struct elf_file_map fmap;
1185 TRACE("Processing elf file '%s' at %08lx\n", debugstr_w(filename), load_offset);
1187 if (!elf_map_file(filename, &fmap)) goto leave;
1189 /* Next, we need to find a few of the internal ELF headers within
1190 * this thing. We need the main executable header, and the section
1193 if (!fmap.elf_start && !load_offset)
1194 ERR("Relocatable ELF %s, but no load address. Loading at 0x0000000\n",
1195 debugstr_w(filename));
1196 if (fmap.elf_start && load_offset)
1198 WARN("Non-relocatable ELF %s, but load address of 0x%08lx supplied. "
1199 "Assuming load address is corrupt\n", debugstr_w(filename), load_offset);
1203 if (elf_info->flags & ELF_INFO_DEBUG_HEADER)
1205 struct elf_section_map esm;
1207 if (elf_find_section(&fmap, ".dynamic", SHT_DYNAMIC, &esm))
1210 char* ptr = (char*)fmap.sect[esm.sidx].shdr.sh_addr;
1215 if (!ReadProcessMemory(pcs->handle, ptr, &dyn, sizeof(dyn), &len) ||
1218 if (dyn.d_tag == DT_DEBUG)
1220 elf_info->dbg_hdr_addr = dyn.d_un.d_ptr;
1224 } while (dyn.d_tag != DT_NULL);
1225 if (dyn.d_tag == DT_NULL) goto leave;
1227 elf_end_find(&fmap);
1230 if (elf_info->flags & ELF_INFO_MODULE)
1232 struct elf_module_info *elf_module_info =
1233 HeapAlloc(GetProcessHeap(), 0, sizeof(struct elf_module_info));
1234 if (!elf_module_info) goto leave;
1235 elf_info->module = module_new(pcs, filename, DMT_ELF, FALSE,
1236 (load_offset) ? load_offset : fmap.elf_start,
1237 fmap.elf_size, 0, calc_crc32(&fmap));
1238 if (!elf_info->module)
1240 HeapFree(GetProcessHeap(), 0, elf_module_info);
1243 elf_info->module->elf_info = elf_module_info;
1244 elf_info->module->elf_info->elf_addr = load_offset;
1246 if (dbghelp_options & SYMOPT_DEFERRED_LOADS)
1248 elf_info->module->module.SymType = SymDeferred;
1251 else ret = elf_load_debug_info(elf_info->module, &fmap);
1253 elf_info->module->elf_info->elf_mark = 1;
1254 elf_info->module->elf_info->elf_loader = 0;
1257 if (elf_info->flags & ELF_INFO_NAME)
1260 ptr = HeapAlloc(GetProcessHeap(), 0, (lstrlenW(filename) + 1) * sizeof(WCHAR));
1263 strcpyW(ptr, filename);
1264 elf_info->module_name = ptr;
1269 elf_unmap_file(&fmap);
1274 /******************************************************************
1275 * elf_load_file_from_path
1276 * tries to load an ELF file from a set of paths (separated by ':')
1278 static BOOL elf_load_file_from_path(HANDLE hProcess,
1279 const WCHAR* filename,
1280 unsigned long load_offset,
1282 struct elf_info* elf_info)
1286 WCHAR* pathW = NULL;
1289 if (!path) return FALSE;
1291 len = MultiByteToWideChar(CP_UNIXCP, 0, path, -1, NULL, 0);
1292 pathW = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR));
1293 if (!pathW) return FALSE;
1294 MultiByteToWideChar(CP_UNIXCP, 0, path, -1, pathW, len);
1296 for (s = pathW; s && *s; s = (t) ? (t+1) : NULL)
1298 t = strchrW(s, ':');
1300 fn = HeapAlloc(GetProcessHeap(), 0, (lstrlenW(filename) + 1 + lstrlenW(s) + 1) * sizeof(WCHAR));
1303 strcatW(fn, S_SlashW);
1304 strcatW(fn, filename);
1305 ret = elf_load_file(hProcess, fn, load_offset, elf_info);
1306 HeapFree(GetProcessHeap(), 0, fn);
1308 s = (t) ? (t+1) : NULL;
1311 HeapFree(GetProcessHeap(), 0, pathW);
1315 /******************************************************************
1316 * elf_load_file_from_dll_path
1318 * Tries to load an ELF file from the dll path
1320 static BOOL elf_load_file_from_dll_path(HANDLE hProcess,
1321 const WCHAR* filename,
1322 unsigned long load_offset,
1323 struct elf_info* elf_info)
1326 unsigned int index = 0;
1329 while (!ret && (path = wine_dll_enum_load_path( index++ )))
1334 len = MultiByteToWideChar(CP_UNIXCP, 0, path, -1, NULL, 0);
1336 name = HeapAlloc( GetProcessHeap(), 0,
1337 (len + lstrlenW(filename) + 2) * sizeof(WCHAR) );
1340 MultiByteToWideChar(CP_UNIXCP, 0, path, -1, name, len);
1341 strcatW( name, S_SlashW );
1342 strcatW( name, filename );
1343 ret = elf_load_file(hProcess, name, load_offset, elf_info);
1344 HeapFree( GetProcessHeap(), 0, name );
1349 /******************************************************************
1350 * elf_search_and_load_file
1352 * lookup a file in standard ELF locations, and if found, load it
1354 static BOOL elf_search_and_load_file(struct process* pcs, const WCHAR* filename,
1355 unsigned long load_offset,
1356 struct elf_info* elf_info)
1359 struct module* module;
1360 static WCHAR S_libstdcPPW[] = {'l','i','b','s','t','d','c','+','+','\0'};
1362 if (filename == NULL || *filename == '\0') return FALSE;
1363 if ((module = module_is_already_loaded(pcs, filename)))
1365 elf_info->module = module;
1366 module->elf_info->elf_mark = 1;
1367 return module->module.SymType;
1370 if (strstrW(filename, S_libstdcPPW)) return FALSE; /* We know we can't do it */
1371 ret = elf_load_file(pcs, filename, load_offset, elf_info);
1372 /* if relative pathname, try some absolute base dirs */
1373 if (!ret && !strchrW(filename, '/'))
1375 ret = elf_load_file_from_path(pcs, filename, load_offset,
1376 getenv("PATH"), elf_info) ||
1377 elf_load_file_from_path(pcs, filename, load_offset,
1378 getenv("LD_LIBRARY_PATH"), elf_info);
1379 if (!ret) ret = elf_load_file_from_dll_path(pcs, filename, load_offset, elf_info);
1385 /******************************************************************
1386 * elf_enum_modules_internal
1388 * Enumerate ELF modules from a running process
1390 static BOOL elf_enum_modules_internal(const struct process* pcs,
1391 const WCHAR* main_name,
1392 elf_enum_modules_cb cb, void* user)
1394 struct r_debug dbg_hdr;
1398 WCHAR bufstrW[MAX_PATH];
1400 if (!pcs->dbg_hdr_addr ||
1401 !ReadProcessMemory(pcs->handle, (void*)pcs->dbg_hdr_addr,
1402 &dbg_hdr, sizeof(dbg_hdr), NULL))
1405 /* Now walk the linked list. In all known ELF implementations,
1406 * the dynamic loader maintains this linked list for us. In some
1407 * cases the first entry doesn't appear with a name, in other cases it
1410 for (lm_addr = (void*)dbg_hdr.r_map; lm_addr; lm_addr = (void*)lm.l_next)
1412 if (!ReadProcessMemory(pcs->handle, lm_addr, &lm, sizeof(lm), NULL))
1415 if (lm.l_prev != NULL && /* skip first entry, normally debuggee itself */
1416 lm.l_name != NULL &&
1417 ReadProcessMemory(pcs->handle, lm.l_name, bufstr, sizeof(bufstr), NULL))
1419 bufstr[sizeof(bufstr) - 1] = '\0';
1420 MultiByteToWideChar(CP_UNIXCP, 0, bufstr, -1, bufstrW, sizeof(bufstrW) / sizeof(WCHAR));
1421 if (main_name && !bufstrW[0]) strcpyW(bufstrW, main_name);
1422 if (!cb(bufstrW, (unsigned long)lm.l_addr, user)) break;
1430 struct process* pcs;
1431 struct elf_info elf_info;
1434 static BOOL elf_enum_sync_cb(const WCHAR* name, unsigned long addr, void* user)
1436 struct elf_sync* es = user;
1438 elf_search_and_load_file(es->pcs, name, addr, &es->elf_info);
1442 /******************************************************************
1443 * elf_synchronize_module_list
1445 * this functions rescans the debuggee module's list and synchronizes it with
1446 * the one from 'pcs', ie:
1447 * - if a module is in debuggee and not in pcs, it's loaded into pcs
1448 * - if a module is in pcs and not in debuggee, it's unloaded from pcs
1450 BOOL elf_synchronize_module_list(struct process* pcs)
1452 struct module* module;
1455 for (module = pcs->lmodules; module; module = module->next)
1457 if (module->type == DMT_ELF && !module->is_virtual)
1458 module->elf_info->elf_mark = 0;
1462 es.elf_info.flags = ELF_INFO_MODULE;
1463 if (!elf_enum_modules_internal(pcs, NULL, elf_enum_sync_cb, &es))
1466 module = pcs->lmodules;
1469 if (module->type == DMT_ELF && !module->is_virtual &&
1470 !module->elf_info->elf_mark && !module->elf_info->elf_loader)
1472 module_remove(pcs, module);
1473 /* restart all over */
1474 module = pcs->lmodules;
1476 else module = module->next;
1481 /******************************************************************
1484 * Lookup in a running ELF process the loader, and sets its ELF link
1485 * address (for accessing the list of loaded .so libs) in pcs.
1486 * If flags is ELF_INFO_MODULE, the module for the loader is also
1487 * added as a module into pcs.
1489 static BOOL elf_search_loader(struct process* pcs, struct elf_info* elf_info)
1494 /* All binaries are loaded with WINELOADER (if run from tree) or by the
1495 * main executable (either wine-kthread or wine-pthread)
1496 * FIXME: the heuristic used to know whether we need to load wine-pthread
1497 * or wine-kthread is not 100% safe
1499 if ((ptr = getenv("WINELOADER")))
1501 WCHAR tmp[MAX_PATH];
1502 MultiByteToWideChar(CP_ACP, 0, ptr, -1, tmp, sizeof(tmp) / sizeof(WCHAR));
1503 ret = elf_search_and_load_file(pcs, tmp, 0, elf_info);
1507 ret = elf_search_and_load_file(pcs, S_WineKThreadW, 0, elf_info) ||
1508 elf_search_and_load_file(pcs, S_WinePThreadW, 0, elf_info);
1513 /******************************************************************
1514 * elf_read_wine_loader_dbg_info
1516 * Try to find a decent wine executable which could have loaded the debuggee
1518 BOOL elf_read_wine_loader_dbg_info(struct process* pcs)
1520 struct elf_info elf_info;
1522 elf_info.flags = ELF_INFO_DEBUG_HEADER | ELF_INFO_MODULE;
1523 if (!elf_search_loader(pcs, &elf_info)) return FALSE;
1524 elf_info.module->elf_info->elf_loader = 1;
1525 module_set_module(elf_info.module, S_WineLoaderW);
1526 return (pcs->dbg_hdr_addr = elf_info.dbg_hdr_addr) != 0;
1529 /******************************************************************
1532 * Enumerates the ELF loaded modules from a running target (hProc)
1533 * This function doesn't require that someone has called SymInitialize
1534 * on this very process.
1536 BOOL elf_enum_modules(HANDLE hProc, elf_enum_modules_cb cb, void* user)
1539 struct elf_info elf_info;
1542 memset(&pcs, 0, sizeof(pcs));
1544 elf_info.flags = ELF_INFO_DEBUG_HEADER | ELF_INFO_NAME;
1545 if (!elf_search_loader(&pcs, &elf_info)) return FALSE;
1546 pcs.dbg_hdr_addr = elf_info.dbg_hdr_addr;
1547 ret = elf_enum_modules_internal(&pcs, elf_info.module_name, cb, user);
1548 HeapFree(GetProcessHeap(), 0, (char*)elf_info.module_name);
1554 struct process* pcs;
1555 struct elf_info elf_info;
1560 /******************************************************************
1563 * Callback for elf_load_module, used to walk the list of loaded
1566 static BOOL elf_load_cb(const WCHAR* name, unsigned long addr, void* user)
1568 struct elf_load* el = user;
1571 /* memcmp is needed for matches when bufstr contains also version information
1572 * el->name: libc.so, name: libc.so.6.0
1574 p = strrchrW(name, '/');
1576 if (!memcmp(p, el->name, lstrlenW(el->name) * sizeof(WCHAR)))
1578 el->ret = elf_search_and_load_file(el->pcs, name, addr, &el->elf_info);
1584 /******************************************************************
1587 * loads an ELF module and stores it in process' module list
1588 * Also, find module real name and load address from
1589 * the real loaded modules list in pcs address space
1591 struct module* elf_load_module(struct process* pcs, const WCHAR* name, unsigned long addr)
1595 TRACE("(%p %s %08lx)\n", pcs, debugstr_w(name), addr);
1597 el.elf_info.flags = ELF_INFO_MODULE;
1600 if (pcs->dbg_hdr_addr) /* we're debugging a life target */
1603 /* do only the lookup from the filename, not the path (as we lookup module
1604 * name in the process' loaded module list)
1606 el.name = strrchrW(name, '/');
1607 if (!el.name++) el.name = name;
1610 if (!elf_enum_modules_internal(pcs, NULL, elf_load_cb, &el))
1616 el.ret = elf_search_and_load_file(pcs, el.name, addr, &el.elf_info);
1618 if (!el.ret) return NULL;
1619 assert(el.elf_info.module);
1620 return el.elf_info.module;
1623 #else /* !__ELF__ */
1625 BOOL elf_synchronize_module_list(struct process* pcs)
1630 BOOL elf_fetch_file_info(const WCHAR* name, DWORD* base,
1631 DWORD* size, DWORD* checksum)
1636 BOOL elf_read_wine_loader_dbg_info(struct process* pcs)
1641 BOOL elf_enum_modules(HANDLE hProc, elf_enum_modules_cb cb, void* user)
1646 struct module* elf_load_module(struct process* pcs, const WCHAR* name, unsigned long addr)
1651 BOOL elf_load_debug_info(struct module* module, struct elf_file_map* fmap)
1656 int elf_is_in_thunk_area(unsigned long addr,
1657 const struct elf_thunk_area* thunks)
1661 #endif /* __ELF__ */