zorldo

Goofing around with Ebiten
git clone git://bsandro.tech/zorldo
Log | Files | Refs | README

dll_windows.go (12312B)


      1 // Copyright 2011 The Go Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style
      3 // license that can be found in the LICENSE file.
      4 
      5 package windows
      6 
      7 import (
      8 	"sync"
      9 	"sync/atomic"
     10 	"syscall"
     11 	"unsafe"
     12 )
     13 
     14 // We need to use LoadLibrary and GetProcAddress from the Go runtime, because
     15 // the these symbols are loaded by the system linker and are required to
     16 // dynamically load additional symbols. Note that in the Go runtime, these
     17 // return syscall.Handle and syscall.Errno, but these are the same, in fact,
     18 // as windows.Handle and windows.Errno, and we intend to keep these the same.
     19 
     20 //go:linkname syscall_loadlibrary syscall.loadlibrary
     21 func syscall_loadlibrary(filename *uint16) (handle Handle, err Errno)
     22 
     23 //go:linkname syscall_getprocaddress syscall.getprocaddress
     24 func syscall_getprocaddress(handle Handle, procname *uint8) (proc uintptr, err Errno)
     25 
     26 // DLLError describes reasons for DLL load failures.
     27 type DLLError struct {
     28 	Err     error
     29 	ObjName string
     30 	Msg     string
     31 }
     32 
     33 func (e *DLLError) Error() string { return e.Msg }
     34 
     35 func (e *DLLError) Unwrap() error { return e.Err }
     36 
     37 // A DLL implements access to a single DLL.
     38 type DLL struct {
     39 	Name   string
     40 	Handle Handle
     41 }
     42 
     43 // LoadDLL loads DLL file into memory.
     44 //
     45 // Warning: using LoadDLL without an absolute path name is subject to
     46 // DLL preloading attacks. To safely load a system DLL, use LazyDLL
     47 // with System set to true, or use LoadLibraryEx directly.
     48 func LoadDLL(name string) (dll *DLL, err error) {
     49 	namep, err := UTF16PtrFromString(name)
     50 	if err != nil {
     51 		return nil, err
     52 	}
     53 	h, e := syscall_loadlibrary(namep)
     54 	if e != 0 {
     55 		return nil, &DLLError{
     56 			Err:     e,
     57 			ObjName: name,
     58 			Msg:     "Failed to load " + name + ": " + e.Error(),
     59 		}
     60 	}
     61 	d := &DLL{
     62 		Name:   name,
     63 		Handle: h,
     64 	}
     65 	return d, nil
     66 }
     67 
     68 // MustLoadDLL is like LoadDLL but panics if load operation failes.
     69 func MustLoadDLL(name string) *DLL {
     70 	d, e := LoadDLL(name)
     71 	if e != nil {
     72 		panic(e)
     73 	}
     74 	return d
     75 }
     76 
     77 // FindProc searches DLL d for procedure named name and returns *Proc
     78 // if found. It returns an error if search fails.
     79 func (d *DLL) FindProc(name string) (proc *Proc, err error) {
     80 	namep, err := BytePtrFromString(name)
     81 	if err != nil {
     82 		return nil, err
     83 	}
     84 	a, e := syscall_getprocaddress(d.Handle, namep)
     85 	if e != 0 {
     86 		return nil, &DLLError{
     87 			Err:     e,
     88 			ObjName: name,
     89 			Msg:     "Failed to find " + name + " procedure in " + d.Name + ": " + e.Error(),
     90 		}
     91 	}
     92 	p := &Proc{
     93 		Dll:  d,
     94 		Name: name,
     95 		addr: a,
     96 	}
     97 	return p, nil
     98 }
     99 
    100 // MustFindProc is like FindProc but panics if search fails.
    101 func (d *DLL) MustFindProc(name string) *Proc {
    102 	p, e := d.FindProc(name)
    103 	if e != nil {
    104 		panic(e)
    105 	}
    106 	return p
    107 }
    108 
    109 // FindProcByOrdinal searches DLL d for procedure by ordinal and returns *Proc
    110 // if found. It returns an error if search fails.
    111 func (d *DLL) FindProcByOrdinal(ordinal uintptr) (proc *Proc, err error) {
    112 	a, e := GetProcAddressByOrdinal(d.Handle, ordinal)
    113 	name := "#" + itoa(int(ordinal))
    114 	if e != nil {
    115 		return nil, &DLLError{
    116 			Err:     e,
    117 			ObjName: name,
    118 			Msg:     "Failed to find " + name + " procedure in " + d.Name + ": " + e.Error(),
    119 		}
    120 	}
    121 	p := &Proc{
    122 		Dll:  d,
    123 		Name: name,
    124 		addr: a,
    125 	}
    126 	return p, nil
    127 }
    128 
    129 // MustFindProcByOrdinal is like FindProcByOrdinal but panics if search fails.
    130 func (d *DLL) MustFindProcByOrdinal(ordinal uintptr) *Proc {
    131 	p, e := d.FindProcByOrdinal(ordinal)
    132 	if e != nil {
    133 		panic(e)
    134 	}
    135 	return p
    136 }
    137 
    138 // Release unloads DLL d from memory.
    139 func (d *DLL) Release() (err error) {
    140 	return FreeLibrary(d.Handle)
    141 }
    142 
    143 // A Proc implements access to a procedure inside a DLL.
    144 type Proc struct {
    145 	Dll  *DLL
    146 	Name string
    147 	addr uintptr
    148 }
    149 
    150 // Addr returns the address of the procedure represented by p.
    151 // The return value can be passed to Syscall to run the procedure.
    152 func (p *Proc) Addr() uintptr {
    153 	return p.addr
    154 }
    155 
    156 //go:uintptrescapes
    157 
    158 // Call executes procedure p with arguments a. It will panic, if more than 15 arguments
    159 // are supplied.
    160 //
    161 // The returned error is always non-nil, constructed from the result of GetLastError.
    162 // Callers must inspect the primary return value to decide whether an error occurred
    163 // (according to the semantics of the specific function being called) before consulting
    164 // the error. The error will be guaranteed to contain windows.Errno.
    165 func (p *Proc) Call(a ...uintptr) (r1, r2 uintptr, lastErr error) {
    166 	switch len(a) {
    167 	case 0:
    168 		return syscall.Syscall(p.Addr(), uintptr(len(a)), 0, 0, 0)
    169 	case 1:
    170 		return syscall.Syscall(p.Addr(), uintptr(len(a)), a[0], 0, 0)
    171 	case 2:
    172 		return syscall.Syscall(p.Addr(), uintptr(len(a)), a[0], a[1], 0)
    173 	case 3:
    174 		return syscall.Syscall(p.Addr(), uintptr(len(a)), a[0], a[1], a[2])
    175 	case 4:
    176 		return syscall.Syscall6(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], 0, 0)
    177 	case 5:
    178 		return syscall.Syscall6(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], 0)
    179 	case 6:
    180 		return syscall.Syscall6(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5])
    181 	case 7:
    182 		return syscall.Syscall9(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], 0, 0)
    183 	case 8:
    184 		return syscall.Syscall9(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], 0)
    185 	case 9:
    186 		return syscall.Syscall9(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8])
    187 	case 10:
    188 		return syscall.Syscall12(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], 0, 0)
    189 	case 11:
    190 		return syscall.Syscall12(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], 0)
    191 	case 12:
    192 		return syscall.Syscall12(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11])
    193 	case 13:
    194 		return syscall.Syscall15(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11], a[12], 0, 0)
    195 	case 14:
    196 		return syscall.Syscall15(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11], a[12], a[13], 0)
    197 	case 15:
    198 		return syscall.Syscall15(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11], a[12], a[13], a[14])
    199 	default:
    200 		panic("Call " + p.Name + " with too many arguments " + itoa(len(a)) + ".")
    201 	}
    202 }
    203 
    204 // A LazyDLL implements access to a single DLL.
    205 // It will delay the load of the DLL until the first
    206 // call to its Handle method or to one of its
    207 // LazyProc's Addr method.
    208 type LazyDLL struct {
    209 	Name string
    210 
    211 	// System determines whether the DLL must be loaded from the
    212 	// Windows System directory, bypassing the normal DLL search
    213 	// path.
    214 	System bool
    215 
    216 	mu  sync.Mutex
    217 	dll *DLL // non nil once DLL is loaded
    218 }
    219 
    220 // Load loads DLL file d.Name into memory. It returns an error if fails.
    221 // Load will not try to load DLL, if it is already loaded into memory.
    222 func (d *LazyDLL) Load() error {
    223 	// Non-racy version of:
    224 	// if d.dll != nil {
    225 	if atomic.LoadPointer((*unsafe.Pointer)(unsafe.Pointer(&d.dll))) != nil {
    226 		return nil
    227 	}
    228 	d.mu.Lock()
    229 	defer d.mu.Unlock()
    230 	if d.dll != nil {
    231 		return nil
    232 	}
    233 
    234 	// kernel32.dll is special, since it's where LoadLibraryEx comes from.
    235 	// The kernel already special-cases its name, so it's always
    236 	// loaded from system32.
    237 	var dll *DLL
    238 	var err error
    239 	if d.Name == "kernel32.dll" {
    240 		dll, err = LoadDLL(d.Name)
    241 	} else {
    242 		dll, err = loadLibraryEx(d.Name, d.System)
    243 	}
    244 	if err != nil {
    245 		return err
    246 	}
    247 
    248 	// Non-racy version of:
    249 	// d.dll = dll
    250 	atomic.StorePointer((*unsafe.Pointer)(unsafe.Pointer(&d.dll)), unsafe.Pointer(dll))
    251 	return nil
    252 }
    253 
    254 // mustLoad is like Load but panics if search fails.
    255 func (d *LazyDLL) mustLoad() {
    256 	e := d.Load()
    257 	if e != nil {
    258 		panic(e)
    259 	}
    260 }
    261 
    262 // Handle returns d's module handle.
    263 func (d *LazyDLL) Handle() uintptr {
    264 	d.mustLoad()
    265 	return uintptr(d.dll.Handle)
    266 }
    267 
    268 // NewProc returns a LazyProc for accessing the named procedure in the DLL d.
    269 func (d *LazyDLL) NewProc(name string) *LazyProc {
    270 	return &LazyProc{l: d, Name: name}
    271 }
    272 
    273 // NewLazyDLL creates new LazyDLL associated with DLL file.
    274 func NewLazyDLL(name string) *LazyDLL {
    275 	return &LazyDLL{Name: name}
    276 }
    277 
    278 // NewLazySystemDLL is like NewLazyDLL, but will only
    279 // search Windows System directory for the DLL if name is
    280 // a base name (like "advapi32.dll").
    281 func NewLazySystemDLL(name string) *LazyDLL {
    282 	return &LazyDLL{Name: name, System: true}
    283 }
    284 
    285 // A LazyProc implements access to a procedure inside a LazyDLL.
    286 // It delays the lookup until the Addr method is called.
    287 type LazyProc struct {
    288 	Name string
    289 
    290 	mu   sync.Mutex
    291 	l    *LazyDLL
    292 	proc *Proc
    293 }
    294 
    295 // Find searches DLL for procedure named p.Name. It returns
    296 // an error if search fails. Find will not search procedure,
    297 // if it is already found and loaded into memory.
    298 func (p *LazyProc) Find() error {
    299 	// Non-racy version of:
    300 	// if p.proc == nil {
    301 	if atomic.LoadPointer((*unsafe.Pointer)(unsafe.Pointer(&p.proc))) == nil {
    302 		p.mu.Lock()
    303 		defer p.mu.Unlock()
    304 		if p.proc == nil {
    305 			e := p.l.Load()
    306 			if e != nil {
    307 				return e
    308 			}
    309 			proc, e := p.l.dll.FindProc(p.Name)
    310 			if e != nil {
    311 				return e
    312 			}
    313 			// Non-racy version of:
    314 			// p.proc = proc
    315 			atomic.StorePointer((*unsafe.Pointer)(unsafe.Pointer(&p.proc)), unsafe.Pointer(proc))
    316 		}
    317 	}
    318 	return nil
    319 }
    320 
    321 // mustFind is like Find but panics if search fails.
    322 func (p *LazyProc) mustFind() {
    323 	e := p.Find()
    324 	if e != nil {
    325 		panic(e)
    326 	}
    327 }
    328 
    329 // Addr returns the address of the procedure represented by p.
    330 // The return value can be passed to Syscall to run the procedure.
    331 // It will panic if the procedure cannot be found.
    332 func (p *LazyProc) Addr() uintptr {
    333 	p.mustFind()
    334 	return p.proc.Addr()
    335 }
    336 
    337 //go:uintptrescapes
    338 
    339 // Call executes procedure p with arguments a. It will panic, if more than 15 arguments
    340 // are supplied. It will also panic if the procedure cannot be found.
    341 //
    342 // The returned error is always non-nil, constructed from the result of GetLastError.
    343 // Callers must inspect the primary return value to decide whether an error occurred
    344 // (according to the semantics of the specific function being called) before consulting
    345 // the error. The error will be guaranteed to contain windows.Errno.
    346 func (p *LazyProc) Call(a ...uintptr) (r1, r2 uintptr, lastErr error) {
    347 	p.mustFind()
    348 	return p.proc.Call(a...)
    349 }
    350 
    351 var canDoSearchSystem32Once struct {
    352 	sync.Once
    353 	v bool
    354 }
    355 
    356 func initCanDoSearchSystem32() {
    357 	// https://msdn.microsoft.com/en-us/library/ms684179(v=vs.85).aspx says:
    358 	// "Windows 7, Windows Server 2008 R2, Windows Vista, and Windows
    359 	// Server 2008: The LOAD_LIBRARY_SEARCH_* flags are available on
    360 	// systems that have KB2533623 installed. To determine whether the
    361 	// flags are available, use GetProcAddress to get the address of the
    362 	// AddDllDirectory, RemoveDllDirectory, or SetDefaultDllDirectories
    363 	// function. If GetProcAddress succeeds, the LOAD_LIBRARY_SEARCH_*
    364 	// flags can be used with LoadLibraryEx."
    365 	canDoSearchSystem32Once.v = (modkernel32.NewProc("AddDllDirectory").Find() == nil)
    366 }
    367 
    368 func canDoSearchSystem32() bool {
    369 	canDoSearchSystem32Once.Do(initCanDoSearchSystem32)
    370 	return canDoSearchSystem32Once.v
    371 }
    372 
    373 func isBaseName(name string) bool {
    374 	for _, c := range name {
    375 		if c == ':' || c == '/' || c == '\\' {
    376 			return false
    377 		}
    378 	}
    379 	return true
    380 }
    381 
    382 // loadLibraryEx wraps the Windows LoadLibraryEx function.
    383 //
    384 // See https://msdn.microsoft.com/en-us/library/windows/desktop/ms684179(v=vs.85).aspx
    385 //
    386 // If name is not an absolute path, LoadLibraryEx searches for the DLL
    387 // in a variety of automatic locations unless constrained by flags.
    388 // See: https://msdn.microsoft.com/en-us/library/ff919712%28VS.85%29.aspx
    389 func loadLibraryEx(name string, system bool) (*DLL, error) {
    390 	loadDLL := name
    391 	var flags uintptr
    392 	if system {
    393 		if canDoSearchSystem32() {
    394 			flags = LOAD_LIBRARY_SEARCH_SYSTEM32
    395 		} else if isBaseName(name) {
    396 			// WindowsXP or unpatched Windows machine
    397 			// trying to load "foo.dll" out of the system
    398 			// folder, but LoadLibraryEx doesn't support
    399 			// that yet on their system, so emulate it.
    400 			systemdir, err := GetSystemDirectory()
    401 			if err != nil {
    402 				return nil, err
    403 			}
    404 			loadDLL = systemdir + "\\" + name
    405 		}
    406 	}
    407 	h, err := LoadLibraryEx(loadDLL, 0, flags)
    408 	if err != nil {
    409 		return nil, err
    410 	}
    411 	return &DLL{Name: name, Handle: h}, nil
    412 }
    413 
    414 type errString string
    415 
    416 func (s errString) Error() string { return string(s) }