Tobias Klauser | 9e4fff1 | 2017-10-25 22:17:19 +0200 | [diff] [blame] | 1 | // Copyright 2011 The Go Authors. All rights reserved. |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 2 | // Use of this source code is governed by a BSD-style |
| 3 | // license that can be found in the LICENSE file. |
| 4 | |
Rob Pike | 8442dd2 | 2014-08-11 15:58:26 -0700 | [diff] [blame] | 5 | package windows |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 6 | |
| 7 | import ( |
| 8 | "sync" |
| 9 | "sync/atomic" |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 10 | "syscall" |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 11 | "unsafe" |
| 12 | ) |
| 13 | |
Jason A. Donenfeld | ef33b2f | 2019-10-07 00:04:36 +0200 | [diff] [blame] | 14 | // We need to use LoadLibrary and GetProcAddress from the Go runtime, because |
| 15 | // the these symbols are loaded by the system linker and are required to |
| 16 | // dynamically load additional symbols. Note that in the Go runtime, these |
| 17 | // return syscall.Handle and syscall.Errno, but these are the same, in fact, |
| 18 | // as windows.Handle and windows.Errno, and we intend to keep these the same. |
| 19 | |
| 20 | //go:linkname syscall_loadlibrary syscall.loadlibrary |
| 21 | func syscall_loadlibrary(filename *uint16) (handle Handle, err Errno) |
| 22 | |
| 23 | //go:linkname syscall_getprocaddress syscall.getprocaddress |
| 24 | func syscall_getprocaddress(handle Handle, procname *uint8) (proc uintptr, err Errno) |
| 25 | |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 26 | // DLLError describes reasons for DLL load failures. |
| 27 | type DLLError struct { |
| 28 | Err error |
| 29 | ObjName string |
| 30 | Msg string |
| 31 | } |
| 32 | |
| 33 | func (e *DLLError) Error() string { return e.Msg } |
| 34 | |
Jason A. Donenfeld | 83cfaa2 | 2020-11-13 15:45:34 +0100 | [diff] [blame] | 35 | func (e *DLLError) Unwrap() error { return e.Err } |
| 36 | |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 37 | // A DLL implements access to a single DLL. |
| 38 | type DLL struct { |
| 39 | Name string |
| 40 | Handle Handle |
| 41 | } |
| 42 | |
| 43 | // LoadDLL loads DLL file into memory. |
Brad Fitzpatrick | 3dff6e1 | 2016-04-01 04:10:49 +0000 | [diff] [blame] | 44 | // |
| 45 | // Warning: using LoadDLL without an absolute path name is subject to |
| 46 | // DLL preloading attacks. To safely load a system DLL, use LazyDLL |
| 47 | // with System set to true, or use LoadLibraryEx directly. |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 48 | func LoadDLL(name string) (dll *DLL, err error) { |
| 49 | namep, err := UTF16PtrFromString(name) |
| 50 | if err != nil { |
| 51 | return nil, err |
| 52 | } |
Jason A. Donenfeld | ef33b2f | 2019-10-07 00:04:36 +0200 | [diff] [blame] | 53 | h, e := syscall_loadlibrary(namep) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 54 | if e != 0 { |
| 55 | return nil, &DLLError{ |
| 56 | Err: e, |
| 57 | ObjName: name, |
| 58 | Msg: "Failed to load " + name + ": " + e.Error(), |
| 59 | } |
| 60 | } |
| 61 | d := &DLL{ |
| 62 | Name: name, |
Jason A. Donenfeld | ef33b2f | 2019-10-07 00:04:36 +0200 | [diff] [blame] | 63 | Handle: h, |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 64 | } |
| 65 | return d, nil |
| 66 | } |
| 67 | |
| 68 | // MustLoadDLL is like LoadDLL but panics if load operation failes. |
| 69 | func MustLoadDLL(name string) *DLL { |
| 70 | d, e := LoadDLL(name) |
| 71 | if e != nil { |
| 72 | panic(e) |
| 73 | } |
| 74 | return d |
| 75 | } |
| 76 | |
| 77 | // FindProc searches DLL d for procedure named name and returns *Proc |
| 78 | // if found. It returns an error if search fails. |
| 79 | func (d *DLL) FindProc(name string) (proc *Proc, err error) { |
| 80 | namep, err := BytePtrFromString(name) |
| 81 | if err != nil { |
| 82 | return nil, err |
| 83 | } |
Jason A. Donenfeld | ef33b2f | 2019-10-07 00:04:36 +0200 | [diff] [blame] | 84 | a, e := syscall_getprocaddress(d.Handle, namep) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 85 | if e != 0 { |
| 86 | return nil, &DLLError{ |
| 87 | Err: e, |
| 88 | ObjName: name, |
| 89 | Msg: "Failed to find " + name + " procedure in " + d.Name + ": " + e.Error(), |
| 90 | } |
| 91 | } |
| 92 | p := &Proc{ |
| 93 | Dll: d, |
| 94 | Name: name, |
| 95 | addr: a, |
| 96 | } |
| 97 | return p, nil |
| 98 | } |
| 99 | |
| 100 | // MustFindProc is like FindProc but panics if search fails. |
| 101 | func (d *DLL) MustFindProc(name string) *Proc { |
| 102 | p, e := d.FindProc(name) |
| 103 | if e != nil { |
| 104 | panic(e) |
| 105 | } |
| 106 | return p |
| 107 | } |
| 108 | |
ly303550688 | 6aff5f3 | 2020-05-06 13:54:32 +0000 | [diff] [blame] | 109 | // FindProcByOrdinal searches DLL d for procedure by ordinal and returns *Proc |
| 110 | // if found. It returns an error if search fails. |
| 111 | func (d *DLL) FindProcByOrdinal(ordinal uintptr) (proc *Proc, err error) { |
| 112 | a, e := GetProcAddressByOrdinal(d.Handle, ordinal) |
| 113 | name := "#" + itoa(int(ordinal)) |
| 114 | if e != nil { |
| 115 | return nil, &DLLError{ |
| 116 | Err: e, |
| 117 | ObjName: name, |
| 118 | Msg: "Failed to find " + name + " procedure in " + d.Name + ": " + e.Error(), |
| 119 | } |
| 120 | } |
| 121 | p := &Proc{ |
| 122 | Dll: d, |
| 123 | Name: name, |
| 124 | addr: a, |
| 125 | } |
| 126 | return p, nil |
| 127 | } |
| 128 | |
| 129 | // MustFindProcByOrdinal is like FindProcByOrdinal but panics if search fails. |
| 130 | func (d *DLL) MustFindProcByOrdinal(ordinal uintptr) *Proc { |
| 131 | p, e := d.FindProcByOrdinal(ordinal) |
| 132 | if e != nil { |
| 133 | panic(e) |
| 134 | } |
| 135 | return p |
| 136 | } |
| 137 | |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 138 | // Release unloads DLL d from memory. |
| 139 | func (d *DLL) Release() (err error) { |
| 140 | return FreeLibrary(d.Handle) |
| 141 | } |
| 142 | |
| 143 | // A Proc implements access to a procedure inside a DLL. |
| 144 | type Proc struct { |
| 145 | Dll *DLL |
| 146 | Name string |
| 147 | addr uintptr |
| 148 | } |
| 149 | |
| 150 | // Addr returns the address of the procedure represented by p. |
| 151 | // The return value can be passed to Syscall to run the procedure. |
| 152 | func (p *Proc) Addr() uintptr { |
| 153 | return p.addr |
| 154 | } |
| 155 | |
Alex Brainman | b518c29 | 2016-07-12 17:09:20 +1000 | [diff] [blame] | 156 | //go:uintptrescapes |
| 157 | |
Alex Brainman | 176de74 | 2017-10-26 09:50:40 +1100 | [diff] [blame] | 158 | // Call executes procedure p with arguments a. It will panic, if more than 15 arguments |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 159 | // are supplied. |
| 160 | // |
| 161 | // The returned error is always non-nil, constructed from the result of GetLastError. |
| 162 | // Callers must inspect the primary return value to decide whether an error occurred |
| 163 | // (according to the semantics of the specific function being called) before consulting |
Rob Pike | 8442dd2 | 2014-08-11 15:58:26 -0700 | [diff] [blame] | 164 | // the error. The error will be guaranteed to contain windows.Errno. |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 165 | func (p *Proc) Call(a ...uintptr) (r1, r2 uintptr, lastErr error) { |
| 166 | switch len(a) { |
| 167 | case 0: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 168 | return syscall.Syscall(p.Addr(), uintptr(len(a)), 0, 0, 0) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 169 | case 1: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 170 | return syscall.Syscall(p.Addr(), uintptr(len(a)), a[0], 0, 0) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 171 | case 2: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 172 | return syscall.Syscall(p.Addr(), uintptr(len(a)), a[0], a[1], 0) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 173 | case 3: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 174 | return syscall.Syscall(p.Addr(), uintptr(len(a)), a[0], a[1], a[2]) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 175 | case 4: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 176 | return syscall.Syscall6(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], 0, 0) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 177 | case 5: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 178 | return syscall.Syscall6(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], 0) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 179 | case 6: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 180 | return syscall.Syscall6(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5]) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 181 | case 7: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 182 | return syscall.Syscall9(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], 0, 0) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 183 | case 8: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 184 | return syscall.Syscall9(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], 0) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 185 | case 9: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 186 | return syscall.Syscall9(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8]) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 187 | case 10: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 188 | return syscall.Syscall12(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], 0, 0) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 189 | case 11: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 190 | return syscall.Syscall12(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], 0) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 191 | case 12: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 192 | return syscall.Syscall12(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11]) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 193 | case 13: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 194 | return syscall.Syscall15(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11], a[12], 0, 0) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 195 | case 14: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 196 | return syscall.Syscall15(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11], a[12], a[13], 0) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 197 | case 15: |
Rob Pike | 7118195 | 2014-08-13 14:08:39 -0700 | [diff] [blame] | 198 | return syscall.Syscall15(p.Addr(), uintptr(len(a)), a[0], a[1], a[2], a[3], a[4], a[5], a[6], a[7], a[8], a[9], a[10], a[11], a[12], a[13], a[14]) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 199 | default: |
| 200 | panic("Call " + p.Name + " with too many arguments " + itoa(len(a)) + ".") |
| 201 | } |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 202 | } |
| 203 | |
| 204 | // A LazyDLL implements access to a single DLL. |
| 205 | // It will delay the load of the DLL until the first |
| 206 | // call to its Handle method or to one of its |
| 207 | // LazyProc's Addr method. |
| 208 | type LazyDLL struct { |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 209 | Name string |
Brad Fitzpatrick | 3dff6e1 | 2016-04-01 04:10:49 +0000 | [diff] [blame] | 210 | |
| 211 | // System determines whether the DLL must be loaded from the |
| 212 | // Windows System directory, bypassing the normal DLL search |
| 213 | // path. |
| 214 | System bool |
| 215 | |
| 216 | mu sync.Mutex |
| 217 | dll *DLL // non nil once DLL is loaded |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 218 | } |
| 219 | |
| 220 | // Load loads DLL file d.Name into memory. It returns an error if fails. |
| 221 | // Load will not try to load DLL, if it is already loaded into memory. |
| 222 | func (d *LazyDLL) Load() error { |
| 223 | // Non-racy version of: |
Brad Fitzpatrick | 3dff6e1 | 2016-04-01 04:10:49 +0000 | [diff] [blame] | 224 | // if d.dll != nil { |
| 225 | if atomic.LoadPointer((*unsafe.Pointer)(unsafe.Pointer(&d.dll))) != nil { |
| 226 | return nil |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 227 | } |
Brad Fitzpatrick | 3dff6e1 | 2016-04-01 04:10:49 +0000 | [diff] [blame] | 228 | d.mu.Lock() |
| 229 | defer d.mu.Unlock() |
| 230 | if d.dll != nil { |
| 231 | return nil |
| 232 | } |
| 233 | |
| 234 | // kernel32.dll is special, since it's where LoadLibraryEx comes from. |
| 235 | // The kernel already special-cases its name, so it's always |
| 236 | // loaded from system32. |
| 237 | var dll *DLL |
| 238 | var err error |
| 239 | if d.Name == "kernel32.dll" { |
| 240 | dll, err = LoadDLL(d.Name) |
| 241 | } else { |
| 242 | dll, err = loadLibraryEx(d.Name, d.System) |
| 243 | } |
| 244 | if err != nil { |
| 245 | return err |
| 246 | } |
| 247 | |
| 248 | // Non-racy version of: |
| 249 | // d.dll = dll |
| 250 | atomic.StorePointer((*unsafe.Pointer)(unsafe.Pointer(&d.dll)), unsafe.Pointer(dll)) |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 251 | return nil |
| 252 | } |
| 253 | |
| 254 | // mustLoad is like Load but panics if search fails. |
| 255 | func (d *LazyDLL) mustLoad() { |
| 256 | e := d.Load() |
| 257 | if e != nil { |
| 258 | panic(e) |
| 259 | } |
| 260 | } |
| 261 | |
| 262 | // Handle returns d's module handle. |
| 263 | func (d *LazyDLL) Handle() uintptr { |
| 264 | d.mustLoad() |
| 265 | return uintptr(d.dll.Handle) |
| 266 | } |
| 267 | |
| 268 | // NewProc returns a LazyProc for accessing the named procedure in the DLL d. |
| 269 | func (d *LazyDLL) NewProc(name string) *LazyProc { |
| 270 | return &LazyProc{l: d, Name: name} |
| 271 | } |
| 272 | |
| 273 | // NewLazyDLL creates new LazyDLL associated with DLL file. |
| 274 | func NewLazyDLL(name string) *LazyDLL { |
| 275 | return &LazyDLL{Name: name} |
| 276 | } |
| 277 | |
Alex Brainman | 042a8f5 | 2016-04-06 15:52:57 +1000 | [diff] [blame] | 278 | // NewLazySystemDLL is like NewLazyDLL, but will only |
| 279 | // search Windows System directory for the DLL if name is |
| 280 | // a base name (like "advapi32.dll"). |
| 281 | func NewLazySystemDLL(name string) *LazyDLL { |
| 282 | return &LazyDLL{Name: name, System: true} |
| 283 | } |
| 284 | |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 285 | // A LazyProc implements access to a procedure inside a LazyDLL. |
| 286 | // It delays the lookup until the Addr method is called. |
| 287 | type LazyProc struct { |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 288 | Name string |
Brad Fitzpatrick | 3dff6e1 | 2016-04-01 04:10:49 +0000 | [diff] [blame] | 289 | |
| 290 | mu sync.Mutex |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 291 | l *LazyDLL |
| 292 | proc *Proc |
| 293 | } |
| 294 | |
| 295 | // Find searches DLL for procedure named p.Name. It returns |
| 296 | // an error if search fails. Find will not search procedure, |
| 297 | // if it is already found and loaded into memory. |
| 298 | func (p *LazyProc) Find() error { |
| 299 | // Non-racy version of: |
| 300 | // if p.proc == nil { |
| 301 | if atomic.LoadPointer((*unsafe.Pointer)(unsafe.Pointer(&p.proc))) == nil { |
| 302 | p.mu.Lock() |
| 303 | defer p.mu.Unlock() |
| 304 | if p.proc == nil { |
| 305 | e := p.l.Load() |
| 306 | if e != nil { |
| 307 | return e |
| 308 | } |
| 309 | proc, e := p.l.dll.FindProc(p.Name) |
| 310 | if e != nil { |
| 311 | return e |
| 312 | } |
| 313 | // Non-racy version of: |
| 314 | // p.proc = proc |
| 315 | atomic.StorePointer((*unsafe.Pointer)(unsafe.Pointer(&p.proc)), unsafe.Pointer(proc)) |
| 316 | } |
| 317 | } |
| 318 | return nil |
| 319 | } |
| 320 | |
| 321 | // mustFind is like Find but panics if search fails. |
| 322 | func (p *LazyProc) mustFind() { |
| 323 | e := p.Find() |
| 324 | if e != nil { |
| 325 | panic(e) |
| 326 | } |
| 327 | } |
| 328 | |
| 329 | // Addr returns the address of the procedure represented by p. |
| 330 | // The return value can be passed to Syscall to run the procedure. |
Kieran Colford | 5d0dd06 | 2017-10-25 11:31:58 -0400 | [diff] [blame] | 331 | // It will panic if the procedure cannot be found. |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 332 | func (p *LazyProc) Addr() uintptr { |
| 333 | p.mustFind() |
| 334 | return p.proc.Addr() |
| 335 | } |
| 336 | |
Alex Brainman | b518c29 | 2016-07-12 17:09:20 +1000 | [diff] [blame] | 337 | //go:uintptrescapes |
| 338 | |
Alex Brainman | 176de74 | 2017-10-26 09:50:40 +1100 | [diff] [blame] | 339 | // Call executes procedure p with arguments a. It will panic, if more than 15 arguments |
Kieran Colford | 5d0dd06 | 2017-10-25 11:31:58 -0400 | [diff] [blame] | 340 | // are supplied. It will also panic if the procedure cannot be found. |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 341 | // |
| 342 | // The returned error is always non-nil, constructed from the result of GetLastError. |
| 343 | // Callers must inspect the primary return value to decide whether an error occurred |
| 344 | // (according to the semantics of the specific function being called) before consulting |
Rob Pike | 8442dd2 | 2014-08-11 15:58:26 -0700 | [diff] [blame] | 345 | // the error. The error will be guaranteed to contain windows.Errno. |
Rob Pike | 20acc5c | 2014-08-11 14:48:46 -0700 | [diff] [blame] | 346 | func (p *LazyProc) Call(a ...uintptr) (r1, r2 uintptr, lastErr error) { |
| 347 | p.mustFind() |
| 348 | return p.proc.Call(a...) |
| 349 | } |
Brad Fitzpatrick | 3dff6e1 | 2016-04-01 04:10:49 +0000 | [diff] [blame] | 350 | |
| 351 | var canDoSearchSystem32Once struct { |
| 352 | sync.Once |
| 353 | v bool |
| 354 | } |
| 355 | |
| 356 | func initCanDoSearchSystem32() { |
| 357 | // https://msdn.microsoft.com/en-us/library/ms684179(v=vs.85).aspx says: |
| 358 | // "Windows 7, Windows Server 2008 R2, Windows Vista, and Windows |
| 359 | // Server 2008: The LOAD_LIBRARY_SEARCH_* flags are available on |
| 360 | // systems that have KB2533623 installed. To determine whether the |
| 361 | // flags are available, use GetProcAddress to get the address of the |
| 362 | // AddDllDirectory, RemoveDllDirectory, or SetDefaultDllDirectories |
| 363 | // function. If GetProcAddress succeeds, the LOAD_LIBRARY_SEARCH_* |
| 364 | // flags can be used with LoadLibraryEx." |
| 365 | canDoSearchSystem32Once.v = (modkernel32.NewProc("AddDllDirectory").Find() == nil) |
| 366 | } |
| 367 | |
| 368 | func canDoSearchSystem32() bool { |
| 369 | canDoSearchSystem32Once.Do(initCanDoSearchSystem32) |
| 370 | return canDoSearchSystem32Once.v |
| 371 | } |
| 372 | |
| 373 | func isBaseName(name string) bool { |
| 374 | for _, c := range name { |
| 375 | if c == ':' || c == '/' || c == '\\' { |
| 376 | return false |
| 377 | } |
| 378 | } |
| 379 | return true |
| 380 | } |
| 381 | |
| 382 | // loadLibraryEx wraps the Windows LoadLibraryEx function. |
| 383 | // |
| 384 | // See https://msdn.microsoft.com/en-us/library/windows/desktop/ms684179(v=vs.85).aspx |
| 385 | // |
| 386 | // If name is not an absolute path, LoadLibraryEx searches for the DLL |
| 387 | // in a variety of automatic locations unless constrained by flags. |
| 388 | // See: https://msdn.microsoft.com/en-us/library/ff919712%28VS.85%29.aspx |
| 389 | func loadLibraryEx(name string, system bool) (*DLL, error) { |
| 390 | loadDLL := name |
| 391 | var flags uintptr |
| 392 | if system { |
| 393 | if canDoSearchSystem32() { |
Brad Fitzpatrick | 3dff6e1 | 2016-04-01 04:10:49 +0000 | [diff] [blame] | 394 | flags = LOAD_LIBRARY_SEARCH_SYSTEM32 |
| 395 | } else if isBaseName(name) { |
| 396 | // WindowsXP or unpatched Windows machine |
| 397 | // trying to load "foo.dll" out of the system |
| 398 | // folder, but LoadLibraryEx doesn't support |
| 399 | // that yet on their system, so emulate it. |
Jason A. Donenfeld | 10058d7 | 2019-03-06 18:49:41 +0100 | [diff] [blame] | 400 | systemdir, err := GetSystemDirectory() |
| 401 | if err != nil { |
| 402 | return nil, err |
Brad Fitzpatrick | 3dff6e1 | 2016-04-01 04:10:49 +0000 | [diff] [blame] | 403 | } |
Jason A. Donenfeld | 10058d7 | 2019-03-06 18:49:41 +0100 | [diff] [blame] | 404 | loadDLL = systemdir + "\\" + name |
Brad Fitzpatrick | 3dff6e1 | 2016-04-01 04:10:49 +0000 | [diff] [blame] | 405 | } |
| 406 | } |
| 407 | h, err := LoadLibraryEx(loadDLL, 0, flags) |
| 408 | if err != nil { |
| 409 | return nil, err |
| 410 | } |
| 411 | return &DLL{Name: name, Handle: h}, nil |
| 412 | } |
| 413 | |
| 414 | type errString string |
| 415 | |
| 416 | func (s errString) Error() string { return string(s) } |