...

Source file src/golang.org/x/sys/windows/dll_windows.go

Documentation: golang.org/x/sys/windows

     1  // Copyright 2011 The Go Authors. All rights reserved.
     2  // Use of this source code is governed by a BSD-style
     3  // license that can be found in the LICENSE file.
     4  
     5  package windows
     6  
     7  import (
     8  	"sync"
     9  	"sync/atomic"
    10  	"syscall"
    11  	"unsafe"
    12  )
    13  
    14  // We need to use LoadLibrary and GetProcAddress from the Go runtime, because
    15  // the these symbols are loaded by the system linker and are required to
    16  // dynamically load additional symbols. Note that in the Go runtime, these
    17  // return syscall.Handle and syscall.Errno, but these are the same, in fact,
    18  // as windows.Handle and windows.Errno, and we intend to keep these the same.
    19  
    20  //go:linkname syscall_loadlibrary syscall.loadlibrary
    21  func syscall_loadlibrary(filename *uint16) (handle Handle, err Errno)
    22  
    23  //go:linkname syscall_getprocaddress syscall.getprocaddress
    24  func syscall_getprocaddress(handle Handle, procname *uint8) (proc uintptr, err Errno)
    25  
    26  // DLLError describes reasons for DLL load failures.
    27  type DLLError struct {
    28  	Err     error
    29  	ObjName string
    30  	Msg     string
    31  }
    32  
    33  func (e *DLLError) Error() string { return e.Msg }
    34  
    35  func (e *DLLError) Unwrap() error { return e.Err }
    36  
    37  // A DLL implements access to a single DLL.
    38  type DLL struct {
    39  	Name   string
    40  	Handle Handle
    41  }
    42  
    43  // LoadDLL loads DLL file into memory.
    44  //
    45  // Warning: using LoadDLL without an absolute path name is subject to
    46  // DLL preloading attacks. To safely load a system DLL, use [NewLazySystemDLL],
    47  // or use [LoadLibraryEx] directly.
    48  func LoadDLL(name string) (dll *DLL, err error) {
    49  	namep, err := UTF16PtrFromString(name)
    50  	if err != nil {
    51  		return nil, err
    52  	}
    53  	h, e := syscall_loadlibrary(namep)
    54  	if e != 0 {
    55  		return nil, &DLLError{
    56  			Err:     e,
    57  			ObjName: name,
    58  			Msg:     "Failed to load " + name + ": " + e.Error(),
    59  		}
    60  	}
    61  	d := &DLL{
    62  		Name:   name,
    63  		Handle: h,
    64  	}
    65  	return d, nil
    66  }
    67  
    68  // MustLoadDLL is like LoadDLL but panics if load operation fails.
    69  func MustLoadDLL(name string) *DLL {
    70  	d, e := LoadDLL(name)
    71  	if e != nil {
    72  		panic(e)
    73  	}
    74  	return d
    75  }
    76  
    77  // FindProc searches DLL d for procedure named name and returns *Proc
    78  // if found. It returns an error if search fails.
    79  func (d *DLL) FindProc(name string) (proc *Proc, err error) {
    80  	namep, err := BytePtrFromString(name)
    81  	if err != nil {
    82  		return nil, err
    83  	}
    84  	a, e := syscall_getprocaddress(d.Handle, namep)
    85  	if e != 0 {
    86  		return nil, &DLLError{
    87  			Err:     e,
    88  			ObjName: name,
    89  			Msg:     "Failed to find " + name + " procedure in " + d.Name + ": " + e.Error(),
    90  		}
    91  	}
    92  	p := &Proc{
    93  		Dll:  d,
    94  		Name: name,
    95  		addr: a,
    96  	}
    97  	return p, nil
    98  }
    99  
   100  // MustFindProc is like FindProc but panics if search fails.
   101  func (d *DLL) MustFindProc(name string) *Proc {
   102  	p, e := d.FindProc(name)
   103  	if e != nil {
   104  		panic(e)
   105  	}
   106  	return p
   107  }
   108  
   109  // FindProcByOrdinal searches DLL d for procedure by ordinal and returns *Proc
   110  // if found. It returns an error if search fails.
   111  func (d *DLL) FindProcByOrdinal(ordinal uintptr) (proc *Proc, err error) {
   112  	a, e := GetProcAddressByOrdinal(d.Handle, ordinal)
   113  	name := "#" + itoa(int(ordinal))
   114  	if e != nil {
   115  		return nil, &DLLError{
   116  			Err:     e,
   117  			ObjName: name,
   118  			Msg:     "Failed to find " + name + " procedure in " + d.Name + ": " + e.Error(),
   119  		}
   120  	}
   121  	p := &Proc{
   122  		Dll:  d,
   123  		Name: name,
   124  		addr: a,
   125  	}
   126  	return p, nil
   127  }
   128  
   129  // MustFindProcByOrdinal is like FindProcByOrdinal but panics if search fails.
   130  func (d *DLL) MustFindProcByOrdinal(ordinal uintptr) *Proc {
   131  	p, e := d.FindProcByOrdinal(ordinal)
   132  	if e != nil {
   133  		panic(e)
   134  	}
   135  	return p
   136  }
   137  
   138  // Release unloads DLL d from memory.
   139  func (d *DLL) Release() (err error) {
   140  	return FreeLibrary(d.Handle)
   141  }
   142  
   143  // A Proc implements access to a procedure inside a DLL.
   144  type Proc struct {
   145  	Dll  *DLL
   146  	Name string
   147  	addr uintptr
   148  }
   149  
   150  // Addr returns the address of the procedure represented by p.
   151  // The return value can be passed to Syscall to run the procedure.
   152  func (p *Proc) Addr() uintptr {
   153  	return p.addr
   154  }
   155  
   156  //go:uintptrescapes
   157  
   158  // Call executes procedure p with arguments a. It will panic, if more than 15 arguments
   159  // are supplied.
   160  //
   161  // The returned error is always non-nil, constructed from the result of GetLastError.
   162  // Callers must inspect the primary return value to decide whether an error occurred
   163  // (according to the semantics of the specific function being called) before consulting
   164  // the error. The error will be guaranteed to contain windows.Errno.
   165  func (p *Proc) Call(a ...uintptr) (r1, r2 uintptr, lastErr error) {
   166  	switch len(a) {
   167  	case 0:
   168  		return syscall.Syscall(p.Addr(), uintptr(len(a)), 0, 0, 0)
   169  	case 1:
   170  		return syscall.Syscall(p.Addr(), uintptr(len(a)), a[0], 0, 0)
   171  	case 2:
   172  		return syscall.Syscall(p.Addr(), uintptr(len(a)), a[0], a[1], 0)
   173  	case 3:
   174  		return syscall.Syscall(p.Addr(), uintptr(len(a)), a[0], a[1], a[2])
   175  	case 4:
   176  		return syscall.Syscall6(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], 0, 0)
   177  	case 5:
   178  		return syscall.Syscall6(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], 0)
   179  	case 6:
   180  		return syscall.Syscall6(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5])
   181  	case 7:
   182  		return syscall.Syscall9(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], 0, 0)
   183  	case 8:
   184  		return syscall.Syscall9(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], 0)
   185  	case 9:
   186  		return syscall.Syscall9(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8])
   187  	case 10:
   188  		return syscall.Syscall12(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], 0, 0)
   189  	case 11:
   190  		return syscall.Syscall12(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], 0)
   191  	case 12:
   192  		return syscall.Syscall12(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11])
   193  	case 13:
   194  		return syscall.Syscall15(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11], a[12], 0, 0)
   195  	case 14:
   196  		return syscall.Syscall15(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11], a[12], a[13], 0)
   197  	case 15:
   198  		return syscall.Syscall15(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11], a[12], a[13], a[14])
   199  	default:
   200  		panic("Call " + p.Name + " with too many arguments " + itoa(len(a)) + ".")
   201  	}
   202  }
   203  
   204  // A LazyDLL implements access to a single DLL.
   205  // It will delay the load of the DLL until the first
   206  // call to its Handle method or to one of its
   207  // LazyProc's Addr method.
   208  type LazyDLL struct {
   209  	Name string
   210  
   211  	// System determines whether the DLL must be loaded from the
   212  	// Windows System directory, bypassing the normal DLL search
   213  	// path.
   214  	System bool
   215  
   216  	mu  sync.Mutex
   217  	dll *DLL // non nil once DLL is loaded
   218  }
   219  
   220  // Load loads DLL file d.Name into memory. It returns an error if fails.
   221  // Load will not try to load DLL, if it is already loaded into memory.
   222  func (d *LazyDLL) Load() error {
   223  	// Non-racy version of:
   224  	// if d.dll != nil {
   225  	if atomic.LoadPointer((*unsafe.Pointer)(unsafe.Pointer(&d.dll))) != nil {
   226  		return nil
   227  	}
   228  	d.mu.Lock()
   229  	defer d.mu.Unlock()
   230  	if d.dll != nil {
   231  		return nil
   232  	}
   233  
   234  	// kernel32.dll is special, since it's where LoadLibraryEx comes from.
   235  	// The kernel already special-cases its name, so it's always
   236  	// loaded from system32.
   237  	var dll *DLL
   238  	var err error
   239  	if d.Name == "kernel32.dll" {
   240  		dll, err = LoadDLL(d.Name)
   241  	} else {
   242  		dll, err = loadLibraryEx(d.Name, d.System)
   243  	}
   244  	if err != nil {
   245  		return err
   246  	}
   247  
   248  	// Non-racy version of:
   249  	// d.dll = dll
   250  	atomic.StorePointer((*unsafe.Pointer)(unsafe.Pointer(&d.dll)), unsafe.Pointer(dll))
   251  	return nil
   252  }
   253  
   254  // mustLoad is like Load but panics if search fails.
   255  func (d *LazyDLL) mustLoad() {
   256  	e := d.Load()
   257  	if e != nil {
   258  		panic(e)
   259  	}
   260  }
   261  
   262  // Handle returns d's module handle.
   263  func (d *LazyDLL) Handle() uintptr {
   264  	d.mustLoad()
   265  	return uintptr(d.dll.Handle)
   266  }
   267  
   268  // NewProc returns a LazyProc for accessing the named procedure in the DLL d.
   269  func (d *LazyDLL) NewProc(name string) *LazyProc {
   270  	return &LazyProc{l: d, Name: name}
   271  }
   272  
   273  // NewLazyDLL creates new LazyDLL associated with DLL file.
   274  //
   275  // Warning: using NewLazyDLL without an absolute path name is subject to
   276  // DLL preloading attacks. To safely load a system DLL, use [NewLazySystemDLL].
   277  func NewLazyDLL(name string) *LazyDLL {
   278  	return &LazyDLL{Name: name}
   279  }
   280  
   281  // NewLazySystemDLL is like NewLazyDLL, but will only
   282  // search Windows System directory for the DLL if name is
   283  // a base name (like "advapi32.dll").
   284  func NewLazySystemDLL(name string) *LazyDLL {
   285  	return &LazyDLL{Name: name, System: true}
   286  }
   287  
   288  // A LazyProc implements access to a procedure inside a LazyDLL.
   289  // It delays the lookup until the Addr method is called.
   290  type LazyProc struct {
   291  	Name string
   292  
   293  	mu   sync.Mutex
   294  	l    *LazyDLL
   295  	proc *Proc
   296  }
   297  
   298  // Find searches DLL for procedure named p.Name. It returns
   299  // an error if search fails. Find will not search procedure,
   300  // if it is already found and loaded into memory.
   301  func (p *LazyProc) Find() error {
   302  	// Non-racy version of:
   303  	// if p.proc == nil {
   304  	if atomic.LoadPointer((*unsafe.Pointer)(unsafe.Pointer(&p.proc))) == nil {
   305  		p.mu.Lock()
   306  		defer p.mu.Unlock()
   307  		if p.proc == nil {
   308  			e := p.l.Load()
   309  			if e != nil {
   310  				return e
   311  			}
   312  			proc, e := p.l.dll.FindProc(p.Name)
   313  			if e != nil {
   314  				return e
   315  			}
   316  			// Non-racy version of:
   317  			// p.proc = proc
   318  			atomic.StorePointer((*unsafe.Pointer)(unsafe.Pointer(&p.proc)), unsafe.Pointer(proc))
   319  		}
   320  	}
   321  	return nil
   322  }
   323  
   324  // mustFind is like Find but panics if search fails.
   325  func (p *LazyProc) mustFind() {
   326  	e := p.Find()
   327  	if e != nil {
   328  		panic(e)
   329  	}
   330  }
   331  
   332  // Addr returns the address of the procedure represented by p.
   333  // The return value can be passed to Syscall to run the procedure.
   334  // It will panic if the procedure cannot be found.
   335  func (p *LazyProc) Addr() uintptr {
   336  	p.mustFind()
   337  	return p.proc.Addr()
   338  }
   339  
   340  //go:uintptrescapes
   341  
   342  // Call executes procedure p with arguments a. It will panic, if more than 15 arguments
   343  // are supplied. It will also panic if the procedure cannot be found.
   344  //
   345  // The returned error is always non-nil, constructed from the result of GetLastError.
   346  // Callers must inspect the primary return value to decide whether an error occurred
   347  // (according to the semantics of the specific function being called) before consulting
   348  // the error. The error will be guaranteed to contain windows.Errno.
   349  func (p *LazyProc) Call(a ...uintptr) (r1, r2 uintptr, lastErr error) {
   350  	p.mustFind()
   351  	return p.proc.Call(a...)
   352  }
   353  
   354  var canDoSearchSystem32Once struct {
   355  	sync.Once
   356  	v bool
   357  }
   358  
   359  func initCanDoSearchSystem32() {
   360  	// https://msdn.microsoft.com/en-us/library/ms684179(v=vs.85).aspx says:
   361  	// "Windows 7, Windows Server 2008 R2, Windows Vista, and Windows
   362  	// Server 2008: The LOAD_LIBRARY_SEARCH_* flags are available on
   363  	// systems that have KB2533623 installed. To determine whether the
   364  	// flags are available, use GetProcAddress to get the address of the
   365  	// AddDllDirectory, RemoveDllDirectory, or SetDefaultDllDirectories
   366  	// function. If GetProcAddress succeeds, the LOAD_LIBRARY_SEARCH_*
   367  	// flags can be used with LoadLibraryEx."
   368  	canDoSearchSystem32Once.v = (modkernel32.NewProc("AddDllDirectory").Find() == nil)
   369  }
   370  
   371  func canDoSearchSystem32() bool {
   372  	canDoSearchSystem32Once.Do(initCanDoSearchSystem32)
   373  	return canDoSearchSystem32Once.v
   374  }
   375  
   376  func isBaseName(name string) bool {
   377  	for _, c := range name {
   378  		if c == ':' || c == '/' || c == '\\' {
   379  			return false
   380  		}
   381  	}
   382  	return true
   383  }
   384  
   385  // loadLibraryEx wraps the Windows LoadLibraryEx function.
   386  //
   387  // See https://msdn.microsoft.com/en-us/library/windows/desktop/ms684179(v=vs.85).aspx
   388  //
   389  // If name is not an absolute path, LoadLibraryEx searches for the DLL
   390  // in a variety of automatic locations unless constrained by flags.
   391  // See: https://msdn.microsoft.com/en-us/library/ff919712%28VS.85%29.aspx
   392  func loadLibraryEx(name string, system bool) (*DLL, error) {
   393  	loadDLL := name
   394  	var flags uintptr
   395  	if system {
   396  		if canDoSearchSystem32() {
   397  			flags = LOAD_LIBRARY_SEARCH_SYSTEM32
   398  		} else if isBaseName(name) {
   399  			// WindowsXP or unpatched Windows machine
   400  			// trying to load "foo.dll" out of the system
   401  			// folder, but LoadLibraryEx doesn't support
   402  			// that yet on their system, so emulate it.
   403  			systemdir, err := GetSystemDirectory()
   404  			if err != nil {
   405  				return nil, err
   406  			}
   407  			loadDLL = systemdir + "\\" + name
   408  		}
   409  	}
   410  	h, err := LoadLibraryEx(loadDLL, 0, flags)
   411  	if err != nil {
   412  		return nil, err
   413  	}
   414  	return &DLL{Name: name, Handle: h}, nil
   415  }
   416  

View as plain text