1 /* 2 * PROJECT: ReactOS api tests 3 * LICENSE: GPL-2.0-or-later (https://spdx.org/licenses/GPL-2.0-or-later) 4 * PURPOSE: Test for dbghelp rsym functions 5 * COPYRIGHT: Copyright 2017-2019 Mark Jansen (mark.jansen@reactos.org) 6 * 7 * These tests are based on the PDB tests. 8 */ 9 10 #include <ntstatus.h> 11 #define WIN32_NO_STATUS 12 #include <windows.h> 13 #include <dbghelp.h> 14 #include <cvconst.h> // SymTagXXX 15 #include <stdio.h> 16 17 #include "wine/test.h" 18 19 #define ok_ulonglong(expression, result) \ 20 do { \ 21 ULONG64 _value = (expression); \ 22 ULONG64 _result = (result); \ 23 ok(_value == _result, "Wrong value for '%s', expected: " #result " (%s), got: %s\n", \ 24 #expression, wine_dbgstr_longlong(_result), wine_dbgstr_longlong(_value)); \ 25 } while (0) 26 27 #define ok_ulonglong_(file, line, expression, result) \ 28 do { \ 29 ULONG64 _value = (expression); \ 30 ULONG64 _result = (result); \ 31 ok_(file, line)(_value == _result, "Wrong value for '%s', expected: " #result " (%s), got: %s\n", \ 32 #expression, wine_dbgstr_longlong(_result), wine_dbgstr_longlong(_value)); \ 33 } while (0) 34 35 36 // data.c 37 void dump_rsym(const char* filename); 38 int extract_gcc_dll(char szFile[MAX_PATH]); 39 void cleanup_gcc_dll(); 40 41 static HANDLE proc() 42 { 43 return GetCurrentProcess(); 44 } 45 46 static BOOL init_sym_imp(BOOL fInvadeProcess, const char* file, int line) 47 { 48 if (!SymInitialize(proc(), NULL, fInvadeProcess)) 49 { 50 DWORD err = GetLastError(); 51 ok_(file, line)(0, "Failed to init: 0x%x\n", err); 52 return FALSE; 53 } 54 return TRUE; 55 } 56 57 static void deinit_sym() 58 { 59 SymCleanup(proc()); 60 } 61 62 #define init_sym(fInvadeProcess) init_sym_imp(fInvadeProcess, __FILE__, __LINE__) 63 64 #define INIT_PSYM(buff) do { \ 65 memset((buff), 0, sizeof((buff))); \ 66 ((PSYMBOL_INFO)(buff))->SizeOfStruct = sizeof(SYMBOL_INFO); \ 67 ((PSYMBOL_INFO)(buff))->MaxNameLen = MAX_SYM_NAME; \ 68 } while (0) 69 70 static BOOL supports_rsym(HANDLE hProc, DWORD64 BaseAddress) 71 { 72 IMAGEHLP_MODULE64 ModuleInfo; 73 BOOL Ret; 74 75 memset(&ModuleInfo, 0, sizeof(ModuleInfo)); 76 ModuleInfo.SizeOfStruct = sizeof(ModuleInfo); 77 Ret = SymGetModuleInfo64(hProc, BaseAddress, &ModuleInfo); 78 79 return Ret && 80 ModuleInfo.SymType == SymDia && 81 ModuleInfo.CVSig == ('R' | ('S' << 8) | ('Y' << 16) | ('M' << 24)); 82 } 83 84 85 static void test_SymFromName(HANDLE hProc, DWORD64 BaseAddress) 86 { 87 BOOL Ret; 88 char buffer[sizeof(SYMBOL_INFO) + MAX_SYM_NAME * sizeof(TCHAR)]; 89 PSYMBOL_INFO pSymbol = (PSYMBOL_INFO)buffer; 90 91 if (!supports_rsym(hProc, BaseAddress)) 92 { 93 skip("dbghelp.dll cannot parse rsym\n"); 94 } 95 else 96 { 97 INIT_PSYM(buffer); 98 Ret = SymFromName(hProc, "DllMain", pSymbol); 99 ok_int(Ret, TRUE); 100 ok_ulonglong(pSymbol->ModBase, BaseAddress); 101 ok_hex(pSymbol->Flags, SYMFLAG_FUNCTION); 102 ok_ulonglong(pSymbol->Address, BaseAddress + 0x1000); 103 ok_hex(pSymbol->Tag, SymTagFunction); 104 ok_str(pSymbol->Name, "DllMain"); 105 106 INIT_PSYM(buffer); 107 Ret = SymFromName(hProc, "FfsChkdsk", pSymbol); 108 ok_int(Ret, TRUE); 109 ok_ulonglong(pSymbol->ModBase, BaseAddress); 110 ok_hex(pSymbol->Flags, SYMFLAG_FUNCTION); 111 ok_ulonglong(pSymbol->Address, BaseAddress + 0x103F); 112 ok_hex(pSymbol->Tag, SymTagFunction); 113 ok_str(pSymbol->Name, "FfsChkdsk"); 114 115 INIT_PSYM(buffer); 116 Ret = SymFromName(hProc, "FfsFormat", pSymbol); 117 ok_int(Ret, TRUE); 118 ok_ulonglong(pSymbol->ModBase, BaseAddress); 119 ok_hex(pSymbol->Flags, SYMFLAG_FUNCTION); 120 ok_ulonglong(pSymbol->Address, BaseAddress + 0x100C); 121 ok_hex(pSymbol->Tag, SymTagFunction); 122 ok_str(pSymbol->Name, "FfsFormat"); 123 } 124 } 125 126 static void test_SymFromAddr(HANDLE hProc, DWORD64 BaseAddress) 127 { 128 BOOL Ret; 129 char buffer[sizeof(SYMBOL_INFO) + MAX_SYM_NAME * sizeof(TCHAR)]; 130 PSYMBOL_INFO pSymbol = (PSYMBOL_INFO)buffer; 131 132 DWORD64 Displacement; 133 DWORD dwErr; 134 135 if (!supports_rsym(hProc, BaseAddress)) 136 { 137 skip("dbghelp.dll cannot parse rsym\n"); 138 } 139 else 140 { 141 /* No address found before load address of module */ 142 Displacement = 0; 143 INIT_PSYM(buffer); 144 Ret = SymFromAddr(hProc, BaseAddress -1, &Displacement, pSymbol); 145 dwErr = GetLastError(); 146 ok_int(Ret, FALSE); 147 ok_hex(dwErr, ERROR_MOD_NOT_FOUND); 148 149 /* Right at the start of the module is recognized as the first symbol found */ 150 Displacement = 0; 151 INIT_PSYM(buffer); 152 Ret = SymFromAddr(hProc, BaseAddress, &Displacement, pSymbol); 153 /* Our dbghelp.dll does not recognize this yet */ 154 todo_if(!Ret) 155 { 156 ok_int(Ret, TRUE); 157 ok_ulonglong(Displacement, 0xffffffffffffffff); 158 ok_ulonglong(pSymbol->ModBase, BaseAddress); 159 ok_hex(pSymbol->Flags, SYMFLAG_FUNCTION); 160 ok_ulonglong(pSymbol->Address, BaseAddress + 0x1000); 161 ok_hex(pSymbol->Tag, SymTagFunction); 162 ok_str(pSymbol->Name, "DllMain"); 163 } 164 165 /* The actual first instruction of the function */ 166 Displacement = 0; 167 INIT_PSYM(buffer); 168 Ret = SymFromAddr(hProc, BaseAddress + 0x1000, &Displacement, pSymbol); 169 ok_int(Ret, TRUE); 170 ok_ulonglong(Displacement, 0); 171 ok_ulonglong(pSymbol->ModBase, BaseAddress); 172 ok_hex(pSymbol->Flags, SYMFLAG_FUNCTION); 173 ok_ulonglong(pSymbol->Address, BaseAddress + 0x1000); 174 ok_hex(pSymbol->Tag, SymTagFunction); 175 ok_str(pSymbol->Name, "DllMain"); 176 177 /* The last instruction in the function */ 178 Displacement = 0; 179 INIT_PSYM(buffer); 180 Ret = SymFromAddr(hProc, BaseAddress + 0x1009, &Displacement, pSymbol); 181 ok_int(Ret, TRUE); 182 ok_ulonglong(Displacement, 0x9); 183 ok_ulonglong(pSymbol->ModBase, BaseAddress); 184 ok_hex(pSymbol->Flags, SYMFLAG_FUNCTION); 185 ok_ulonglong(pSymbol->Address, BaseAddress + 0x1000); 186 ok_hex(pSymbol->Tag, SymTagFunction); 187 ok_str(pSymbol->Name, "DllMain"); 188 189 /* First byte of the next function */ 190 Displacement = 0; 191 INIT_PSYM(buffer); 192 Ret = SymFromAddr(hProc, BaseAddress + 0x103F, &Displacement, pSymbol); 193 ok_int(Ret, TRUE); 194 ok_ulonglong(Displacement, 0); 195 ok_ulonglong(pSymbol->ModBase, BaseAddress); 196 ok_hex(pSymbol->Flags, SYMFLAG_FUNCTION); 197 ok_ulonglong(pSymbol->Address, BaseAddress + 0x103F); 198 ok_hex(pSymbol->Tag, SymTagFunction); 199 ok_str(pSymbol->Name, "FfsChkdsk"); 200 201 /* .idata */ 202 Displacement = 0; 203 INIT_PSYM(buffer); 204 Ret = SymFromAddr(hProc, BaseAddress + 0x4000, &Displacement, pSymbol); 205 ok_int(Ret, TRUE); 206 ok_ulonglong(Displacement, 0); 207 ok_ulonglong(pSymbol->ModBase, BaseAddress); 208 ok_hex(pSymbol->Flags, SYMFLAG_EXPORT); 209 ok_ulonglong(pSymbol->Address, BaseAddress + 0x4000); 210 ok_hex(pSymbol->Tag, SymTagPublicSymbol); 211 ok_str(pSymbol->Name, "_head_dll_ntdll_libntdll_a"); 212 } 213 } 214 215 typedef struct _test_context 216 { 217 DWORD64 BaseAddress; 218 SIZE_T Index; 219 } test_context; 220 221 static struct _test_data { 222 DWORD64 AddressOffset; 223 ULONG Size; 224 ULONG Tag; 225 const char* Name; 226 int Line; 227 } test_data[] = { 228 229 /* TODO: Order is based on magic, should find entries based on name, and mark as 'seen' */ 230 { 0x107c, 0, SymTagPublicSymbol, "__CTOR_LIST__", __LINE__ }, 231 { 0x2074, 0, SymTagPublicSymbol, "__RUNTIME_PSEUDO_RELOC_LIST_END__", __LINE__ }, 232 { 0x1000, 12, SymTagPublicSymbol, "EntryPoint", __LINE__ }, 233 { 0x100c, 51, SymTagFunction, "FfsFormat", __LINE__ }, 234 { 0x4030, 0, SymTagPublicSymbol, "_imp__DbgPrint", __LINE__ }, 235 { 0x1084, 0, SymTagPublicSymbol, "__DTOR_LIST__", __LINE__ }, 236 { 0x103f, 53, SymTagFunction, "FfsChkdsk", __LINE__ }, 237 { 0x2074, 0, SymTagPublicSymbol, "_rt_psrelocs_end", __LINE__ }, 238 { 0x103f, 53, SymTagPublicSymbol, "ChkdskEx", __LINE__ }, 239 { 0x4048, 0, SymTagPublicSymbol, "_dll_ntdll_libntdll_a_iname", __LINE__ }, 240 241 242 243 { 0x2074, 0, SymTagPublicSymbol, "_rt_psrelocs_start", __LINE__ }, 244 { 0x1000, 12, SymTagFunction, "DllMain", __LINE__ }, 245 { 0x100c, 0, SymTagPublicSymbol, "FormatEx", __LINE__ }, 246 { 0x1074, 0, SymTagPublicSymbol, "DbgPrint", __LINE__ }, 247 { 0x68900000, 0, SymTagPublicSymbol, "__ImageBase", __LINE__ }, 248 { 0x68902074, 0, SymTagPublicSymbol, "__RUNTIME_PSEUDO_RELOC_LIST__", __LINE__ }, 249 { 0x4000, 0, SymTagPublicSymbol, "_head_dll_ntdll_libntdll_a", __LINE__ }, 250 }; 251 252 static BOOL CALLBACK EnumSymProc(PSYMBOL_INFO pSymInfo, ULONG SymbolSize, PVOID UserContext) 253 { 254 test_context* ctx = UserContext; 255 256 if (ctx->Index < ARRAYSIZE(test_data)) 257 { 258 ok_ulonglong_(__FILE__, test_data[ctx->Index].Line, pSymInfo->ModBase, ctx->BaseAddress); 259 if (test_data[ctx->Index].AddressOffset > 0x100000) 260 ok_ulonglong_(__FILE__, test_data[ctx->Index].Line, pSymInfo->Address, test_data[ctx->Index].AddressOffset); 261 else 262 ok_ulonglong_(__FILE__, test_data[ctx->Index].Line, pSymInfo->Address, ctx->BaseAddress + test_data[ctx->Index].AddressOffset); 263 ok_hex_(__FILE__, test_data[ctx->Index].Line, pSymInfo->Tag, test_data[ctx->Index].Tag); 264 ok_str_(__FILE__, test_data[ctx->Index].Line, pSymInfo->Name, test_data[ctx->Index].Name); 265 266 ctx->Index++; 267 } 268 else 269 { 270 ok(0, "Out of bounds (%lu), max is: %i!\n", ctx->Index, ARRAYSIZE(test_data)); 271 } 272 273 return TRUE; 274 } 275 276 static void test_SymEnumSymbols(HANDLE hProc, DWORD64 BaseAddress) 277 { 278 BOOL Ret; 279 test_context ctx; 280 281 ctx.Index = 0; 282 ctx.BaseAddress = BaseAddress; 283 284 if (!supports_rsym(hProc, ctx.BaseAddress)) 285 { 286 skip("dbghelp.dll cannot parse rsym\n"); 287 } 288 else 289 { 290 Ret = SymEnumSymbols(hProc, ctx.BaseAddress, NULL, EnumSymProc, &ctx); 291 ok_int(Ret, TRUE); 292 ok_int(ctx.Index, ARRAYSIZE(test_data)); 293 } 294 } 295 296 297 START_TEST(rsym) 298 { 299 char szDllName[MAX_PATH]; 300 #ifdef _M_IX86 301 HMODULE hMod; 302 #endif 303 DWORD64 BaseAddress; 304 DWORD dwErr, Options; 305 306 Options = SymGetOptions(); 307 Options &= ~(SYMOPT_UNDNAME); 308 //Options |= SYMOPT_DEBUG; 309 SymSetOptions(Options); 310 311 if (!extract_gcc_dll(szDllName)) 312 { 313 ok(0, "Failed extracting files\n"); 314 return; 315 } 316 317 if (init_sym(FALSE)) 318 { 319 SetLastError(ERROR_SUCCESS); 320 BaseAddress = SymLoadModule64(proc(), NULL, szDllName, NULL, 0x600000, 0); 321 dwErr = GetLastError(); 322 323 ok_ulonglong(BaseAddress, 0x600000); 324 ok_hex(dwErr, ERROR_SUCCESS); 325 326 if (BaseAddress == 0x600000) 327 { 328 trace("Module loaded by SymLoadModule64\n"); 329 test_SymFromName(proc(), BaseAddress); 330 test_SymFromAddr(proc(), BaseAddress); 331 test_SymEnumSymbols(proc(), BaseAddress); 332 } 333 334 deinit_sym(); 335 } 336 337 #ifdef _M_IX86 338 hMod = LoadLibraryA(szDllName); 339 if (hMod) 340 { 341 BaseAddress = (DWORD64)(DWORD_PTR)hMod; 342 /* Invade process */ 343 if (init_sym(TRUE)) 344 { 345 trace("Module loaded by LoadLibraryA\n"); 346 test_SymFromName(proc(), BaseAddress); 347 test_SymFromAddr(proc(), BaseAddress); 348 test_SymEnumSymbols(proc(), BaseAddress); 349 350 deinit_sym(); 351 } 352 353 FreeLibrary(hMod); 354 } 355 #endif 356 cleanup_gcc_dll(); 357 } 358