2 * File elf.c - processing of ELF files
4 * Copyright (C) 1996, Eric Youngdale.
5 * 1999-2004 Eric Pouech
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation; either
10 * version 2.1 of the License, or (at your option) any later version.
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23 #include "wine/port.h"
28 #ifdef HAVE_SYS_STAT_H
29 # include <sys/stat.h>
32 #ifdef HAVE_SYS_MMAN_H
39 #define PATH_MAX MAX_PATH
42 #include "dbghelp_private.h"
44 #if defined(__svr4__) || defined(__sun)
51 #ifdef HAVE_SYS_ELF32_H
52 # include <sys/elf32.h>
54 #ifdef HAVE_SYS_EXEC_ELF_H
55 # include <sys/exec_elf.h>
58 # if defined(DT_COUNT)
59 # define DT_NUM DT_COUNT
61 /* this seems to be a satisfactory value on Solaris, which doesn't support this AFAICT */
68 #ifdef HAVE_SYS_LINK_H
69 # include <sys/link.h>
72 #include "wine/debug.h"
74 WINE_DEFAULT_DEBUG_CHANNEL(dbghelp);
76 struct elf_module_info
78 unsigned long elf_addr;
79 unsigned short elf_mark : 1,
85 #define ELF_INFO_DEBUG_HEADER 0x0001
86 #define ELF_INFO_MODULE 0x0002
87 #define ELF_INFO_NAME 0x0004
91 unsigned flags; /* IN one (or several) of the ELF_INFO constants */
92 unsigned long dbg_hdr_addr; /* OUT address of debug header (if ELF_INFO_DEBUG_HEADER is set) */
93 struct module* module; /* OUT loaded module (if ELF_INFO_MODULE is set) */
94 const char* module_name; /* OUT found module name (if ELF_INFO_NAME is set) */
97 #define NO_MAP ((const void*)0xffffffff)
98 /* structure holding information while handling an ELF image
99 * allows one by one section mapping for memory savings
118 struct hash_table_elt ht_elt;
119 const Elf32_Sym* symp;
120 const char* filename;
127 THUNK_ORDINAL ordinal;
128 unsigned long rva_start;
129 unsigned long rva_end;
132 /******************************************************************
135 * Maps a single section into memory from an ELF file
137 static const char* elf_map_section(struct elf_file_map* fmap, int sidx)
139 unsigned pgsz = getpagesize();
142 if (sidx >= fmap->elfhdr.e_shnum ||
143 fmap->sect[sidx].shdr.sh_type == SHT_NOBITS)
145 /* align required information on page size (we assume pagesize is a power of 2) */
146 ofst = fmap->sect[sidx].shdr.sh_offset & ~(pgsz - 1);
147 size = (fmap->sect[sidx].shdr.sh_offset +
148 fmap->sect[sidx].shdr.sh_size + pgsz - 1) & ~(pgsz - 1);
149 fmap->sect[sidx].mapped = mmap(NULL, size, PROT_READ, MAP_PRIVATE, fmap->fd, ofst);
150 if (fmap->sect[sidx].mapped == NO_MAP) return NO_MAP;
151 return fmap->sect[sidx].mapped + (fmap->sect[sidx].shdr.sh_offset & (pgsz - 1));
154 /******************************************************************
157 * Unmaps a single section from memory
159 static void elf_unmap_section(struct elf_file_map* fmap, int sidx)
161 if (sidx < fmap->elfhdr.e_shnum && fmap->sect[sidx].mapped != NO_MAP)
163 munmap((char*)fmap->sect[sidx].mapped, fmap->sect[sidx].shdr.sh_size);
164 fmap->sect[sidx].mapped = NO_MAP;
168 /******************************************************************
171 * Maps an ELF file into memory (and checks it's a real ELF file)
173 static BOOL elf_map_file(const char* filename, struct elf_file_map* fmap)
175 static const BYTE elf_signature[4] = { ELFMAG0, ELFMAG1, ELFMAG2, ELFMAG3 };
179 unsigned tmp, page_mask = getpagesize() - 1;
185 /* check that the file exists, and that the module hasn't been loaded yet */
186 if (stat(filename, &statbuf) == -1 || S_ISDIR(statbuf.st_mode)) return FALSE;
188 /* Now open the file, so that we can mmap() it. */
189 if ((fmap->fd = open(filename, O_RDONLY)) == -1) return FALSE;
191 if (read(fmap->fd, &fmap->elfhdr, sizeof(fmap->elfhdr)) != sizeof(fmap->elfhdr))
193 /* and check for an ELF header */
194 if (memcmp(fmap->elfhdr.e_ident,
195 elf_signature, sizeof(elf_signature))) return FALSE;
197 fmap->sect = HeapAlloc(GetProcessHeap(), 0,
198 fmap->elfhdr.e_shnum * sizeof(fmap->sect[0]));
199 if (!fmap->sect) return FALSE;
201 lseek(fmap->fd, fmap->elfhdr.e_shoff, SEEK_SET);
202 for (i = 0; i < fmap->elfhdr.e_shnum; i++)
204 read(fmap->fd, &fmap->sect[i].shdr, sizeof(fmap->sect[i].shdr));
205 fmap->sect[i].mapped = NO_MAP;
208 /* grab size of module once loaded in memory */
209 lseek(fmap->fd, fmap->elfhdr.e_phoff, SEEK_SET);
211 fmap->elf_start = ~0L;
212 for (i = 0; i < fmap->elfhdr.e_phnum; i++)
214 if (read(fmap->fd, &phdr, sizeof(phdr)) == sizeof(phdr) &&
215 phdr.p_type == PT_LOAD)
217 tmp = (phdr.p_vaddr + phdr.p_memsz + page_mask) & ~page_mask;
218 if (fmap->elf_size < tmp) fmap->elf_size = tmp;
219 if (phdr.p_vaddr < fmap->elf_start) fmap->elf_start = phdr.p_vaddr;
222 /* if non relocatable ELF, then remove fixed address from computation
223 * otherwise, all addresses are zero based and start has no effect
225 fmap->elf_size -= fmap->elf_start;
229 /******************************************************************
232 * Unmaps an ELF file from memory (previously mapped with elf_map_file)
234 static void elf_unmap_file(struct elf_file_map* fmap)
239 for (i = 0; i < fmap->elfhdr.e_shnum; i++)
241 elf_unmap_section(fmap, i);
243 HeapFree(GetProcessHeap(), 0, fmap->sect);
248 /******************************************************************
251 * creating an internal hash table to ease use ELF symtab information lookup
253 static void elf_hash_symtab(const struct module* module, struct pool* pool,
254 struct hash_table* ht_symtab, struct elf_file_map* fmap,
255 int symtab_idx, struct thunk_area* thunks)
260 const char* filename = NULL;
262 const Elf32_Sym* symp;
263 struct symtab_elt* ste;
265 symp = (const Elf32_Sym*)elf_map_section(fmap, symtab_idx);
266 strp = elf_map_section(fmap, fmap->sect[symtab_idx].shdr.sh_link);
267 if (symp == NO_MAP || strp == NO_MAP) return;
269 nsym = fmap->sect[symtab_idx].shdr.sh_size / sizeof(*symp);
271 for (j = 0; thunks[j].symname; j++)
272 thunks[j].rva_start = thunks[j].rva_end = 0;
274 for (i = 0; i < nsym; i++, symp++)
276 /* Ignore certain types of entries which really aren't of that much
279 if ((ELF32_ST_TYPE(symp->st_info) != STT_FILE &&
280 ELF32_ST_TYPE(symp->st_info) != STT_OBJECT &&
281 ELF32_ST_TYPE(symp->st_info) != STT_FUNC) ||
282 symp->st_shndx == SHN_UNDEF)
287 symname = strp + symp->st_name;
289 if (ELF32_ST_TYPE(symp->st_info) == STT_FILE)
294 for (j = 0; thunks[j].symname; j++)
296 if (!strcmp(symname, thunks[j].symname))
298 thunks[j].rva_start = symp->st_value;
299 thunks[j].rva_end = symp->st_value + symp->st_size;
303 if (thunks[j].symname) continue;
305 /* FIXME: we don't need to handle them (GCC internals)
306 * Moreover, they screw up our symbol lookup :-/
308 if (symname[0] == '.' && symname[1] == 'L' && isdigit(symname[2]))
311 ste = pool_alloc(pool, sizeof(*ste));
312 ste->ht_elt.name = symname;
313 /* GCC emits, in some cases, a .<digit>+ suffix.
314 * This is used for static variable inside functions, so
315 * that we can have several such variables with same name in
316 * the same compilation unit
317 * We simply ignore that suffix when present (we also get rid
318 * of it in stabs parsing)
320 ptr = symname + strlen(symname) - 1;
323 while (isdigit(*ptr) && ptr >= symname) ptr--;
324 if (ptr > symname && *ptr == '.')
326 char* n = pool_alloc(pool, ptr - symname + 1);
327 memcpy(n, symname, ptr - symname + 1);
328 n[ptr - symname] = '\0';
329 ste->ht_elt.name = n;
333 ste->filename = filename;
335 hash_table_add(ht_symtab, &ste->ht_elt);
337 /* as we added in the ht_symtab pointers to the symbols themselves,
338 * we cannot unmap yet the sections, it will be done when we're over
343 /******************************************************************
346 * lookup a symbol by name in our internal hash table for the symtab
348 static const Elf32_Sym* elf_lookup_symtab(const struct module* module,
349 const struct hash_table* ht_symtab,
350 const char* name, struct symt* compiland)
352 struct symtab_elt* weak_result = NULL; /* without compiland name */
353 struct symtab_elt* result = NULL;
354 struct hash_table_iter hti;
355 struct symtab_elt* ste;
356 const char* compiland_name;
357 const char* compiland_basename;
360 /* we need weak match up (at least) when symbols of same name,
361 * defined several times in different compilation units,
362 * are merged in a single one (hence a different filename for c.u.)
366 compiland_name = source_get(module,
367 ((struct symt_compiland*)compiland)->source);
368 compiland_basename = strrchr(compiland_name, '/');
369 if (!compiland_basename++) compiland_basename = compiland_name;
371 else compiland_name = compiland_basename = NULL;
373 hash_table_iter_init(ht_symtab, &hti, name);
374 while ((ste = hash_table_iter_up(&hti)))
376 if (ste->used || strcmp(ste->ht_elt.name, name)) continue;
379 if ((ste->filename && !compiland_name) || (!ste->filename && compiland_name))
381 if (ste->filename && compiland_name)
383 if (strcmp(ste->filename, compiland_name))
385 base = strrchr(ste->filename, '/');
386 if (!base++) base = ste->filename;
387 if (strcmp(base, compiland_basename)) continue;
392 FIXME("Already found symbol %s (%s) in symtab %s @%08x and %s @%08x\n",
393 name, compiland_name, result->filename, result->symp->st_value,
394 ste->filename, ste->symp->st_value);
402 if (!result && !(result = weak_result))
404 FIXME("Couldn't find symbol %s!%s in symtab\n",
405 module->module.ModuleName, name);
411 /******************************************************************
412 * elf_finish_stabs_info
414 * - get any relevant information (address & size) from the bits we got from the
415 * stabs debugging information
417 static void elf_finish_stabs_info(struct module* module, struct hash_table* symtab)
419 struct hash_table_iter hti;
422 const Elf32_Sym* symp;
424 hash_table_iter_init(&module->ht_symbols, &hti, NULL);
425 while ((ptr = hash_table_iter_up(&hti)))
427 sym = GET_ENTRY(ptr, struct symt_ht, hash_elt);
428 switch (sym->symt.tag)
431 if (((struct symt_function*)sym)->address != module->elf_info->elf_addr &&
432 ((struct symt_function*)sym)->size)
436 symp = elf_lookup_symtab(module, symtab, sym->hash_elt.name,
437 ((struct symt_function*)sym)->container);
440 if (((struct symt_function*)sym)->address != module->elf_info->elf_addr &&
441 ((struct symt_function*)sym)->address != module->elf_info->elf_addr + symp->st_value)
442 FIXME("Changing address for %p/%s!%s from %08lx to %08lx\n",
443 sym, module->module.ModuleName, sym->hash_elt.name,
444 ((struct symt_function*)sym)->address, module->elf_info->elf_addr + symp->st_value);
445 if (((struct symt_function*)sym)->size && ((struct symt_function*)sym)->size != symp->st_size)
446 FIXME("Changing size for %p/%s!%s from %08lx to %08x\n",
447 sym, module->module.ModuleName, sym->hash_elt.name,
448 ((struct symt_function*)sym)->size, symp->st_size);
450 ((struct symt_function*)sym)->address = module->elf_info->elf_addr +
452 ((struct symt_function*)sym)->size = symp->st_size;
453 } else FIXME("Couldn't find %s!%s\n", module->module.ModuleName, sym->hash_elt.name);
456 switch (((struct symt_data*)sym)->kind)
459 case DataIsFileStatic:
460 if (((struct symt_data*)sym)->u.address != module->elf_info->elf_addr)
462 symp = elf_lookup_symtab(module, symtab, sym->hash_elt.name,
463 ((struct symt_data*)sym)->container);
466 if (((struct symt_data*)sym)->u.address != module->elf_info->elf_addr &&
467 ((struct symt_data*)sym)->u.address != module->elf_info->elf_addr + symp->st_value)
468 FIXME("Changing address for %p/%s!%s from %08lx to %08lx\n",
469 sym, module->module.ModuleName, sym->hash_elt.name,
470 ((struct symt_function*)sym)->address, module->elf_info->elf_addr + symp->st_value);
471 ((struct symt_data*)sym)->u.address = module->elf_info->elf_addr +
473 ((struct symt_data*)sym)->kind = (ELF32_ST_BIND(symp->st_info) == STB_LOCAL) ?
474 DataIsFileStatic : DataIsGlobal;
475 } else FIXME("Couldn't find %s!%s\n", module->module.ModuleName, sym->hash_elt.name);
481 FIXME("Unsupported tag %u\n", sym->symt.tag);
485 /* since we may have changed some addresses & sizes, mark the module to be resorted */
486 module->sortlist_valid = FALSE;
489 /******************************************************************
490 * elf_load_wine_thunks
492 * creating the thunk objects for a wine native DLL
494 static int elf_new_wine_thunks(struct module* module, struct hash_table* ht_symtab,
495 unsigned num_areas, struct thunk_area* thunks)
498 struct symt_compiland* compiland = NULL;
499 const char* compiland_name = NULL;
500 struct hash_table_iter hti;
501 struct symtab_elt* ste;
505 hash_table_iter_init(ht_symtab, &hti, NULL);
506 while ((ste = hash_table_iter_up(&hti)))
508 if (ste->used) continue;
510 /* FIXME: this is not a good idea anyway... we are creating several
511 * compiland objects for a same compilation unit
512 * We try to cache the last compiland used, but it's not enough
513 * (we should here only create compilands if they are not yet
516 if (!compiland_name || compiland_name != ste->filename)
517 compiland = symt_new_compiland(module,
518 compiland_name = ste->filename);
520 addr = module->elf_info->elf_addr + ste->symp->st_value;
522 for (j = 0; j < num_areas; j++)
524 if (ste->symp->st_value >= thunks[j].rva_start &&
525 ste->symp->st_value < thunks[j].rva_end)
528 if (j < num_areas) /* thunk found */
530 symt_new_thunk(module, compiland, ste->ht_elt.name, thunks[j].ordinal,
531 addr, ste->symp->st_size);
537 idx = symt_find_nearest(module, addr);
539 symt_get_info(&module->addr_sorttab[idx]->symt,
540 TI_GET_ADDRESS, &ref_addr);
541 if (idx == -1 || addr != ref_addr)
543 /* creating public symbols for all the ELF symbols which haven't been
544 * used yet (ie we have no debug information on them)
545 * That's the case, for example, of the .spec.c files
547 switch (ELF32_ST_TYPE(ste->symp->st_info))
550 symt_new_function(module, compiland, ste->ht_elt.name,
551 addr, ste->symp->st_size, NULL);
554 symt_new_global_variable(module, compiland, ste->ht_elt.name,
555 ELF32_ST_BIND(ste->symp->st_info) == STB_LOCAL,
556 addr, ste->symp->st_size, NULL);
559 FIXME("Shouldn't happen\n");
562 /* FIXME: this is a hack !!!
563 * we are adding new symbols, but as we're parsing a symbol table
564 * (hopefully without duplicate symbols) we delay rebuilding the sorted
565 * module table until we're done with the symbol table
566 * Otherwise, as we intertwine symbols's add and lookup, performance
569 module->sortlist_valid = TRUE;
571 else if (strcmp(ste->ht_elt.name, module->addr_sorttab[idx]->hash_elt.name))
574 DWORD xsize = 0, kind = -1;
576 symt_get_info(&module->addr_sorttab[idx]->symt, TI_GET_ADDRESS, &xaddr);
577 symt_get_info(&module->addr_sorttab[idx]->symt, TI_GET_LENGTH, &xsize);
578 symt_get_info(&module->addr_sorttab[idx]->symt, TI_GET_DATAKIND, &kind);
580 /* If none of symbols has a correct size, we consider they are both markers
581 * Hence, we can silence this warning
582 * Also, we check that we don't have two symbols, one local, the other
583 * global which is legal
585 if ((xsize || ste->symp->st_size) &&
586 (kind == (ELF32_ST_BIND(ste->symp->st_info) == STB_LOCAL) ? DataIsFileStatic : DataIsGlobal))
587 FIXME("Duplicate in %s: %s<%08lx-%08x> %s<%s-%08lx>\n",
588 module->module.ModuleName,
589 ste->ht_elt.name, addr, ste->symp->st_size,
590 module->addr_sorttab[idx]->hash_elt.name,
591 wine_dbgstr_longlong(xaddr), xsize);
595 /* see comment above */
596 module->sortlist_valid = FALSE;
600 /******************************************************************
601 * elf_new_public_symbols
603 * Creates a set of public symbols from an ELF symtab
605 static int elf_new_public_symbols(struct module* module, struct hash_table* symtab)
607 struct symt_compiland* compiland = NULL;
608 const char* compiland_name = NULL;
609 struct hash_table_iter hti;
610 struct symtab_elt* ste;
612 if (dbghelp_options & SYMOPT_NO_PUBLICS) return TRUE;
614 /* FIXME: we're missing the ELF entry point here */
616 hash_table_iter_init(symtab, &hti, NULL);
617 while ((ste = hash_table_iter_up(&hti)))
619 /* FIXME: this is not a good idea anyway... we are creating several
620 * compiland objects for a same compilation unit
621 * We try to cache the last compiland used, but it's not enough
622 * (we should here only create compilands if they are not yet
625 if (!compiland_name || compiland_name != ste->filename)
626 compiland = symt_new_compiland(module,
627 compiland_name = ste->filename);
629 symt_new_public(module, compiland, ste->ht_elt.name,
630 module->elf_info->elf_addr + ste->symp->st_value,
631 ste->symp->st_size, TRUE /* FIXME */,
632 ELF32_ST_TYPE(ste->symp->st_info) == STT_FUNC);
637 /* Copyright (C) 1986 Gary S. Brown. Modified by Robert Shearman. You may use
638 the following calc_crc32 code or tables extracted from it, as desired without
641 /**********************************************************************\
642 |* Demonstration program to compute the 32-bit CRC used as the frame *|
643 |* check sequence in ADCCP (ANSI X3.66, also known as FIPS PUB 71 *|
644 |* and FED-STD-1003, the U.S. versions of CCITT's X.25 link-level *|
645 |* protocol). The 32-bit FCS was added via the Federal Register, *|
646 |* 1 June 1982, p.23798. I presume but don't know for certain that *|
647 |* this polynomial is or will be included in CCITT V.41, which *|
648 |* defines the 16-bit CRC (often called CRC-CCITT) polynomial. FIPS *|
649 |* PUB 78 says that the 32-bit FCS reduces otherwise undetected *|
650 |* errors by a factor of 10^-5 over 16-bit FCS. *|
651 \**********************************************************************/
653 /* First, the polynomial itself and its table of feedback terms. The */
655 /* X^32+X^26+X^23+X^22+X^16+X^12+X^11+X^10+X^8+X^7+X^5+X^4+X^2+X^1+X^0 */
656 /* Note that we take it "backwards" and put the highest-order term in */
657 /* the lowest-order bit. The X^32 term is "implied"; the LSB is the */
658 /* X^31 term, etc. The X^0 term (usually shown as "+1") results in */
659 /* the MSB being 1. */
661 /* Note that the usual hardware shift register implementation, which */
662 /* is what we're using (we're merely optimizing it by doing eight-bit */
663 /* chunks at a time) shifts bits into the lowest-order term. In our */
664 /* implementation, that means shifting towards the right. Why do we */
665 /* do it this way? Because the calculated CRC must be transmitted in */
666 /* order from highest-order term to lowest-order term. UARTs transmit */
667 /* characters in order from LSB to MSB. By storing the CRC this way, */
668 /* we hand it to the UART in the order low-byte to high-byte; the UART */
669 /* sends each low-bit to hight-bit; and the result is transmission bit */
670 /* by bit from highest- to lowest-order term without requiring any bit */
671 /* shuffling on our part. Reception works similarly. */
673 /* The feedback terms table consists of 256, 32-bit entries. Notes: */
675 /* 1. The table can be generated at runtime if desired; code to do so */
676 /* is shown later. It might not be obvious, but the feedback */
677 /* terms simply represent the results of eight shift/xor opera- */
678 /* tions for all combinations of data and CRC register values. */
680 /* 2. The CRC accumulation logic is the same for all CRC polynomials, */
681 /* be they sixteen or thirty-two bits wide. You simply choose the */
682 /* appropriate table. Alternatively, because the table can be */
683 /* generated at runtime, you can start by generating the table for */
684 /* the polynomial in question and use exactly the same "updcrc", */
685 /* if your application needn't simultaneously handle two CRC */
686 /* polynomials. (Note, however, that XMODEM is strange.) */
688 /* 3. For 16-bit CRCs, the table entries need be only 16 bits wide; */
689 /* of course, 32-bit entries work OK if the high 16 bits are zero. */
691 /* 4. The values must be right-shifted by eight bits by the "updcrc" */
692 /* logic; the shift must be unsigned (bring in zeroes). On some */
693 /* hardware you could probably optimize the shift in assembler by */
694 /* using byte-swap instructions. */
697 static DWORD calc_crc32(struct elf_file_map* fmap)
699 #define UPDC32(octet,crc) (crc_32_tab[((crc) ^ (octet)) & 0xff] ^ ((crc) >> 8))
700 static const DWORD crc_32_tab[] =
701 { /* CRC polynomial 0xedb88320 */
702 0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, 0x706af48f,
703 0xe963a535, 0x9e6495a3, 0x0edb8832, 0x79dcb8a4, 0xe0d5e91e, 0x97d2d988,
704 0x09b64c2b, 0x7eb17cbd, 0xe7b82d07, 0x90bf1d91, 0x1db71064, 0x6ab020f2,
705 0xf3b97148, 0x84be41de, 0x1adad47d, 0x6ddde4eb, 0xf4d4b551, 0x83d385c7,
706 0x136c9856, 0x646ba8c0, 0xfd62f97a, 0x8a65c9ec, 0x14015c4f, 0x63066cd9,
707 0xfa0f3d63, 0x8d080df5, 0x3b6e20c8, 0x4c69105e, 0xd56041e4, 0xa2677172,
708 0x3c03e4d1, 0x4b04d447, 0xd20d85fd, 0xa50ab56b, 0x35b5a8fa, 0x42b2986c,
709 0xdbbbc9d6, 0xacbcf940, 0x32d86ce3, 0x45df5c75, 0xdcd60dcf, 0xabd13d59,
710 0x26d930ac, 0x51de003a, 0xc8d75180, 0xbfd06116, 0x21b4f4b5, 0x56b3c423,
711 0xcfba9599, 0xb8bda50f, 0x2802b89e, 0x5f058808, 0xc60cd9b2, 0xb10be924,
712 0x2f6f7c87, 0x58684c11, 0xc1611dab, 0xb6662d3d, 0x76dc4190, 0x01db7106,
713 0x98d220bc, 0xefd5102a, 0x71b18589, 0x06b6b51f, 0x9fbfe4a5, 0xe8b8d433,
714 0x7807c9a2, 0x0f00f934, 0x9609a88e, 0xe10e9818, 0x7f6a0dbb, 0x086d3d2d,
715 0x91646c97, 0xe6635c01, 0x6b6b51f4, 0x1c6c6162, 0x856530d8, 0xf262004e,
716 0x6c0695ed, 0x1b01a57b, 0x8208f4c1, 0xf50fc457, 0x65b0d9c6, 0x12b7e950,
717 0x8bbeb8ea, 0xfcb9887c, 0x62dd1ddf, 0x15da2d49, 0x8cd37cf3, 0xfbd44c65,
718 0x4db26158, 0x3ab551ce, 0xa3bc0074, 0xd4bb30e2, 0x4adfa541, 0x3dd895d7,
719 0xa4d1c46d, 0xd3d6f4fb, 0x4369e96a, 0x346ed9fc, 0xad678846, 0xda60b8d0,
720 0x44042d73, 0x33031de5, 0xaa0a4c5f, 0xdd0d7cc9, 0x5005713c, 0x270241aa,
721 0xbe0b1010, 0xc90c2086, 0x5768b525, 0x206f85b3, 0xb966d409, 0xce61e49f,
722 0x5edef90e, 0x29d9c998, 0xb0d09822, 0xc7d7a8b4, 0x59b33d17, 0x2eb40d81,
723 0xb7bd5c3b, 0xc0ba6cad, 0xedb88320, 0x9abfb3b6, 0x03b6e20c, 0x74b1d29a,
724 0xead54739, 0x9dd277af, 0x04db2615, 0x73dc1683, 0xe3630b12, 0x94643b84,
725 0x0d6d6a3e, 0x7a6a5aa8, 0xe40ecf0b, 0x9309ff9d, 0x0a00ae27, 0x7d079eb1,
726 0xf00f9344, 0x8708a3d2, 0x1e01f268, 0x6906c2fe, 0xf762575d, 0x806567cb,
727 0x196c3671, 0x6e6b06e7, 0xfed41b76, 0x89d32be0, 0x10da7a5a, 0x67dd4acc,
728 0xf9b9df6f, 0x8ebeeff9, 0x17b7be43, 0x60b08ed5, 0xd6d6a3e8, 0xa1d1937e,
729 0x38d8c2c4, 0x4fdff252, 0xd1bb67f1, 0xa6bc5767, 0x3fb506dd, 0x48b2364b,
730 0xd80d2bda, 0xaf0a1b4c, 0x36034af6, 0x41047a60, 0xdf60efc3, 0xa867df55,
731 0x316e8eef, 0x4669be79, 0xcb61b38c, 0xbc66831a, 0x256fd2a0, 0x5268e236,
732 0xcc0c7795, 0xbb0b4703, 0x220216b9, 0x5505262f, 0xc5ba3bbe, 0xb2bd0b28,
733 0x2bb45a92, 0x5cb36a04, 0xc2d7ffa7, 0xb5d0cf31, 0x2cd99e8b, 0x5bdeae1d,
734 0x9b64c2b0, 0xec63f226, 0x756aa39c, 0x026d930a, 0x9c0906a9, 0xeb0e363f,
735 0x72076785, 0x05005713, 0x95bf4a82, 0xe2b87a14, 0x7bb12bae, 0x0cb61b38,
736 0x92d28e9b, 0xe5d5be0d, 0x7cdcefb7, 0x0bdbdf21, 0x86d3d2d4, 0xf1d4e242,
737 0x68ddb3f8, 0x1fda836e, 0x81be16cd, 0xf6b9265b, 0x6fb077e1, 0x18b74777,
738 0x88085ae6, 0xff0f6a70, 0x66063bca, 0x11010b5c, 0x8f659eff, 0xf862ae69,
739 0x616bffd3, 0x166ccf45, 0xa00ae278, 0xd70dd2ee, 0x4e048354, 0x3903b3c2,
740 0xa7672661, 0xd06016f7, 0x4969474d, 0x3e6e77db, 0xaed16a4a, 0xd9d65adc,
741 0x40df0b66, 0x37d83bf0, 0xa9bcae53, 0xdebb9ec5, 0x47b2cf7f, 0x30b5ffe9,
742 0xbdbdf21c, 0xcabac28a, 0x53b39330, 0x24b4a3a6, 0xbad03605, 0xcdd70693,
743 0x54de5729, 0x23d967bf, 0xb3667a2e, 0xc4614ab8, 0x5d681b02, 0x2a6f2b94,
744 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, 0x2d02ef8d
747 unsigned char buffer[256];
750 lseek(fmap->fd, 0, SEEK_SET);
751 while ((r = read(fmap->fd, buffer, sizeof(buffer))) > 0)
753 for (i = 0; i < r; i++) crc = UPDC32(buffer[i], crc);
759 /******************************************************************
760 * elf_load_debug_info_from_map
762 * Loads the symbolic information from ELF module which mapping is described
764 * the module has been loaded at 'load_offset' address, so symbols' address
765 * relocation is performed.
766 * CRC is checked if fmap->with_crc is TRUE
768 * 0 if the file doesn't contain symbolic info (or this info cannot be
772 static BOOL elf_load_debug_info_from_map(struct module* module,
773 struct elf_file_map* fmap,
775 struct hash_table* ht_symtab)
778 const char* shstrtab;
780 int symtab_sect, dynsym_sect, stab_sect, stabstr_sect;
781 int debug_sect, debug_str_sect, debug_abbrev_sect, debug_line_sect;
783 struct thunk_area thunks[] =
785 {"__wine_spec_import_thunks", THUNK_ORDINAL_NOTYPE, 0, 0}, /* inter DLL calls */
786 {"__wine_spec_delayed_import_loaders", THUNK_ORDINAL_LOAD, 0, 0}, /* delayed inter DLL calls */
787 {"__wine_spec_delayed_import_thunks", THUNK_ORDINAL_LOAD, 0, 0}, /* delayed inter DLL calls */
788 {"__wine_delay_load", THUNK_ORDINAL_LOAD, 0, 0}, /* delayed inter DLL calls */
789 {"__wine_spec_thunk_text_16", -16, 0, 0}, /* 16 => 32 thunks */
790 {"__wine_spec_thunk_text_32", -32, 0, 0}, /* 32 => 16 thunks */
794 if (fmap->with_crc && (fmap->crc != calc_crc32(fmap)))
796 ERR("Bad CRC for module %s (got %08lx while expecting %08lx)\n",
797 module->module.ImageName, calc_crc32(fmap), fmap->crc);
798 /* we don't tolerate mis-matched files */
803 * Next, we need to find a few of the internal ELF headers within
804 * this thing. We need the main executable header, and the section
807 shstrtab = elf_map_section(fmap, fmap->elfhdr.e_shstrndx);
808 if (shstrtab == NO_MAP) return FALSE;
810 symtab_sect = dynsym_sect = stab_sect = stabstr_sect = -1;
811 debug_sect = debug_str_sect = debug_abbrev_sect = debug_line_sect = -1;
814 for (i = 0; i < fmap->elfhdr.e_shnum; i++)
816 if (strcmp(shstrtab + fmap->sect[i].shdr.sh_name, ".stab") == 0)
818 if (strcmp(shstrtab + fmap->sect[i].shdr.sh_name, ".stabstr") == 0)
820 if (strcmp(shstrtab + fmap->sect[i].shdr.sh_name, ".debug_info") == 0)
822 if (strcmp(shstrtab + fmap->sect[i].shdr.sh_name, ".debug_str") == 0)
824 if (strcmp(shstrtab + fmap->sect[i].shdr.sh_name, ".debug_abbrev") == 0)
825 debug_abbrev_sect = i;
826 if (strcmp(shstrtab + fmap->sect[i].shdr.sh_name, ".debug_line") == 0)
828 if (strcmp(shstrtab + fmap->sect[i].shdr.sh_name, ".gnu_debuglink") == 0)
830 if ((strcmp(shstrtab + fmap->sect[i].shdr.sh_name, ".symtab") == 0) &&
831 (fmap->sect[i].shdr.sh_type == SHT_SYMTAB))
833 if ((strcmp(shstrtab + fmap->sect[i].shdr.sh_name, ".dynsym") == 0) &&
834 (fmap->sect[i].shdr.sh_type == SHT_DYNSYM))
837 elf_unmap_section(fmap, fmap->elfhdr.e_shstrndx);
840 if (symtab_sect == -1)
842 /* if we don't have a symtab but a dynsym, process the dynsym
843 * section instead. It'll contain less (relevant) information,
844 * but it'll be better than nothing
846 if (dynsym_sect == -1) return FALSE;
847 symtab_sect = dynsym_sect;
850 module->module.SymType = SymExport;
852 /* create a hash table for the symtab */
853 elf_hash_symtab(module, pool, ht_symtab, fmap, symtab_sect, thunks);
855 if (!(dbghelp_options & SYMOPT_PUBLICS_ONLY))
857 if (stab_sect != -1 && stabstr_sect != -1)
862 stab = elf_map_section(fmap, stab_sect);
863 stabstr = elf_map_section(fmap, stabstr_sect);
864 if (stab != NO_MAP && stabstr != NO_MAP)
866 /* OK, now just parse all of the stabs. */
867 ret = stabs_parse(module, module->elf_info->elf_addr,
868 stab, fmap->sect[stab_sect].shdr.sh_size,
869 stabstr, fmap->sect[stabstr_sect].shdr.sh_size);
871 elf_unmap_section(fmap, stab_sect);
872 elf_unmap_section(fmap, stabstr_sect);
876 WARN("Couldn't correctly read stabs\n");
879 /* and fill in the missing information for stabs */
880 elf_finish_stabs_info(module, ht_symtab);
882 else if (debug_sect != -1)
884 /* Dwarf 2 debug information */
885 const char* dw2_debug;
886 const char* dw2_debug_abbrev;
887 const char* dw2_debug_str;
889 FIXME("Alpha-support for Dwarf2 information for %s\n", module->module.ModuleName);
891 dw2_debug = elf_map_section(fmap, debug_sect);
892 dw2_debug_abbrev = elf_map_section(fmap, debug_abbrev_sect);
893 dw2_debug_str = elf_map_section(fmap, debug_str_sect);
894 if (dw2_debug != NO_MAP && NO_MAP != dw2_debug_abbrev && dw2_debug_str != NO_MAP)
896 /* OK, now just parse dwarf2 debug infos. */
897 ret = dwarf2_parse(module, module->elf_info->elf_addr,
898 dw2_debug, fmap->sect[debug_sect].shdr.sh_size,
899 dw2_debug_abbrev, fmap->sect[debug_abbrev_sect].shdr.sh_size,
900 dw2_debug_str, fmap->sect[debug_str_sect].shdr.sh_size);
902 elf_unmap_section(fmap, debug_sect);
903 elf_unmap_section(fmap, debug_abbrev_sect);
904 elf_unmap_section(fmap, debug_str_sect);
907 WARN("Couldn't correctly read stabs\n");
911 else if (debuglink_sect != -1)
913 const char* dbg_link;
914 struct elf_file_map fmap_link;
916 dbg_link = elf_map_section(fmap, debuglink_sect);
917 /* The content of a debug link section is:
918 * 1/ a NULL terminated string, containing the file name for the
920 * 2/ padding on 4 byte boundary
921 * 3/ CRC of the linked ELF file
923 if (dbg_link != NO_MAP && elf_map_file(dbg_link, &fmap_link))
925 fmap_link.crc = *(const DWORD*)(dbg_link + ((DWORD_PTR)(strlen(dbg_link) + 4) & ~3));
926 fmap_link.with_crc = 1;
927 ret = elf_load_debug_info_from_map(module, &fmap_link, pool,
930 WARN("Couldn't load debug information from %s\n", dbg_link);
933 WARN("Couldn't load linked debug file for %s\n",
934 module->module.ModuleName);
935 elf_unmap_file(&fmap_link);
938 if (strstr(module->module.ModuleName, "<elf>") ||
939 !strcmp(module->module.ModuleName, "<wine-loader>"))
941 /* add the thunks for native libraries */
942 if (!(dbghelp_options & SYMOPT_PUBLICS_ONLY))
943 elf_new_wine_thunks(module, ht_symtab,
944 sizeof(thunks) / sizeof(thunks[0]), thunks);
946 /* add all the public symbols from symtab */
947 if (elf_new_public_symbols(module, ht_symtab) && !ret) ret = TRUE;
952 /******************************************************************
953 * elf_load_debug_info
955 * Loads ELF debugging information from the module image file.
957 BOOL elf_load_debug_info(struct module* module, struct elf_file_map* fmap)
961 struct hash_table ht_symtab;
962 struct elf_file_map my_fmap;
964 if (module->type != DMT_ELF || !module->elf_info)
966 ERR("Bad elf module '%s'\n", module->module.LoadedImageName);
970 pool_init(&pool, 65536);
971 hash_table_init(&pool, &ht_symtab, 256);
976 ret = elf_map_file(module->module.LoadedImageName, fmap);
979 ret = elf_load_debug_info_from_map(module, fmap, &pool, &ht_symtab);
982 if (fmap == &my_fmap) elf_unmap_file(fmap);
986 /******************************************************************
987 * elf_fetch_file_info
989 * Gathers some more information for an ELF module from a given file
991 BOOL elf_fetch_file_info(const char* name, DWORD* base,
992 DWORD* size, DWORD* checksum)
994 struct elf_file_map fmap;
995 if (!elf_map_file(name, &fmap)) return FALSE;
996 if (base) *base = fmap.elf_start;
997 *size = fmap.elf_size;
998 *checksum = calc_crc32(&fmap);
999 elf_unmap_file(&fmap);
1003 /******************************************************************
1005 * returns true iff the section tag is valid
1007 static unsigned is_dt_flag_valid(unsigned d_tag)
1010 #define DT_PROCNUM 0
1013 #define DT_EXTRANUM 0
1015 return (d_tag >= 0 && d_tag < DT_NUM + DT_PROCNUM + DT_EXTRANUM)
1016 #if defined(DT_LOOS) && defined(DT_HIOS)
1017 || (d_tag >= DT_LOOS && d_tag < DT_HIOS)
1019 #if defined(DT_LOPROC) && defined(DT_HIPROC)
1020 || (d_tag >= DT_LOPROC && d_tag < DT_HIPROC)
1025 /******************************************************************
1028 * Loads the information for ELF module stored in 'filename'
1029 * the module has been loaded at 'load_offset' address
1031 * -1 if the file cannot be found/opened
1032 * 0 if the file doesn't contain symbolic info (or this info cannot be
1036 static BOOL elf_load_file(struct process* pcs, const char* filename,
1037 unsigned long load_offset, struct elf_info* elf_info)
1040 struct elf_file_map fmap;
1043 TRACE("Processing elf file '%s' at %08lx\n", filename, load_offset);
1045 if (!elf_map_file(filename, &fmap)) goto leave;
1047 /* Next, we need to find a few of the internal ELF headers within
1048 * this thing. We need the main executable header, and the section
1051 if (!fmap.elf_start && !load_offset)
1052 ERR("Relocatable ELF %s, but no load address. Loading at 0x0000000\n",
1054 if (fmap.elf_start && load_offset)
1056 WARN("Non-relocatable ELF %s, but load address of 0x%08lx supplied. "
1057 "Assuming load address is corrupt\n", filename, load_offset);
1061 if (elf_info->flags & ELF_INFO_DEBUG_HEADER)
1063 const char* shstrtab = elf_map_section(&fmap, fmap.elfhdr.e_shstrndx);
1064 if (shstrtab == NO_MAP) goto leave;
1065 for (i = 0; i < fmap.elfhdr.e_shnum; i++)
1067 if (strcmp(shstrtab + fmap.sect[i].shdr.sh_name, ".dynamic") == 0 &&
1068 fmap.sect[i].shdr.sh_type == SHT_DYNAMIC)
1071 char* ptr = (char*)fmap.sect[i].shdr.sh_addr;
1076 if (!ReadProcessMemory(pcs->handle, ptr, &dyn, sizeof(dyn), &len) ||
1077 len != sizeof(dyn) || !is_dt_flag_valid(dyn.d_tag))
1078 dyn.d_tag = DT_NULL;
1080 } while (dyn.d_tag != DT_DEBUG && dyn.d_tag != DT_NULL);
1081 if (dyn.d_tag == DT_NULL) goto leave;
1082 elf_info->dbg_hdr_addr = dyn.d_un.d_ptr;
1085 elf_unmap_section(&fmap, fmap.elfhdr.e_shstrndx);
1088 if (elf_info->flags & ELF_INFO_MODULE)
1090 struct elf_module_info *elf_module_info =
1091 HeapAlloc(GetProcessHeap(), 0, sizeof(struct elf_module_info));
1092 if (!elf_module_info) goto leave;
1093 elf_info->module = module_new(pcs, filename, DMT_ELF,
1094 (load_offset) ? load_offset : fmap.elf_start,
1095 fmap.elf_size, 0, calc_crc32(&fmap));
1096 if (!elf_info->module)
1098 HeapFree(GetProcessHeap(), 0, elf_module_info);
1101 elf_info->module->elf_info = elf_module_info;
1102 elf_info->module->elf_info->elf_addr = load_offset;
1104 if (dbghelp_options & SYMOPT_DEFERRED_LOADS)
1106 elf_info->module->module.SymType = SymDeferred;
1109 else ret = elf_load_debug_info(elf_info->module, &fmap);
1111 elf_info->module->elf_info->elf_mark = 1;
1112 elf_info->module->elf_info->elf_loader = 0;
1115 if (elf_info->flags & ELF_INFO_NAME)
1117 elf_info->module_name = strcpy(HeapAlloc(GetProcessHeap(), 0,
1118 strlen(filename) + 1), filename);
1121 elf_unmap_file(&fmap);
1126 /******************************************************************
1127 * elf_load_file_from_path
1128 * tries to load an ELF file from a set of paths (separated by ':')
1130 static BOOL elf_load_file_from_path(HANDLE hProcess,
1131 const char* filename,
1132 unsigned long load_offset,
1134 struct elf_info* elf_info)
1140 if (!path) return FALSE;
1142 paths = strcpy(HeapAlloc(GetProcessHeap(), 0, strlen(path) + 1), path);
1143 for (s = paths; s && *s; s = (t) ? (t+1) : NULL)
1147 fn = HeapAlloc(GetProcessHeap(), 0, strlen(filename) + 1 + strlen(s) + 1);
1151 strcat(fn, filename);
1152 ret = elf_load_file(hProcess, fn, load_offset, elf_info);
1153 HeapFree(GetProcessHeap(), 0, fn);
1155 s = (t) ? (t+1) : NULL;
1158 HeapFree(GetProcessHeap(), 0, paths);
1162 /******************************************************************
1163 * elf_search_and_load_file
1165 * lookup a file in standard ELF locations, and if found, load it
1167 static BOOL elf_search_and_load_file(struct process* pcs, const char* filename,
1168 unsigned long load_offset,
1169 struct elf_info* elf_info)
1172 struct module* module;
1174 if (filename == NULL || *filename == '\0') return FALSE;
1175 if ((module = module_find_by_name(pcs, filename, DMT_ELF)))
1177 elf_info->module = module;
1178 module->elf_info->elf_mark = 1;
1179 return module->module.SymType;
1182 if (strstr(filename, "libstdc++")) return FALSE; /* We know we can't do it */
1183 ret = elf_load_file(pcs, filename, load_offset, elf_info);
1184 /* if relative pathname, try some absolute base dirs */
1185 if (!ret && !strchr(filename, '/'))
1187 ret = elf_load_file_from_path(pcs, filename, load_offset,
1188 getenv("PATH"), elf_info) ||
1189 elf_load_file_from_path(pcs, filename, load_offset,
1190 getenv("LD_LIBRARY_PATH"), elf_info) ||
1191 elf_load_file_from_path(pcs, filename, load_offset,
1192 getenv("WINEDLLPATH"), elf_info);
1198 /******************************************************************
1199 * elf_enum_modules_internal
1201 * Enumerate ELF modules from a running process
1203 static BOOL elf_enum_modules_internal(const struct process* pcs,
1204 const char* main_name,
1205 elf_enum_modules_cb cb, void* user)
1207 struct r_debug dbg_hdr;
1212 if (!pcs->dbg_hdr_addr ||
1213 !ReadProcessMemory(pcs->handle, (void*)pcs->dbg_hdr_addr,
1214 &dbg_hdr, sizeof(dbg_hdr), NULL))
1217 /* Now walk the linked list. In all known ELF implementations,
1218 * the dynamic loader maintains this linked list for us. In some
1219 * cases the first entry doesn't appear with a name, in other cases it
1222 for (lm_addr = (void*)dbg_hdr.r_map; lm_addr; lm_addr = (void*)lm.l_next)
1224 if (!ReadProcessMemory(pcs->handle, lm_addr, &lm, sizeof(lm), NULL))
1227 if (lm.l_prev != NULL && /* skip first entry, normally debuggee itself */
1228 lm.l_name != NULL &&
1229 ReadProcessMemory(pcs->handle, lm.l_name, bufstr, sizeof(bufstr), NULL))
1231 bufstr[sizeof(bufstr) - 1] = '\0';
1232 if (main_name && !bufstr[0]) strcpy(bufstr, main_name);
1233 if (!cb(bufstr, (unsigned long)lm.l_addr, user)) break;
1241 struct process* pcs;
1242 struct elf_info elf_info;
1245 static BOOL elf_enum_sync_cb(const char* name, unsigned long addr, void* user)
1247 struct elf_sync* es = user;
1249 elf_search_and_load_file(es->pcs, name, addr, &es->elf_info);
1253 /******************************************************************
1254 * elf_synchronize_module_list
1256 * this functions rescans the debuggee module's list and synchronizes it with
1257 * the one from 'pcs', ie:
1258 * - if a module is in debuggee and not in pcs, it's loaded into pcs
1259 * - if a module is in pcs and not in debuggee, it's unloaded from pcs
1261 BOOL elf_synchronize_module_list(struct process* pcs)
1263 struct module* module;
1266 for (module = pcs->lmodules; module; module = module->next)
1268 if (module->type == DMT_ELF) module->elf_info->elf_mark = 0;
1272 es.elf_info.flags = ELF_INFO_MODULE;
1273 if (!elf_enum_modules_internal(pcs, NULL, elf_enum_sync_cb, &es))
1276 module = pcs->lmodules;
1279 if (module->type == DMT_ELF && !module->elf_info->elf_mark &&
1280 !module->elf_info->elf_loader)
1282 module_remove(pcs, module);
1283 /* restart all over */
1284 module = pcs->lmodules;
1286 else module = module->next;
1291 /******************************************************************
1294 * Lookup in a running ELF process the loader, and sets its ELF link
1295 * address (for accessing the list of loaded .so libs) in pcs.
1296 * If flags is ELF_INFO_MODULE, the module for the loader is also
1297 * added as a module into pcs.
1299 static BOOL elf_search_loader(struct process* pcs, struct elf_info* elf_info)
1304 /* All binaries are loaded with WINELOADER (if run from tree) or by the
1305 * main executable (either wine-kthread or wine-pthread)
1306 * FIXME: the heuristic used to know whether we need to load wine-pthread
1307 * or wine-kthread is not 100% safe
1309 if ((ptr = getenv("WINELOADER")))
1310 ret = elf_search_and_load_file(pcs, ptr, 0, elf_info);
1313 ret = elf_search_and_load_file(pcs, "wine-kthread", 0, elf_info) ||
1314 elf_search_and_load_file(pcs, "wine-pthread", 0, elf_info);
1319 /******************************************************************
1320 * elf_read_wine_loader_dbg_info
1322 * Try to find a decent wine executable which could have loaded the debuggee
1324 BOOL elf_read_wine_loader_dbg_info(struct process* pcs)
1326 struct elf_info elf_info;
1328 elf_info.flags = ELF_INFO_DEBUG_HEADER | ELF_INFO_MODULE;
1329 if (!elf_search_loader(pcs, &elf_info)) return FALSE;
1330 elf_info.module->elf_info->elf_loader = 1;
1331 strcpy(elf_info.module->module.ModuleName, "<wine-loader>");
1332 return (pcs->dbg_hdr_addr = elf_info.dbg_hdr_addr) != 0;
1335 /******************************************************************
1338 * Enumerates the ELF loaded modules from a running target (hProc)
1339 * This function doesn't require that someone has called SymInitialize
1340 * on this very process.
1342 BOOL elf_enum_modules(HANDLE hProc, elf_enum_modules_cb cb, void* user)
1345 struct elf_info elf_info;
1348 memset(&pcs, 0, sizeof(pcs));
1350 elf_info.flags = ELF_INFO_DEBUG_HEADER | ELF_INFO_NAME;
1351 if (!elf_search_loader(&pcs, &elf_info)) return FALSE;
1352 pcs.dbg_hdr_addr = elf_info.dbg_hdr_addr;
1353 ret = elf_enum_modules_internal(&pcs, elf_info.module_name, cb, user);
1354 HeapFree(GetProcessHeap(), 0, (char*)elf_info.module_name);
1360 struct process* pcs;
1361 struct elf_info elf_info;
1366 /******************************************************************
1369 * Callback for elf_load_module, used to walk the list of loaded
1372 static BOOL elf_load_cb(const char* name, unsigned long addr, void* user)
1374 struct elf_load* el = user;
1377 /* memcmp is needed for matches when bufstr contains also version information
1378 * el->name: libc.so, name: libc.so.6.0
1380 p = strrchr(name, '/');
1382 if (!memcmp(p, el->name, strlen(el->name)))
1384 elf_search_and_load_file(el->pcs, name, addr, &el->elf_info);
1390 /******************************************************************
1393 * loads an ELF module and stores it in process' module list
1394 * Also, find module real name and load address from
1395 * the real loaded modules list in pcs address space
1397 struct module* elf_load_module(struct process* pcs, const char* name, DWORD addr)
1401 TRACE("(%p %s %08lx)\n", pcs, name, addr);
1403 el.elf_info.flags = ELF_INFO_MODULE;
1406 if (pcs->dbg_hdr_addr) /* we're debugging a life target */
1409 /* do only the lookup from the filename, not the path (as we lookup module
1410 * name in the process' loaded module list)
1412 el.name = strrchr(name, '/');
1413 if (!el.name++) el.name = name;
1416 if (!elf_enum_modules_internal(pcs, NULL, elf_load_cb, &el))
1421 el.ret = elf_search_and_load_file(pcs, name, addr, &el.elf_info);
1423 if (!el.ret) return NULL;
1424 assert(el.elf_info.module);
1425 return el.elf_info.module;
1428 #else /* !__ELF__ */
1430 BOOL elf_synchronize_module_list(struct process* pcs)
1435 BOOL elf_read_wine_loader_dbg_info(struct process* pcs)
1440 struct module* elf_load_module(struct process* pcs, const char* name, DWORD addr)
1445 BOOL elf_load_debug_info(struct module* module, struct elf_file_map* fmap)
1449 #endif /* __ELF__ */