gdb/doc/
[deliverable/binutils-gdb.git] / gdb / coff-pe-read.c
CommitLineData
1b6bc7e0
CF
1/* Read the export table symbols from a portable executable and
2 convert to internal format, for GDB. Used as a last resort if no
3 debugging symbols recognized.
4
28e7fd62 5 Copyright (C) 2003-2013 Free Software Foundation, Inc.
1b6bc7e0
CF
6
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
1b6bc7e0
CF
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>.
1b6bc7e0 21
aff410f1 22 Contributed by Raoul M. Gough (RaoulGough@yahoo.co.uk). */
1b6bc7e0 23
0baeab03
PA
24#include "defs.h"
25
1b6bc7e0
CF
26#include "coff-pe-read.h"
27
81de56be 28#include "bfd.h"
1b6bc7e0
CF
29#include "gdbtypes.h"
30
3999122f
PM
31#include "command.h"
32#include "gdbcmd.h"
1b6bc7e0
CF
33#include "symtab.h"
34#include "symfile.h"
35#include "objfiles.h"
3999122f 36#include "common/common-utils.h"
aab2f004 37#include "coff/internal.h"
3999122f
PM
38
39#include <ctype.h>
1b6bc7e0
CF
40
41/* Internal section information */
42
3999122f
PM
43/* Coff PE read debugging flag:
44 default value is 0,
45 value 1 outputs problems encountered while parsing PE file,
46 value above 1 also lists all generated minimal symbols. */
47static unsigned int debug_coff_pe_read;
48
1b6bc7e0
CF
49struct read_pe_section_data
50{
aff410f1
MS
51 CORE_ADDR vma_offset; /* Offset to loaded address of section. */
52 unsigned long rva_start; /* Start offset within the pe. */
53 unsigned long rva_end; /* End offset within the pe. */
54 enum minimal_symbol_type ms_type; /* Type to assign symbols in
55 section. */
3999122f 56 char *section_name; /* Recorded section name. */
1b6bc7e0
CF
57};
58
78ea0eca
PM
59#define IMAGE_SCN_CNT_CODE 0x20
60#define IMAGE_SCN_CNT_INITIALIZED_DATA 0x40
61#define IMAGE_SCN_CNT_UNINITIALIZED_DATA 0x80
1b6bc7e0
CF
62#define PE_SECTION_INDEX_TEXT 0
63#define PE_SECTION_INDEX_DATA 1
64#define PE_SECTION_INDEX_BSS 2
65#define PE_SECTION_TABLE_SIZE 3
66#define PE_SECTION_INDEX_INVALID -1
67\f
68/* Get the index of the named section in our own array, which contains
aff410f1
MS
69 text, data and bss in that order. Return PE_SECTION_INDEX_INVALID
70 if passed an unrecognised section name. */
1b6bc7e0
CF
71
72static int
73read_pe_section_index (const char *section_name)
74{
75 if (strcmp (section_name, ".text") == 0)
76 {
77 return PE_SECTION_INDEX_TEXT;
78 }
79
80 else if (strcmp (section_name, ".data") == 0)
81 {
82 return PE_SECTION_INDEX_DATA;
83 }
84
85 else if (strcmp (section_name, ".bss") == 0)
86 {
87 return PE_SECTION_INDEX_BSS;
88 }
89
90 else
91 {
92 return PE_SECTION_INDEX_INVALID;
93 }
94}
95
3999122f
PM
96/* Get the index of the named section in our own full arrayi.
97 text, data and bss in that order. Return PE_SECTION_INDEX_INVALID
98 if passed an unrecognised section name. */
99
100static int
101get_pe_section_index (const char *section_name,
102 struct read_pe_section_data *sections,
103 int nb_sections)
104{
105 int i;
106
107 for (i = 0; i < nb_sections; i++)
108 if (strcmp (sections[i].section_name, section_name) == 0)
109 return i;
110 return PE_SECTION_INDEX_INVALID;
111}
112
113/* Structure used by get_section_vmas function below
114 to access section_data array and the size of the array
115 stored in nb_sections field. */
116struct pe_sections_info
117{
118 int nb_sections;
119 struct read_pe_section_data *sections;
120};
121
aff410f1 122/* Record the virtual memory address of a section. */
1b6bc7e0
CF
123
124static void
125get_section_vmas (bfd *abfd, asection *sectp, void *context)
126{
3999122f
PM
127 struct pe_sections_info *data = context;
128 struct read_pe_section_data *sections = data->sections;
129 int sectix = get_pe_section_index (sectp->name, sections,
130 data->nb_sections);
1b6bc7e0
CF
131
132 if (sectix != PE_SECTION_INDEX_INVALID)
133 {
134 /* Data within the section start at rva_start in the pe and at
aff410f1 135 bfd_get_section_vma() within memory. Store the offset. */
1b6bc7e0
CF
136
137 sections[sectix].vma_offset
138 = bfd_get_section_vma (abfd, sectp) - sections[sectix].rva_start;
139 }
140}
141\f
3999122f
PM
142/* Create a minimal symbol entry for an exported symbol.
143 SYM_NAME contains the exported name or NULL if exported by ordinal,
144 FUNC_RVA contains the Relative Virtual Address of the symbol,
145 ORDINAL is the ordinal index value of the symbol,
146 SECTION_DATA contains information about the section in which the
147 symbol is declared,
148 DLL_NAME is the internal name of the DLL file,
149 OBJFILE is the objfile struct of DLL_NAME. */
1b6bc7e0
CF
150
151static void
3999122f 152add_pe_exported_sym (const char *sym_name,
1b6bc7e0 153 unsigned long func_rva,
3999122f 154 int ordinal,
1b6bc7e0
CF
155 const struct read_pe_section_data *section_data,
156 const char *dll_name, struct objfile *objfile)
157{
3999122f 158 char *qualified_name, *bare_name;
aff410f1 159 /* Add the stored offset to get the loaded address of the symbol. */
1b6bc7e0 160 CORE_ADDR vma = func_rva + section_data->vma_offset;
1b6bc7e0
CF
161
162 /* Generate a (hopefully unique) qualified name using the first part
aff410f1
MS
163 of the dll name, e.g. KERNEL32!AddAtomA. This matches the style
164 used by windbg from the "Microsoft Debugging Tools for Windows". */
1b6bc7e0 165
3999122f
PM
166 if (sym_name == NULL || *sym_name == '\0')
167 bare_name = xstrprintf ("#%d", ordinal);
168 else
169 bare_name = xstrdup (sym_name);
170
171 qualified_name = xstrprintf ("%s!%s", dll_name, bare_name);
1b6bc7e0 172
3999122f
PM
173 if ((section_data->ms_type == mst_unknown) && debug_coff_pe_read)
174 fprintf_unfiltered (gdb_stdlog , _("Unknown section type for \"%s\""
175 " for entry \"%s\" in dll \"%s\"\n"),
176 section_data->section_name, sym_name, dll_name);
1b6bc7e0 177
3999122f
PM
178 prim_record_minimal_symbol (qualified_name, vma,
179 section_data->ms_type, objfile);
1b6bc7e0 180
3999122f
PM
181 /* Enter the plain name as well, which might not be unique. */
182 prim_record_minimal_symbol (bare_name, vma, section_data->ms_type, objfile);
183 if (debug_coff_pe_read > 1)
184 fprintf_unfiltered (gdb_stdlog, _("Adding exported symbol \"%s\""
185 " in dll \"%s\"\n"), sym_name, dll_name);
1b6bc7e0 186 xfree (qualified_name);
3999122f
PM
187 xfree (bare_name);
188}
189
190/* Create a minimal symbol entry for an exported forward symbol.
191 Return 1 if the forwarded function was found 0 otherwise.
192 SYM_NAME contains the exported name or NULL if exported by ordinal,
193 FORWARD_DLL_NAME is the name of the DLL in which the target symobl resides,
194 FORWARD_FUNC_NAME is the name of the target symbol in that DLL,
195 ORDINAL is the ordinal index value of the symbol,
196 DLL_NAME is the internal name of the DLL file,
197 OBJFILE is the objfile struct of DLL_NAME. */
198
199static int
200add_pe_forwarded_sym (const char *sym_name, const char *forward_dll_name,
201 const char *forward_func_name, int ordinal,
202 const char *dll_name, struct objfile *objfile)
203{
204 CORE_ADDR vma;
205 struct objfile *forward_objfile;
206 struct minimal_symbol *msymbol;
3999122f 207 enum minimal_symbol_type msymtype;
3999122f
PM
208 char *qualified_name, *bare_name;
209 int forward_dll_name_len = strlen (forward_dll_name);
210 int forward_func_name_len = strlen (forward_func_name);
211 int forward_len = forward_dll_name_len + forward_func_name_len + 2;
212 char *forward_qualified_name = alloca (forward_len);
213
214 xsnprintf (forward_qualified_name, forward_len, "%s!%s", forward_dll_name,
215 forward_func_name);
216
217
218 msymbol = lookup_minimal_symbol_and_objfile (forward_qualified_name,
219 &forward_objfile);
220
221 if (!msymbol)
222 {
223 int i;
224
225 for (i = 0; i < forward_dll_name_len; i++)
226 forward_qualified_name[i] = tolower (forward_qualified_name[i]);
227 msymbol = lookup_minimal_symbol_and_objfile (forward_qualified_name,
228 &forward_objfile);
229 }
230
231 if (!msymbol)
232 {
233 if (debug_coff_pe_read)
234 fprintf_unfiltered (gdb_stdlog, _("Unable to find function \"%s\" in"
235 " dll \"%s\", forward of \"%s\" in dll \"%s\"\n"),
236 forward_func_name, forward_dll_name, sym_name,
237 dll_name);
238 return 0;
239 }
240
241 if (debug_coff_pe_read > 1)
242 fprintf_unfiltered (gdb_stdlog, _("Adding forwarded exported symbol"
243 " \"%s\" in dll \"%s\", pointing to \"%s\"\n"),
244 sym_name, dll_name, forward_qualified_name);
245
246 vma = SYMBOL_VALUE_ADDRESS (msymbol);
3999122f
PM
247 msymtype = MSYMBOL_TYPE (msymbol);
248
249 /* Generate a (hopefully unique) qualified name using the first part
250 of the dll name, e.g. KERNEL32!AddAtomA. This matches the style
251 used by windbg from the "Microsoft Debugging Tools for Windows". */
252
253 if (sym_name == NULL || *sym_name == '\0')
254 bare_name = xstrprintf ("#%d", ordinal);
255 else
256 bare_name = xstrdup (sym_name);
257
258 qualified_name = xstrprintf ("%s!%s", dll_name, bare_name);
259
260 prim_record_minimal_symbol (qualified_name, vma, msymtype, objfile);
1b6bc7e0 261
aff410f1 262 /* Enter the plain name as well, which might not be unique. */
3999122f
PM
263 prim_record_minimal_symbol (bare_name, vma, msymtype, objfile);
264 xfree (qualified_name);
265 xfree (bare_name);
266
267 return 1;
1b6bc7e0
CF
268}
269
3999122f 270/* Truncate a dll_name at the last dot character. */
1b6bc7e0
CF
271
272static void
273read_pe_truncate_name (char *dll_name)
274{
3999122f 275 char *last_point = strrchr (dll_name, '.');
1b6bc7e0 276
3999122f
PM
277 if (last_point != NULL)
278 *last_point = '\0';
1b6bc7e0
CF
279}
280\f
aff410f1 281/* Low-level support functions, direct from the ld module pe-dll.c. */
1b6bc7e0
CF
282static unsigned int
283pe_get16 (bfd *abfd, int where)
284{
285 unsigned char b[2];
286
287 bfd_seek (abfd, (file_ptr) where, SEEK_SET);
288 bfd_bread (b, (bfd_size_type) 2, abfd);
289 return b[0] + (b[1] << 8);
290}
291
292static unsigned int
293pe_get32 (bfd *abfd, int where)
294{
295 unsigned char b[4];
296
297 bfd_seek (abfd, (file_ptr) where, SEEK_SET);
298 bfd_bread (b, (bfd_size_type) 4, abfd);
299 return b[0] + (b[1] << 8) + (b[2] << 16) + (b[3] << 24);
300}
301
3999122f
PM
302static unsigned int
303pe_as16 (void *ptr)
304{
305 unsigned char *b = ptr;
306
307 return b[0] + (b[1] << 8);
308}
309
1b6bc7e0
CF
310static unsigned int
311pe_as32 (void *ptr)
312{
313 unsigned char *b = ptr;
314
315 return b[0] + (b[1] << 8) + (b[2] << 16) + (b[3] << 24);
316}
317\f
318/* Read the (non-debug) export symbol table from a portable
aff410f1
MS
319 executable. Code originally lifted from the ld function
320 pe_implied_import_dll in pe-dll.c. */
1b6bc7e0
CF
321
322void
323read_pe_exported_syms (struct objfile *objfile)
324{
325 bfd *dll = objfile->obfd;
3999122f 326 unsigned long nbnormal, nbforward;
1b6bc7e0 327 unsigned long pe_header_offset, opthdr_ofs, num_entries, i;
3999122f 328 unsigned long export_opthdrrva, export_opthdrsize;
1b6bc7e0
CF
329 unsigned long export_rva, export_size, nsections, secptr, expptr;
330 unsigned long exp_funcbase;
331 unsigned char *expdata, *erva;
332 unsigned long name_rvas, ordinals, nexp, ordbase;
3999122f
PM
333 char *dll_name = (char *) dll->filename;
334 int otherix = PE_SECTION_TABLE_SIZE;
a68ddad5
KT
335 int is_pe64 = 0;
336 int is_pe32 = 0;
1b6bc7e0
CF
337
338 /* Array elements are for text, data and bss in that order
3999122f 339 Initialization with RVA_START > RVA_END guarantees that
aff410f1 340 unused sections won't be matched. */
3999122f
PM
341 struct read_pe_section_data *section_data;
342 struct pe_sections_info pe_sections_info;
1b6bc7e0 343
3999122f 344 struct cleanup *back_to = make_cleanup (null_cleanup, 0);
1b6bc7e0
CF
345
346 char const *target = bfd_get_target (objfile->obfd);
347
3999122f
PM
348 section_data = xzalloc (PE_SECTION_TABLE_SIZE
349 * sizeof (struct read_pe_section_data));
350
351 make_cleanup (free_current_contents, &section_data);
352
353 for (i=0; i < PE_SECTION_TABLE_SIZE; i++)
354 {
355 section_data[i].vma_offset = 0;
356 section_data[i].rva_start = 1;
357 section_data[i].rva_end = 0;
358 };
359 section_data[PE_SECTION_INDEX_TEXT].ms_type = mst_text;
360 section_data[PE_SECTION_INDEX_TEXT].section_name = ".text";
361 section_data[PE_SECTION_INDEX_DATA].ms_type = mst_data;
362 section_data[PE_SECTION_INDEX_DATA].section_name = ".data";
363 section_data[PE_SECTION_INDEX_BSS].ms_type = mst_bss;
364 section_data[PE_SECTION_INDEX_BSS].section_name = ".bss";
365
5e13bd89
PA
366 is_pe64 = (strcmp (target, "pe-x86-64") == 0
367 || strcmp (target, "pei-x86-64") == 0);
368 is_pe32 = (strcmp (target, "pe-i386") == 0
369 || strcmp (target, "pei-i386") == 0
370 || strcmp (target, "pe-arm-wince-little") == 0
371 || strcmp (target, "pei-arm-wince-little") == 0);
a68ddad5 372 if (!is_pe32 && !is_pe64)
1b6bc7e0 373 {
5e13bd89
PA
374 /* This is not a recognized PE format file. Abort now, because
375 the code is untested on anything else. *FIXME* test on
aff410f1 376 further architectures and loosen or remove this test. */
feb14725 377 do_cleanups (back_to);
1b6bc7e0
CF
378 return;
379 }
380
381 /* Get pe_header, optional header and numbers of export entries. */
382 pe_header_offset = pe_get32 (dll, 0x3c);
383 opthdr_ofs = pe_header_offset + 4 + 20;
a68ddad5 384 if (is_pe64)
1dac1b47 385 num_entries = pe_get32 (dll, opthdr_ofs + 108);
a68ddad5
KT
386 else
387 num_entries = pe_get32 (dll, opthdr_ofs + 92);
1b6bc7e0
CF
388
389 if (num_entries < 1) /* No exports. */
390 {
feb14725 391 do_cleanups (back_to);
1b6bc7e0
CF
392 return;
393 }
a68ddad5
KT
394 if (is_pe64)
395 {
3999122f
PM
396 export_opthdrrva = pe_get32 (dll, opthdr_ofs + 112);
397 export_opthdrsize = pe_get32 (dll, opthdr_ofs + 116);
a68ddad5
KT
398 }
399 else
400 {
3999122f
PM
401 export_opthdrrva = pe_get32 (dll, opthdr_ofs + 96);
402 export_opthdrsize = pe_get32 (dll, opthdr_ofs + 100);
a68ddad5 403 }
1b6bc7e0
CF
404 nsections = pe_get16 (dll, pe_header_offset + 4 + 2);
405 secptr = (pe_header_offset + 4 + 20 +
406 pe_get16 (dll, pe_header_offset + 4 + 16));
407 expptr = 0;
3999122f 408 export_size = 0;
1b6bc7e0
CF
409
410 /* Get the rva and size of the export section. */
411 for (i = 0; i < nsections; i++)
412 {
413 char sname[8];
414 unsigned long secptr1 = secptr + 40 * i;
415 unsigned long vaddr = pe_get32 (dll, secptr1 + 12);
416 unsigned long vsize = pe_get32 (dll, secptr1 + 16);
417 unsigned long fptr = pe_get32 (dll, secptr1 + 20);
418
419 bfd_seek (dll, (file_ptr) secptr1, SEEK_SET);
3999122f 420 bfd_bread (sname, (bfd_size_type) sizeof (sname), dll);
1b6bc7e0 421
3999122f
PM
422 if ((strcmp (sname, ".edata") == 0)
423 || (vaddr <= export_opthdrrva && export_opthdrrva < vaddr + vsize))
1b6bc7e0 424 {
3999122f
PM
425 if (strcmp (sname, ".edata") != 0)
426 {
427 if (debug_coff_pe_read)
428 fprintf_unfiltered (gdb_stdlog, _("Export RVA for dll "
429 "\"%s\" is in section \"%s\"\n"),
430 dll_name, sname);
431 }
432 else if (export_opthdrrva != vaddr && debug_coff_pe_read)
433 fprintf_unfiltered (gdb_stdlog, _("Wrong value of export RVA"
434 " for dll \"%s\": 0x%lx instead of 0x%lx\n"),
435 dll_name, export_opthdrrva, vaddr);
436 expptr = fptr + (export_opthdrrva - vaddr);
1b6bc7e0
CF
437 break;
438 }
439 }
440
3999122f
PM
441 export_rva = export_opthdrrva;
442 export_size = export_opthdrsize;
443
1b6bc7e0
CF
444 if (export_size == 0)
445 {
aff410f1 446 /* Empty export table. */
feb14725 447 do_cleanups (back_to);
1b6bc7e0
CF
448 return;
449 }
450
aff410f1
MS
451 /* Scan sections and store the base and size of the relevant
452 sections. */
1b6bc7e0
CF
453 for (i = 0; i < nsections; i++)
454 {
455 unsigned long secptr1 = secptr + 40 * i;
456 unsigned long vsize = pe_get32 (dll, secptr1 + 8);
457 unsigned long vaddr = pe_get32 (dll, secptr1 + 12);
3999122f 458 unsigned long characteristics = pe_get32 (dll, secptr1 + 36);
aab2f004 459 char sec_name[SCNNMLEN + 1];
1b6bc7e0
CF
460 int sectix;
461
1b6bc7e0 462 bfd_seek (dll, (file_ptr) secptr1 + 0, SEEK_SET);
aab2f004
PA
463 bfd_bread (sec_name, (bfd_size_type) SCNNMLEN, dll);
464 sec_name[SCNNMLEN] = '\0';
1b6bc7e0
CF
465
466 sectix = read_pe_section_index (sec_name);
467
468 if (sectix != PE_SECTION_INDEX_INVALID)
469 {
470 section_data[sectix].rva_start = vaddr;
471 section_data[sectix].rva_end = vaddr + vsize;
472 }
3999122f
PM
473 else
474 {
475 char *name;
476
477 section_data = xrealloc (section_data, (otherix + 1)
478 * sizeof (struct read_pe_section_data));
479 name = xstrdup (sec_name);
480 section_data[otherix].section_name = name;
481 make_cleanup (xfree, name);
482 section_data[otherix].rva_start = vaddr;
483 section_data[otherix].rva_end = vaddr + vsize;
484 section_data[otherix].vma_offset = 0;
485 if (characteristics & IMAGE_SCN_CNT_CODE)
486 section_data[otherix].ms_type = mst_text;
487 else if (characteristics & IMAGE_SCN_CNT_INITIALIZED_DATA)
488 section_data[otherix].ms_type = mst_data;
489 else if (characteristics & IMAGE_SCN_CNT_UNINITIALIZED_DATA)
490 section_data[otherix].ms_type = mst_bss;
491 else
492 section_data[otherix].ms_type = mst_unknown;
493 otherix++;
494 }
1b6bc7e0
CF
495 }
496
497 expdata = (unsigned char *) xmalloc (export_size);
3999122f 498 make_cleanup (xfree, expdata);
1b6bc7e0
CF
499
500 bfd_seek (dll, (file_ptr) expptr, SEEK_SET);
501 bfd_bread (expdata, (bfd_size_type) export_size, dll);
502 erva = expdata - export_rva;
503
504 nexp = pe_as32 (expdata + 24);
505 name_rvas = pe_as32 (expdata + 32);
506 ordinals = pe_as32 (expdata + 36);
507 ordbase = pe_as32 (expdata + 16);
508 exp_funcbase = pe_as32 (expdata + 28);
509
aff410f1 510 /* Use internal dll name instead of full pathname. */
1b6bc7e0
CF
511 dll_name = pe_as32 (expdata + 12) + erva;
512
3999122f
PM
513 pe_sections_info.nb_sections = otherix;
514 pe_sections_info.sections = section_data;
515
516 bfd_map_over_sections (dll, get_section_vmas, &pe_sections_info);
1b6bc7e0
CF
517
518 /* Adjust the vma_offsets in case this PE got relocated. This
519 assumes that *all* sections share the same relocation offset
aff410f1 520 as the text section. */
3999122f 521 for (i = 0; i < otherix; i++)
1b6bc7e0
CF
522 {
523 section_data[i].vma_offset
524 += ANOFFSET (objfile->section_offsets, SECT_OFF_TEXT (objfile));
525 }
526
1b6bc7e0 527 /* Truncate name at first dot. Should maybe also convert to all
aff410f1 528 lower case for convenience on Windows. */
1b6bc7e0
CF
529 read_pe_truncate_name (dll_name);
530
3999122f
PM
531 if (debug_coff_pe_read)
532 fprintf_unfiltered (gdb_stdlog, _("DLL \"%s\" has %ld export entries,"
533 " base=%ld\n"), dll_name, nexp, ordbase);
534 nbforward = 0;
535 nbnormal = 0;
1b6bc7e0
CF
536 /* Iterate through the list of symbols. */
537 for (i = 0; i < nexp; i++)
538 {
539 /* Pointer to the names vector. */
540 unsigned long name_rva = pe_as32 (erva + name_rvas + i * 4);
3999122f
PM
541 /* Retrieve ordinal value. */
542
543 unsigned long ordinal = pe_as16 (erva + ordinals + i * 2);
544
1b6bc7e0
CF
545
546 /* Pointer to the function address vector. */
3999122f
PM
547 /* This is relatived to ordinal value. */
548 unsigned long func_rva = pe_as32 (erva + exp_funcbase +
549 ordinal * 4);
1b6bc7e0 550
aff410f1 551 /* Find this symbol's section in our own array. */
1b6bc7e0 552 int sectix = 0;
3999122f
PM
553 int section_found = 0;
554
555 /* First handle forward cases. */
556 if (func_rva >= export_rva && func_rva < export_rva + export_size)
557 {
558 char *forward_name = (char *) (erva + func_rva);
559 char *funcname = (char *) (erva + name_rva);
560 char *forward_dll_name = forward_name;
561 char *forward_func_name = forward_name;
562 char *sep = strrchr (forward_name, '.');
563
564 if (sep)
565 {
566 int len = (int) (sep - forward_name);
1b6bc7e0 567
3999122f
PM
568 forward_dll_name = alloca (len + 1);
569 strncpy (forward_dll_name, forward_name, len);
570 forward_dll_name[len] = '\0';
571 forward_func_name = ++sep;
572 }
573 if (add_pe_forwarded_sym (funcname, forward_dll_name,
574 forward_func_name, ordinal,
575 dll_name, objfile) != 0)
576 ++nbforward;
577 continue;
578 }
579
580 for (sectix = 0; sectix < otherix; ++sectix)
1b6bc7e0
CF
581 {
582 if ((func_rva >= section_data[sectix].rva_start)
583 && (func_rva < section_data[sectix].rva_end))
584 {
3999122f 585 section_found = 1;
1b6bc7e0 586 add_pe_exported_sym (erva + name_rva,
3999122f 587 func_rva, ordinal,
1b6bc7e0 588 section_data + sectix, dll_name, objfile);
3999122f 589 ++nbnormal;
1b6bc7e0
CF
590 break;
591 }
592 }
3999122f
PM
593 if (!section_found)
594 {
595 char *funcname = (char *) (erva + name_rva);
596
597 if (name_rva == 0)
598 {
599 add_pe_exported_sym (NULL, func_rva, ordinal,
600 section_data, dll_name, objfile);
601 ++nbnormal;
602 }
603 else if (debug_coff_pe_read)
604 fprintf_unfiltered (gdb_stdlog, _("Export name \"%s\" ord. %lu,"
605 " RVA 0x%lx in dll \"%s\" not handled\n"),
606 funcname, ordinal, func_rva, dll_name);
607 }
1b6bc7e0
CF
608 }
609
3999122f
PM
610 if (debug_coff_pe_read)
611 fprintf_unfiltered (gdb_stdlog, _("Finished reading \"%s\", exports %ld,"
612 " forwards %ld, total %ld/%ld.\n"), dll_name, nbnormal,
613 nbforward, nbnormal + nbforward, nexp);
614 /* Discard expdata and section_data. */
1b6bc7e0
CF
615 do_cleanups (back_to);
616}
3999122f
PM
617
618/* Extract from ABFD the offset of the .text section.
619 This offset is mainly related to the offset within the file.
620 The value was previously expected to be 0x1000 for all files,
621 but some Windows OS core DLLs seem to use 0x10000 section alignement
622 which modified the return value of that function.
623 Still return default 0x1000 value if ABFD is NULL or
624 if '.text' section is not found, but that should not happen... */
625
626#define DEFAULT_COFF_PE_TEXT_SECTION_OFFSET 0x1000
627
628CORE_ADDR
629pe_text_section_offset (struct bfd *abfd)
630
631{
cebca8c1
AR
632 unsigned long pe_header_offset, i;
633 unsigned long nsections, secptr;
3999122f
PM
634 int is_pe64 = 0;
635 int is_pe32 = 0;
636 char const *target;
637
638 if (!abfd)
639 return DEFAULT_COFF_PE_TEXT_SECTION_OFFSET;
640
641 target = bfd_get_target (abfd);
642
643 is_pe64 = (strcmp (target, "pe-x86-64") == 0
644 || strcmp (target, "pei-x86-64") == 0);
645 is_pe32 = (strcmp (target, "pe-i386") == 0
646 || strcmp (target, "pei-i386") == 0
647 || strcmp (target, "pe-arm-wince-little") == 0
648 || strcmp (target, "pei-arm-wince-little") == 0);
649
650 if (!is_pe32 && !is_pe64)
651 {
652 /* This is not a recognized PE format file. Abort now, because
653 the code is untested on anything else. *FIXME* test on
654 further architectures and loosen or remove this test. */
655 return DEFAULT_COFF_PE_TEXT_SECTION_OFFSET;
656 }
657
658 /* Get pe_header, optional header and numbers of sections. */
659 pe_header_offset = pe_get32 (abfd, 0x3c);
3999122f
PM
660 nsections = pe_get16 (abfd, pe_header_offset + 4 + 2);
661 secptr = (pe_header_offset + 4 + 20 +
662 pe_get16 (abfd, pe_header_offset + 4 + 16));
663
664 /* Get the rva and size of the export section. */
665 for (i = 0; i < nsections; i++)
666 {
d8f4a83e 667 char sname[SCNNMLEN + 1];
3999122f
PM
668 unsigned long secptr1 = secptr + 40 * i;
669 unsigned long vaddr = pe_get32 (abfd, secptr1 + 12);
670
671 bfd_seek (abfd, (file_ptr) secptr1, SEEK_SET);
d8f4a83e
PM
672 bfd_bread (sname, (bfd_size_type) SCNNMLEN, abfd);
673 sname[SCNNMLEN] = '\0';
3999122f
PM
674 if (strcmp (sname, ".text") == 0)
675 return vaddr;
676 }
677
678 return DEFAULT_COFF_PE_TEXT_SECTION_OFFSET;
679}
680
681/* Implements "show debug coff_pe_read" command. */
682
683static void
684show_debug_coff_pe_read (struct ui_file *file, int from_tty,
685 struct cmd_list_element *c, const char *value)
686{
687 fprintf_filtered (file, _("Coff PE read debugging is %s.\n"), value);
688}
689
690/* Provide a prototype to silence -Wmissing-prototypes. */
691
692void _initialize_coff_pe_read (void);
693
694/* Adds "Set/show debug coff_pe_read" commands. */
695
696void
697_initialize_coff_pe_read (void)
698{
826ecc4d 699 add_setshow_zuinteger_cmd ("coff-pe-read", class_maintenance,
b75bf488
PA
700 &debug_coff_pe_read,
701 _("Set coff PE read debugging."),
702 _("Show coff PE read debugging."),
703 _("When set, debugging messages for coff reading "
704 "of exported symbols are displayed."),
705 NULL, show_debug_coff_pe_read,
706 &setdebuglist, &showdebuglist);
3999122f 707}
This page took 0.691449 seconds and 4 git commands to generate.