Rename "set debug coff_pe_read" command to "set debug coff-pe-read".
[deliverable/binutils-gdb.git] / gdb / coff-pe-read.c
CommitLineData
1b6bc7e0
CF
1/* Read the export table symbols from a portable executable and
2 convert to internal format, for GDB. Used as a last resort if no
3 debugging symbols recognized.
4
28e7fd62 5 Copyright (C) 2003-2013 Free Software Foundation, Inc.
1b6bc7e0
CF
6
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
1b6bc7e0
CF
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>.
1b6bc7e0 21
aff410f1 22 Contributed by Raoul M. Gough (RaoulGough@yahoo.co.uk). */
1b6bc7e0 23
0baeab03
PA
24#include "defs.h"
25
1b6bc7e0
CF
26#include "coff-pe-read.h"
27
81de56be 28#include "bfd.h"
1b6bc7e0
CF
29#include "gdbtypes.h"
30
3999122f
PM
31#include "command.h"
32#include "gdbcmd.h"
1b6bc7e0
CF
33#include "symtab.h"
34#include "symfile.h"
35#include "objfiles.h"
3999122f 36#include "common/common-utils.h"
aab2f004 37#include "coff/internal.h"
3999122f
PM
38
39#include <ctype.h>
1b6bc7e0
CF
40
41/* Internal section information */
42
3999122f
PM
43/* Coff PE read debugging flag:
44 default value is 0,
45 value 1 outputs problems encountered while parsing PE file,
46 value above 1 also lists all generated minimal symbols. */
47static unsigned int debug_coff_pe_read;
48
1b6bc7e0
CF
49struct read_pe_section_data
50{
aff410f1
MS
51 CORE_ADDR vma_offset; /* Offset to loaded address of section. */
52 unsigned long rva_start; /* Start offset within the pe. */
53 unsigned long rva_end; /* End offset within the pe. */
54 enum minimal_symbol_type ms_type; /* Type to assign symbols in
55 section. */
3999122f 56 char *section_name; /* Recorded section name. */
1b6bc7e0
CF
57};
58
78ea0eca
PM
59#define IMAGE_SCN_CNT_CODE 0x20
60#define IMAGE_SCN_CNT_INITIALIZED_DATA 0x40
61#define IMAGE_SCN_CNT_UNINITIALIZED_DATA 0x80
1b6bc7e0
CF
62#define PE_SECTION_INDEX_TEXT 0
63#define PE_SECTION_INDEX_DATA 1
64#define PE_SECTION_INDEX_BSS 2
65#define PE_SECTION_TABLE_SIZE 3
66#define PE_SECTION_INDEX_INVALID -1
67\f
68/* Get the index of the named section in our own array, which contains
aff410f1
MS
69 text, data and bss in that order. Return PE_SECTION_INDEX_INVALID
70 if passed an unrecognised section name. */
1b6bc7e0
CF
71
72static int
73read_pe_section_index (const char *section_name)
74{
75 if (strcmp (section_name, ".text") == 0)
76 {
77 return PE_SECTION_INDEX_TEXT;
78 }
79
80 else if (strcmp (section_name, ".data") == 0)
81 {
82 return PE_SECTION_INDEX_DATA;
83 }
84
85 else if (strcmp (section_name, ".bss") == 0)
86 {
87 return PE_SECTION_INDEX_BSS;
88 }
89
90 else
91 {
92 return PE_SECTION_INDEX_INVALID;
93 }
94}
95
3999122f
PM
96/* Get the index of the named section in our own full arrayi.
97 text, data and bss in that order. Return PE_SECTION_INDEX_INVALID
98 if passed an unrecognised section name. */
99
100static int
101get_pe_section_index (const char *section_name,
102 struct read_pe_section_data *sections,
103 int nb_sections)
104{
105 int i;
106
107 for (i = 0; i < nb_sections; i++)
108 if (strcmp (sections[i].section_name, section_name) == 0)
109 return i;
110 return PE_SECTION_INDEX_INVALID;
111}
112
113/* Structure used by get_section_vmas function below
114 to access section_data array and the size of the array
115 stored in nb_sections field. */
116struct pe_sections_info
117{
118 int nb_sections;
119 struct read_pe_section_data *sections;
120};
121
aff410f1 122/* Record the virtual memory address of a section. */
1b6bc7e0
CF
123
124static void
125get_section_vmas (bfd *abfd, asection *sectp, void *context)
126{
3999122f
PM
127 struct pe_sections_info *data = context;
128 struct read_pe_section_data *sections = data->sections;
129 int sectix = get_pe_section_index (sectp->name, sections,
130 data->nb_sections);
1b6bc7e0
CF
131
132 if (sectix != PE_SECTION_INDEX_INVALID)
133 {
134 /* Data within the section start at rva_start in the pe and at
aff410f1 135 bfd_get_section_vma() within memory. Store the offset. */
1b6bc7e0
CF
136
137 sections[sectix].vma_offset
138 = bfd_get_section_vma (abfd, sectp) - sections[sectix].rva_start;
139 }
140}
141\f
3999122f
PM
142/* Create a minimal symbol entry for an exported symbol.
143 SYM_NAME contains the exported name or NULL if exported by ordinal,
144 FUNC_RVA contains the Relative Virtual Address of the symbol,
145 ORDINAL is the ordinal index value of the symbol,
146 SECTION_DATA contains information about the section in which the
147 symbol is declared,
148 DLL_NAME is the internal name of the DLL file,
149 OBJFILE is the objfile struct of DLL_NAME. */
1b6bc7e0
CF
150
151static void
3999122f 152add_pe_exported_sym (const char *sym_name,
1b6bc7e0 153 unsigned long func_rva,
3999122f 154 int ordinal,
1b6bc7e0
CF
155 const struct read_pe_section_data *section_data,
156 const char *dll_name, struct objfile *objfile)
157{
3999122f 158 char *qualified_name, *bare_name;
aff410f1 159 /* Add the stored offset to get the loaded address of the symbol. */
1b6bc7e0 160 CORE_ADDR vma = func_rva + section_data->vma_offset;
1b6bc7e0 161 int dll_name_len = strlen (dll_name);
1b6bc7e0
CF
162
163 /* Generate a (hopefully unique) qualified name using the first part
aff410f1
MS
164 of the dll name, e.g. KERNEL32!AddAtomA. This matches the style
165 used by windbg from the "Microsoft Debugging Tools for Windows". */
1b6bc7e0 166
3999122f
PM
167 if (sym_name == NULL || *sym_name == '\0')
168 bare_name = xstrprintf ("#%d", ordinal);
169 else
170 bare_name = xstrdup (sym_name);
171
172 qualified_name = xstrprintf ("%s!%s", dll_name, bare_name);
1b6bc7e0 173
3999122f
PM
174 if ((section_data->ms_type == mst_unknown) && debug_coff_pe_read)
175 fprintf_unfiltered (gdb_stdlog , _("Unknown section type for \"%s\""
176 " for entry \"%s\" in dll \"%s\"\n"),
177 section_data->section_name, sym_name, dll_name);
1b6bc7e0 178
3999122f
PM
179 prim_record_minimal_symbol (qualified_name, vma,
180 section_data->ms_type, objfile);
1b6bc7e0 181
3999122f
PM
182 /* Enter the plain name as well, which might not be unique. */
183 prim_record_minimal_symbol (bare_name, vma, section_data->ms_type, objfile);
184 if (debug_coff_pe_read > 1)
185 fprintf_unfiltered (gdb_stdlog, _("Adding exported symbol \"%s\""
186 " in dll \"%s\"\n"), sym_name, dll_name);
1b6bc7e0 187 xfree (qualified_name);
3999122f
PM
188 xfree (bare_name);
189}
190
191/* Create a minimal symbol entry for an exported forward symbol.
192 Return 1 if the forwarded function was found 0 otherwise.
193 SYM_NAME contains the exported name or NULL if exported by ordinal,
194 FORWARD_DLL_NAME is the name of the DLL in which the target symobl resides,
195 FORWARD_FUNC_NAME is the name of the target symbol in that DLL,
196 ORDINAL is the ordinal index value of the symbol,
197 DLL_NAME is the internal name of the DLL file,
198 OBJFILE is the objfile struct of DLL_NAME. */
199
200static int
201add_pe_forwarded_sym (const char *sym_name, const char *forward_dll_name,
202 const char *forward_func_name, int ordinal,
203 const char *dll_name, struct objfile *objfile)
204{
205 CORE_ADDR vma;
206 struct objfile *forward_objfile;
207 struct minimal_symbol *msymbol;
208 short section;
209 enum minimal_symbol_type msymtype;
210 int dll_name_len = strlen (dll_name);
211 char *qualified_name, *bare_name;
212 int forward_dll_name_len = strlen (forward_dll_name);
213 int forward_func_name_len = strlen (forward_func_name);
214 int forward_len = forward_dll_name_len + forward_func_name_len + 2;
215 char *forward_qualified_name = alloca (forward_len);
216
217 xsnprintf (forward_qualified_name, forward_len, "%s!%s", forward_dll_name,
218 forward_func_name);
219
220
221 msymbol = lookup_minimal_symbol_and_objfile (forward_qualified_name,
222 &forward_objfile);
223
224 if (!msymbol)
225 {
226 int i;
227
228 for (i = 0; i < forward_dll_name_len; i++)
229 forward_qualified_name[i] = tolower (forward_qualified_name[i]);
230 msymbol = lookup_minimal_symbol_and_objfile (forward_qualified_name,
231 &forward_objfile);
232 }
233
234 if (!msymbol)
235 {
236 if (debug_coff_pe_read)
237 fprintf_unfiltered (gdb_stdlog, _("Unable to find function \"%s\" in"
238 " dll \"%s\", forward of \"%s\" in dll \"%s\"\n"),
239 forward_func_name, forward_dll_name, sym_name,
240 dll_name);
241 return 0;
242 }
243
244 if (debug_coff_pe_read > 1)
245 fprintf_unfiltered (gdb_stdlog, _("Adding forwarded exported symbol"
246 " \"%s\" in dll \"%s\", pointing to \"%s\"\n"),
247 sym_name, dll_name, forward_qualified_name);
248
249 vma = SYMBOL_VALUE_ADDRESS (msymbol);
250 section = SYMBOL_SECTION (msymbol);
251 msymtype = MSYMBOL_TYPE (msymbol);
252
253 /* Generate a (hopefully unique) qualified name using the first part
254 of the dll name, e.g. KERNEL32!AddAtomA. This matches the style
255 used by windbg from the "Microsoft Debugging Tools for Windows". */
256
257 if (sym_name == NULL || *sym_name == '\0')
258 bare_name = xstrprintf ("#%d", ordinal);
259 else
260 bare_name = xstrdup (sym_name);
261
262 qualified_name = xstrprintf ("%s!%s", dll_name, bare_name);
263
264 prim_record_minimal_symbol (qualified_name, vma, msymtype, objfile);
1b6bc7e0 265
aff410f1 266 /* Enter the plain name as well, which might not be unique. */
3999122f
PM
267 prim_record_minimal_symbol (bare_name, vma, msymtype, objfile);
268 xfree (qualified_name);
269 xfree (bare_name);
270
271 return 1;
1b6bc7e0
CF
272}
273
3999122f 274/* Truncate a dll_name at the last dot character. */
1b6bc7e0
CF
275
276static void
277read_pe_truncate_name (char *dll_name)
278{
3999122f 279 char *last_point = strrchr (dll_name, '.');
1b6bc7e0 280
3999122f
PM
281 if (last_point != NULL)
282 *last_point = '\0';
1b6bc7e0
CF
283}
284\f
aff410f1 285/* Low-level support functions, direct from the ld module pe-dll.c. */
1b6bc7e0
CF
286static unsigned int
287pe_get16 (bfd *abfd, int where)
288{
289 unsigned char b[2];
290
291 bfd_seek (abfd, (file_ptr) where, SEEK_SET);
292 bfd_bread (b, (bfd_size_type) 2, abfd);
293 return b[0] + (b[1] << 8);
294}
295
296static unsigned int
297pe_get32 (bfd *abfd, int where)
298{
299 unsigned char b[4];
300
301 bfd_seek (abfd, (file_ptr) where, SEEK_SET);
302 bfd_bread (b, (bfd_size_type) 4, abfd);
303 return b[0] + (b[1] << 8) + (b[2] << 16) + (b[3] << 24);
304}
305
3999122f
PM
306static unsigned int
307pe_as16 (void *ptr)
308{
309 unsigned char *b = ptr;
310
311 return b[0] + (b[1] << 8);
312}
313
1b6bc7e0
CF
314static unsigned int
315pe_as32 (void *ptr)
316{
317 unsigned char *b = ptr;
318
319 return b[0] + (b[1] << 8) + (b[2] << 16) + (b[3] << 24);
320}
321\f
322/* Read the (non-debug) export symbol table from a portable
aff410f1
MS
323 executable. Code originally lifted from the ld function
324 pe_implied_import_dll in pe-dll.c. */
1b6bc7e0
CF
325
326void
327read_pe_exported_syms (struct objfile *objfile)
328{
329 bfd *dll = objfile->obfd;
3999122f 330 unsigned long nbnormal, nbforward;
1b6bc7e0 331 unsigned long pe_header_offset, opthdr_ofs, num_entries, i;
3999122f 332 unsigned long export_opthdrrva, export_opthdrsize;
1b6bc7e0
CF
333 unsigned long export_rva, export_size, nsections, secptr, expptr;
334 unsigned long exp_funcbase;
335 unsigned char *expdata, *erva;
336 unsigned long name_rvas, ordinals, nexp, ordbase;
3999122f
PM
337 char *dll_name = (char *) dll->filename;
338 int otherix = PE_SECTION_TABLE_SIZE;
339 int exportix = -1;
a68ddad5
KT
340 int is_pe64 = 0;
341 int is_pe32 = 0;
1b6bc7e0
CF
342
343 /* Array elements are for text, data and bss in that order
3999122f 344 Initialization with RVA_START > RVA_END guarantees that
aff410f1 345 unused sections won't be matched. */
3999122f
PM
346 struct read_pe_section_data *section_data;
347 struct pe_sections_info pe_sections_info;
1b6bc7e0 348
3999122f 349 struct cleanup *back_to = make_cleanup (null_cleanup, 0);
1b6bc7e0
CF
350
351 char const *target = bfd_get_target (objfile->obfd);
352
3999122f
PM
353 section_data = xzalloc (PE_SECTION_TABLE_SIZE
354 * sizeof (struct read_pe_section_data));
355
356 make_cleanup (free_current_contents, &section_data);
357
358 for (i=0; i < PE_SECTION_TABLE_SIZE; i++)
359 {
360 section_data[i].vma_offset = 0;
361 section_data[i].rva_start = 1;
362 section_data[i].rva_end = 0;
363 };
364 section_data[PE_SECTION_INDEX_TEXT].ms_type = mst_text;
365 section_data[PE_SECTION_INDEX_TEXT].section_name = ".text";
366 section_data[PE_SECTION_INDEX_DATA].ms_type = mst_data;
367 section_data[PE_SECTION_INDEX_DATA].section_name = ".data";
368 section_data[PE_SECTION_INDEX_BSS].ms_type = mst_bss;
369 section_data[PE_SECTION_INDEX_BSS].section_name = ".bss";
370
5e13bd89
PA
371 is_pe64 = (strcmp (target, "pe-x86-64") == 0
372 || strcmp (target, "pei-x86-64") == 0);
373 is_pe32 = (strcmp (target, "pe-i386") == 0
374 || strcmp (target, "pei-i386") == 0
375 || strcmp (target, "pe-arm-wince-little") == 0
376 || strcmp (target, "pei-arm-wince-little") == 0);
a68ddad5 377 if (!is_pe32 && !is_pe64)
1b6bc7e0 378 {
5e13bd89
PA
379 /* This is not a recognized PE format file. Abort now, because
380 the code is untested on anything else. *FIXME* test on
aff410f1 381 further architectures and loosen or remove this test. */
feb14725 382 do_cleanups (back_to);
1b6bc7e0
CF
383 return;
384 }
385
386 /* Get pe_header, optional header and numbers of export entries. */
387 pe_header_offset = pe_get32 (dll, 0x3c);
388 opthdr_ofs = pe_header_offset + 4 + 20;
a68ddad5 389 if (is_pe64)
1dac1b47 390 num_entries = pe_get32 (dll, opthdr_ofs + 108);
a68ddad5
KT
391 else
392 num_entries = pe_get32 (dll, opthdr_ofs + 92);
1b6bc7e0
CF
393
394 if (num_entries < 1) /* No exports. */
395 {
feb14725 396 do_cleanups (back_to);
1b6bc7e0
CF
397 return;
398 }
a68ddad5
KT
399 if (is_pe64)
400 {
3999122f
PM
401 export_opthdrrva = pe_get32 (dll, opthdr_ofs + 112);
402 export_opthdrsize = pe_get32 (dll, opthdr_ofs + 116);
a68ddad5
KT
403 }
404 else
405 {
3999122f
PM
406 export_opthdrrva = pe_get32 (dll, opthdr_ofs + 96);
407 export_opthdrsize = pe_get32 (dll, opthdr_ofs + 100);
a68ddad5 408 }
1b6bc7e0
CF
409 nsections = pe_get16 (dll, pe_header_offset + 4 + 2);
410 secptr = (pe_header_offset + 4 + 20 +
411 pe_get16 (dll, pe_header_offset + 4 + 16));
412 expptr = 0;
3999122f 413 export_size = 0;
1b6bc7e0
CF
414
415 /* Get the rva and size of the export section. */
416 for (i = 0; i < nsections; i++)
417 {
418 char sname[8];
419 unsigned long secptr1 = secptr + 40 * i;
420 unsigned long vaddr = pe_get32 (dll, secptr1 + 12);
421 unsigned long vsize = pe_get32 (dll, secptr1 + 16);
422 unsigned long fptr = pe_get32 (dll, secptr1 + 20);
423
424 bfd_seek (dll, (file_ptr) secptr1, SEEK_SET);
3999122f 425 bfd_bread (sname, (bfd_size_type) sizeof (sname), dll);
1b6bc7e0 426
3999122f
PM
427 if ((strcmp (sname, ".edata") == 0)
428 || (vaddr <= export_opthdrrva && export_opthdrrva < vaddr + vsize))
1b6bc7e0 429 {
3999122f
PM
430 if (strcmp (sname, ".edata") != 0)
431 {
432 if (debug_coff_pe_read)
433 fprintf_unfiltered (gdb_stdlog, _("Export RVA for dll "
434 "\"%s\" is in section \"%s\"\n"),
435 dll_name, sname);
436 }
437 else if (export_opthdrrva != vaddr && debug_coff_pe_read)
438 fprintf_unfiltered (gdb_stdlog, _("Wrong value of export RVA"
439 " for dll \"%s\": 0x%lx instead of 0x%lx\n"),
440 dll_name, export_opthdrrva, vaddr);
441 expptr = fptr + (export_opthdrrva - vaddr);
442 exportix = i;
1b6bc7e0
CF
443 break;
444 }
445 }
446
3999122f
PM
447 export_rva = export_opthdrrva;
448 export_size = export_opthdrsize;
449
1b6bc7e0
CF
450 if (export_size == 0)
451 {
aff410f1 452 /* Empty export table. */
feb14725 453 do_cleanups (back_to);
1b6bc7e0
CF
454 return;
455 }
456
aff410f1
MS
457 /* Scan sections and store the base and size of the relevant
458 sections. */
1b6bc7e0
CF
459 for (i = 0; i < nsections; i++)
460 {
461 unsigned long secptr1 = secptr + 40 * i;
462 unsigned long vsize = pe_get32 (dll, secptr1 + 8);
463 unsigned long vaddr = pe_get32 (dll, secptr1 + 12);
3999122f 464 unsigned long characteristics = pe_get32 (dll, secptr1 + 36);
aab2f004 465 char sec_name[SCNNMLEN + 1];
1b6bc7e0
CF
466 int sectix;
467
1b6bc7e0 468 bfd_seek (dll, (file_ptr) secptr1 + 0, SEEK_SET);
aab2f004
PA
469 bfd_bread (sec_name, (bfd_size_type) SCNNMLEN, dll);
470 sec_name[SCNNMLEN] = '\0';
1b6bc7e0
CF
471
472 sectix = read_pe_section_index (sec_name);
473
474 if (sectix != PE_SECTION_INDEX_INVALID)
475 {
476 section_data[sectix].rva_start = vaddr;
477 section_data[sectix].rva_end = vaddr + vsize;
478 }
3999122f
PM
479 else
480 {
481 char *name;
482
483 section_data = xrealloc (section_data, (otherix + 1)
484 * sizeof (struct read_pe_section_data));
485 name = xstrdup (sec_name);
486 section_data[otherix].section_name = name;
487 make_cleanup (xfree, name);
488 section_data[otherix].rva_start = vaddr;
489 section_data[otherix].rva_end = vaddr + vsize;
490 section_data[otherix].vma_offset = 0;
491 if (characteristics & IMAGE_SCN_CNT_CODE)
492 section_data[otherix].ms_type = mst_text;
493 else if (characteristics & IMAGE_SCN_CNT_INITIALIZED_DATA)
494 section_data[otherix].ms_type = mst_data;
495 else if (characteristics & IMAGE_SCN_CNT_UNINITIALIZED_DATA)
496 section_data[otherix].ms_type = mst_bss;
497 else
498 section_data[otherix].ms_type = mst_unknown;
499 otherix++;
500 }
1b6bc7e0
CF
501 }
502
503 expdata = (unsigned char *) xmalloc (export_size);
3999122f 504 make_cleanup (xfree, expdata);
1b6bc7e0
CF
505
506 bfd_seek (dll, (file_ptr) expptr, SEEK_SET);
507 bfd_bread (expdata, (bfd_size_type) export_size, dll);
508 erva = expdata - export_rva;
509
510 nexp = pe_as32 (expdata + 24);
511 name_rvas = pe_as32 (expdata + 32);
512 ordinals = pe_as32 (expdata + 36);
513 ordbase = pe_as32 (expdata + 16);
514 exp_funcbase = pe_as32 (expdata + 28);
515
aff410f1 516 /* Use internal dll name instead of full pathname. */
1b6bc7e0
CF
517 dll_name = pe_as32 (expdata + 12) + erva;
518
3999122f
PM
519 pe_sections_info.nb_sections = otherix;
520 pe_sections_info.sections = section_data;
521
522 bfd_map_over_sections (dll, get_section_vmas, &pe_sections_info);
1b6bc7e0
CF
523
524 /* Adjust the vma_offsets in case this PE got relocated. This
525 assumes that *all* sections share the same relocation offset
aff410f1 526 as the text section. */
3999122f 527 for (i = 0; i < otherix; i++)
1b6bc7e0
CF
528 {
529 section_data[i].vma_offset
530 += ANOFFSET (objfile->section_offsets, SECT_OFF_TEXT (objfile));
531 }
532
1b6bc7e0 533 /* Truncate name at first dot. Should maybe also convert to all
aff410f1 534 lower case for convenience on Windows. */
1b6bc7e0
CF
535 read_pe_truncate_name (dll_name);
536
3999122f
PM
537 if (debug_coff_pe_read)
538 fprintf_unfiltered (gdb_stdlog, _("DLL \"%s\" has %ld export entries,"
539 " base=%ld\n"), dll_name, nexp, ordbase);
540 nbforward = 0;
541 nbnormal = 0;
1b6bc7e0
CF
542 /* Iterate through the list of symbols. */
543 for (i = 0; i < nexp; i++)
544 {
545 /* Pointer to the names vector. */
546 unsigned long name_rva = pe_as32 (erva + name_rvas + i * 4);
3999122f
PM
547 /* Retrieve ordinal value. */
548
549 unsigned long ordinal = pe_as16 (erva + ordinals + i * 2);
550
1b6bc7e0
CF
551
552 /* Pointer to the function address vector. */
3999122f
PM
553 /* This is relatived to ordinal value. */
554 unsigned long func_rva = pe_as32 (erva + exp_funcbase +
555 ordinal * 4);
1b6bc7e0 556
aff410f1 557 /* Find this symbol's section in our own array. */
1b6bc7e0 558 int sectix = 0;
3999122f
PM
559 int section_found = 0;
560
561 /* First handle forward cases. */
562 if (func_rva >= export_rva && func_rva < export_rva + export_size)
563 {
564 char *forward_name = (char *) (erva + func_rva);
565 char *funcname = (char *) (erva + name_rva);
566 char *forward_dll_name = forward_name;
567 char *forward_func_name = forward_name;
568 char *sep = strrchr (forward_name, '.');
569
570 if (sep)
571 {
572 int len = (int) (sep - forward_name);
1b6bc7e0 573
3999122f
PM
574 forward_dll_name = alloca (len + 1);
575 strncpy (forward_dll_name, forward_name, len);
576 forward_dll_name[len] = '\0';
577 forward_func_name = ++sep;
578 }
579 if (add_pe_forwarded_sym (funcname, forward_dll_name,
580 forward_func_name, ordinal,
581 dll_name, objfile) != 0)
582 ++nbforward;
583 continue;
584 }
585
586 for (sectix = 0; sectix < otherix; ++sectix)
1b6bc7e0
CF
587 {
588 if ((func_rva >= section_data[sectix].rva_start)
589 && (func_rva < section_data[sectix].rva_end))
590 {
3999122f 591 section_found = 1;
1b6bc7e0 592 add_pe_exported_sym (erva + name_rva,
3999122f 593 func_rva, ordinal,
1b6bc7e0 594 section_data + sectix, dll_name, objfile);
3999122f 595 ++nbnormal;
1b6bc7e0
CF
596 break;
597 }
598 }
3999122f
PM
599 if (!section_found)
600 {
601 char *funcname = (char *) (erva + name_rva);
602
603 if (name_rva == 0)
604 {
605 add_pe_exported_sym (NULL, func_rva, ordinal,
606 section_data, dll_name, objfile);
607 ++nbnormal;
608 }
609 else if (debug_coff_pe_read)
610 fprintf_unfiltered (gdb_stdlog, _("Export name \"%s\" ord. %lu,"
611 " RVA 0x%lx in dll \"%s\" not handled\n"),
612 funcname, ordinal, func_rva, dll_name);
613 }
1b6bc7e0
CF
614 }
615
3999122f
PM
616 if (debug_coff_pe_read)
617 fprintf_unfiltered (gdb_stdlog, _("Finished reading \"%s\", exports %ld,"
618 " forwards %ld, total %ld/%ld.\n"), dll_name, nbnormal,
619 nbforward, nbnormal + nbforward, nexp);
620 /* Discard expdata and section_data. */
1b6bc7e0
CF
621 do_cleanups (back_to);
622}
3999122f
PM
623
624/* Extract from ABFD the offset of the .text section.
625 This offset is mainly related to the offset within the file.
626 The value was previously expected to be 0x1000 for all files,
627 but some Windows OS core DLLs seem to use 0x10000 section alignement
628 which modified the return value of that function.
629 Still return default 0x1000 value if ABFD is NULL or
630 if '.text' section is not found, but that should not happen... */
631
632#define DEFAULT_COFF_PE_TEXT_SECTION_OFFSET 0x1000
633
634CORE_ADDR
635pe_text_section_offset (struct bfd *abfd)
636
637{
638 unsigned long pe_header_offset, opthdr_ofs, num_entries, i;
639 unsigned long export_rva, export_size, nsections, secptr, expptr;
640 unsigned long exp_funcbase;
641 unsigned char *expdata, *erva;
642 unsigned long name_rvas, ordinals, nexp, ordbase;
643 char *dll_name;
644 int is_pe64 = 0;
645 int is_pe32 = 0;
646 char const *target;
647
648 if (!abfd)
649 return DEFAULT_COFF_PE_TEXT_SECTION_OFFSET;
650
651 target = bfd_get_target (abfd);
652
653 is_pe64 = (strcmp (target, "pe-x86-64") == 0
654 || strcmp (target, "pei-x86-64") == 0);
655 is_pe32 = (strcmp (target, "pe-i386") == 0
656 || strcmp (target, "pei-i386") == 0
657 || strcmp (target, "pe-arm-wince-little") == 0
658 || strcmp (target, "pei-arm-wince-little") == 0);
659
660 if (!is_pe32 && !is_pe64)
661 {
662 /* This is not a recognized PE format file. Abort now, because
663 the code is untested on anything else. *FIXME* test on
664 further architectures and loosen or remove this test. */
665 return DEFAULT_COFF_PE_TEXT_SECTION_OFFSET;
666 }
667
668 /* Get pe_header, optional header and numbers of sections. */
669 pe_header_offset = pe_get32 (abfd, 0x3c);
670 opthdr_ofs = pe_header_offset + 4 + 20;
671 nsections = pe_get16 (abfd, pe_header_offset + 4 + 2);
672 secptr = (pe_header_offset + 4 + 20 +
673 pe_get16 (abfd, pe_header_offset + 4 + 16));
674
675 /* Get the rva and size of the export section. */
676 for (i = 0; i < nsections; i++)
677 {
d8f4a83e 678 char sname[SCNNMLEN + 1];
3999122f
PM
679 unsigned long secptr1 = secptr + 40 * i;
680 unsigned long vaddr = pe_get32 (abfd, secptr1 + 12);
681
682 bfd_seek (abfd, (file_ptr) secptr1, SEEK_SET);
d8f4a83e
PM
683 bfd_bread (sname, (bfd_size_type) SCNNMLEN, abfd);
684 sname[SCNNMLEN] = '\0';
3999122f
PM
685 if (strcmp (sname, ".text") == 0)
686 return vaddr;
687 }
688
689 return DEFAULT_COFF_PE_TEXT_SECTION_OFFSET;
690}
691
692/* Implements "show debug coff_pe_read" command. */
693
694static void
695show_debug_coff_pe_read (struct ui_file *file, int from_tty,
696 struct cmd_list_element *c, const char *value)
697{
698 fprintf_filtered (file, _("Coff PE read debugging is %s.\n"), value);
699}
700
701/* Provide a prototype to silence -Wmissing-prototypes. */
702
703void _initialize_coff_pe_read (void);
704
705/* Adds "Set/show debug coff_pe_read" commands. */
706
707void
708_initialize_coff_pe_read (void)
709{
826ecc4d 710 add_setshow_zuinteger_cmd ("coff-pe-read", class_maintenance,
b75bf488
PA
711 &debug_coff_pe_read,
712 _("Set coff PE read debugging."),
713 _("Show coff PE read debugging."),
714 _("When set, debugging messages for coff reading "
715 "of exported symbols are displayed."),
716 NULL, show_debug_coff_pe_read,
717 &setdebuglist, &showdebuglist);
3999122f 718}
This page took 0.754712 seconds and 4 git commands to generate.