| /* |
| * Loader functions |
| * |
| * Copyright 1995, 2003 Alexandre Julliard |
| * Copyright 2002 Dmitry Timoshkov for CodeWeavers |
| * |
| * This library is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU Lesser General Public |
| * License as published by the Free Software Foundation; either |
| * version 2.1 of the License, or (at your option) any later version. |
| * |
| * This library is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| * Lesser General Public License for more details. |
| * |
| * You should have received a copy of the GNU Lesser General Public |
| * License along with this library; if not, write to the Free Software |
| * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| */ |
| |
| #include "config.h" |
| #include "wine/port.h" |
| |
| #include <assert.h> |
| #include <stdarg.h> |
| |
| #include "windef.h" |
| #include "winbase.h" |
| #include "winnt.h" |
| #include "winreg.h" |
| #include "winternl.h" |
| |
| #include "module.h" |
| #include "wine/exception.h" |
| #include "excpt.h" |
| #include "wine/unicode.h" |
| #include "wine/debug.h" |
| #include "wine/server.h" |
| #include "ntdll_misc.h" |
| |
| WINE_DEFAULT_DEBUG_CHANNEL(module); |
| WINE_DECLARE_DEBUG_CHANNEL(relay); |
| WINE_DECLARE_DEBUG_CHANNEL(snoop); |
| WINE_DECLARE_DEBUG_CHANNEL(loaddll); |
| |
| typedef DWORD (CALLBACK *DLLENTRYPROC)(HMODULE,DWORD,LPVOID); |
| |
| static int process_detaching = 0; /* set on process detach to avoid deadlocks with thread detach */ |
| static int free_lib_count; /* recursion depth of LdrUnloadDll calls */ |
| |
| /* filter for page-fault exceptions */ |
| static WINE_EXCEPTION_FILTER(page_fault) |
| { |
| if (GetExceptionCode() == EXCEPTION_ACCESS_VIOLATION) |
| return EXCEPTION_EXECUTE_HANDLER; |
| return EXCEPTION_CONTINUE_SEARCH; |
| } |
| |
| static const char * const reason_names[] = |
| { |
| "PROCESS_DETACH", |
| "PROCESS_ATTACH", |
| "THREAD_ATTACH", |
| "THREAD_DETACH" |
| }; |
| |
| static const WCHAR dllW[] = {'.','d','l','l',0}; |
| |
| /* internal representation of 32bit modules. per process. */ |
| typedef struct _wine_modref |
| { |
| LDR_MODULE ldr; |
| int nDeps; |
| struct _wine_modref **deps; |
| } WINE_MODREF; |
| |
| /* info about the current builtin dll load */ |
| /* used to keep track of things across the register_dll constructor call */ |
| struct builtin_load_info |
| { |
| const WCHAR *load_path; |
| NTSTATUS status; |
| WINE_MODREF *wm; |
| }; |
| |
| static struct builtin_load_info default_load_info; |
| static struct builtin_load_info *builtin_load_info = &default_load_info; |
| |
| static UINT tls_module_count; /* number of modules with TLS directory */ |
| static UINT tls_total_size; /* total size of TLS storage */ |
| static const IMAGE_TLS_DIRECTORY **tls_dirs; /* array of TLS directories */ |
| |
| static UNICODE_STRING system_dir; /* system directory */ |
| |
| static CRITICAL_SECTION loader_section; |
| static CRITICAL_SECTION_DEBUG critsect_debug = |
| { |
| 0, 0, &loader_section, |
| { &critsect_debug.ProcessLocksList, &critsect_debug.ProcessLocksList }, |
| 0, 0, { 0, (DWORD)(__FILE__ ": loader_section") } |
| }; |
| static CRITICAL_SECTION loader_section = { &critsect_debug, -1, 0, 0, 0, 0 }; |
| |
| static WINE_MODREF *cached_modref; |
| static WINE_MODREF *current_modref; |
| |
| static NTSTATUS load_dll( LPCWSTR load_path, LPCWSTR libname, DWORD flags, WINE_MODREF** pwm ); |
| static FARPROC find_named_export( HMODULE module, IMAGE_EXPORT_DIRECTORY *exports, |
| DWORD exp_size, const char *name, int hint ); |
| |
| /* convert PE image VirtualAddress to Real Address */ |
| inline static void *get_rva( HMODULE module, DWORD va ) |
| { |
| return (void *)((char *)module + va); |
| } |
| |
| /* check whether the file name contains a path */ |
| inline static int contains_path( LPCWSTR name ) |
| { |
| return ((*name && (name[1] == ':')) || strchrW(name, '/') || strchrW(name, '\\')); |
| } |
| |
| /* convert from straight ASCII to Unicode without depending on the current codepage */ |
| inline static void ascii_to_unicode( WCHAR *dst, const char *src, size_t len ) |
| { |
| while (len--) *dst++ = (unsigned char)*src++; |
| } |
| |
| |
| /************************************************************************* |
| * call_dll_entry_point |
| * |
| * Some brain-damaged dlls (ir32_32.dll for instance) modify ebx in |
| * their entry point, so we need a small asm wrapper. |
| */ |
| #ifdef __i386__ |
| extern BOOL call_dll_entry_point( DLLENTRYPROC proc, void *module, UINT reason, void *reserved ); |
| __ASM_GLOBAL_FUNC(call_dll_entry_point, |
| "pushl %ebp\n\t" |
| "movl %esp,%ebp\n\t" |
| "pushl %ebx\n\t" |
| "pushl 20(%ebp)\n\t" |
| "pushl 16(%ebp)\n\t" |
| "pushl 12(%ebp)\n\t" |
| "movl 8(%ebp),%eax\n\t" |
| "call *%eax\n\t" |
| "leal -4(%ebp),%esp\n\t" |
| "popl %ebx\n\t" |
| "popl %ebp\n\t" |
| "ret" ); |
| #else /* __i386__ */ |
| static inline BOOL call_dll_entry_point( DLLENTRYPROC proc, void *module, |
| UINT reason, void *reserved ) |
| { |
| return proc( module, reason, reserved ); |
| } |
| #endif /* __i386__ */ |
| |
| |
| /************************************************************************* |
| * get_modref |
| * |
| * Looks for the referenced HMODULE in the current process |
| * The loader_section must be locked while calling this function. |
| */ |
| static WINE_MODREF *get_modref( HMODULE hmod ) |
| { |
| PLIST_ENTRY mark, entry; |
| PLDR_MODULE mod; |
| |
| if (cached_modref && cached_modref->ldr.BaseAddress == hmod) return cached_modref; |
| |
| mark = &NtCurrentTeb()->Peb->LdrData->InMemoryOrderModuleList; |
| for (entry = mark->Flink; entry != mark; entry = entry->Flink) |
| { |
| mod = CONTAINING_RECORD(entry, LDR_MODULE, InMemoryOrderModuleList); |
| if (mod->BaseAddress == hmod) |
| return cached_modref = CONTAINING_RECORD(mod, WINE_MODREF, ldr); |
| if (mod->BaseAddress > (void*)hmod) break; |
| } |
| return NULL; |
| } |
| |
| |
| /********************************************************************** |
| * find_basename_module |
| * |
| * Find a module from its base name. |
| * The loader_section must be locked while calling this function |
| */ |
| static WINE_MODREF *find_basename_module( LPCWSTR name ) |
| { |
| PLIST_ENTRY mark, entry; |
| |
| if (cached_modref && !strcmpiW( name, cached_modref->ldr.BaseDllName.Buffer )) |
| return cached_modref; |
| |
| mark = &NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList; |
| for (entry = mark->Flink; entry != mark; entry = entry->Flink) |
| { |
| LDR_MODULE *mod = CONTAINING_RECORD(entry, LDR_MODULE, InLoadOrderModuleList); |
| if (!strcmpiW( name, mod->BaseDllName.Buffer )) |
| { |
| cached_modref = CONTAINING_RECORD(mod, WINE_MODREF, ldr); |
| return cached_modref; |
| } |
| } |
| return NULL; |
| } |
| |
| |
| /********************************************************************** |
| * find_fullname_module |
| * |
| * Find a module from its full path name. |
| * The loader_section must be locked while calling this function |
| */ |
| static WINE_MODREF *find_fullname_module( LPCWSTR name ) |
| { |
| PLIST_ENTRY mark, entry; |
| |
| if (cached_modref && !strcmpiW( name, cached_modref->ldr.FullDllName.Buffer )) |
| return cached_modref; |
| |
| mark = &NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList; |
| for (entry = mark->Flink; entry != mark; entry = entry->Flink) |
| { |
| LDR_MODULE *mod = CONTAINING_RECORD(entry, LDR_MODULE, InLoadOrderModuleList); |
| if (!strcmpiW( name, mod->FullDllName.Buffer )) |
| { |
| cached_modref = CONTAINING_RECORD(mod, WINE_MODREF, ldr); |
| return cached_modref; |
| } |
| } |
| return NULL; |
| } |
| |
| |
| /************************************************************************* |
| * find_forwarded_export |
| * |
| * Find the final function pointer for a forwarded function. |
| * The loader_section must be locked while calling this function. |
| */ |
| static FARPROC find_forwarded_export( HMODULE module, const char *forward ) |
| { |
| IMAGE_EXPORT_DIRECTORY *exports; |
| DWORD exp_size; |
| WINE_MODREF *wm; |
| WCHAR mod_name[32]; |
| char *end = strchr(forward, '.'); |
| FARPROC proc = NULL; |
| |
| if (!end) return NULL; |
| if ((end - forward) * sizeof(WCHAR) >= sizeof(mod_name) - sizeof(dllW)) return NULL; |
| ascii_to_unicode( mod_name, forward, end - forward ); |
| memcpy( mod_name + (end - forward), dllW, sizeof(dllW) ); |
| |
| if (!(wm = find_basename_module( mod_name ))) |
| { |
| ERR("module not found for forward '%s' used by %s\n", |
| forward, debugstr_w(get_modref(module)->ldr.FullDllName.Buffer) ); |
| return NULL; |
| } |
| if ((exports = RtlImageDirectoryEntryToData( wm->ldr.BaseAddress, TRUE, |
| IMAGE_DIRECTORY_ENTRY_EXPORT, &exp_size ))) |
| proc = find_named_export( wm->ldr.BaseAddress, exports, exp_size, end + 1, -1 ); |
| |
| if (!proc) |
| { |
| ERR("function not found for forward '%s' used by %s." |
| " If you are using builtin %s, try using the native one instead.\n", |
| forward, debugstr_w(get_modref(module)->ldr.FullDllName.Buffer), |
| debugstr_w(get_modref(module)->ldr.BaseDllName.Buffer) ); |
| } |
| return proc; |
| } |
| |
| |
| /************************************************************************* |
| * find_ordinal_export |
| * |
| * Find an exported function by ordinal. |
| * The exports base must have been subtracted from the ordinal already. |
| * The loader_section must be locked while calling this function. |
| */ |
| static FARPROC find_ordinal_export( HMODULE module, IMAGE_EXPORT_DIRECTORY *exports, |
| DWORD exp_size, int ordinal ) |
| { |
| FARPROC proc; |
| DWORD *functions = get_rva( module, exports->AddressOfFunctions ); |
| |
| if (ordinal >= exports->NumberOfFunctions) |
| { |
| TRACE(" ordinal %ld out of range!\n", ordinal + exports->Base ); |
| return NULL; |
| } |
| if (!functions[ordinal]) return NULL; |
| |
| proc = get_rva( module, functions[ordinal] ); |
| |
| /* if the address falls into the export dir, it's a forward */ |
| if (((char *)proc >= (char *)exports) && ((char *)proc < (char *)exports + exp_size)) |
| return find_forwarded_export( module, (char *)proc ); |
| |
| if (TRACE_ON(snoop) && current_modref) |
| { |
| proc = SNOOP_GetProcAddress( module, exports, exp_size, proc, ordinal, |
| current_modref->ldr.BaseDllName.Buffer ); |
| } |
| if (TRACE_ON(relay) && current_modref) |
| { |
| proc = RELAY_GetProcAddress( module, exports, exp_size, proc, |
| current_modref->ldr.BaseDllName.Buffer ); |
| } |
| return proc; |
| } |
| |
| |
| /************************************************************************* |
| * find_named_export |
| * |
| * Find an exported function by name. |
| * The loader_section must be locked while calling this function. |
| */ |
| static FARPROC find_named_export( HMODULE module, IMAGE_EXPORT_DIRECTORY *exports, |
| DWORD exp_size, const char *name, int hint ) |
| { |
| WORD *ordinals = get_rva( module, exports->AddressOfNameOrdinals ); |
| DWORD *names = get_rva( module, exports->AddressOfNames ); |
| int min = 0, max = exports->NumberOfNames - 1; |
| |
| /* first check the hint */ |
| if (hint >= 0 && hint <= max) |
| { |
| char *ename = get_rva( module, names[hint] ); |
| if (!strcmp( ename, name )) |
| return find_ordinal_export( module, exports, exp_size, ordinals[hint] ); |
| } |
| |
| /* then do a binary search */ |
| while (min <= max) |
| { |
| int res, pos = (min + max) / 2; |
| char *ename = get_rva( module, names[pos] ); |
| if (!(res = strcmp( ename, name ))) |
| return find_ordinal_export( module, exports, exp_size, ordinals[pos] ); |
| if (res > 0) max = pos - 1; |
| else min = pos + 1; |
| } |
| return NULL; |
| |
| } |
| |
| |
| /************************************************************************* |
| * import_dll |
| * |
| * Import the dll specified by the given import descriptor. |
| * The loader_section must be locked while calling this function. |
| */ |
| static WINE_MODREF *import_dll( HMODULE module, IMAGE_IMPORT_DESCRIPTOR *descr, LPCWSTR load_path ) |
| { |
| NTSTATUS status; |
| WINE_MODREF *wmImp; |
| HMODULE imp_mod; |
| IMAGE_EXPORT_DIRECTORY *exports; |
| DWORD exp_size; |
| IMAGE_THUNK_DATA *import_list, *thunk_list; |
| WCHAR buffer[32]; |
| char *name = get_rva( module, descr->Name ); |
| DWORD len = strlen(name) + 1; |
| |
| thunk_list = get_rva( module, (DWORD)descr->FirstThunk ); |
| if (descr->u.OriginalFirstThunk) |
| import_list = get_rva( module, (DWORD)descr->u.OriginalFirstThunk ); |
| else |
| import_list = thunk_list; |
| |
| if (len * sizeof(WCHAR) <= sizeof(buffer)) |
| { |
| ascii_to_unicode( buffer, name, len ); |
| status = load_dll( load_path, buffer, 0, &wmImp ); |
| } |
| else /* need to allocate a larger buffer */ |
| { |
| WCHAR *ptr = RtlAllocateHeap( GetProcessHeap(), 0, len * sizeof(WCHAR) ); |
| if (!ptr) return NULL; |
| ascii_to_unicode( ptr, name, len ); |
| status = load_dll( load_path, ptr, 0, &wmImp ); |
| RtlFreeHeap( GetProcessHeap(), 0, ptr ); |
| } |
| |
| if (status) |
| { |
| if (status == STATUS_DLL_NOT_FOUND) |
| ERR("Library %s (which is needed by %s) not found\n", |
| name, debugstr_w(current_modref->ldr.FullDllName.Buffer)); |
| else |
| ERR("Loading library %s (which is needed by %s) failed (error %lx).\n", |
| name, debugstr_w(current_modref->ldr.FullDllName.Buffer), status); |
| return NULL; |
| } |
| |
| imp_mod = wmImp->ldr.BaseAddress; |
| exports = RtlImageDirectoryEntryToData( imp_mod, TRUE, IMAGE_DIRECTORY_ENTRY_EXPORT, &exp_size ); |
| |
| if (!exports) |
| { |
| /* set all imported function to deadbeef */ |
| while (import_list->u1.Ordinal) |
| { |
| if (IMAGE_SNAP_BY_ORDINAL(import_list->u1.Ordinal)) |
| { |
| ERR("No implementation for %s.%ld", name, IMAGE_ORDINAL(import_list->u1.Ordinal)); |
| } |
| else |
| { |
| IMAGE_IMPORT_BY_NAME *pe_name = get_rva( module, (DWORD)import_list->u1.AddressOfData ); |
| ERR("No implementation for %s.%s", name, pe_name->Name ); |
| } |
| ERR(" imported from %s, setting to 0xdeadbeef\n", |
| debugstr_w(current_modref->ldr.FullDllName.Buffer) ); |
| thunk_list->u1.Function = (PDWORD)0xdeadbeef; |
| |
| import_list++; |
| thunk_list++; |
| } |
| return wmImp; |
| } |
| |
| while (import_list->u1.Ordinal) |
| { |
| if (IMAGE_SNAP_BY_ORDINAL(import_list->u1.Ordinal)) |
| { |
| int ordinal = IMAGE_ORDINAL(import_list->u1.Ordinal); |
| |
| thunk_list->u1.Function = (PDWORD)find_ordinal_export( imp_mod, exports, exp_size, |
| ordinal - exports->Base ); |
| if (!thunk_list->u1.Function) |
| { |
| ERR("No implementation for %s.%d imported from %s, setting to 0xdeadbeef\n", |
| name, ordinal, debugstr_w(current_modref->ldr.FullDllName.Buffer) ); |
| thunk_list->u1.Function = (PDWORD)0xdeadbeef; |
| } |
| TRACE("--- Ordinal %s.%d = %p\n", name, ordinal, thunk_list->u1.Function ); |
| } |
| else /* import by name */ |
| { |
| IMAGE_IMPORT_BY_NAME *pe_name; |
| pe_name = get_rva( module, (DWORD)import_list->u1.AddressOfData ); |
| thunk_list->u1.Function = (PDWORD)find_named_export( imp_mod, exports, exp_size, |
| pe_name->Name, pe_name->Hint ); |
| if (!thunk_list->u1.Function) |
| { |
| ERR("No implementation for %s.%s imported from %s, setting to 0xdeadbeef\n", |
| name, pe_name->Name, debugstr_w(current_modref->ldr.FullDllName.Buffer) ); |
| thunk_list->u1.Function = (PDWORD)0xdeadbeef; |
| } |
| TRACE("--- %s %s.%d = %p\n", pe_name->Name, name, pe_name->Hint, thunk_list->u1.Function); |
| } |
| import_list++; |
| thunk_list++; |
| } |
| return wmImp; |
| } |
| |
| |
| /**************************************************************** |
| * fixup_imports |
| * |
| * Fixup all imports of a given module. |
| * The loader_section must be locked while calling this function. |
| */ |
| static NTSTATUS fixup_imports( WINE_MODREF *wm, LPCWSTR load_path ) |
| { |
| int i, nb_imports; |
| IMAGE_IMPORT_DESCRIPTOR *imports; |
| WINE_MODREF *prev; |
| DWORD size; |
| NTSTATUS status; |
| |
| if (!(imports = RtlImageDirectoryEntryToData( wm->ldr.BaseAddress, TRUE, |
| IMAGE_DIRECTORY_ENTRY_IMPORT, &size ))) |
| return STATUS_SUCCESS; |
| |
| nb_imports = size / sizeof(*imports); |
| for (i = 0; i < nb_imports; i++) |
| { |
| if (!imports[i].Name) |
| { |
| nb_imports = i; |
| break; |
| } |
| } |
| if (!nb_imports) return STATUS_SUCCESS; /* no imports */ |
| |
| /* Allocate module dependency list */ |
| wm->nDeps = nb_imports; |
| wm->deps = RtlAllocateHeap( GetProcessHeap(), 0, nb_imports*sizeof(WINE_MODREF *) ); |
| |
| /* load the imported modules. They are automatically |
| * added to the modref list of the process. |
| */ |
| prev = current_modref; |
| current_modref = wm; |
| status = STATUS_SUCCESS; |
| for (i = 0; i < nb_imports; i++) |
| { |
| if (!(wm->deps[i] = import_dll( wm->ldr.BaseAddress, &imports[i], load_path ))) |
| status = STATUS_DLL_NOT_FOUND; |
| } |
| current_modref = prev; |
| return status; |
| } |
| |
| |
| /************************************************************************* |
| * alloc_module |
| * |
| * Allocate a WINE_MODREF structure and add it to the process list |
| * The loader_section must be locked while calling this function. |
| */ |
| static WINE_MODREF *alloc_module( HMODULE hModule, LPCWSTR filename ) |
| { |
| WINE_MODREF *wm; |
| WCHAR *p; |
| IMAGE_NT_HEADERS *nt = RtlImageNtHeader(hModule); |
| PLIST_ENTRY entry, mark; |
| |
| if (!(wm = RtlAllocateHeap( GetProcessHeap(), 0, sizeof(*wm) ))) return NULL; |
| |
| wm->nDeps = 0; |
| wm->deps = NULL; |
| |
| wm->ldr.BaseAddress = hModule; |
| wm->ldr.EntryPoint = NULL; |
| wm->ldr.SizeOfImage = nt->OptionalHeader.SizeOfImage; |
| wm->ldr.Flags = 0; |
| wm->ldr.LoadCount = 0; |
| wm->ldr.TlsIndex = -1; |
| wm->ldr.SectionHandle = NULL; |
| wm->ldr.CheckSum = 0; |
| wm->ldr.TimeDateStamp = 0; |
| |
| RtlCreateUnicodeString( &wm->ldr.FullDllName, filename ); |
| if ((p = strrchrW( wm->ldr.FullDllName.Buffer, '\\' ))) p++; |
| else p = wm->ldr.FullDllName.Buffer; |
| RtlInitUnicodeString( &wm->ldr.BaseDllName, p ); |
| |
| if (nt->FileHeader.Characteristics & IMAGE_FILE_DLL) |
| { |
| wm->ldr.Flags |= LDR_IMAGE_IS_DLL; |
| if (nt->OptionalHeader.AddressOfEntryPoint) |
| wm->ldr.EntryPoint = (char *)hModule + nt->OptionalHeader.AddressOfEntryPoint; |
| } |
| |
| InsertTailList(&NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList, |
| &wm->ldr.InLoadOrderModuleList); |
| |
| /* insert module in MemoryList, sorted in increasing base addresses */ |
| mark = &NtCurrentTeb()->Peb->LdrData->InMemoryOrderModuleList; |
| for (entry = mark->Flink; entry != mark; entry = entry->Flink) |
| { |
| if (CONTAINING_RECORD(entry, LDR_MODULE, InMemoryOrderModuleList)->BaseAddress > wm->ldr.BaseAddress) |
| break; |
| } |
| entry->Blink->Flink = &wm->ldr.InMemoryOrderModuleList; |
| wm->ldr.InMemoryOrderModuleList.Blink = entry->Blink; |
| wm->ldr.InMemoryOrderModuleList.Flink = entry; |
| entry->Blink = &wm->ldr.InMemoryOrderModuleList; |
| |
| /* wait until init is called for inserting into this list */ |
| wm->ldr.InInitializationOrderModuleList.Flink = NULL; |
| wm->ldr.InInitializationOrderModuleList.Blink = NULL; |
| return wm; |
| } |
| |
| |
| /************************************************************************* |
| * alloc_process_tls |
| * |
| * Allocate the process-wide structure for module TLS storage. |
| */ |
| static NTSTATUS alloc_process_tls(void) |
| { |
| PLIST_ENTRY mark, entry; |
| PLDR_MODULE mod; |
| IMAGE_TLS_DIRECTORY *dir; |
| ULONG size, i; |
| |
| mark = &NtCurrentTeb()->Peb->LdrData->InMemoryOrderModuleList; |
| for (entry = mark->Flink; entry != mark; entry = entry->Flink) |
| { |
| mod = CONTAINING_RECORD(entry, LDR_MODULE, InMemoryOrderModuleList); |
| if (!(dir = RtlImageDirectoryEntryToData( mod->BaseAddress, TRUE, |
| IMAGE_DIRECTORY_ENTRY_TLS, &size ))) |
| continue; |
| size = (dir->EndAddressOfRawData - dir->StartAddressOfRawData) + dir->SizeOfZeroFill; |
| if (!size) continue; |
| tls_total_size += size; |
| tls_module_count++; |
| } |
| if (!tls_module_count) return STATUS_SUCCESS; |
| |
| TRACE( "count %u size %u\n", tls_module_count, tls_total_size ); |
| |
| tls_dirs = RtlAllocateHeap( GetProcessHeap(), 0, tls_module_count * sizeof(*tls_dirs) ); |
| if (!tls_dirs) return STATUS_NO_MEMORY; |
| |
| for (i = 0, entry = mark->Flink; entry != mark; entry = entry->Flink) |
| { |
| mod = CONTAINING_RECORD(entry, LDR_MODULE, InMemoryOrderModuleList); |
| if (!(dir = RtlImageDirectoryEntryToData( mod->BaseAddress, TRUE, |
| IMAGE_DIRECTORY_ENTRY_TLS, &size ))) |
| continue; |
| tls_dirs[i] = dir; |
| *dir->AddressOfIndex = i; |
| mod->TlsIndex = i; |
| mod->LoadCount = -1; /* can't unload it */ |
| i++; |
| } |
| return STATUS_SUCCESS; |
| } |
| |
| |
| /************************************************************************* |
| * alloc_thread_tls |
| * |
| * Allocate the per-thread structure for module TLS storage. |
| */ |
| static NTSTATUS alloc_thread_tls(void) |
| { |
| void **pointers; |
| char *data; |
| UINT i; |
| |
| if (!tls_module_count) return STATUS_SUCCESS; |
| |
| if (!(pointers = RtlAllocateHeap( GetProcessHeap(), 0, |
| tls_module_count * sizeof(*pointers) ))) |
| return STATUS_NO_MEMORY; |
| |
| if (!(data = RtlAllocateHeap( GetProcessHeap(), 0, tls_total_size ))) |
| { |
| RtlFreeHeap( GetProcessHeap(), 0, pointers ); |
| return STATUS_NO_MEMORY; |
| } |
| |
| for (i = 0; i < tls_module_count; i++) |
| { |
| const IMAGE_TLS_DIRECTORY *dir = tls_dirs[i]; |
| ULONG size = dir->EndAddressOfRawData - dir->StartAddressOfRawData; |
| |
| TRACE( "thread %04lx idx %d: %ld/%ld bytes from %p to %p\n", |
| GetCurrentThreadId(), i, size, dir->SizeOfZeroFill, |
| (void *)dir->StartAddressOfRawData, data ); |
| |
| pointers[i] = data; |
| memcpy( data, (void *)dir->StartAddressOfRawData, size ); |
| data += size; |
| memset( data, 0, dir->SizeOfZeroFill ); |
| data += dir->SizeOfZeroFill; |
| } |
| NtCurrentTeb()->ThreadLocalStoragePointer = pointers; |
| return STATUS_SUCCESS; |
| } |
| |
| |
| /************************************************************************* |
| * call_tls_callbacks |
| */ |
| static void call_tls_callbacks( HMODULE module, UINT reason ) |
| { |
| const IMAGE_TLS_DIRECTORY *dir; |
| const PIMAGE_TLS_CALLBACK *callback; |
| ULONG dirsize; |
| |
| dir = RtlImageDirectoryEntryToData( module, TRUE, IMAGE_DIRECTORY_ENTRY_TLS, &dirsize ); |
| if (!dir || !dir->AddressOfCallBacks) return; |
| |
| for (callback = dir->AddressOfCallBacks; *callback; callback++) |
| { |
| if (TRACE_ON(relay)) |
| DPRINTF("%04lx:Call TLS callback (proc=%p,module=%p,reason=%s,reserved=0)\n", |
| GetCurrentThreadId(), *callback, module, reason_names[reason] ); |
| (*callback)( module, reason, NULL ); |
| if (TRACE_ON(relay)) |
| DPRINTF("%04lx:Ret TLS callback (proc=%p,module=%p,reason=%s,reserved=0)\n", |
| GetCurrentThreadId(), *callback, module, reason_names[reason] ); |
| } |
| } |
| |
| |
| /************************************************************************* |
| * MODULE_InitDLL |
| */ |
| static BOOL MODULE_InitDLL( WINE_MODREF *wm, UINT reason, LPVOID lpReserved ) |
| { |
| WCHAR mod_name[32]; |
| BOOL retv = TRUE; |
| DLLENTRYPROC entry = wm->ldr.EntryPoint; |
| void *module = wm->ldr.BaseAddress; |
| |
| /* Skip calls for modules loaded with special load flags */ |
| |
| if (wm->ldr.Flags & LDR_DONT_RESOLVE_REFS) return TRUE; |
| if (wm->ldr.TlsIndex != -1) call_tls_callbacks( wm->ldr.BaseAddress, reason ); |
| if (!entry) return TRUE; |
| |
| if (TRACE_ON(relay)) |
| { |
| size_t len = min( wm->ldr.BaseDllName.Length, sizeof(mod_name)-sizeof(WCHAR) ); |
| memcpy( mod_name, wm->ldr.BaseDllName.Buffer, len ); |
| mod_name[len / sizeof(WCHAR)] = 0; |
| DPRINTF("%04lx:Call PE DLL (proc=%p,module=%p %s,reason=%s,res=%p)\n", |
| GetCurrentThreadId(), entry, module, debugstr_w(mod_name), |
| reason_names[reason], lpReserved ); |
| } |
| else TRACE("(%p %s,%s,%p) - CALL\n", module, debugstr_w(wm->ldr.BaseDllName.Buffer), |
| reason_names[reason], lpReserved ); |
| |
| retv = call_dll_entry_point( entry, module, reason, lpReserved ); |
| |
| /* The state of the module list may have changed due to the call |
| to the dll. We cannot assume that this module has not been |
| deleted. */ |
| if (TRACE_ON(relay)) |
| DPRINTF("%04lx:Ret PE DLL (proc=%p,module=%p %s,reason=%s,res=%p) retval=%x\n", |
| GetCurrentThreadId(), entry, module, debugstr_w(mod_name), |
| reason_names[reason], lpReserved, retv ); |
| else TRACE("(%p,%s,%p) - RETURN %d\n", module, reason_names[reason], lpReserved, retv ); |
| |
| return retv; |
| } |
| |
| |
| /************************************************************************* |
| * process_attach |
| * |
| * Send the process attach notification to all DLLs the given module |
| * depends on (recursively). This is somewhat complicated due to the fact that |
| * |
| * - we have to respect the module dependencies, i.e. modules implicitly |
| * referenced by another module have to be initialized before the module |
| * itself can be initialized |
| * |
| * - the initialization routine of a DLL can itself call LoadLibrary, |
| * thereby introducing a whole new set of dependencies (even involving |
| * the 'old' modules) at any time during the whole process |
| * |
| * (Note that this routine can be recursively entered not only directly |
| * from itself, but also via LoadLibrary from one of the called initialization |
| * routines.) |
| * |
| * Furthermore, we need to rearrange the main WINE_MODREF list to allow |
| * the process *detach* notifications to be sent in the correct order. |
| * This must not only take into account module dependencies, but also |
| * 'hidden' dependencies created by modules calling LoadLibrary in their |
| * attach notification routine. |
| * |
| * The strategy is rather simple: we move a WINE_MODREF to the head of the |
| * list after the attach notification has returned. This implies that the |
| * detach notifications are called in the reverse of the sequence the attach |
| * notifications *returned*. |
| * |
| * The loader_section must be locked while calling this function. |
| */ |
| static NTSTATUS process_attach( WINE_MODREF *wm, LPVOID lpReserved ) |
| { |
| NTSTATUS status = STATUS_SUCCESS; |
| int i; |
| |
| /* prevent infinite recursion in case of cyclical dependencies */ |
| if ( ( wm->ldr.Flags & LDR_LOAD_IN_PROGRESS ) |
| || ( wm->ldr.Flags & LDR_PROCESS_ATTACHED ) ) |
| return status; |
| |
| TRACE("(%s,%p) - START\n", debugstr_w(wm->ldr.BaseDllName.Buffer), lpReserved ); |
| |
| /* Tag current MODREF to prevent recursive loop */ |
| wm->ldr.Flags |= LDR_LOAD_IN_PROGRESS; |
| |
| /* Recursively attach all DLLs this one depends on */ |
| for ( i = 0; i < wm->nDeps; i++ ) |
| { |
| if (!wm->deps[i]) continue; |
| if ((status = process_attach( wm->deps[i], lpReserved )) != STATUS_SUCCESS) break; |
| } |
| |
| /* Call DLL entry point */ |
| if (status == STATUS_SUCCESS) |
| { |
| WINE_MODREF *prev = current_modref; |
| current_modref = wm; |
| if (MODULE_InitDLL( wm, DLL_PROCESS_ATTACH, lpReserved )) |
| wm->ldr.Flags |= LDR_PROCESS_ATTACHED; |
| else |
| status = STATUS_DLL_INIT_FAILED; |
| current_modref = prev; |
| } |
| |
| InsertTailList(&NtCurrentTeb()->Peb->LdrData->InInitializationOrderModuleList, |
| &wm->ldr.InInitializationOrderModuleList); |
| |
| /* Remove recursion flag */ |
| wm->ldr.Flags &= ~LDR_LOAD_IN_PROGRESS; |
| |
| TRACE("(%s,%p) - END\n", debugstr_w(wm->ldr.BaseDllName.Buffer), lpReserved ); |
| return status; |
| } |
| |
| /************************************************************************* |
| * process_detach |
| * |
| * Send DLL process detach notifications. See the comment about calling |
| * sequence at process_attach. Unless the bForceDetach flag |
| * is set, only DLLs with zero refcount are notified. |
| */ |
| static void process_detach( BOOL bForceDetach, LPVOID lpReserved ) |
| { |
| PLIST_ENTRY mark, entry; |
| PLDR_MODULE mod; |
| |
| RtlEnterCriticalSection( &loader_section ); |
| if (bForceDetach) process_detaching = 1; |
| mark = &NtCurrentTeb()->Peb->LdrData->InInitializationOrderModuleList; |
| do |
| { |
| for (entry = mark->Blink; entry != mark; entry = entry->Blink) |
| { |
| mod = CONTAINING_RECORD(entry, LDR_MODULE, |
| InInitializationOrderModuleList); |
| /* Check whether to detach this DLL */ |
| if ( !(mod->Flags & LDR_PROCESS_ATTACHED) ) |
| continue; |
| if ( mod->LoadCount && !bForceDetach ) |
| continue; |
| |
| /* Call detach notification */ |
| mod->Flags &= ~LDR_PROCESS_ATTACHED; |
| MODULE_InitDLL( CONTAINING_RECORD(mod, WINE_MODREF, ldr), |
| DLL_PROCESS_DETACH, lpReserved ); |
| |
| /* Restart at head of WINE_MODREF list, as entries might have |
| been added and/or removed while performing the call ... */ |
| break; |
| } |
| } while (entry != mark); |
| |
| RtlLeaveCriticalSection( &loader_section ); |
| } |
| |
| /************************************************************************* |
| * MODULE_DllThreadAttach |
| * |
| * Send DLL thread attach notifications. These are sent in the |
| * reverse sequence of process detach notification. |
| * |
| */ |
| NTSTATUS MODULE_DllThreadAttach( LPVOID lpReserved ) |
| { |
| PLIST_ENTRY mark, entry; |
| PLDR_MODULE mod; |
| NTSTATUS status; |
| |
| /* don't do any attach calls if process is exiting */ |
| if (process_detaching) return STATUS_SUCCESS; |
| /* FIXME: there is still a race here */ |
| |
| RtlEnterCriticalSection( &loader_section ); |
| |
| if ((status = alloc_thread_tls()) != STATUS_SUCCESS) goto done; |
| |
| mark = &NtCurrentTeb()->Peb->LdrData->InInitializationOrderModuleList; |
| for (entry = mark->Flink; entry != mark; entry = entry->Flink) |
| { |
| mod = CONTAINING_RECORD(entry, LDR_MODULE, |
| InInitializationOrderModuleList); |
| if ( !(mod->Flags & LDR_PROCESS_ATTACHED) ) |
| continue; |
| if ( mod->Flags & LDR_NO_DLL_CALLS ) |
| continue; |
| |
| MODULE_InitDLL( CONTAINING_RECORD(mod, WINE_MODREF, ldr), |
| DLL_THREAD_ATTACH, lpReserved ); |
| } |
| |
| done: |
| RtlLeaveCriticalSection( &loader_section ); |
| return status; |
| } |
| |
| /****************************************************************** |
| * LdrDisableThreadCalloutsForDll (NTDLL.@) |
| * |
| */ |
| NTSTATUS WINAPI LdrDisableThreadCalloutsForDll(HMODULE hModule) |
| { |
| WINE_MODREF *wm; |
| NTSTATUS ret = STATUS_SUCCESS; |
| |
| RtlEnterCriticalSection( &loader_section ); |
| |
| wm = get_modref( hModule ); |
| if (!wm || wm->ldr.TlsIndex != -1) |
| ret = STATUS_DLL_NOT_FOUND; |
| else |
| wm->ldr.Flags |= LDR_NO_DLL_CALLS; |
| |
| RtlLeaveCriticalSection( &loader_section ); |
| |
| return ret; |
| } |
| |
| /****************************************************************** |
| * LdrFindEntryForAddress (NTDLL.@) |
| * |
| * The loader_section must be locked while calling this function |
| */ |
| NTSTATUS WINAPI LdrFindEntryForAddress(const void* addr, PLDR_MODULE* pmod) |
| { |
| PLIST_ENTRY mark, entry; |
| PLDR_MODULE mod; |
| |
| mark = &NtCurrentTeb()->Peb->LdrData->InMemoryOrderModuleList; |
| for (entry = mark->Flink; entry != mark; entry = entry->Flink) |
| { |
| mod = CONTAINING_RECORD(entry, LDR_MODULE, InMemoryOrderModuleList); |
| if ((const void *)mod->BaseAddress <= addr && |
| (char *)addr < (char*)mod->BaseAddress + mod->SizeOfImage) |
| { |
| *pmod = mod; |
| return STATUS_SUCCESS; |
| } |
| if ((const void *)mod->BaseAddress > addr) break; |
| } |
| return STATUS_NO_MORE_ENTRIES; |
| } |
| |
| /****************************************************************** |
| * LdrLockLoaderLock (NTDLL.@) |
| * |
| * Note: flags are not implemented. |
| * Flag 0x01 is used to raise exceptions on errors. |
| * Flag 0x02 is used to avoid waiting on the section (does RtlTryEnterCriticalSection instead). |
| */ |
| NTSTATUS WINAPI LdrLockLoaderLock( ULONG flags, ULONG *result, ULONG *magic ) |
| { |
| if (flags) FIXME( "flags %lx not supported\n", flags ); |
| |
| if (result) *result = 1; |
| if (!magic) return STATUS_INVALID_PARAMETER_3; |
| RtlEnterCriticalSection( &loader_section ); |
| *magic = GetCurrentThreadId(); |
| return STATUS_SUCCESS; |
| } |
| |
| |
| /****************************************************************** |
| * LdrUnlockLoaderUnlock (NTDLL.@) |
| */ |
| NTSTATUS WINAPI LdrUnlockLoaderLock( ULONG flags, ULONG magic ) |
| { |
| if (magic) |
| { |
| if (magic != GetCurrentThreadId()) return STATUS_INVALID_PARAMETER_2; |
| RtlLeaveCriticalSection( &loader_section ); |
| } |
| return STATUS_SUCCESS; |
| } |
| |
| |
| /****************************************************************** |
| * LdrGetDllHandle (NTDLL.@) |
| */ |
| NTSTATUS WINAPI LdrGetDllHandle(ULONG x, ULONG y, const UNICODE_STRING *name, HMODULE *base) |
| { |
| NTSTATUS status = STATUS_DLL_NOT_FOUND; |
| WCHAR dllname[MAX_PATH+4], *p; |
| UNICODE_STRING str; |
| PLIST_ENTRY mark, entry; |
| PLDR_MODULE mod; |
| |
| if (x != 0 || y != 0) |
| FIXME("Unknown behavior, please report\n"); |
| |
| /* Append .DLL to name if no extension present */ |
| if (!(p = strrchrW( name->Buffer, '.')) || strchrW( p, '/' ) || strchrW( p, '\\')) |
| { |
| if (name->Length >= MAX_PATH) return STATUS_NAME_TOO_LONG; |
| strcpyW( dllname, name->Buffer ); |
| strcatW( dllname, dllW ); |
| RtlInitUnicodeString( &str, dllname ); |
| name = &str; |
| } |
| |
| RtlEnterCriticalSection( &loader_section ); |
| |
| if (cached_modref) |
| { |
| if (RtlEqualUnicodeString( name, &cached_modref->ldr.FullDllName, TRUE ) || |
| RtlEqualUnicodeString( name, &cached_modref->ldr.BaseDllName, TRUE )) |
| { |
| *base = cached_modref->ldr.BaseAddress; |
| status = STATUS_SUCCESS; |
| goto done; |
| } |
| } |
| |
| mark = &NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList; |
| for (entry = mark->Flink; entry != mark; entry = entry->Flink) |
| { |
| mod = CONTAINING_RECORD(entry, LDR_MODULE, InLoadOrderModuleList); |
| |
| if (RtlEqualUnicodeString( name, &mod->FullDllName, TRUE ) || |
| RtlEqualUnicodeString( name, &mod->BaseDllName, TRUE )) |
| { |
| cached_modref = CONTAINING_RECORD(mod, WINE_MODREF, ldr); |
| *base = mod->BaseAddress; |
| status = STATUS_SUCCESS; |
| break; |
| } |
| } |
| done: |
| RtlLeaveCriticalSection( &loader_section ); |
| TRACE("%lx %lx %s -> %p\n", x, y, debugstr_us(name), status ? NULL : *base); |
| return status; |
| } |
| |
| |
| /****************************************************************** |
| * LdrGetProcedureAddress (NTDLL.@) |
| */ |
| NTSTATUS WINAPI LdrGetProcedureAddress(HMODULE module, const ANSI_STRING *name, |
| ULONG ord, PVOID *address) |
| { |
| IMAGE_EXPORT_DIRECTORY *exports; |
| DWORD exp_size; |
| NTSTATUS ret = STATUS_PROCEDURE_NOT_FOUND; |
| |
| RtlEnterCriticalSection( &loader_section ); |
| |
| if ((exports = RtlImageDirectoryEntryToData( module, TRUE, |
| IMAGE_DIRECTORY_ENTRY_EXPORT, &exp_size ))) |
| { |
| void *proc = name ? find_named_export( module, exports, exp_size, name->Buffer, -1 ) |
| : find_ordinal_export( module, exports, exp_size, ord - exports->Base ); |
| if (proc) |
| { |
| *address = proc; |
| ret = STATUS_SUCCESS; |
| } |
| } |
| else |
| { |
| /* check if the module itself is invalid to return the proper error */ |
| if (!get_modref( module )) ret = STATUS_DLL_NOT_FOUND; |
| } |
| |
| RtlLeaveCriticalSection( &loader_section ); |
| return ret; |
| } |
| |
| |
| /*********************************************************************** |
| * load_builtin_callback |
| * |
| * Load a library in memory; callback function for wine_dll_register |
| */ |
| static void load_builtin_callback( void *module, const char *filename ) |
| { |
| static const WCHAR emptyW[1]; |
| void *addr; |
| IMAGE_NT_HEADERS *nt; |
| WINE_MODREF *wm; |
| WCHAR *fullname, *p; |
| const WCHAR *load_path; |
| |
| if (!module) |
| { |
| ERR("could not map image for %s\n", filename ? filename : "main exe" ); |
| return; |
| } |
| if (!(nt = RtlImageNtHeader( module ))) |
| { |
| ERR( "bad module for %s\n", filename ? filename : "main exe" ); |
| builtin_load_info->status = STATUS_INVALID_IMAGE_FORMAT; |
| return; |
| } |
| if (!(nt->FileHeader.Characteristics & IMAGE_FILE_DLL)) |
| { |
| /* if we already have an executable, ignore this one */ |
| if (!NtCurrentTeb()->Peb->ImageBaseAddress) |
| { |
| NtCurrentTeb()->Peb->ImageBaseAddress = module; |
| return; /* don't create the modref here, will be done later on */ |
| } |
| } |
| |
| /* create the MODREF */ |
| |
| if (!(fullname = RtlAllocateHeap( GetProcessHeap(), 0, |
| system_dir.MaximumLength + (strlen(filename) + 1) * sizeof(WCHAR) ))) |
| { |
| ERR( "can't load %s\n", filename ); |
| builtin_load_info->status = STATUS_NO_MEMORY; |
| return; |
| } |
| memcpy( fullname, system_dir.Buffer, system_dir.Length ); |
| p = fullname + system_dir.Length / sizeof(WCHAR); |
| if (p > fullname && p[-1] != '\\') *p++ = '\\'; |
| ascii_to_unicode( p, filename, strlen(filename) + 1 ); |
| |
| wm = alloc_module( module, fullname ); |
| RtlFreeHeap( GetProcessHeap(), 0, fullname ); |
| if (!wm) |
| { |
| ERR( "can't load %s\n", filename ); |
| builtin_load_info->status = STATUS_NO_MEMORY; |
| return; |
| } |
| wm->ldr.Flags |= LDR_WINE_INTERNAL; |
| NtAllocateVirtualMemory( GetCurrentProcess(), &addr, module, &nt->OptionalHeader.SizeOfImage, |
| MEM_SYSTEM | MEM_IMAGE, PAGE_EXECUTE_WRITECOPY ); |
| |
| /* fixup imports */ |
| |
| load_path = builtin_load_info->load_path; |
| if (!load_path) load_path = NtCurrentTeb()->Peb->ProcessParameters->DllPath.Buffer; |
| if (!load_path) load_path = emptyW; |
| if (fixup_imports( wm, load_path ) != STATUS_SUCCESS) |
| { |
| /* the module has only be inserted in the load & memory order lists */ |
| RemoveEntryList(&wm->ldr.InLoadOrderModuleList); |
| RemoveEntryList(&wm->ldr.InMemoryOrderModuleList); |
| /* FIXME: free the modref */ |
| builtin_load_info->status = STATUS_DLL_NOT_FOUND; |
| return; |
| } |
| builtin_load_info->wm = wm; |
| TRACE( "loaded %s %p %p\n", filename, wm, module ); |
| |
| /* send the DLL load event */ |
| |
| SERVER_START_REQ( load_dll ) |
| { |
| req->handle = 0; |
| req->base = module; |
| req->size = nt->OptionalHeader.SizeOfImage; |
| req->dbg_offset = nt->FileHeader.PointerToSymbolTable; |
| req->dbg_size = nt->FileHeader.NumberOfSymbols; |
| req->name = &wm->ldr.FullDllName.Buffer; |
| wine_server_add_data( req, wm->ldr.FullDllName.Buffer, wm->ldr.FullDllName.Length ); |
| wine_server_call( req ); |
| } |
| SERVER_END_REQ; |
| |
| /* setup relay debugging entry points */ |
| if (TRACE_ON(relay)) RELAY_SetupDLL( module ); |
| } |
| |
| |
| /****************************************************************************** |
| * load_native_dll (internal) |
| */ |
| static NTSTATUS load_native_dll( LPCWSTR load_path, LPCWSTR name, HANDLE file, |
| DWORD flags, WINE_MODREF** pwm ) |
| { |
| void *module; |
| HANDLE mapping; |
| OBJECT_ATTRIBUTES attr; |
| LARGE_INTEGER size; |
| IMAGE_NT_HEADERS *nt; |
| DWORD len = 0; |
| WINE_MODREF *wm; |
| NTSTATUS status; |
| |
| TRACE( "loading %s\n", debugstr_w(name) ); |
| |
| attr.Length = sizeof(attr); |
| attr.RootDirectory = 0; |
| attr.ObjectName = NULL; |
| attr.Attributes = 0; |
| attr.SecurityDescriptor = NULL; |
| attr.SecurityQualityOfService = NULL; |
| size.QuadPart = 0; |
| |
| status = NtCreateSection( &mapping, STANDARD_RIGHTS_REQUIRED | SECTION_QUERY | SECTION_MAP_READ, |
| &attr, &size, 0, SEC_IMAGE, file ); |
| if (status != STATUS_SUCCESS) return status; |
| |
| module = NULL; |
| status = NtMapViewOfSection( mapping, GetCurrentProcess(), |
| &module, 0, 0, &size, &len, ViewShare, 0, PAGE_READONLY ); |
| NtClose( mapping ); |
| if (status != STATUS_SUCCESS) return status; |
| |
| /* create the MODREF */ |
| |
| if (!(wm = alloc_module( module, name ))) return STATUS_NO_MEMORY; |
| |
| /* fixup imports */ |
| |
| if (!(flags & DONT_RESOLVE_DLL_REFERENCES)) |
| { |
| if ((status = fixup_imports( wm, load_path )) != STATUS_SUCCESS) |
| { |
| /* the module has only be inserted in the load & memory order lists */ |
| RemoveEntryList(&wm->ldr.InLoadOrderModuleList); |
| RemoveEntryList(&wm->ldr.InMemoryOrderModuleList); |
| |
| /* FIXME: there are several more dangling references |
| * left. Including dlls loaded by this dll before the |
| * failed one. Unrolling is rather difficult with the |
| * current structure and we can leave them lying |
| * around with no problems, so we don't care. |
| * As these might reference our wm, we don't free it. |
| */ |
| return status; |
| } |
| } |
| else wm->ldr.Flags |= LDR_DONT_RESOLVE_REFS; |
| |
| /* send DLL load event */ |
| |
| nt = RtlImageNtHeader( module ); |
| |
| /* don't keep the file open if the mapping is from removable media */ |
| if (!VIRTUAL_HasMapping( module )) file = 0; |
| |
| SERVER_START_REQ( load_dll ) |
| { |
| req->handle = file; |
| req->base = module; |
| req->size = nt->OptionalHeader.SizeOfImage; |
| req->dbg_offset = nt->FileHeader.PointerToSymbolTable; |
| req->dbg_size = nt->FileHeader.NumberOfSymbols; |
| req->name = &wm->ldr.FullDllName.Buffer; |
| wine_server_add_data( req, wm->ldr.FullDllName.Buffer, wm->ldr.FullDllName.Length ); |
| wine_server_call( req ); |
| } |
| SERVER_END_REQ; |
| |
| if (TRACE_ON(snoop)) SNOOP_SetupDLL( module ); |
| |
| *pwm = wm; |
| return STATUS_SUCCESS; |
| } |
| |
| |
| /*********************************************************************** |
| * load_builtin_dll |
| */ |
| static NTSTATUS load_builtin_dll( LPCWSTR load_path, LPCWSTR path, DWORD flags, WINE_MODREF** pwm ) |
| { |
| char error[256], dllname[MAX_PATH]; |
| int file_exists; |
| const WCHAR *name, *p; |
| DWORD len, i; |
| void *handle; |
| struct builtin_load_info info, *prev_info; |
| |
| /* Fix the name in case we have a full path and extension */ |
| name = path; |
| if ((p = strrchrW( name, '\\' ))) name = p + 1; |
| if ((p = strrchrW( name, '/' ))) name = p + 1; |
| |
| /* we don't want to depend on the current codepage here */ |
| len = strlenW( name ) + 1; |
| if (len >= sizeof(dllname)) return STATUS_NAME_TOO_LONG; |
| for (i = 0; i < len; i++) |
| { |
| if (name[i] > 127) return STATUS_DLL_NOT_FOUND; |
| dllname[i] = (char)name[i]; |
| if (dllname[i] >= 'A' && dllname[i] <= 'Z') dllname[i] += 'a' - 'A'; |
| } |
| |
| /* load_library will modify info.status. Note also that load_library can be |
| * called several times, if the .so file we're loading has dependencies. |
| * info.status will gather all the errors we may get while loading all these |
| * libraries |
| */ |
| info.load_path = load_path; |
| info.status = STATUS_SUCCESS; |
| info.wm = NULL; |
| prev_info = builtin_load_info; |
| builtin_load_info = &info; |
| handle = wine_dll_load( dllname, error, sizeof(error), &file_exists ); |
| builtin_load_info = prev_info; |
| |
| if (!handle) |
| { |
| if (!file_exists) |
| { |
| /* The file does not exist -> WARN() */ |
| WARN("cannot open .so lib for builtin %s: %s\n", debugstr_w(name), error); |
| return STATUS_DLL_NOT_FOUND; |
| } |
| /* ERR() for all other errors (missing functions, ...) */ |
| ERR("failed to load .so lib for builtin %s: %s\n", debugstr_w(name), error ); |
| return STATUS_PROCEDURE_NOT_FOUND; |
| } |
| if (info.status != STATUS_SUCCESS) return info.status; |
| |
| if (!info.wm) |
| { |
| /* The constructor wasn't called, this means the .so is already |
| * loaded under a different name. We can't support multiple names |
| * for the same module, so return an error. */ |
| return STATUS_INVALID_IMAGE_FORMAT; |
| } |
| |
| info.wm->ldr.SectionHandle = handle; |
| if (strcmpiW( info.wm->ldr.BaseDllName.Buffer, name )) |
| { |
| ERR( "loaded .so for %s but got %s instead - probably 16-bit dll\n", |
| debugstr_w(name), debugstr_w(info.wm->ldr.BaseDllName.Buffer) ); |
| /* wine_dll_unload( handle );*/ |
| return STATUS_INVALID_IMAGE_FORMAT; |
| } |
| *pwm = info.wm; |
| return STATUS_SUCCESS; |
| } |
| |
| |
| /*********************************************************************** |
| * find_dll_file |
| * |
| * Find the file (or already loaded module) for a given dll name. |
| */ |
| static NTSTATUS find_dll_file( const WCHAR *load_path, const WCHAR *libname, |
| WCHAR *filename, ULONG *size, WINE_MODREF **pwm, HANDLE *handle ) |
| { |
| OBJECT_ATTRIBUTES attr; |
| IO_STATUS_BLOCK io; |
| UNICODE_STRING nt_name; |
| WCHAR *file_part, *ext; |
| ULONG len; |
| |
| nt_name.Buffer = NULL; |
| if (RtlDetermineDosPathNameType_U( libname ) == RELATIVE_PATH) |
| { |
| /* we need to search for it */ |
| /* but first append .dll because RtlDosSearchPath extension handling is broken */ |
| if (!(ext = strrchrW( libname, '.')) || strchrW( ext, '/' ) || strchrW( ext, '\\')) |
| { |
| WCHAR *dllname; |
| |
| if (!(dllname = RtlAllocateHeap( GetProcessHeap(), 0, |
| (strlenW(libname) * sizeof(WCHAR)) + sizeof(dllW) ))) |
| return STATUS_NO_MEMORY; |
| strcpyW( dllname, libname ); |
| strcatW( dllname, dllW ); |
| len = RtlDosSearchPath_U( load_path, dllname, NULL, *size, filename, &file_part ); |
| RtlFreeHeap( GetProcessHeap(), 0, dllname ); |
| } |
| else len = RtlDosSearchPath_U( load_path, libname, NULL, *size, filename, &file_part ); |
| |
| if (len) |
| { |
| if (len >= *size) |
| { |
| *size = len + sizeof(WCHAR); |
| return STATUS_BUFFER_TOO_SMALL; |
| } |
| if ((*pwm = find_fullname_module( filename )) != NULL) return STATUS_SUCCESS; |
| |
| /* check for already loaded module in a different path */ |
| if (!contains_path( libname )) |
| { |
| if ((*pwm = find_basename_module( file_part )) != NULL) return STATUS_SUCCESS; |
| } |
| if (!RtlDosPathNameToNtPathName_U( filename, &nt_name, NULL, NULL )) |
| return STATUS_NO_MEMORY; |
| |
| attr.Length = sizeof(attr); |
| attr.RootDirectory = 0; |
| attr.Attributes = OBJ_CASE_INSENSITIVE; |
| attr.ObjectName = &nt_name; |
| attr.SecurityDescriptor = NULL; |
| attr.SecurityQualityOfService = NULL; |
| if (NtOpenFile( handle, GENERIC_READ, &attr, &io, FILE_SHARE_READ, 0 )) *handle = 0; |
| RtlFreeUnicodeString( &nt_name ); |
| return STATUS_SUCCESS; |
| } |
| |
| /* not found */ |
| |
| if (!contains_path( libname )) |
| { |
| /* if libname doesn't contain a path at all, we simply return the name as is, |
| * to be loaded as builtin */ |
| len = strlenW(libname) * sizeof(WCHAR); |
| if (len >= *size) goto overflow; |
| strcpyW( filename, libname ); |
| if (!strchrW( filename, '.' )) |
| { |
| len += sizeof(dllW) - sizeof(WCHAR); |
| if (len >= *size) goto overflow; |
| strcatW( filename, dllW ); |
| } |
| *pwm = find_basename_module( filename ); |
| return STATUS_SUCCESS; |
| } |
| } |
| |
| /* absolute path name, or relative path name but not found above */ |
| |
| if (!RtlDosPathNameToNtPathName_U( libname, &nt_name, &file_part, NULL )) |
| return STATUS_NO_MEMORY; |
| |
| len = nt_name.Length - 4*sizeof(WCHAR); /* for \??\ prefix */ |
| if (len >= *size) goto overflow; |
| memcpy( filename, nt_name.Buffer + 4, len + sizeof(WCHAR) ); |
| if (file_part && !strchrW( file_part, '.' )) |
| { |
| len += sizeof(dllW) - sizeof(WCHAR); |
| if (len >= *size) goto overflow; |
| strcatW( filename, dllW ); |
| } |
| if (!(*pwm = find_fullname_module( filename ))) |
| { |
| attr.Length = sizeof(attr); |
| attr.RootDirectory = 0; |
| attr.Attributes = OBJ_CASE_INSENSITIVE; |
| attr.ObjectName = &nt_name; |
| attr.SecurityDescriptor = NULL; |
| attr.SecurityQualityOfService = NULL; |
| if (NtOpenFile( handle, GENERIC_READ, &attr, &io, FILE_SHARE_READ, 0 )) *handle = 0; |
| } |
| RtlFreeUnicodeString( &nt_name ); |
| return STATUS_SUCCESS; |
| |
| overflow: |
| RtlFreeUnicodeString( &nt_name ); |
| *size = len + sizeof(WCHAR); |
| return STATUS_BUFFER_TOO_SMALL; |
| } |
| |
| |
| /*********************************************************************** |
| * load_dll (internal) |
| * |
| * Load a PE style module according to the load order. |
| * The loader_section must be locked while calling this function. |
| */ |
| static NTSTATUS load_dll( LPCWSTR load_path, LPCWSTR libname, DWORD flags, WINE_MODREF** pwm ) |
| { |
| int i; |
| enum loadorder_type loadorder[LOADORDER_NTYPES]; |
| WCHAR buffer[32]; |
| WCHAR *filename; |
| ULONG size; |
| const char *filetype = ""; |
| WINE_MODREF *main_exe; |
| HANDLE handle = 0; |
| NTSTATUS nts; |
| |
| TRACE( "looking for %s in %s\n", debugstr_w(libname), debugstr_w(load_path) ); |
| |
| filename = buffer; |
| size = sizeof(buffer); |
| for (;;) |
| { |
| nts = find_dll_file( load_path, libname, filename, &size, pwm, &handle ); |
| if (nts == STATUS_SUCCESS) break; |
| if (filename != buffer) RtlFreeHeap( GetProcessHeap(), 0, filename ); |
| if (nts != STATUS_BUFFER_TOO_SMALL) return nts; |
| /* grow the buffer and retry */ |
| if (!(filename = RtlAllocateHeap( GetProcessHeap(), 0, size ))) return STATUS_NO_MEMORY; |
| } |
| |
| if (*pwm) /* found already loaded module */ |
| { |
| if ((*pwm)->ldr.LoadCount != -1) (*pwm)->ldr.LoadCount++; |
| |
| if (((*pwm)->ldr.Flags & LDR_DONT_RESOLVE_REFS) && |
| !(flags & DONT_RESOLVE_DLL_REFERENCES)) |
| { |
| (*pwm)->ldr.Flags &= ~LDR_DONT_RESOLVE_REFS; |
| fixup_imports( *pwm, load_path ); |
| } |
| TRACE("Found loaded module %s for %s at %p, count=%d\n", |
| debugstr_w((*pwm)->ldr.FullDllName.Buffer), debugstr_w(libname), |
| (*pwm)->ldr.BaseAddress, (*pwm)->ldr.LoadCount); |
| if (filename != buffer) RtlFreeHeap( GetProcessHeap(), 0, filename ); |
| return STATUS_SUCCESS; |
| } |
| |
| main_exe = get_modref( NtCurrentTeb()->Peb->ImageBaseAddress ); |
| MODULE_GetLoadOrderW( loadorder, main_exe ? main_exe->ldr.BaseDllName.Buffer : NULL, filename ); |
| |
| nts = STATUS_DLL_NOT_FOUND; |
| for (i = 0; i < LOADORDER_NTYPES; i++) |
| { |
| if (loadorder[i] == LOADORDER_INVALID) break; |
| |
| switch (loadorder[i]) |
| { |
| case LOADORDER_DLL: |
| TRACE("Trying native dll %s\n", debugstr_w(filename)); |
| if (!handle) continue; /* it cannot possibly be loaded */ |
| nts = load_native_dll( load_path, filename, handle, flags, pwm ); |
| filetype = "native"; |
| break; |
| case LOADORDER_BI: |
| TRACE("Trying built-in %s\n", debugstr_w(filename)); |
| nts = load_builtin_dll( load_path, filename, flags, pwm ); |
| filetype = "builtin"; |
| break; |
| default: |
| nts = STATUS_INTERNAL_ERROR; |
| break; |
| } |
| |
| if (nts == STATUS_SUCCESS) |
| { |
| /* Initialize DLL just loaded */ |
| TRACE("Loaded module %s (%s) at %p\n", |
| debugstr_w(filename), filetype, (*pwm)->ldr.BaseAddress); |
| if (!TRACE_ON(module)) |
| TRACE_(loaddll)("Loaded module %s : %s\n", debugstr_w(filename), filetype); |
| /* Set the ldr.LoadCount here so that an attach failure will */ |
| /* decrement the dependencies through the MODULE_FreeLibrary call. */ |
| (*pwm)->ldr.LoadCount = 1; |
| if (handle) NtClose( handle ); |
| if (filename != buffer) RtlFreeHeap( GetProcessHeap(), 0, filename ); |
| return nts; |
| } |
| if (nts != STATUS_DLL_NOT_FOUND) break; |
| } |
| |
| WARN("Failed to load module %s; status=%lx\n", debugstr_w(libname), nts); |
| if (handle) NtClose( handle ); |
| if (filename != buffer) RtlFreeHeap( GetProcessHeap(), 0, filename ); |
| return nts; |
| } |
| |
| /****************************************************************** |
| * LdrLoadDll (NTDLL.@) |
| */ |
| NTSTATUS WINAPI LdrLoadDll(LPCWSTR path_name, DWORD flags, |
| const UNICODE_STRING *libname, HMODULE* hModule) |
| { |
| WINE_MODREF *wm; |
| NTSTATUS nts; |
| |
| RtlEnterCriticalSection( &loader_section ); |
| |
| if (!path_name) path_name = NtCurrentTeb()->Peb->ProcessParameters->DllPath.Buffer; |
| nts = load_dll( path_name, libname->Buffer, flags, &wm ); |
| |
| if (nts == STATUS_SUCCESS && !(wm->ldr.Flags & LDR_DONT_RESOLVE_REFS)) |
| { |
| nts = process_attach( wm, NULL ); |
| if (nts != STATUS_SUCCESS) |
| { |
| WARN("Attach failed for module %s\n", debugstr_w(libname->Buffer)); |
| LdrUnloadDll(wm->ldr.BaseAddress); |
| wm = NULL; |
| } |
| } |
| *hModule = (wm) ? wm->ldr.BaseAddress : NULL; |
| |
| RtlLeaveCriticalSection( &loader_section ); |
| return nts; |
| } |
| |
| /****************************************************************** |
| * LdrQueryProcessModuleInformation |
| * |
| */ |
| NTSTATUS WINAPI LdrQueryProcessModuleInformation(PSYSTEM_MODULE_INFORMATION smi, |
| ULONG buf_size, ULONG* req_size) |
| { |
| SYSTEM_MODULE* sm = &smi->Modules[0]; |
| ULONG size = sizeof(ULONG); |
| NTSTATUS nts = STATUS_SUCCESS; |
| ANSI_STRING str; |
| char* ptr; |
| PLIST_ENTRY mark, entry; |
| PLDR_MODULE mod; |
| |
| smi->ModulesCount = 0; |
| |
| RtlEnterCriticalSection( &loader_section ); |
| mark = &NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList; |
| for (entry = mark->Flink; entry != mark; entry = entry->Flink) |
| { |
| mod = CONTAINING_RECORD(entry, LDR_MODULE, InLoadOrderModuleList); |
| size += sizeof(*sm); |
| if (size <= buf_size) |
| { |
| sm->Reserved1 = 0; /* FIXME */ |
| sm->Reserved2 = 0; /* FIXME */ |
| sm->ImageBaseAddress = mod->BaseAddress; |
| sm->ImageSize = mod->SizeOfImage; |
| sm->Flags = mod->Flags; |
| sm->Id = 0; /* FIXME */ |
| sm->Rank = 0; /* FIXME */ |
| sm->Unknown = 0; /* FIXME */ |
| str.Length = 0; |
| str.MaximumLength = MAXIMUM_FILENAME_LENGTH; |
| str.Buffer = sm->Name; |
| RtlUnicodeStringToAnsiString(&str, &mod->FullDllName, FALSE); |
| ptr = strrchr(sm->Name, '\\'); |
| sm->NameOffset = (ptr != NULL) ? (ptr - (char*)sm->Name + 1) : 0; |
| |
| smi->ModulesCount++; |
| sm++; |
| } |
| else nts = STATUS_INFO_LENGTH_MISMATCH; |
| } |
| RtlLeaveCriticalSection( &loader_section ); |
| |
| if (req_size) *req_size = size; |
| |
| return nts; |
| } |
| |
| /****************************************************************** |
| * LdrShutdownProcess (NTDLL.@) |
| * |
| */ |
| void WINAPI LdrShutdownProcess(void) |
| { |
| TRACE("()\n"); |
| process_detach( TRUE, (LPVOID)1 ); |
| } |
| |
| /****************************************************************** |
| * LdrShutdownThread (NTDLL.@) |
| * |
| */ |
| void WINAPI LdrShutdownThread(void) |
| { |
| PLIST_ENTRY mark, entry; |
| PLDR_MODULE mod; |
| |
| TRACE("()\n"); |
| |
| /* don't do any detach calls if process is exiting */ |
| if (process_detaching) return; |
| /* FIXME: there is still a race here */ |
| |
| RtlEnterCriticalSection( &loader_section ); |
| |
| mark = &NtCurrentTeb()->Peb->LdrData->InInitializationOrderModuleList; |
| for (entry = mark->Blink; entry != mark; entry = entry->Blink) |
| { |
| mod = CONTAINING_RECORD(entry, LDR_MODULE, |
| InInitializationOrderModuleList); |
| if ( !(mod->Flags & LDR_PROCESS_ATTACHED) ) |
| continue; |
| if ( mod->Flags & LDR_NO_DLL_CALLS ) |
| continue; |
| |
| MODULE_InitDLL( CONTAINING_RECORD(mod, WINE_MODREF, ldr), |
| DLL_THREAD_DETACH, NULL ); |
| } |
| |
| RtlLeaveCriticalSection( &loader_section ); |
| } |
| |
| /*********************************************************************** |
| * MODULE_FlushModrefs |
| * |
| * Remove all unused modrefs and call the internal unloading routines |
| * for the library type. |
| * |
| * The loader_section must be locked while calling this function. |
| */ |
| static void MODULE_FlushModrefs(void) |
| { |
| PLIST_ENTRY mark, entry, prev; |
| PLDR_MODULE mod; |
| WINE_MODREF*wm; |
| |
| mark = &NtCurrentTeb()->Peb->LdrData->InInitializationOrderModuleList; |
| for (entry = mark->Blink; entry != mark; entry = prev) |
| { |
| mod = CONTAINING_RECORD(entry, LDR_MODULE, |
| InInitializationOrderModuleList); |
| wm = CONTAINING_RECORD(mod, WINE_MODREF, ldr); |
| |
| prev = entry->Blink; |
| if (mod->LoadCount) continue; |
| |
| RemoveEntryList(&mod->InLoadOrderModuleList); |
| RemoveEntryList(&mod->InMemoryOrderModuleList); |
| RemoveEntryList(&mod->InInitializationOrderModuleList); |
| |
| TRACE(" unloading %s\n", debugstr_w(mod->FullDllName.Buffer)); |
| if (!TRACE_ON(module)) |
| TRACE_(loaddll)("Unloaded module %s : %s\n", |
| debugstr_w(mod->FullDllName.Buffer), |
| (wm->ldr.Flags & LDR_WINE_INTERNAL) ? "builtin" : "native" ); |
| |
| SERVER_START_REQ( unload_dll ) |
| { |
| req->base = mod->BaseAddress; |
| wine_server_call( req ); |
| } |
| SERVER_END_REQ; |
| |
| if (wm->ldr.Flags & LDR_WINE_INTERNAL) wine_dll_unload( wm->ldr.SectionHandle ); |
| NtUnmapViewOfSection( GetCurrentProcess(), mod->BaseAddress ); |
| if (cached_modref == wm) cached_modref = NULL; |
| RtlFreeUnicodeString( &mod->FullDllName ); |
| RtlFreeHeap( GetProcessHeap(), 0, wm->deps ); |
| RtlFreeHeap( GetProcessHeap(), 0, wm ); |
| } |
| } |
| |
| /*********************************************************************** |
| * MODULE_DecRefCount |
| * |
| * The loader_section must be locked while calling this function. |
| */ |
| static void MODULE_DecRefCount( WINE_MODREF *wm ) |
| { |
| int i; |
| |
| if ( wm->ldr.Flags & LDR_UNLOAD_IN_PROGRESS ) |
| return; |
| |
| if ( wm->ldr.LoadCount <= 0 ) |
| return; |
| |
| --wm->ldr.LoadCount; |
| TRACE("(%s) ldr.LoadCount: %d\n", debugstr_w(wm->ldr.BaseDllName.Buffer), wm->ldr.LoadCount ); |
| |
| if ( wm->ldr.LoadCount == 0 ) |
| { |
| wm->ldr.Flags |= LDR_UNLOAD_IN_PROGRESS; |
| |
| for ( i = 0; i < wm->nDeps; i++ ) |
| if ( wm->deps[i] ) |
| MODULE_DecRefCount( wm->deps[i] ); |
| |
| wm->ldr.Flags &= ~LDR_UNLOAD_IN_PROGRESS; |
| } |
| } |
| |
| /****************************************************************** |
| * LdrUnloadDll (NTDLL.@) |
| * |
| * |
| */ |
| NTSTATUS WINAPI LdrUnloadDll( HMODULE hModule ) |
| { |
| NTSTATUS retv = STATUS_SUCCESS; |
| |
| TRACE("(%p)\n", hModule); |
| |
| RtlEnterCriticalSection( &loader_section ); |
| |
| /* if we're stopping the whole process (and forcing the removal of all |
| * DLLs) the library will be freed anyway |
| */ |
| if (!process_detaching) |
| { |
| WINE_MODREF *wm; |
| |
| free_lib_count++; |
| if ((wm = get_modref( hModule )) != NULL) |
| { |
| TRACE("(%s) - START\n", debugstr_w(wm->ldr.BaseDllName.Buffer)); |
| |
| /* Recursively decrement reference counts */ |
| MODULE_DecRefCount( wm ); |
| |
| /* Call process detach notifications */ |
| if ( free_lib_count <= 1 ) |
| { |
| process_detach( FALSE, NULL ); |
| MODULE_FlushModrefs(); |
| } |
| |
| TRACE("END\n"); |
| } |
| else |
| retv = STATUS_DLL_NOT_FOUND; |
| |
| free_lib_count--; |
| } |
| |
| RtlLeaveCriticalSection( &loader_section ); |
| |
| return retv; |
| } |
| |
| /*********************************************************************** |
| * RtlImageNtHeader (NTDLL.@) |
| */ |
| PIMAGE_NT_HEADERS WINAPI RtlImageNtHeader(HMODULE hModule) |
| { |
| IMAGE_NT_HEADERS *ret; |
| |
| __TRY |
| { |
| IMAGE_DOS_HEADER *dos = (IMAGE_DOS_HEADER *)hModule; |
| |
| ret = NULL; |
| if (dos->e_magic == IMAGE_DOS_SIGNATURE) |
| { |
| ret = (IMAGE_NT_HEADERS *)((char *)dos + dos->e_lfanew); |
| if (ret->Signature != IMAGE_NT_SIGNATURE) ret = NULL; |
| } |
| } |
| __EXCEPT(page_fault) |
| { |
| return NULL; |
| } |
| __ENDTRY |
| return ret; |
| } |
| |
| |
| /****************************************************************** |
| * init_system_dir |
| * |
| * System dir initialization once kernel32 has been loaded. |
| */ |
| static inline void init_system_dir(void) |
| { |
| PLIST_ENTRY mark, entry; |
| LPWSTR buffer, p; |
| |
| if (!MODULE_GetSystemDirectory( &system_dir )) |
| { |
| ERR( "Couldn't get system dir\n"); |
| exit(1); |
| } |
| |
| /* prepend the system dir to the name of the already created modules */ |
| mark = &NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList; |
| for (entry = mark->Flink; entry != mark; entry = entry->Flink) |
| { |
| LDR_MODULE *mod = CONTAINING_RECORD( entry, LDR_MODULE, InLoadOrderModuleList ); |
| |
| assert( mod->Flags & LDR_WINE_INTERNAL ); |
| |
| buffer = RtlAllocateHeap( GetProcessHeap(), 0, |
| system_dir.Length + mod->FullDllName.Length + 2*sizeof(WCHAR) ); |
| if (!buffer) continue; |
| strcpyW( buffer, system_dir.Buffer ); |
| p = buffer + strlenW( buffer ); |
| if (p > buffer && p[-1] != '\\') *p++ = '\\'; |
| strcpyW( p, mod->FullDllName.Buffer ); |
| RtlInitUnicodeString( &mod->FullDllName, buffer ); |
| RtlInitUnicodeString( &mod->BaseDllName, p ); |
| } |
| } |
| |
| |
| /****************************************************************** |
| * LdrInitializeThunk (NTDLL.@) |
| * |
| * FIXME: the arguments are not correct, main_file is a Wine invention. |
| */ |
| void WINAPI LdrInitializeThunk( HANDLE main_file, ULONG unknown2, ULONG unknown3, ULONG unknown4 ) |
| { |
| NTSTATUS status; |
| WINE_MODREF *wm; |
| LPCWSTR load_path; |
| PEB *peb = NtCurrentTeb()->Peb; |
| UNICODE_STRING *main_exe_name = &peb->ProcessParameters->ImagePathName; |
| IMAGE_NT_HEADERS *nt = RtlImageNtHeader( peb->ImageBaseAddress ); |
| |
| init_system_dir(); |
| |
| /* allocate the modref for the main exe */ |
| if (!(wm = alloc_module( peb->ImageBaseAddress, main_exe_name->Buffer ))) |
| { |
| status = STATUS_NO_MEMORY; |
| goto error; |
| } |
| wm->ldr.LoadCount = -1; /* can't unload main exe */ |
| |
| /* the main exe needs to be the first in the load order list */ |
| RemoveEntryList( &wm->ldr.InLoadOrderModuleList ); |
| InsertHeadList( &peb->LdrData->InLoadOrderModuleList, &wm->ldr.InLoadOrderModuleList ); |
| |
| /* Install signal handlers; this cannot be done before, since we cannot |
| * send exceptions to the debugger before the create process event that |
| * is sent by REQ_INIT_PROCESS_DONE. |
| * We do need the handlers in place by the time the request is over, so |
| * we set them up here. If we segfault between here and the server call |
| * something is very wrong... */ |
| if (!SIGNAL_Init()) exit(1); |
| |
| /* Signal the parent process to continue */ |
| SERVER_START_REQ( init_process_done ) |
| { |
| req->module = peb->ImageBaseAddress; |
| req->module_size = wm->ldr.SizeOfImage; |
| req->entry = (char *)peb->ImageBaseAddress + nt->OptionalHeader.AddressOfEntryPoint; |
| /* API requires a double indirection */ |
| req->name = &main_exe_name->Buffer; |
| req->exe_file = main_file; |
| req->gui = (nt->OptionalHeader.Subsystem != IMAGE_SUBSYSTEM_WINDOWS_CUI); |
| wine_server_add_data( req, main_exe_name->Buffer, main_exe_name->Length ); |
| wine_server_call( req ); |
| } |
| SERVER_END_REQ; |
| |
| if (main_file) NtClose( main_file ); /* we no longer need it */ |
| |
| if (TRACE_ON(relay) || TRACE_ON(snoop)) |
| { |
| RELAY_InitDebugLists(); |
| |
| if (TRACE_ON(relay)) /* setup relay for already loaded dlls */ |
| { |
| LIST_ENTRY *entry, *mark = &peb->LdrData->InLoadOrderModuleList; |
| for (entry = mark->Flink; entry != mark; entry = entry->Flink) |
| { |
| LDR_MODULE *mod = CONTAINING_RECORD(entry, LDR_MODULE, InLoadOrderModuleList); |
| if (mod->Flags & LDR_WINE_INTERNAL) RELAY_SetupDLL( mod->BaseAddress ); |
| } |
| } |
| } |
| |
| RtlEnterCriticalSection( &loader_section ); |
| |
| load_path = NtCurrentTeb()->Peb->ProcessParameters->DllPath.Buffer; |
| if ((status = fixup_imports( wm, load_path )) != STATUS_SUCCESS) goto error; |
| if ((status = alloc_process_tls()) != STATUS_SUCCESS) goto error; |
| if ((status = alloc_thread_tls()) != STATUS_SUCCESS) goto error; |
| if ((status = process_attach( wm, (LPVOID)1 )) != STATUS_SUCCESS) goto error; |
| |
| RtlLeaveCriticalSection( &loader_section ); |
| return; |
| |
| error: |
| ERR( "Main exe initialization for %s failed, status %lx\n", debugstr_w(main_exe_name->Buffer), status ); |
| exit(1); |
| } |
| |
| |
| /*********************************************************************** |
| * RtlImageDirectoryEntryToData (NTDLL.@) |
| */ |
| PVOID WINAPI RtlImageDirectoryEntryToData( HMODULE module, BOOL image, WORD dir, ULONG *size ) |
| { |
| const IMAGE_NT_HEADERS *nt; |
| DWORD addr; |
| |
| if ((ULONG_PTR)module & 1) /* mapped as data file */ |
| { |
| module = (HMODULE)((ULONG_PTR)module & ~1); |
| image = FALSE; |
| } |
| if (!(nt = RtlImageNtHeader( module ))) return NULL; |
| if (dir >= nt->OptionalHeader.NumberOfRvaAndSizes) return NULL; |
| if (!(addr = nt->OptionalHeader.DataDirectory[dir].VirtualAddress)) return NULL; |
| *size = nt->OptionalHeader.DataDirectory[dir].Size; |
| if (image || addr < nt->OptionalHeader.SizeOfHeaders) return (char *)module + addr; |
| |
| /* not mapped as image, need to find the section containing the virtual address */ |
| return RtlImageRvaToVa( nt, module, addr, NULL ); |
| } |
| |
| |
| /*********************************************************************** |
| * RtlImageRvaToSection (NTDLL.@) |
| */ |
| PIMAGE_SECTION_HEADER WINAPI RtlImageRvaToSection( const IMAGE_NT_HEADERS *nt, |
| HMODULE module, DWORD rva ) |
| { |
| int i; |
| IMAGE_SECTION_HEADER *sec = (IMAGE_SECTION_HEADER*)((char*)&nt->OptionalHeader + |
| nt->FileHeader.SizeOfOptionalHeader); |
| for (i = 0; i < nt->FileHeader.NumberOfSections; i++, sec++) |
| { |
| if ((sec->VirtualAddress <= rva) && (sec->VirtualAddress + sec->SizeOfRawData > rva)) |
| return sec; |
| } |
| return NULL; |
| } |
| |
| |
| /*********************************************************************** |
| * RtlImageRvaToVa (NTDLL.@) |
| */ |
| PVOID WINAPI RtlImageRvaToVa( const IMAGE_NT_HEADERS *nt, HMODULE module, |
| DWORD rva, IMAGE_SECTION_HEADER **section ) |
| { |
| IMAGE_SECTION_HEADER *sec; |
| |
| if (section && *section) /* try this section first */ |
| { |
| sec = *section; |
| if ((sec->VirtualAddress <= rva) && (sec->VirtualAddress + sec->SizeOfRawData > rva)) |
| goto found; |
| } |
| if (!(sec = RtlImageRvaToSection( nt, module, rva ))) return NULL; |
| found: |
| if (section) *section = sec; |
| return (char *)module + sec->PointerToRawData + (rva - sec->VirtualAddress); |
| } |
| |
| |
| /*********************************************************************** |
| * __wine_process_init |
| */ |
| void __wine_process_init( int argc, char *argv[] ) |
| { |
| static const WCHAR kernel32W[] = {'k','e','r','n','e','l','3','2','.','d','l','l',0}; |
| |
| WINE_MODREF *wm; |
| NTSTATUS status; |
| ANSI_STRING func_name; |
| void (* DECLSPEC_NORETURN init_func)(); |
| extern mode_t FILE_umask; |
| |
| thread_init(); |
| |
| /* retrieve current umask */ |
| FILE_umask = umask(0777); |
| umask( FILE_umask ); |
| |
| /* setup the load callback and create ntdll modref */ |
| wine_dll_set_callback( load_builtin_callback ); |
| |
| if ((status = load_builtin_dll( NULL, kernel32W, 0, &wm )) != STATUS_SUCCESS) |
| { |
| MESSAGE( "wine: could not load kernel32.dll, status %lx\n", status ); |
| exit(1); |
| } |
| RtlInitAnsiString( &func_name, "__wine_kernel_init" ); |
| if ((status = LdrGetProcedureAddress( wm->ldr.BaseAddress, &func_name, |
| 0, (void **)&init_func )) != STATUS_SUCCESS) |
| { |
| MESSAGE( "wine: could not find __wine_kernel_init in kernel32.dll, status %lx\n", status ); |
| exit(1); |
| } |
| init_func(); |
| } |