mirror of
git://source.winehq.org/git/wine.git
synced 2024-11-01 11:08:45 +00:00
d47c07d0cf
Found with Coccinelle. Signed-off-by: Akihiro Sagawa <sagawa.aki@gmail.com> Signed-off-by: Alexandre Julliard <julliard@winehq.org>
1157 lines
38 KiB
C
1157 lines
38 KiB
C
/*
|
|
* File module.c - module handling for the wine debugger
|
|
*
|
|
* Copyright (C) 1993, Eric Youngdale.
|
|
* 2000-2007, Eric Pouech
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
*/
|
|
|
|
#include "config.h"
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <assert.h>
|
|
|
|
#include "dbghelp_private.h"
|
|
#include "psapi.h"
|
|
#include "winternl.h"
|
|
#include "wine/debug.h"
|
|
|
|
WINE_DEFAULT_DEBUG_CHANNEL(dbghelp);
|
|
|
|
const WCHAR S_ElfW[] = {'<','e','l','f','>','\0'};
|
|
const WCHAR S_WineLoaderW[] = {'<','w','i','n','e','-','l','o','a','d','e','r','>','\0'};
|
|
static const WCHAR S_DotSoW[] = {'.','s','o','\0'};
|
|
static const WCHAR S_DotDylibW[] = {'.','d','y','l','i','b','\0'};
|
|
static const WCHAR S_DotPdbW[] = {'.','p','d','b','\0'};
|
|
static const WCHAR S_DotDbgW[] = {'.','d','b','g','\0'};
|
|
const WCHAR S_SlashW[] = {'/','\0'};
|
|
|
|
static const WCHAR S_AcmW[] = {'.','a','c','m','\0'};
|
|
static const WCHAR S_DllW[] = {'.','d','l','l','\0'};
|
|
static const WCHAR S_DrvW[] = {'.','d','r','v','\0'};
|
|
static const WCHAR S_ExeW[] = {'.','e','x','e','\0'};
|
|
static const WCHAR S_OcxW[] = {'.','o','c','x','\0'};
|
|
static const WCHAR S_VxdW[] = {'.','v','x','d','\0'};
|
|
static const WCHAR * const ext[] = {S_AcmW, S_DllW, S_DrvW, S_ExeW, S_OcxW, S_VxdW, NULL};
|
|
|
|
static int match_ext(const WCHAR* ptr, size_t len)
|
|
{
|
|
const WCHAR* const *e;
|
|
size_t l;
|
|
|
|
for (e = ext; *e; e++)
|
|
{
|
|
l = strlenW(*e);
|
|
if (l >= len) return 0;
|
|
if (strncmpiW(&ptr[len - l], *e, l)) continue;
|
|
return l;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static const WCHAR* get_filename(const WCHAR* name, const WCHAR* endptr)
|
|
{
|
|
const WCHAR* ptr;
|
|
|
|
if (!endptr) endptr = name + strlenW(name);
|
|
for (ptr = endptr - 1; ptr >= name; ptr--)
|
|
{
|
|
if (*ptr == '/' || *ptr == '\\') break;
|
|
}
|
|
return ++ptr;
|
|
}
|
|
|
|
static void module_fill_module(const WCHAR* in, WCHAR* out, size_t size)
|
|
{
|
|
const WCHAR *loader = get_wine_loader_name();
|
|
const WCHAR *ptr, *endptr;
|
|
size_t len, l;
|
|
|
|
ptr = get_filename(in, endptr = in + strlenW(in));
|
|
len = min(endptr - ptr, size - 1);
|
|
memcpy(out, ptr, len * sizeof(WCHAR));
|
|
out[len] = '\0';
|
|
if (len > 4 && (l = match_ext(out, len)))
|
|
out[len - l] = '\0';
|
|
else if (len > strlenW(loader) && !strcmpiW(out + len - strlenW(loader), loader))
|
|
lstrcpynW(out, S_WineLoaderW, size);
|
|
else
|
|
{
|
|
if (len > 3 && !strcmpiW(&out[len - 3], S_DotSoW) &&
|
|
(l = match_ext(out, len - 3)))
|
|
strcpyW(&out[len - l - 3], S_ElfW);
|
|
}
|
|
while ((*out = tolowerW(*out))) out++;
|
|
}
|
|
|
|
void module_set_module(struct module* module, const WCHAR* name)
|
|
{
|
|
module_fill_module(name, module->module.ModuleName, sizeof(module->module.ModuleName));
|
|
}
|
|
|
|
const WCHAR *get_wine_loader_name(void)
|
|
{
|
|
static const BOOL is_win64 = sizeof(void *) > sizeof(int); /* FIXME: should depend on target process */
|
|
static const WCHAR wineW[] = {'w','i','n','e',0};
|
|
static const WCHAR suffixW[] = {'6','4',0};
|
|
static const WCHAR *loader;
|
|
|
|
if (!loader)
|
|
{
|
|
WCHAR *p, *buffer;
|
|
const char *ptr;
|
|
|
|
/* All binaries are loaded with WINELOADER (if run from tree) or by the
|
|
* main executable
|
|
*/
|
|
if ((ptr = getenv("WINELOADER")))
|
|
{
|
|
DWORD len = 2 + MultiByteToWideChar( CP_UNIXCP, 0, ptr, -1, NULL, 0 );
|
|
buffer = HeapAlloc( GetProcessHeap(), 0, len * sizeof(WCHAR) );
|
|
MultiByteToWideChar( CP_UNIXCP, 0, ptr, -1, buffer, len );
|
|
}
|
|
else
|
|
{
|
|
buffer = HeapAlloc( GetProcessHeap(), 0, sizeof(wineW) + 2 * sizeof(WCHAR) );
|
|
strcpyW( buffer, wineW );
|
|
}
|
|
p = buffer + strlenW( buffer ) - strlenW( suffixW );
|
|
if (p > buffer && !strcmpW( p, suffixW ))
|
|
{
|
|
if (!is_win64) *p = 0;
|
|
}
|
|
else if (is_win64) strcatW( buffer, suffixW );
|
|
|
|
TRACE( "returning %s\n", debugstr_w(buffer) );
|
|
loader = buffer;
|
|
}
|
|
return loader;
|
|
}
|
|
|
|
static const char* get_module_type(enum module_type type, BOOL virtual)
|
|
{
|
|
switch (type)
|
|
{
|
|
case DMT_ELF: return virtual ? "Virtual ELF" : "ELF";
|
|
case DMT_PE: return virtual ? "Virtual PE" : "PE";
|
|
case DMT_MACHO: return virtual ? "Virtual Mach-O" : "Mach-O";
|
|
default: return "---";
|
|
}
|
|
}
|
|
|
|
/***********************************************************************
|
|
* Creates and links a new module to a process
|
|
*/
|
|
struct module* module_new(struct process* pcs, const WCHAR* name,
|
|
enum module_type type, BOOL virtual,
|
|
DWORD64 mod_addr, DWORD64 size,
|
|
unsigned long stamp, unsigned long checksum)
|
|
{
|
|
struct module* module;
|
|
unsigned i;
|
|
|
|
assert(type == DMT_ELF || type == DMT_PE || type == DMT_MACHO);
|
|
if (!(module = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(*module))))
|
|
return NULL;
|
|
|
|
module->next = pcs->lmodules;
|
|
pcs->lmodules = module;
|
|
|
|
TRACE("=> %s %s-%s %s\n",
|
|
get_module_type(type, virtual),
|
|
wine_dbgstr_longlong(mod_addr), wine_dbgstr_longlong(mod_addr + size),
|
|
debugstr_w(name));
|
|
|
|
pool_init(&module->pool, 65536);
|
|
|
|
module->process = pcs;
|
|
module->module.SizeOfStruct = sizeof(module->module);
|
|
module->module.BaseOfImage = mod_addr;
|
|
module->module.ImageSize = size;
|
|
module_set_module(module, name);
|
|
module->module.ImageName[0] = '\0';
|
|
lstrcpynW(module->module.LoadedImageName, name, sizeof(module->module.LoadedImageName) / sizeof(WCHAR));
|
|
module->module.SymType = SymNone;
|
|
module->module.NumSyms = 0;
|
|
module->module.TimeDateStamp = stamp;
|
|
module->module.CheckSum = checksum;
|
|
|
|
memset(module->module.LoadedPdbName, 0, sizeof(module->module.LoadedPdbName));
|
|
module->module.CVSig = 0;
|
|
memset(module->module.CVData, 0, sizeof(module->module.CVData));
|
|
module->module.PdbSig = 0;
|
|
memset(&module->module.PdbSig70, 0, sizeof(module->module.PdbSig70));
|
|
module->module.PdbAge = 0;
|
|
module->module.PdbUnmatched = FALSE;
|
|
module->module.DbgUnmatched = FALSE;
|
|
module->module.LineNumbers = FALSE;
|
|
module->module.GlobalSymbols = FALSE;
|
|
module->module.TypeInfo = FALSE;
|
|
module->module.SourceIndexed = FALSE;
|
|
module->module.Publics = FALSE;
|
|
|
|
module->reloc_delta = 0;
|
|
module->type = type;
|
|
module->is_virtual = virtual;
|
|
for (i = 0; i < DFI_LAST; i++) module->format_info[i] = NULL;
|
|
module->sortlist_valid = FALSE;
|
|
module->sorttab_size = 0;
|
|
module->addr_sorttab = NULL;
|
|
module->num_sorttab = 0;
|
|
module->num_symbols = 0;
|
|
|
|
vector_init(&module->vsymt, sizeof(struct symt*), 128);
|
|
/* FIXME: this seems a bit too high (on a per module basis)
|
|
* need some statistics about this
|
|
*/
|
|
hash_table_init(&module->pool, &module->ht_symbols, 4096);
|
|
hash_table_init(&module->pool, &module->ht_types, 4096);
|
|
vector_init(&module->vtypes, sizeof(struct symt*), 32);
|
|
|
|
module->sources_used = 0;
|
|
module->sources_alloc = 0;
|
|
module->sources = 0;
|
|
wine_rb_init(&module->sources_offsets_tree, source_rb_compare);
|
|
|
|
return module;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* module_find_by_nameW
|
|
*
|
|
*/
|
|
struct module* module_find_by_nameW(const struct process* pcs, const WCHAR* name)
|
|
{
|
|
struct module* module;
|
|
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if (!strcmpiW(name, module->module.ModuleName)) return module;
|
|
}
|
|
SetLastError(ERROR_INVALID_NAME);
|
|
return NULL;
|
|
}
|
|
|
|
struct module* module_find_by_nameA(const struct process* pcs, const char* name)
|
|
{
|
|
WCHAR wname[MAX_PATH];
|
|
|
|
MultiByteToWideChar(CP_ACP, 0, name, -1, wname, sizeof(wname) / sizeof(WCHAR));
|
|
return module_find_by_nameW(pcs, wname);
|
|
}
|
|
|
|
/***********************************************************************
|
|
* module_is_already_loaded
|
|
*
|
|
*/
|
|
struct module* module_is_already_loaded(const struct process* pcs, const WCHAR* name)
|
|
{
|
|
struct module* module;
|
|
const WCHAR* filename;
|
|
|
|
/* first compare the loaded image name... */
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if (!strcmpiW(name, module->module.LoadedImageName))
|
|
return module;
|
|
}
|
|
/* then compare the standard filenames (without the path) ... */
|
|
filename = get_filename(name, NULL);
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if (!strcmpiW(filename, get_filename(module->module.LoadedImageName, NULL)))
|
|
return module;
|
|
}
|
|
SetLastError(ERROR_INVALID_NAME);
|
|
return NULL;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* module_get_container
|
|
*
|
|
*/
|
|
static struct module* module_get_container(const struct process* pcs,
|
|
const struct module* inner)
|
|
{
|
|
struct module* module;
|
|
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if (module != inner &&
|
|
module->module.BaseOfImage <= inner->module.BaseOfImage &&
|
|
module->module.BaseOfImage + module->module.ImageSize >=
|
|
inner->module.BaseOfImage + inner->module.ImageSize)
|
|
return module;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* module_get_containee
|
|
*
|
|
*/
|
|
struct module* module_get_containee(const struct process* pcs,
|
|
const struct module* outter)
|
|
{
|
|
struct module* module;
|
|
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if (module != outter &&
|
|
outter->module.BaseOfImage <= module->module.BaseOfImage &&
|
|
outter->module.BaseOfImage + outter->module.ImageSize >=
|
|
module->module.BaseOfImage + module->module.ImageSize)
|
|
return module;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/******************************************************************
|
|
* module_get_debug
|
|
*
|
|
* get the debug information from a module:
|
|
* - if the module's type is deferred, then force loading of debug info (and return
|
|
* the module itself)
|
|
* - if the module has no debug info and has an ELF container, then return the ELF
|
|
* container (and also force the ELF container's debug info loading if deferred)
|
|
* - otherwise return the module itself if it has some debug info
|
|
*/
|
|
BOOL module_get_debug(struct module_pair* pair)
|
|
{
|
|
IMAGEHLP_DEFERRED_SYMBOL_LOADW64 idslW64;
|
|
|
|
if (!pair->requested) return FALSE;
|
|
/* for a PE builtin, always get info from container */
|
|
if (!(pair->effective = module_get_container(pair->pcs, pair->requested)))
|
|
pair->effective = pair->requested;
|
|
/* if deferred, force loading */
|
|
if (pair->effective->module.SymType == SymDeferred)
|
|
{
|
|
BOOL ret;
|
|
|
|
if (pair->effective->is_virtual) ret = FALSE;
|
|
else switch (pair->effective->type)
|
|
{
|
|
case DMT_ELF:
|
|
ret = elf_load_debug_info(pair->effective);
|
|
break;
|
|
case DMT_PE:
|
|
idslW64.SizeOfStruct = sizeof(idslW64);
|
|
idslW64.BaseOfImage = pair->effective->module.BaseOfImage;
|
|
idslW64.CheckSum = pair->effective->module.CheckSum;
|
|
idslW64.TimeDateStamp = pair->effective->module.TimeDateStamp;
|
|
memcpy(idslW64.FileName, pair->effective->module.ImageName,
|
|
sizeof(pair->effective->module.ImageName));
|
|
idslW64.Reparse = FALSE;
|
|
idslW64.hFile = INVALID_HANDLE_VALUE;
|
|
|
|
pcs_callback(pair->pcs, CBA_DEFERRED_SYMBOL_LOAD_START, &idslW64);
|
|
ret = pe_load_debug_info(pair->pcs, pair->effective);
|
|
pcs_callback(pair->pcs,
|
|
ret ? CBA_DEFERRED_SYMBOL_LOAD_COMPLETE : CBA_DEFERRED_SYMBOL_LOAD_FAILURE,
|
|
&idslW64);
|
|
break;
|
|
case DMT_MACHO:
|
|
ret = macho_load_debug_info(pair->effective);
|
|
break;
|
|
default:
|
|
ret = FALSE;
|
|
break;
|
|
}
|
|
if (!ret) pair->effective->module.SymType = SymNone;
|
|
assert(pair->effective->module.SymType != SymDeferred);
|
|
pair->effective->module.NumSyms = pair->effective->ht_symbols.num_elts;
|
|
}
|
|
return pair->effective->module.SymType != SymNone;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* module_find_by_addr
|
|
*
|
|
* either the addr where module is loaded, or any address inside the
|
|
* module
|
|
*/
|
|
struct module* module_find_by_addr(const struct process* pcs, DWORD64 addr,
|
|
enum module_type type)
|
|
{
|
|
struct module* module;
|
|
|
|
if (type == DMT_UNKNOWN)
|
|
{
|
|
if ((module = module_find_by_addr(pcs, addr, DMT_PE)) ||
|
|
(module = module_find_by_addr(pcs, addr, DMT_ELF)) ||
|
|
(module = module_find_by_addr(pcs, addr, DMT_MACHO)))
|
|
return module;
|
|
}
|
|
else
|
|
{
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if (type == module->type && addr >= module->module.BaseOfImage &&
|
|
addr < module->module.BaseOfImage + module->module.ImageSize)
|
|
return module;
|
|
}
|
|
}
|
|
SetLastError(ERROR_INVALID_ADDRESS);
|
|
return module;
|
|
}
|
|
|
|
/******************************************************************
|
|
* module_is_container_loaded
|
|
*
|
|
* checks whether the native container, for a (supposed) PE builtin is
|
|
* already loaded
|
|
*/
|
|
static BOOL module_is_container_loaded(const struct process* pcs,
|
|
const WCHAR* ImageName, DWORD64 base)
|
|
{
|
|
size_t len;
|
|
struct module* module;
|
|
PCWSTR filename, modname;
|
|
|
|
if (!base) return FALSE;
|
|
filename = get_filename(ImageName, NULL);
|
|
len = strlenW(filename);
|
|
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if ((module->type == DMT_ELF || module->type == DMT_MACHO) &&
|
|
base >= module->module.BaseOfImage &&
|
|
base < module->module.BaseOfImage + module->module.ImageSize)
|
|
{
|
|
modname = get_filename(module->module.LoadedImageName, NULL);
|
|
if (!strncmpiW(modname, filename, len) &&
|
|
!memcmp(modname + len, S_DotSoW, 3 * sizeof(WCHAR)))
|
|
{
|
|
return TRUE;
|
|
}
|
|
}
|
|
}
|
|
/* likely a native PE module */
|
|
WARN("Couldn't find container for %s\n", debugstr_w(ImageName));
|
|
return FALSE;
|
|
}
|
|
|
|
/******************************************************************
|
|
* module_get_type_by_name
|
|
*
|
|
* Guesses a filename type from its extension
|
|
*/
|
|
enum module_type module_get_type_by_name(const WCHAR* name)
|
|
{
|
|
int loader_len, len = strlenW(name);
|
|
const WCHAR *loader;
|
|
|
|
/* Skip all version extensions (.[digits]) regex: "(\.\d+)*$" */
|
|
do
|
|
{
|
|
int i = len;
|
|
|
|
while (i && name[i - 1] >= '0' && name[i - 1] <= '9') i--;
|
|
|
|
if (i && name[i - 1] == '.')
|
|
len = i - 1;
|
|
else
|
|
break;
|
|
} while (len);
|
|
|
|
/* check for terminating .so or .so.[digit] */
|
|
/* FIXME: Can't rely solely on extension; have to check magic or
|
|
* stop using .so on Mac OS X. For now, base on platform. */
|
|
if (len > 3 && !memcmp(name + len - 3, S_DotSoW, 3))
|
|
#ifdef __APPLE__
|
|
return DMT_MACHO;
|
|
#else
|
|
return DMT_ELF;
|
|
#endif
|
|
|
|
if (len > 6 && !strncmpiW(name + len - 6, S_DotDylibW, 6))
|
|
return DMT_MACHO;
|
|
|
|
if (len > 4 && !strncmpiW(name + len - 4, S_DotPdbW, 4))
|
|
return DMT_PDB;
|
|
|
|
if (len > 4 && !strncmpiW(name + len - 4, S_DotDbgW, 4))
|
|
return DMT_DBG;
|
|
|
|
/* wine is also a native module (Mach-O on Mac OS X, ELF elsewhere) */
|
|
loader = get_wine_loader_name();
|
|
loader_len = strlenW( loader );
|
|
if ((len == loader_len || (len > loader_len && name[len - loader_len - 1] == '/')) &&
|
|
!strcmpiW(name + len - loader_len, loader))
|
|
{
|
|
#ifdef __APPLE__
|
|
return DMT_MACHO;
|
|
#else
|
|
return DMT_ELF;
|
|
#endif
|
|
}
|
|
return DMT_PE;
|
|
}
|
|
|
|
/******************************************************************
|
|
* refresh_module_list
|
|
*/
|
|
static BOOL refresh_module_list(struct process* pcs)
|
|
{
|
|
/* force transparent ELF and Mach-O loading / unloading */
|
|
return elf_synchronize_module_list(pcs) || macho_synchronize_module_list(pcs);
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymLoadModule (DBGHELP.@)
|
|
*/
|
|
DWORD WINAPI SymLoadModule(HANDLE hProcess, HANDLE hFile, PCSTR ImageName,
|
|
PCSTR ModuleName, DWORD BaseOfDll, DWORD SizeOfDll)
|
|
{
|
|
return SymLoadModuleEx(hProcess, hFile, ImageName, ModuleName, BaseOfDll,
|
|
SizeOfDll, NULL, 0);
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymLoadModuleEx (DBGHELP.@)
|
|
*/
|
|
DWORD64 WINAPI SymLoadModuleEx(HANDLE hProcess, HANDLE hFile, PCSTR ImageName,
|
|
PCSTR ModuleName, DWORD64 BaseOfDll, DWORD DllSize,
|
|
PMODLOAD_DATA Data, DWORD Flags)
|
|
{
|
|
PWSTR wImageName, wModuleName;
|
|
unsigned len;
|
|
DWORD64 ret;
|
|
|
|
TRACE("(%p %p %s %s %s %08x %p %08x)\n",
|
|
hProcess, hFile, debugstr_a(ImageName), debugstr_a(ModuleName),
|
|
wine_dbgstr_longlong(BaseOfDll), DllSize, Data, Flags);
|
|
|
|
if (ImageName)
|
|
{
|
|
len = MultiByteToWideChar(CP_ACP, 0, ImageName, -1, NULL, 0);
|
|
wImageName = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR));
|
|
MultiByteToWideChar(CP_ACP, 0, ImageName, -1, wImageName, len);
|
|
}
|
|
else wImageName = NULL;
|
|
if (ModuleName)
|
|
{
|
|
len = MultiByteToWideChar(CP_ACP, 0, ModuleName, -1, NULL, 0);
|
|
wModuleName = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR));
|
|
MultiByteToWideChar(CP_ACP, 0, ModuleName, -1, wModuleName, len);
|
|
}
|
|
else wModuleName = NULL;
|
|
|
|
ret = SymLoadModuleExW(hProcess, hFile, wImageName, wModuleName,
|
|
BaseOfDll, DllSize, Data, Flags);
|
|
HeapFree(GetProcessHeap(), 0, wImageName);
|
|
HeapFree(GetProcessHeap(), 0, wModuleName);
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymLoadModuleExW (DBGHELP.@)
|
|
*/
|
|
DWORD64 WINAPI SymLoadModuleExW(HANDLE hProcess, HANDLE hFile, PCWSTR wImageName,
|
|
PCWSTR wModuleName, DWORD64 BaseOfDll, DWORD SizeOfDll,
|
|
PMODLOAD_DATA Data, DWORD Flags)
|
|
{
|
|
struct process* pcs;
|
|
struct module* module = NULL;
|
|
|
|
TRACE("(%p %p %s %s %s %08x %p %08x)\n",
|
|
hProcess, hFile, debugstr_w(wImageName), debugstr_w(wModuleName),
|
|
wine_dbgstr_longlong(BaseOfDll), SizeOfDll, Data, Flags);
|
|
|
|
if (Data)
|
|
FIXME("Unsupported load data parameter %p for %s\n",
|
|
Data, debugstr_w(wImageName));
|
|
if (!validate_addr64(BaseOfDll)) return FALSE;
|
|
|
|
if (!(pcs = process_find_by_handle(hProcess))) return FALSE;
|
|
|
|
if (Flags & SLMFLAG_VIRTUAL)
|
|
{
|
|
if (!wImageName) return FALSE;
|
|
module = module_new(pcs, wImageName, module_get_type_by_name(wImageName),
|
|
TRUE, BaseOfDll, SizeOfDll, 0, 0);
|
|
if (!module) return FALSE;
|
|
if (wModuleName) module_set_module(module, wModuleName);
|
|
module->module.SymType = SymVirtual;
|
|
|
|
return TRUE;
|
|
}
|
|
if (Flags & ~(SLMFLAG_VIRTUAL))
|
|
FIXME("Unsupported Flags %08x for %s\n", Flags, debugstr_w(wImageName));
|
|
|
|
refresh_module_list(pcs);
|
|
|
|
/* this is a Wine extension to the API just to redo the synchronisation */
|
|
if (!wImageName && !hFile) return 0;
|
|
|
|
/* check if the module is already loaded, or if it's a builtin PE module with
|
|
* an containing ELF module
|
|
*/
|
|
if (wImageName)
|
|
{
|
|
module = module_is_already_loaded(pcs, wImageName);
|
|
if (!module && module_is_container_loaded(pcs, wImageName, BaseOfDll))
|
|
{
|
|
/* force the loading of DLL as builtin */
|
|
module = pe_load_builtin_module(pcs, wImageName, BaseOfDll, SizeOfDll);
|
|
}
|
|
}
|
|
if (!module)
|
|
{
|
|
/* otherwise, try a regular PE module */
|
|
if (!(module = pe_load_native_module(pcs, wImageName, hFile, BaseOfDll, SizeOfDll)) &&
|
|
wImageName)
|
|
{
|
|
/* and finally an ELF or Mach-O module */
|
|
switch (module_get_type_by_name(wImageName))
|
|
{
|
|
case DMT_ELF:
|
|
module = elf_load_module(pcs, wImageName, BaseOfDll);
|
|
break;
|
|
case DMT_MACHO:
|
|
module = macho_load_module(pcs, wImageName, BaseOfDll);
|
|
break;
|
|
default:
|
|
/* Ignored */
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
if (!module)
|
|
{
|
|
WARN("Couldn't locate %s\n", debugstr_w(wImageName));
|
|
return 0;
|
|
}
|
|
module->module.NumSyms = module->ht_symbols.num_elts;
|
|
/* by default module_new fills module.ModuleName from a derivation
|
|
* of LoadedImageName. Overwrite it, if we have better information
|
|
*/
|
|
if (wModuleName)
|
|
module_set_module(module, wModuleName);
|
|
if (wImageName)
|
|
lstrcpynW(module->module.ImageName, wImageName,
|
|
sizeof(module->module.ImageName) / sizeof(WCHAR));
|
|
|
|
return module->module.BaseOfImage;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymLoadModule64 (DBGHELP.@)
|
|
*/
|
|
DWORD64 WINAPI SymLoadModule64(HANDLE hProcess, HANDLE hFile, PCSTR ImageName,
|
|
PCSTR ModuleName, DWORD64 BaseOfDll, DWORD SizeOfDll)
|
|
{
|
|
return SymLoadModuleEx(hProcess, hFile, ImageName, ModuleName, BaseOfDll, SizeOfDll,
|
|
NULL, 0);
|
|
}
|
|
|
|
/******************************************************************
|
|
* module_remove
|
|
*
|
|
*/
|
|
BOOL module_remove(struct process* pcs, struct module* module)
|
|
{
|
|
struct module_format*modfmt;
|
|
struct module** p;
|
|
unsigned i;
|
|
|
|
TRACE("%s (%p)\n", debugstr_w(module->module.ModuleName), module);
|
|
|
|
for (i = 0; i < DFI_LAST; i++)
|
|
{
|
|
if ((modfmt = module->format_info[i]) && modfmt->remove)
|
|
modfmt->remove(pcs, module->format_info[i]);
|
|
}
|
|
hash_table_destroy(&module->ht_symbols);
|
|
hash_table_destroy(&module->ht_types);
|
|
HeapFree(GetProcessHeap(), 0, module->sources);
|
|
HeapFree(GetProcessHeap(), 0, module->addr_sorttab);
|
|
pool_destroy(&module->pool);
|
|
/* native dbghelp doesn't invoke registered callback(,CBA_SYMBOLS_UNLOADED,) here
|
|
* so do we
|
|
*/
|
|
for (p = &pcs->lmodules; *p; p = &(*p)->next)
|
|
{
|
|
if (*p == module)
|
|
{
|
|
*p = module->next;
|
|
HeapFree(GetProcessHeap(), 0, module);
|
|
return TRUE;
|
|
}
|
|
}
|
|
FIXME("This shouldn't happen\n");
|
|
return FALSE;
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymUnloadModule (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI SymUnloadModule(HANDLE hProcess, DWORD BaseOfDll)
|
|
{
|
|
struct process* pcs;
|
|
struct module* module;
|
|
|
|
pcs = process_find_by_handle(hProcess);
|
|
if (!pcs) return FALSE;
|
|
module = module_find_by_addr(pcs, BaseOfDll, DMT_UNKNOWN);
|
|
if (!module) return FALSE;
|
|
return module_remove(pcs, module);
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymUnloadModule64 (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI SymUnloadModule64(HANDLE hProcess, DWORD64 BaseOfDll)
|
|
{
|
|
struct process* pcs;
|
|
struct module* module;
|
|
|
|
pcs = process_find_by_handle(hProcess);
|
|
if (!pcs) return FALSE;
|
|
if (!validate_addr64(BaseOfDll)) return FALSE;
|
|
module = module_find_by_addr(pcs, BaseOfDll, DMT_UNKNOWN);
|
|
if (!module) return FALSE;
|
|
return module_remove(pcs, module);
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymEnumerateModules (DBGHELP.@)
|
|
*
|
|
*/
|
|
struct enum_modW64_32
|
|
{
|
|
PSYM_ENUMMODULES_CALLBACK cb;
|
|
PVOID user;
|
|
char module[MAX_PATH];
|
|
};
|
|
|
|
static BOOL CALLBACK enum_modW64_32(PCWSTR name, DWORD64 base, PVOID user)
|
|
{
|
|
struct enum_modW64_32* x = user;
|
|
|
|
WideCharToMultiByte(CP_ACP, 0, name, -1, x->module, sizeof(x->module), NULL, NULL);
|
|
return x->cb(x->module, (DWORD)base, x->user);
|
|
}
|
|
|
|
BOOL WINAPI SymEnumerateModules(HANDLE hProcess,
|
|
PSYM_ENUMMODULES_CALLBACK EnumModulesCallback,
|
|
PVOID UserContext)
|
|
{
|
|
struct enum_modW64_32 x;
|
|
|
|
x.cb = EnumModulesCallback;
|
|
x.user = UserContext;
|
|
|
|
return SymEnumerateModulesW64(hProcess, enum_modW64_32, &x);
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymEnumerateModules64 (DBGHELP.@)
|
|
*
|
|
*/
|
|
struct enum_modW64_64
|
|
{
|
|
PSYM_ENUMMODULES_CALLBACK64 cb;
|
|
PVOID user;
|
|
char module[MAX_PATH];
|
|
};
|
|
|
|
static BOOL CALLBACK enum_modW64_64(PCWSTR name, DWORD64 base, PVOID user)
|
|
{
|
|
struct enum_modW64_64* x = user;
|
|
|
|
WideCharToMultiByte(CP_ACP, 0, name, -1, x->module, sizeof(x->module), NULL, NULL);
|
|
return x->cb(x->module, base, x->user);
|
|
}
|
|
|
|
BOOL WINAPI SymEnumerateModules64(HANDLE hProcess,
|
|
PSYM_ENUMMODULES_CALLBACK64 EnumModulesCallback,
|
|
PVOID UserContext)
|
|
{
|
|
struct enum_modW64_64 x;
|
|
|
|
x.cb = EnumModulesCallback;
|
|
x.user = UserContext;
|
|
|
|
return SymEnumerateModulesW64(hProcess, enum_modW64_64, &x);
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymEnumerateModulesW64 (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI SymEnumerateModulesW64(HANDLE hProcess,
|
|
PSYM_ENUMMODULES_CALLBACKW64 EnumModulesCallback,
|
|
PVOID UserContext)
|
|
{
|
|
struct process* pcs = process_find_by_handle(hProcess);
|
|
struct module* module;
|
|
|
|
if (!pcs) return FALSE;
|
|
|
|
for (module = pcs->lmodules; module; module = module->next)
|
|
{
|
|
if (!(dbghelp_options & SYMOPT_WINE_WITH_NATIVE_MODULES) &&
|
|
(module->type == DMT_ELF || module->type == DMT_MACHO))
|
|
continue;
|
|
if (!EnumModulesCallback(module->module.ModuleName,
|
|
module->module.BaseOfImage, UserContext))
|
|
break;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
/******************************************************************
|
|
* EnumerateLoadedModules64 (DBGHELP.@)
|
|
*
|
|
*/
|
|
struct enum_load_modW64_64
|
|
{
|
|
PENUMLOADED_MODULES_CALLBACK64 cb;
|
|
PVOID user;
|
|
char module[MAX_PATH];
|
|
};
|
|
|
|
static BOOL CALLBACK enum_load_modW64_64(PCWSTR name, DWORD64 base, ULONG size,
|
|
PVOID user)
|
|
{
|
|
struct enum_load_modW64_64* x = user;
|
|
|
|
WideCharToMultiByte(CP_ACP, 0, name, -1, x->module, sizeof(x->module), NULL, NULL);
|
|
return x->cb(x->module, base, size, x->user);
|
|
}
|
|
|
|
BOOL WINAPI EnumerateLoadedModules64(HANDLE hProcess,
|
|
PENUMLOADED_MODULES_CALLBACK64 EnumLoadedModulesCallback,
|
|
PVOID UserContext)
|
|
{
|
|
struct enum_load_modW64_64 x;
|
|
|
|
x.cb = EnumLoadedModulesCallback;
|
|
x.user = UserContext;
|
|
|
|
return EnumerateLoadedModulesW64(hProcess, enum_load_modW64_64, &x);
|
|
}
|
|
|
|
/******************************************************************
|
|
* EnumerateLoadedModules (DBGHELP.@)
|
|
*
|
|
*/
|
|
struct enum_load_modW64_32
|
|
{
|
|
PENUMLOADED_MODULES_CALLBACK cb;
|
|
PVOID user;
|
|
char module[MAX_PATH];
|
|
};
|
|
|
|
static BOOL CALLBACK enum_load_modW64_32(PCWSTR name, DWORD64 base, ULONG size,
|
|
PVOID user)
|
|
{
|
|
struct enum_load_modW64_32* x = user;
|
|
WideCharToMultiByte(CP_ACP, 0, name, -1, x->module, sizeof(x->module), NULL, NULL);
|
|
return x->cb(x->module, (DWORD)base, size, x->user);
|
|
}
|
|
|
|
BOOL WINAPI EnumerateLoadedModules(HANDLE hProcess,
|
|
PENUMLOADED_MODULES_CALLBACK EnumLoadedModulesCallback,
|
|
PVOID UserContext)
|
|
{
|
|
struct enum_load_modW64_32 x;
|
|
|
|
x.cb = EnumLoadedModulesCallback;
|
|
x.user = UserContext;
|
|
|
|
return EnumerateLoadedModulesW64(hProcess, enum_load_modW64_32, &x);
|
|
}
|
|
|
|
/******************************************************************
|
|
* EnumerateLoadedModulesW64 (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI EnumerateLoadedModulesW64(HANDLE hProcess,
|
|
PENUMLOADED_MODULES_CALLBACKW64 EnumLoadedModulesCallback,
|
|
PVOID UserContext)
|
|
{
|
|
HMODULE* hMods;
|
|
WCHAR baseW[256], modW[256];
|
|
DWORD i, sz;
|
|
MODULEINFO mi;
|
|
|
|
hMods = HeapAlloc(GetProcessHeap(), 0, 256 * sizeof(hMods[0]));
|
|
if (!hMods) return FALSE;
|
|
|
|
if (!EnumProcessModules(hProcess, hMods, 256 * sizeof(hMods[0]), &sz))
|
|
{
|
|
/* hProcess should also be a valid process handle !! */
|
|
FIXME("If this happens, bump the number in mod\n");
|
|
HeapFree(GetProcessHeap(), 0, hMods);
|
|
return FALSE;
|
|
}
|
|
sz /= sizeof(HMODULE);
|
|
for (i = 0; i < sz; i++)
|
|
{
|
|
if (!GetModuleInformation(hProcess, hMods[i], &mi, sizeof(mi)) ||
|
|
!GetModuleBaseNameW(hProcess, hMods[i], baseW, sizeof(baseW) / sizeof(WCHAR)))
|
|
continue;
|
|
module_fill_module(baseW, modW, sizeof(modW) / sizeof(CHAR));
|
|
EnumLoadedModulesCallback(modW, (DWORD_PTR)mi.lpBaseOfDll, mi.SizeOfImage,
|
|
UserContext);
|
|
}
|
|
HeapFree(GetProcessHeap(), 0, hMods);
|
|
|
|
return sz != 0 && i == sz;
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymGetModuleInfo (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI SymGetModuleInfo(HANDLE hProcess, DWORD dwAddr,
|
|
PIMAGEHLP_MODULE ModuleInfo)
|
|
{
|
|
IMAGEHLP_MODULE mi;
|
|
IMAGEHLP_MODULEW64 miw64;
|
|
|
|
if (sizeof(mi) < ModuleInfo->SizeOfStruct) FIXME("Wrong size\n");
|
|
|
|
miw64.SizeOfStruct = sizeof(miw64);
|
|
if (!SymGetModuleInfoW64(hProcess, dwAddr, &miw64)) return FALSE;
|
|
|
|
mi.SizeOfStruct = miw64.SizeOfStruct;
|
|
mi.BaseOfImage = miw64.BaseOfImage;
|
|
mi.ImageSize = miw64.ImageSize;
|
|
mi.TimeDateStamp = miw64.TimeDateStamp;
|
|
mi.CheckSum = miw64.CheckSum;
|
|
mi.NumSyms = miw64.NumSyms;
|
|
mi.SymType = miw64.SymType;
|
|
WideCharToMultiByte(CP_ACP, 0, miw64.ModuleName, -1,
|
|
mi.ModuleName, sizeof(mi.ModuleName), NULL, NULL);
|
|
WideCharToMultiByte(CP_ACP, 0, miw64.ImageName, -1,
|
|
mi.ImageName, sizeof(mi.ImageName), NULL, NULL);
|
|
WideCharToMultiByte(CP_ACP, 0, miw64.LoadedImageName, -1,
|
|
mi.LoadedImageName, sizeof(mi.LoadedImageName), NULL, NULL);
|
|
|
|
memcpy(ModuleInfo, &mi, ModuleInfo->SizeOfStruct);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymGetModuleInfoW (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI SymGetModuleInfoW(HANDLE hProcess, DWORD dwAddr,
|
|
PIMAGEHLP_MODULEW ModuleInfo)
|
|
{
|
|
IMAGEHLP_MODULEW64 miw64;
|
|
IMAGEHLP_MODULEW miw;
|
|
|
|
if (sizeof(miw) < ModuleInfo->SizeOfStruct) FIXME("Wrong size\n");
|
|
|
|
miw64.SizeOfStruct = sizeof(miw64);
|
|
if (!SymGetModuleInfoW64(hProcess, dwAddr, &miw64)) return FALSE;
|
|
|
|
miw.SizeOfStruct = miw64.SizeOfStruct;
|
|
miw.BaseOfImage = miw64.BaseOfImage;
|
|
miw.ImageSize = miw64.ImageSize;
|
|
miw.TimeDateStamp = miw64.TimeDateStamp;
|
|
miw.CheckSum = miw64.CheckSum;
|
|
miw.NumSyms = miw64.NumSyms;
|
|
miw.SymType = miw64.SymType;
|
|
strcpyW(miw.ModuleName, miw64.ModuleName);
|
|
strcpyW(miw.ImageName, miw64.ImageName);
|
|
strcpyW(miw.LoadedImageName, miw64.LoadedImageName);
|
|
memcpy(ModuleInfo, &miw, ModuleInfo->SizeOfStruct);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymGetModuleInfo64 (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI SymGetModuleInfo64(HANDLE hProcess, DWORD64 dwAddr,
|
|
PIMAGEHLP_MODULE64 ModuleInfo)
|
|
{
|
|
IMAGEHLP_MODULE64 mi64;
|
|
IMAGEHLP_MODULEW64 miw64;
|
|
|
|
if (sizeof(mi64) < ModuleInfo->SizeOfStruct)
|
|
{
|
|
SetLastError(ERROR_MOD_NOT_FOUND); /* NOTE: native returns this error */
|
|
WARN("Wrong size %u\n", ModuleInfo->SizeOfStruct);
|
|
return FALSE;
|
|
}
|
|
|
|
miw64.SizeOfStruct = sizeof(miw64);
|
|
if (!SymGetModuleInfoW64(hProcess, dwAddr, &miw64)) return FALSE;
|
|
|
|
mi64.SizeOfStruct = miw64.SizeOfStruct;
|
|
mi64.BaseOfImage = miw64.BaseOfImage;
|
|
mi64.ImageSize = miw64.ImageSize;
|
|
mi64.TimeDateStamp = miw64.TimeDateStamp;
|
|
mi64.CheckSum = miw64.CheckSum;
|
|
mi64.NumSyms = miw64.NumSyms;
|
|
mi64.SymType = miw64.SymType;
|
|
WideCharToMultiByte(CP_ACP, 0, miw64.ModuleName, -1,
|
|
mi64.ModuleName, sizeof(mi64.ModuleName), NULL, NULL);
|
|
WideCharToMultiByte(CP_ACP, 0, miw64.ImageName, -1,
|
|
mi64.ImageName, sizeof(mi64.ImageName), NULL, NULL);
|
|
WideCharToMultiByte(CP_ACP, 0, miw64.LoadedImageName, -1,
|
|
mi64.LoadedImageName, sizeof(mi64.LoadedImageName), NULL, NULL);
|
|
WideCharToMultiByte(CP_ACP, 0, miw64.LoadedPdbName, -1,
|
|
mi64.LoadedPdbName, sizeof(mi64.LoadedPdbName), NULL, NULL);
|
|
|
|
mi64.CVSig = miw64.CVSig;
|
|
WideCharToMultiByte(CP_ACP, 0, miw64.CVData, -1,
|
|
mi64.CVData, sizeof(mi64.CVData), NULL, NULL);
|
|
mi64.PdbSig = miw64.PdbSig;
|
|
mi64.PdbSig70 = miw64.PdbSig70;
|
|
mi64.PdbAge = miw64.PdbAge;
|
|
mi64.PdbUnmatched = miw64.PdbUnmatched;
|
|
mi64.DbgUnmatched = miw64.DbgUnmatched;
|
|
mi64.LineNumbers = miw64.LineNumbers;
|
|
mi64.GlobalSymbols = miw64.GlobalSymbols;
|
|
mi64.TypeInfo = miw64.TypeInfo;
|
|
mi64.SourceIndexed = miw64.SourceIndexed;
|
|
mi64.Publics = miw64.Publics;
|
|
|
|
memcpy(ModuleInfo, &mi64, ModuleInfo->SizeOfStruct);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymGetModuleInfoW64 (DBGHELP.@)
|
|
*
|
|
*/
|
|
BOOL WINAPI SymGetModuleInfoW64(HANDLE hProcess, DWORD64 dwAddr,
|
|
PIMAGEHLP_MODULEW64 ModuleInfo)
|
|
{
|
|
struct process* pcs = process_find_by_handle(hProcess);
|
|
struct module* module;
|
|
IMAGEHLP_MODULEW64 miw64;
|
|
|
|
TRACE("%p %s %p\n", hProcess, wine_dbgstr_longlong(dwAddr), ModuleInfo);
|
|
|
|
if (!pcs) return FALSE;
|
|
if (ModuleInfo->SizeOfStruct > sizeof(*ModuleInfo)) return FALSE;
|
|
module = module_find_by_addr(pcs, dwAddr, DMT_UNKNOWN);
|
|
if (!module) return FALSE;
|
|
|
|
miw64 = module->module;
|
|
|
|
/* update debug information from container if any */
|
|
if (module->module.SymType == SymNone)
|
|
{
|
|
module = module_get_container(pcs, module);
|
|
if (module && module->module.SymType != SymNone)
|
|
{
|
|
miw64.SymType = module->module.SymType;
|
|
miw64.NumSyms = module->module.NumSyms;
|
|
}
|
|
}
|
|
memcpy(ModuleInfo, &miw64, ModuleInfo->SizeOfStruct);
|
|
return TRUE;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymGetModuleBase (DBGHELP.@)
|
|
*/
|
|
DWORD WINAPI SymGetModuleBase(HANDLE hProcess, DWORD dwAddr)
|
|
{
|
|
DWORD64 ret;
|
|
|
|
ret = SymGetModuleBase64(hProcess, dwAddr);
|
|
return validate_addr64(ret) ? ret : 0;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymGetModuleBase64 (DBGHELP.@)
|
|
*/
|
|
DWORD64 WINAPI SymGetModuleBase64(HANDLE hProcess, DWORD64 dwAddr)
|
|
{
|
|
struct process* pcs = process_find_by_handle(hProcess);
|
|
struct module* module;
|
|
|
|
if (!pcs) return 0;
|
|
module = module_find_by_addr(pcs, dwAddr, DMT_UNKNOWN);
|
|
if (!module) return 0;
|
|
return module->module.BaseOfImage;
|
|
}
|
|
|
|
/******************************************************************
|
|
* module_reset_debug_info
|
|
* Removes any debug information linked to a given module.
|
|
*/
|
|
void module_reset_debug_info(struct module* module)
|
|
{
|
|
module->sortlist_valid = TRUE;
|
|
module->sorttab_size = 0;
|
|
module->addr_sorttab = NULL;
|
|
module->num_sorttab = module->num_symbols = 0;
|
|
hash_table_destroy(&module->ht_symbols);
|
|
module->ht_symbols.num_buckets = 0;
|
|
module->ht_symbols.buckets = NULL;
|
|
hash_table_destroy(&module->ht_types);
|
|
module->ht_types.num_buckets = 0;
|
|
module->ht_types.buckets = NULL;
|
|
module->vtypes.num_elts = 0;
|
|
hash_table_destroy(&module->ht_symbols);
|
|
module->sources_used = module->sources_alloc = 0;
|
|
module->sources = NULL;
|
|
}
|
|
|
|
/******************************************************************
|
|
* SymRefreshModuleList (DBGHELP.@)
|
|
*/
|
|
BOOL WINAPI SymRefreshModuleList(HANDLE hProcess)
|
|
{
|
|
struct process* pcs;
|
|
|
|
TRACE("(%p)\n", hProcess);
|
|
|
|
if (!(pcs = process_find_by_handle(hProcess))) return FALSE;
|
|
|
|
return refresh_module_list(pcs);
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymFunctionTableAccess (DBGHELP.@)
|
|
*/
|
|
PVOID WINAPI SymFunctionTableAccess(HANDLE hProcess, DWORD AddrBase)
|
|
{
|
|
return SymFunctionTableAccess64(hProcess, AddrBase);
|
|
}
|
|
|
|
/***********************************************************************
|
|
* SymFunctionTableAccess64 (DBGHELP.@)
|
|
*/
|
|
PVOID WINAPI SymFunctionTableAccess64(HANDLE hProcess, DWORD64 AddrBase)
|
|
{
|
|
struct process* pcs = process_find_by_handle(hProcess);
|
|
struct module* module;
|
|
|
|
if (!pcs || !dbghelp_current_cpu->find_runtime_function) return NULL;
|
|
module = module_find_by_addr(pcs, AddrBase, DMT_UNKNOWN);
|
|
if (!module) return NULL;
|
|
|
|
return dbghelp_current_cpu->find_runtime_function(module, AddrBase);
|
|
}
|