dll_windows.go (12377B)
1 // Copyright 2011 The Go Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style 3 // license that can be found in the LICENSE file. 4 5 package windows 6 7 import ( 8 "sync" 9 "sync/atomic" 10 "syscall" 11 "unsafe" 12 ) 13 14 // We need to use LoadLibrary and GetProcAddress from the Go runtime, because 15 // the these symbols are loaded by the system linker and are required to 16 // dynamically load additional symbols. Note that in the Go runtime, these 17 // return syscall.Handle and syscall.Errno, but these are the same, in fact, 18 // as windows.Handle and windows.Errno, and we intend to keep these the same. 19 20 //go:linkname syscall_loadlibrary syscall.loadlibrary 21 func syscall_loadlibrary(filename *uint16) (handle Handle, err Errno) 22 23 //go:linkname syscall_getprocaddress syscall.getprocaddress 24 func syscall_getprocaddress(handle Handle, procname *uint8) (proc uintptr, err Errno) 25 26 // DLLError describes reasons for DLL load failures. 27 type DLLError struct { 28 Err error 29 ObjName string 30 Msg string 31 } 32 33 func (e *DLLError) Error() string { return e.Msg } 34 35 func (e *DLLError) Unwrap() error { return e.Err } 36 37 // A DLL implements access to a single DLL. 38 type DLL struct { 39 Name string 40 Handle Handle 41 } 42 43 // LoadDLL loads DLL file into memory. 44 // 45 // Warning: using LoadDLL without an absolute path name is subject to 46 // DLL preloading attacks. To safely load a system DLL, use [NewLazySystemDLL], 47 // or use [LoadLibraryEx] directly. 48 func LoadDLL(name string) (dll *DLL, err error) { 49 namep, err := UTF16PtrFromString(name) 50 if err != nil { 51 return nil, err 52 } 53 h, e := syscall_loadlibrary(namep) 54 if e != 0 { 55 return nil, &DLLError{ 56 Err: e, 57 ObjName: name, 58 Msg: "Failed to load " + name + ": " + e.Error(), 59 } 60 } 61 d := &DLL{ 62 Name: name, 63 Handle: h, 64 } 65 return d, nil 66 } 67 68 // MustLoadDLL is like LoadDLL but panics if load operation fails. 69 func MustLoadDLL(name string) *DLL { 70 d, e := LoadDLL(name) 71 if e != nil { 72 panic(e) 73 } 74 return d 75 } 76 77 // FindProc searches DLL d for procedure named name and returns *Proc 78 // if found. It returns an error if search fails. 79 func (d *DLL) FindProc(name string) (proc *Proc, err error) { 80 namep, err := BytePtrFromString(name) 81 if err != nil { 82 return nil, err 83 } 84 a, e := syscall_getprocaddress(d.Handle, namep) 85 if e != 0 { 86 return nil, &DLLError{ 87 Err: e, 88 ObjName: name, 89 Msg: "Failed to find " + name + " procedure in " + d.Name + ": " + e.Error(), 90 } 91 } 92 p := &Proc{ 93 Dll: d, 94 Name: name, 95 addr: a, 96 } 97 return p, nil 98 } 99 100 // MustFindProc is like FindProc but panics if search fails. 101 func (d *DLL) MustFindProc(name string) *Proc { 102 p, e := d.FindProc(name) 103 if e != nil { 104 panic(e) 105 } 106 return p 107 } 108 109 // FindProcByOrdinal searches DLL d for procedure by ordinal and returns *Proc 110 // if found. It returns an error if search fails. 111 func (d *DLL) FindProcByOrdinal(ordinal uintptr) (proc *Proc, err error) { 112 a, e := GetProcAddressByOrdinal(d.Handle, ordinal) 113 name := "#" + itoa(int(ordinal)) 114 if e != nil { 115 return nil, &DLLError{ 116 Err: e, 117 ObjName: name, 118 Msg: "Failed to find " + name + " procedure in " + d.Name + ": " + e.Error(), 119 } 120 } 121 p := &Proc{ 122 Dll: d, 123 Name: name, 124 addr: a, 125 } 126 return p, nil 127 } 128 129 // MustFindProcByOrdinal is like FindProcByOrdinal but panics if search fails. 130 func (d *DLL) MustFindProcByOrdinal(ordinal uintptr) *Proc { 131 p, e := d.FindProcByOrdinal(ordinal) 132 if e != nil { 133 panic(e) 134 } 135 return p 136 } 137 138 // Release unloads DLL d from memory. 139 func (d *DLL) Release() (err error) { 140 return FreeLibrary(d.Handle) 141 } 142 143 // A Proc implements access to a procedure inside a DLL. 144 type Proc struct { 145 Dll *DLL 146 Name string 147 addr uintptr 148 } 149 150 // Addr returns the address of the procedure represented by p. 151 // The return value can be passed to Syscall to run the procedure. 152 func (p *Proc) Addr() uintptr { 153 return p.addr 154 } 155 156 //go:uintptrescapes 157 158 // Call executes procedure p with arguments a. It will panic, if more than 15 arguments 159 // are supplied. 160 // 161 // The returned error is always non-nil, constructed from the result of GetLastError. 162 // Callers must inspect the primary return value to decide whether an error occurred 163 // (according to the semantics of the specific function being called) before consulting 164 // the error. The error will be guaranteed to contain windows.Errno. 165 func (p *Proc) Call(a ...uintptr) (r1, r2 uintptr, lastErr error) { 166 switch len(a) { 167 case 0: 168 return syscall.Syscall(p.Addr(), uintptr(len(a)), 0, 0, 0) 169 case 1: 170 return syscall.Syscall(p.Addr(), uintptr(len(a)), a[0], 0, 0) 171 case 2: 172 return syscall.Syscall(p.Addr(), uintptr(len(a)), a[0], a[1], 0) 173 case 3: 174 return syscall.Syscall(p.Addr(), uintptr(len(a)), a[0], a[1], a[2]) 175 case 4: 176 return syscall.Syscall6(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], 0, 0) 177 case 5: 178 return syscall.Syscall6(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], 0) 179 case 6: 180 return syscall.Syscall6(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5]) 181 case 7: 182 return syscall.Syscall9(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], 0, 0) 183 case 8: 184 return syscall.Syscall9(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], 0) 185 case 9: 186 return syscall.Syscall9(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8]) 187 case 10: 188 return syscall.Syscall12(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], 0, 0) 189 case 11: 190 return syscall.Syscall12(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], 0) 191 case 12: 192 return syscall.Syscall12(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11]) 193 case 13: 194 return syscall.Syscall15(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11], a[12], 0, 0) 195 case 14: 196 return syscall.Syscall15(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11], a[12], a[13], 0) 197 case 15: 198 return syscall.Syscall15(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11], a[12], a[13], a[14]) 199 default: 200 panic("Call " + p.Name + " with too many arguments " + itoa(len(a)) + ".") 201 } 202 } 203 204 // A LazyDLL implements access to a single DLL. 205 // It will delay the load of the DLL until the first 206 // call to its Handle method or to one of its 207 // LazyProc's Addr method. 208 type LazyDLL struct { 209 Name string 210 211 // System determines whether the DLL must be loaded from the 212 // Windows System directory, bypassing the normal DLL search 213 // path. 214 System bool 215 216 mu sync.Mutex 217 dll *DLL // non nil once DLL is loaded 218 } 219 220 // Load loads DLL file d.Name into memory. It returns an error if fails. 221 // Load will not try to load DLL, if it is already loaded into memory. 222 func (d *LazyDLL) Load() error { 223 // Non-racy version of: 224 // if d.dll != nil { 225 if atomic.LoadPointer((*unsafe.Pointer)(unsafe.Pointer(&d.dll))) != nil { 226 return nil 227 } 228 d.mu.Lock() 229 defer d.mu.Unlock() 230 if d.dll != nil { 231 return nil 232 } 233 234 // kernel32.dll is special, since it's where LoadLibraryEx comes from. 235 // The kernel already special-cases its name, so it's always 236 // loaded from system32. 237 var dll *DLL 238 var err error 239 if d.Name == "kernel32.dll" { 240 dll, err = LoadDLL(d.Name) 241 } else { 242 dll, err = loadLibraryEx(d.Name, d.System) 243 } 244 if err != nil { 245 return err 246 } 247 248 // Non-racy version of: 249 // d.dll = dll 250 atomic.StorePointer((*unsafe.Pointer)(unsafe.Pointer(&d.dll)), unsafe.Pointer(dll)) 251 return nil 252 } 253 254 // mustLoad is like Load but panics if search fails. 255 func (d *LazyDLL) mustLoad() { 256 e := d.Load() 257 if e != nil { 258 panic(e) 259 } 260 } 261 262 // Handle returns d's module handle. 263 func (d *LazyDLL) Handle() uintptr { 264 d.mustLoad() 265 return uintptr(d.dll.Handle) 266 } 267 268 // NewProc returns a LazyProc for accessing the named procedure in the DLL d. 269 func (d *LazyDLL) NewProc(name string) *LazyProc { 270 return &LazyProc{l: d, Name: name} 271 } 272 273 // NewLazyDLL creates new LazyDLL associated with DLL file. 274 // 275 // Warning: using NewLazyDLL without an absolute path name is subject to 276 // DLL preloading attacks. To safely load a system DLL, use [NewLazySystemDLL]. 277 func NewLazyDLL(name string) *LazyDLL { 278 return &LazyDLL{Name: name} 279 } 280 281 // NewLazySystemDLL is like NewLazyDLL, but will only 282 // search Windows System directory for the DLL if name is 283 // a base name (like "advapi32.dll"). 284 func NewLazySystemDLL(name string) *LazyDLL { 285 return &LazyDLL{Name: name, System: true} 286 } 287 288 // A LazyProc implements access to a procedure inside a LazyDLL. 289 // It delays the lookup until the Addr method is called. 290 type LazyProc struct { 291 Name string 292 293 mu sync.Mutex 294 l *LazyDLL 295 proc *Proc 296 } 297 298 // Find searches DLL for procedure named p.Name. It returns 299 // an error if search fails. Find will not search procedure, 300 // if it is already found and loaded into memory. 301 func (p *LazyProc) Find() error { 302 // Non-racy version of: 303 // if p.proc == nil { 304 if atomic.LoadPointer((*unsafe.Pointer)(unsafe.Pointer(&p.proc))) == nil { 305 p.mu.Lock() 306 defer p.mu.Unlock() 307 if p.proc == nil { 308 e := p.l.Load() 309 if e != nil { 310 return e 311 } 312 proc, e := p.l.dll.FindProc(p.Name) 313 if e != nil { 314 return e 315 } 316 // Non-racy version of: 317 // p.proc = proc 318 atomic.StorePointer((*unsafe.Pointer)(unsafe.Pointer(&p.proc)), unsafe.Pointer(proc)) 319 } 320 } 321 return nil 322 } 323 324 // mustFind is like Find but panics if search fails. 325 func (p *LazyProc) mustFind() { 326 e := p.Find() 327 if e != nil { 328 panic(e) 329 } 330 } 331 332 // Addr returns the address of the procedure represented by p. 333 // The return value can be passed to Syscall to run the procedure. 334 // It will panic if the procedure cannot be found. 335 func (p *LazyProc) Addr() uintptr { 336 p.mustFind() 337 return p.proc.Addr() 338 } 339 340 //go:uintptrescapes 341 342 // Call executes procedure p with arguments a. It will panic, if more than 15 arguments 343 // are supplied. It will also panic if the procedure cannot be found. 344 // 345 // The returned error is always non-nil, constructed from the result of GetLastError. 346 // Callers must inspect the primary return value to decide whether an error occurred 347 // (according to the semantics of the specific function being called) before consulting 348 // the error. The error will be guaranteed to contain windows.Errno. 349 func (p *LazyProc) Call(a ...uintptr) (r1, r2 uintptr, lastErr error) { 350 p.mustFind() 351 return p.proc.Call(a...) 352 } 353 354 var canDoSearchSystem32Once struct { 355 sync.Once 356 v bool 357 } 358 359 func initCanDoSearchSystem32() { 360 // https://msdn.microsoft.com/en-us/library/ms684179(v=vs.85).aspx says: 361 // "Windows 7, Windows Server 2008 R2, Windows Vista, and Windows 362 // Server 2008: The LOAD_LIBRARY_SEARCH_* flags are available on 363 // systems that have KB2533623 installed. To determine whether the 364 // flags are available, use GetProcAddress to get the address of the 365 // AddDllDirectory, RemoveDllDirectory, or SetDefaultDllDirectories 366 // function. If GetProcAddress succeeds, the LOAD_LIBRARY_SEARCH_* 367 // flags can be used with LoadLibraryEx." 368 canDoSearchSystem32Once.v = (modkernel32.NewProc("AddDllDirectory").Find() == nil) 369 } 370 371 func canDoSearchSystem32() bool { 372 canDoSearchSystem32Once.Do(initCanDoSearchSystem32) 373 return canDoSearchSystem32Once.v 374 } 375 376 func isBaseName(name string) bool { 377 for _, c := range name { 378 if c == ':' || c == '/' || c == '\\' { 379 return false 380 } 381 } 382 return true 383 } 384 385 // loadLibraryEx wraps the Windows LoadLibraryEx function. 386 // 387 // See https://msdn.microsoft.com/en-us/library/windows/desktop/ms684179(v=vs.85).aspx 388 // 389 // If name is not an absolute path, LoadLibraryEx searches for the DLL 390 // in a variety of automatic locations unless constrained by flags. 391 // See: https://msdn.microsoft.com/en-us/library/ff919712%28VS.85%29.aspx 392 func loadLibraryEx(name string, system bool) (*DLL, error) { 393 loadDLL := name 394 var flags uintptr 395 if system { 396 if canDoSearchSystem32() { 397 flags = LOAD_LIBRARY_SEARCH_SYSTEM32 398 } else if isBaseName(name) { 399 // WindowsXP or unpatched Windows machine 400 // trying to load "foo.dll" out of the system 401 // folder, but LoadLibraryEx doesn't support 402 // that yet on their system, so emulate it. 403 systemdir, err := GetSystemDirectory() 404 if err != nil { 405 return nil, err 406 } 407 loadDLL = systemdir + "\\" + name 408 } 409 } 410 h, err := LoadLibraryEx(loadDLL, 0, flags) 411 if err != nil { 412 return nil, err 413 } 414 return &DLL{Name: name, Handle: h}, nil 415 }