1 // Copyright 2010 The Go Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style
3 // license that can be found in the LICENSE file.
5 // Package loadpe implements a PE/COFF file reader.
13 "cmd/link/internal/loader"
14 "cmd/link/internal/sym"
24 // TODO: the Microsoft doco says IMAGE_SYM_DTYPE_ARRAY is 3 (same with IMAGE_SYM_DTYPE_POINTER and IMAGE_SYM_DTYPE_FUNCTION)
25 IMAGE_SYM_UNDEFINED = 0
26 IMAGE_SYM_ABSOLUTE = -1
28 IMAGE_SYM_TYPE_NULL = 0
29 IMAGE_SYM_TYPE_VOID = 1
30 IMAGE_SYM_TYPE_CHAR = 2
31 IMAGE_SYM_TYPE_SHORT = 3
32 IMAGE_SYM_TYPE_INT = 4
33 IMAGE_SYM_TYPE_LONG = 5
34 IMAGE_SYM_TYPE_FLOAT = 6
35 IMAGE_SYM_TYPE_DOUBLE = 7
36 IMAGE_SYM_TYPE_STRUCT = 8
37 IMAGE_SYM_TYPE_UNION = 9
38 IMAGE_SYM_TYPE_ENUM = 10
39 IMAGE_SYM_TYPE_MOE = 11
40 IMAGE_SYM_TYPE_BYTE = 12
41 IMAGE_SYM_TYPE_WORD = 13
42 IMAGE_SYM_TYPE_UINT = 14
43 IMAGE_SYM_TYPE_DWORD = 15
44 IMAGE_SYM_TYPE_PCODE = 32768
45 IMAGE_SYM_DTYPE_NULL = 0
46 IMAGE_SYM_DTYPE_POINTER = 0x10
47 IMAGE_SYM_DTYPE_FUNCTION = 0x20
48 IMAGE_SYM_DTYPE_ARRAY = 0x30
49 IMAGE_SYM_CLASS_END_OF_FUNCTION = -1
50 IMAGE_SYM_CLASS_NULL = 0
51 IMAGE_SYM_CLASS_AUTOMATIC = 1
52 IMAGE_SYM_CLASS_EXTERNAL = 2
53 IMAGE_SYM_CLASS_STATIC = 3
54 IMAGE_SYM_CLASS_REGISTER = 4
55 IMAGE_SYM_CLASS_EXTERNAL_DEF = 5
56 IMAGE_SYM_CLASS_LABEL = 6
57 IMAGE_SYM_CLASS_UNDEFINED_LABEL = 7
58 IMAGE_SYM_CLASS_MEMBER_OF_STRUCT = 8
59 IMAGE_SYM_CLASS_ARGUMENT = 9
60 IMAGE_SYM_CLASS_STRUCT_TAG = 10
61 IMAGE_SYM_CLASS_MEMBER_OF_UNION = 11
62 IMAGE_SYM_CLASS_UNION_TAG = 12
63 IMAGE_SYM_CLASS_TYPE_DEFINITION = 13
64 IMAGE_SYM_CLASS_UNDEFINED_STATIC = 14
65 IMAGE_SYM_CLASS_ENUM_TAG = 15
66 IMAGE_SYM_CLASS_MEMBER_OF_ENUM = 16
67 IMAGE_SYM_CLASS_REGISTER_PARAM = 17
68 IMAGE_SYM_CLASS_BIT_FIELD = 18
69 IMAGE_SYM_CLASS_FAR_EXTERNAL = 68 /* Not in PECOFF v8 spec */
70 IMAGE_SYM_CLASS_BLOCK = 100
71 IMAGE_SYM_CLASS_FUNCTION = 101
72 IMAGE_SYM_CLASS_END_OF_STRUCT = 102
73 IMAGE_SYM_CLASS_FILE = 103
74 IMAGE_SYM_CLASS_SECTION = 104
75 IMAGE_SYM_CLASS_WEAK_EXTERNAL = 105
76 IMAGE_SYM_CLASS_CLR_TOKEN = 107
77 IMAGE_REL_I386_ABSOLUTE = 0x0000
78 IMAGE_REL_I386_DIR16 = 0x0001
79 IMAGE_REL_I386_REL16 = 0x0002
80 IMAGE_REL_I386_DIR32 = 0x0006
81 IMAGE_REL_I386_DIR32NB = 0x0007
82 IMAGE_REL_I386_SEG12 = 0x0009
83 IMAGE_REL_I386_SECTION = 0x000A
84 IMAGE_REL_I386_SECREL = 0x000B
85 IMAGE_REL_I386_TOKEN = 0x000C
86 IMAGE_REL_I386_SECREL7 = 0x000D
87 IMAGE_REL_I386_REL32 = 0x0014
88 IMAGE_REL_AMD64_ABSOLUTE = 0x0000
89 IMAGE_REL_AMD64_ADDR64 = 0x0001
90 IMAGE_REL_AMD64_ADDR32 = 0x0002
91 IMAGE_REL_AMD64_ADDR32NB = 0x0003
92 IMAGE_REL_AMD64_REL32 = 0x0004
93 IMAGE_REL_AMD64_REL32_1 = 0x0005
94 IMAGE_REL_AMD64_REL32_2 = 0x0006
95 IMAGE_REL_AMD64_REL32_3 = 0x0007
96 IMAGE_REL_AMD64_REL32_4 = 0x0008
97 IMAGE_REL_AMD64_REL32_5 = 0x0009
98 IMAGE_REL_AMD64_SECTION = 0x000A
99 IMAGE_REL_AMD64_SECREL = 0x000B
100 IMAGE_REL_AMD64_SECREL7 = 0x000C
101 IMAGE_REL_AMD64_TOKEN = 0x000D
102 IMAGE_REL_AMD64_SREL32 = 0x000E
103 IMAGE_REL_AMD64_PAIR = 0x000F
104 IMAGE_REL_AMD64_SSPAN32 = 0x0010
105 IMAGE_REL_ARM_ABSOLUTE = 0x0000
106 IMAGE_REL_ARM_ADDR32 = 0x0001
107 IMAGE_REL_ARM_ADDR32NB = 0x0002
108 IMAGE_REL_ARM_BRANCH24 = 0x0003
109 IMAGE_REL_ARM_BRANCH11 = 0x0004
110 IMAGE_REL_ARM_SECTION = 0x000E
111 IMAGE_REL_ARM_SECREL = 0x000F
112 IMAGE_REL_ARM_MOV32 = 0x0010
113 IMAGE_REL_THUMB_MOV32 = 0x0011
114 IMAGE_REL_THUMB_BRANCH20 = 0x0012
115 IMAGE_REL_THUMB_BRANCH24 = 0x0014
116 IMAGE_REL_THUMB_BLX23 = 0x0015
117 IMAGE_REL_ARM_PAIR = 0x0016
118 IMAGE_REL_ARM64_ABSOLUTE = 0x0000
119 IMAGE_REL_ARM64_ADDR32 = 0x0001
120 IMAGE_REL_ARM64_ADDR32NB = 0x0002
121 IMAGE_REL_ARM64_BRANCH26 = 0x0003
122 IMAGE_REL_ARM64_PAGEBASE_REL21 = 0x0004
123 IMAGE_REL_ARM64_REL21 = 0x0005
124 IMAGE_REL_ARM64_PAGEOFFSET_12A = 0x0006
125 IMAGE_REL_ARM64_PAGEOFFSET_12L = 0x0007
126 IMAGE_REL_ARM64_SECREL = 0x0008
127 IMAGE_REL_ARM64_SECREL_LOW12A = 0x0009
128 IMAGE_REL_ARM64_SECREL_HIGH12A = 0x000A
129 IMAGE_REL_ARM64_SECREL_LOW12L = 0x000B
130 IMAGE_REL_ARM64_TOKEN = 0x000C
131 IMAGE_REL_ARM64_SECTION = 0x000D
132 IMAGE_REL_ARM64_ADDR64 = 0x000E
133 IMAGE_REL_ARM64_BRANCH19 = 0x000F
134 IMAGE_REL_ARM64_BRANCH14 = 0x0010
135 IMAGE_REL_ARM64_REL32 = 0x0011
138 // TODO(crawshaw): de-duplicate these symbols with cmd/internal/ld, ideally in debug/pe.
140 IMAGE_SCN_CNT_CODE = 0x00000020
141 IMAGE_SCN_CNT_INITIALIZED_DATA = 0x00000040
142 IMAGE_SCN_CNT_UNINITIALIZED_DATA = 0x00000080
143 IMAGE_SCN_MEM_DISCARDABLE = 0x02000000
144 IMAGE_SCN_MEM_EXECUTE = 0x20000000
145 IMAGE_SCN_MEM_READ = 0x40000000
146 IMAGE_SCN_MEM_WRITE = 0x80000000
149 // TODO(brainman): maybe just add ReadAt method to bio.Reader instead of creating peBiobuf
151 // peBiobuf makes bio.Reader look like io.ReaderAt.
152 type peBiobuf bio.Reader
154 func (f *peBiobuf) ReadAt(p []byte, off int64) (int, error) {
155 ret := ((*bio.Reader)(f)).MustSeek(off, 0)
157 return 0, errors.New("fail to seek")
166 // makeUpdater creates a loader.SymbolBuilder if one hasn't been created previously.
167 // We use this to lazily make SymbolBuilders as we don't always need a builder, and creating them for all symbols might be an error.
168 func makeUpdater(l *loader.Loader, bld *loader.SymbolBuilder, s loader.Sym) *loader.SymbolBuilder {
172 bld = l.MakeSymbolUpdater(s)
176 // Load loads the PE file pn from input.
177 // Symbols are written into syms, and a slice of the text symbols is returned.
178 // If an .rsrc section or set of .rsrc$xx sections is found, its symbols are
180 func Load(l *loader.Loader, arch *sys.Arch, localSymVersion int, input *bio.Reader, pkg string, length int64, pn string) (textp []loader.Sym, rsrc []loader.Sym, err error) {
181 lookup := func(name string, version int) (*loader.SymbolBuilder, loader.Sym) {
182 s := l.LookupOrCreateSym(name, version)
183 sb := l.MakeSymbolUpdater(s)
186 sectsyms := make(map[*pe.Section]loader.Sym)
187 sectdata := make(map[*pe.Section][]byte)
189 // Some input files are archives containing multiple of
190 // object files, and pe.NewFile seeks to the start of
191 // input file and get confused. Create section reader
192 // to stop pe.NewFile looking before current position.
193 sr := io.NewSectionReader((*peBiobuf)(input), input.Offset(), 1<<63-1)
195 // TODO: replace pe.NewFile with pe.Load (grep for "add Load function" in debug/pe for details)
196 f, err := pe.NewFile(sr)
202 // TODO return error if found .cormeta
204 // create symbols for mapped sections
205 for _, sect := range f.Sections {
206 if sect.Characteristics&IMAGE_SCN_MEM_DISCARDABLE != 0 {
210 if sect.Characteristics&(IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_CNT_UNINITIALIZED_DATA) == 0 {
211 // This has been seen for .idata sections, which we
212 // want to ignore. See issues 5106 and 5273.
216 name := fmt.Sprintf("%s(%s)", pkg, sect.Name)
217 bld, s := lookup(name, localSymVersion)
219 switch sect.Characteristics & (IMAGE_SCN_CNT_UNINITIALIZED_DATA | IMAGE_SCN_CNT_INITIALIZED_DATA | IMAGE_SCN_MEM_READ | IMAGE_SCN_MEM_WRITE | IMAGE_SCN_CNT_CODE | IMAGE_SCN_MEM_EXECUTE) {
220 case IMAGE_SCN_CNT_INITIALIZED_DATA | IMAGE_SCN_MEM_READ: //.rdata
221 bld.SetType(sym.SRODATA)
223 case IMAGE_SCN_CNT_UNINITIALIZED_DATA | IMAGE_SCN_MEM_READ | IMAGE_SCN_MEM_WRITE: //.bss
224 bld.SetType(sym.SNOPTRBSS)
226 case IMAGE_SCN_CNT_INITIALIZED_DATA | IMAGE_SCN_MEM_READ | IMAGE_SCN_MEM_WRITE: //.data
227 bld.SetType(sym.SNOPTRDATA)
229 case IMAGE_SCN_CNT_CODE | IMAGE_SCN_MEM_EXECUTE | IMAGE_SCN_MEM_READ: //.text
230 bld.SetType(sym.STEXT)
233 return nil, nil, fmt.Errorf("unexpected flags %#06x for PE section %s", sect.Characteristics, sect.Name)
236 if bld.Type() != sym.SNOPTRBSS {
237 data, err := sect.Data()
241 sectdata[sect] = data
244 bld.SetSize(int64(sect.Size))
246 if sect.Name == ".rsrc" || strings.HasPrefix(sect.Name, ".rsrc$") {
247 rsrc = append(rsrc, s)
252 for _, rsect := range f.Sections {
253 if _, found := sectsyms[rsect]; !found {
256 if rsect.NumberOfRelocations == 0 {
259 if rsect.Characteristics&IMAGE_SCN_MEM_DISCARDABLE != 0 {
262 if rsect.Characteristics&(IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_CNT_UNINITIALIZED_DATA) == 0 {
263 // This has been seen for .idata sections, which we
264 // want to ignore. See issues 5106 and 5273.
268 splitResources := strings.HasPrefix(rsect.Name, ".rsrc$")
269 sb := l.MakeSymbolUpdater(sectsyms[rsect])
270 for j, r := range rsect.Relocs {
271 if int(r.SymbolTableIndex) >= len(f.COFFSymbols) {
272 return nil, nil, fmt.Errorf("relocation number %d symbol index idx=%d cannot be large then number of symbols %d", j, r.SymbolTableIndex, len(f.COFFSymbols))
274 pesym := &f.COFFSymbols[r.SymbolTableIndex]
275 _, gosym, err := readpesym(l, arch, l.LookupOrCreateSym, f, pesym, sectsyms, localSymVersion)
280 name, err := pesym.FullName(f.StringTable)
282 name = string(pesym.Name[:])
284 return nil, nil, fmt.Errorf("reloc of invalid sym %s idx=%d type=%d", name, r.SymbolTableIndex, pesym.Type)
289 rOff := int32(r.VirtualAddress)
291 var rType objabi.RelocType
294 return nil, nil, fmt.Errorf("%s: unsupported arch %v", pn, arch.Family)
295 case sys.I386, sys.AMD64:
298 return nil, nil, fmt.Errorf("%s: %v: unknown relocation type %v", pn, sectsyms[rsect], r.Type)
300 case IMAGE_REL_I386_REL32, IMAGE_REL_AMD64_REL32,
301 IMAGE_REL_AMD64_ADDR32, // R_X86_64_PC32
302 IMAGE_REL_AMD64_ADDR32NB:
303 rType = objabi.R_PCREL
305 rAdd = int64(int32(binary.LittleEndian.Uint32(sectdata[rsect][rOff:])))
307 case IMAGE_REL_I386_DIR32NB, IMAGE_REL_I386_DIR32:
308 rType = objabi.R_ADDR
310 // load addend from image
311 rAdd = int64(int32(binary.LittleEndian.Uint32(sectdata[rsect][rOff:])))
313 case IMAGE_REL_AMD64_ADDR64: // R_X86_64_64
316 rType = objabi.R_ADDR
318 // load addend from image
319 rAdd = int64(binary.LittleEndian.Uint64(sectdata[rsect][rOff:]))
325 return nil, nil, fmt.Errorf("%s: %v: unknown ARM relocation type %v", pn, sectsyms[rsect], r.Type)
327 case IMAGE_REL_ARM_SECREL:
328 rType = objabi.R_PCREL
330 rAdd = int64(int32(binary.LittleEndian.Uint32(sectdata[rsect][rOff:])))
332 case IMAGE_REL_ARM_ADDR32, IMAGE_REL_ARM_ADDR32NB:
333 rType = objabi.R_ADDR
335 rAdd = int64(int32(binary.LittleEndian.Uint32(sectdata[rsect][rOff:])))
337 case IMAGE_REL_ARM_BRANCH24:
338 rType = objabi.R_CALLARM
340 rAdd = int64(int32(binary.LittleEndian.Uint32(sectdata[rsect][rOff:])))
346 return nil, nil, fmt.Errorf("%s: %v: unknown ARM64 relocation type %v", pn, sectsyms[rsect], r.Type)
348 case IMAGE_REL_ARM64_ADDR32, IMAGE_REL_ARM64_ADDR32NB:
349 rType = objabi.R_ADDR
351 rAdd = int64(int32(binary.LittleEndian.Uint32(sectdata[rsect][rOff:])))
355 // ld -r could generate multiple section symbols for the
356 // same section but with different values, we have to take
357 // that into account, or in the case of split resources,
358 // the section and its symbols are split into two sections.
359 if issect(pesym) || splitResources {
360 rAdd += int64(pesym.Value)
363 rel, _ := sb.AddRel(rType)
373 // enter sub-symbols into symbol table.
374 for i, numaux := 0, 0; i < len(f.COFFSymbols); i += numaux + 1 {
375 pesym := &f.COFFSymbols[i]
377 numaux = int(pesym.NumberOfAuxSymbols)
379 name, err := pesym.FullName(f.StringTable)
389 if int(pesym.SectionNumber) > len(f.Sections) {
392 if pesym.SectionNumber == IMAGE_SYM_DEBUG {
395 if pesym.SectionNumber == IMAGE_SYM_ABSOLUTE && bytes.Equal(pesym.Name[:], []byte("@feat.00")) {
396 // Microsoft's linker looks at whether all input objects have an empty
397 // section called @feat.00. If all of them do, then it enables SEH;
398 // otherwise it doesn't enable that feature. So, since around the Windows
399 // XP SP2 era, most tools that make PE objects just tack on that section,
400 // so that it won't gimp Microsoft's linker logic. Go doesn't support SEH,
401 // so in theory, none of this really matters to us. But actually, if the
402 // linker tries to ingest an object with @feat.00 -- which are produced by
403 // LLVM's resource compiler, for example -- it chokes because of the
404 // IMAGE_SYM_ABSOLUTE section that it doesn't know how to deal with. Since
405 // @feat.00 is just a marking anyway, skip IMAGE_SYM_ABSOLUTE sections that
406 // are called @feat.00.
410 if pesym.SectionNumber > 0 {
411 sect = f.Sections[pesym.SectionNumber-1]
412 if _, found := sectsyms[sect]; !found {
417 bld, s, err := readpesym(l, arch, l.LookupOrCreateSym, f, pesym, sectsyms, localSymVersion)
422 if pesym.SectionNumber == 0 { // extern
423 if l.SymType(s) == sym.SDYNIMPORT {
424 bld = makeUpdater(l, bld, s)
425 bld.SetPlt(-2) // flag for dynimport in PE object files.
427 if l.SymType(s) == sym.SXREF && pesym.Value > 0 { // global data
428 bld = makeUpdater(l, bld, s)
429 bld.SetType(sym.SNOPTRDATA)
430 bld.SetSize(int64(pesym.Value))
434 } else if pesym.SectionNumber > 0 && int(pesym.SectionNumber) <= len(f.Sections) {
435 sect = f.Sections[pesym.SectionNumber-1]
436 if _, found := sectsyms[sect]; !found {
437 return nil, nil, fmt.Errorf("%s: %v: missing sect.sym", pn, s)
440 return nil, nil, fmt.Errorf("%s: %v: sectnum < 0!", pn, s)
447 if l.OuterSym(s) != 0 {
448 if l.AttrDuplicateOK(s) {
451 outerName := l.SymName(l.OuterSym(s))
452 sectName := l.SymName(sectsyms[sect])
453 return nil, nil, fmt.Errorf("%s: duplicate symbol reference: %s in both %s and %s", pn, l.SymName(s), outerName, sectName)
456 bld = makeUpdater(l, bld, s)
457 sectsym := sectsyms[sect]
458 bld.SetType(l.SymType(sectsym))
459 l.AddInteriorSym(sectsym, s)
460 bld.SetValue(int64(pesym.Value))
462 if l.SymType(sectsym) == sym.STEXT {
463 if bld.External() && !bld.DuplicateOK() {
464 return nil, nil, fmt.Errorf("%s: duplicate symbol definition", l.SymName(s))
466 bld.SetExternal(true)
470 // Sort outer lists by address, adding to textp.
471 // This keeps textp in increasing address order.
472 for _, sect := range f.Sections {
478 if l.SymType(s) == sym.STEXT {
479 for ; s != 0; s = l.SubSym(s) {
481 return nil, nil, fmt.Errorf("symbol %s listed multiple times", l.SymName(s))
483 l.SetAttrOnList(s, true)
484 textp = append(textp, s)
489 return textp, rsrc, nil
492 func issect(s *pe.COFFSymbol) bool {
493 return s.StorageClass == IMAGE_SYM_CLASS_STATIC && s.Type == 0 && s.Name[0] == '.'
496 func readpesym(l *loader.Loader, arch *sys.Arch, lookup func(string, int) loader.Sym, f *pe.File, pesym *pe.COFFSymbol, sectsyms map[*pe.Section]loader.Sym, localSymVersion int) (*loader.SymbolBuilder, loader.Sym, error) {
497 symname, err := pesym.FullName(f.StringTable)
503 name = l.SymName(sectsyms[f.Sections[pesym.SectionNumber-1]])
508 if name == "__imp___acrt_iob_func" {
509 // Do not rename __imp___acrt_iob_func into __acrt_iob_func,
510 // because __imp___acrt_iob_func symbol is real
511 // (see commit b295099 from git://git.code.sf.net/p/mingw-w64/mingw-w64 for details).
513 name = strings.TrimPrefix(name, "__imp_") // __imp_Name => Name
516 if name == "__imp____acrt_iob_func" {
517 // Do not rename __imp____acrt_iob_func into ___acrt_iob_func,
518 // because __imp____acrt_iob_func symbol is real
519 // (see commit b295099 from git://git.code.sf.net/p/mingw-w64/mingw-w64 for details).
521 name = strings.TrimPrefix(name, "__imp_") // __imp_Name => Name
524 name = name[1:] // _Name => Name
530 if i := strings.LastIndex(name, "@"); i >= 0 {
535 var bld *loader.SymbolBuilder
538 return nil, 0, fmt.Errorf("%s: invalid symbol type %d", symname, pesym.Type)
540 case IMAGE_SYM_DTYPE_FUNCTION, IMAGE_SYM_DTYPE_NULL:
541 switch pesym.StorageClass {
542 case IMAGE_SYM_CLASS_EXTERNAL: //global
545 case IMAGE_SYM_CLASS_NULL, IMAGE_SYM_CLASS_STATIC, IMAGE_SYM_CLASS_LABEL:
546 s = lookup(name, localSymVersion)
547 bld = makeUpdater(l, bld, s)
548 bld.SetDuplicateOK(true)
551 return nil, 0, fmt.Errorf("%s: invalid symbol binding %d", symname, pesym.StorageClass)
555 if s != 0 && l.SymType(s) == 0 && (pesym.StorageClass != IMAGE_SYM_CLASS_STATIC || pesym.Value != 0) {
556 bld = makeUpdater(l, bld, s)
557 bld.SetType(sym.SXREF)
559 if strings.HasPrefix(symname, "__imp_") {
560 bld = makeUpdater(l, bld, s)
561 bld.SetGot(-2) // flag for __imp_