dosexe.c

来自「开放源码的编译器open watcom 1.6.0版的源代码」· C语言 代码 · 共 122 行

C
122
字号
/****************************************************************************
*
*                            Open Watcom Project
*
*    Portions Copyright (c) 1983-2002 Sybase, Inc. All Rights Reserved.
*
*  ========================================================================
*
*    This file contains Original Code and/or Modifications of Original
*    Code as defined in and that are subject to the Sybase Open Watcom
*    Public License version 1.0 (the 'License'). You may not use this file
*    except in compliance with the License. BY USING THIS FILE YOU AGREE TO
*    ALL TERMS AND CONDITIONS OF THE LICENSE. A copy of the License is
*    provided with the Original Code and Modifications, and is also
*    available at www.sybase.com/developer/opensource.
*
*    The Original Code and all software distributed under the License are
*    distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
*    EXPRESS OR IMPLIED, AND SYBASE AND ALL CONTRIBUTORS HEREBY DISCLAIM
*    ALL SUCH WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF
*    MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR
*    NON-INFRINGEMENT. Please see the License for the specific language
*    governing rights and limitations under the License.
*
*  ========================================================================
*
* Description:  DOS MZ executable dumping routines.
*
****************************************************************************/


#include <stdio.h>
#include <setjmp.h>
#include <unistd.h>

#include "wdglb.h"
#include "wdfunc.h"

static  char    *dos_exe_msg[] = {
    "2length of load module mod 200H                       = ",
    "2number of 200H pages in load module                  = ",
    "2number of relocation items                           = ",
    "2size of header in paragraphs                         = ",
    "2minimum number of paragraphs required above load mod = ",
    "2maximum number of paragraphs required above load mod = ",
    "2offset of stack segment in load module               = ",
    "2initial value of SP                                  = ",
    "2checksum                                             = ",
    "2initial value of IP                                  = ",
    "2offset of code segment within load module (segment)  = ",
    "2file offset of first relocation item                 = ",
    "2overlay number                                       = ",
    NULL
};

/*
 * dump the dos header information
 */
static void dmp_dos_head_info( void )
/***********************************/
{
    unsigned_32                     load_start;
    unsigned_32                     load_end;
    unsigned_16                     i;
    struct { unsigned_16 offset;
             unsigned_16 segment; } reloc;

    Banner( "DOS EXE Header" );
    Dump_header( (char *)&Dos_head.mod_size, dos_exe_msg );
    Load_len = (unsigned_32)Dos_head.file_size * 0x200 -
        ( ( -Dos_head.mod_size ) & 0x1ff ); /* Brian Stecher */
    Wdputslc( "load module length                                   = " );
    Puthex( Load_len, 8 );
    Wdputslc( "H\n\n" );
    if( Options_dmp & FIX_DMP ) {
        if( Dos_head.num_relocs != 0 ) {
            Wlseek( Dos_head.reloc_offset );
            Wdputslc( "segment:offset\n  " );
            for( i = 0; i < Dos_head.num_relocs; i++ ) {
                Wread( &reloc, sizeof( reloc ) );
                Puthex( reloc.segment, 4 );
                Wdputc( ':' );
                Puthex( reloc.offset, 4 );
                if( (i+1) % 6 ) {
                    Wdputs( "   " );
                } else {
                    Wdputslc( "\n  " );
                }
            }
            Wdputslc( "\n" );
            Wdputslc( "\n" );
        }
    }
    if( Options_dmp & DOS_SEG_DMP ) {
        load_start = Dos_head.hdr_size << 4;
        load_end = Load_len - load_start;
        Wdputslc( "load module =\n" );
        Dmp_seg_data( load_start, load_end );
        Wdputslc( "\n" );
    }
}

/*
 * Dump the Dos Executable Header, if any.
 */
bool Dmp_dos_head( void )
/***********************/
{
    Wread( &Dos_head, sizeof( Dos_head ) );
    if( Dos_head.signature != DOS_SIGNATURE ) {
        return( 0 );
    }
    dmp_dos_head_info();
    if( Dos_head.reloc_offset != OS2_EXE_HEADER_FOLLOWS ) {
        Wdputslc( "No New Executable header.\n" );
        return( 1 );
    }
    Wlseek( OS2_NE_OFFSET );
    Wread( &New_exe_off, sizeof( New_exe_off ) );
    return( 2 );
}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?