loader.c 87.8 KB
Newer Older
1
/*
2 3
 * Loader functions
 *
4
 * Copyright 1995, 2003 Alexandre Julliard
5
 * Copyright 2002 Dmitry Timoshkov for CodeWeavers
6 7 8 9 10 11 12 13 14 15 16 17 18
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
19
 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20 21
 */

Alexandre Julliard's avatar
Alexandre Julliard committed
22 23 24
#include "config.h"
#include "wine/port.h"

25
#include <assert.h>
26
#include <stdarg.h>
27 28 29
#ifdef HAVE_SYS_MMAN_H
# include <sys/mman.h>
#endif
30

31 32 33
#define NONAMELESSUNION
#define NONAMELESSSTRUCT

34 35
#include "ntstatus.h"
#define WIN32_NO_STATUS
36
#include "windef.h"
37
#include "winnt.h"
38
#include "winternl.h"
39

40
#include "wine/exception.h"
41
#include "wine/library.h"
42
#include "wine/pthread.h"
43
#include "wine/unicode.h"
44
#include "wine/debug.h"
45 46
#include "wine/server.h"
#include "ntdll_misc.h"
47
#include "ddk/wdm.h"
48

49 50
WINE_DEFAULT_DEBUG_CHANNEL(module);
WINE_DECLARE_DEBUG_CHANNEL(relay);
51
WINE_DECLARE_DEBUG_CHANNEL(snoop);
52
WINE_DECLARE_DEBUG_CHANNEL(loaddll);
53
WINE_DECLARE_DEBUG_CHANNEL(imports);
54

55 56 57 58
/* we don't want to include winuser.h */
#define RT_MANIFEST                         ((ULONG_PTR)24)
#define ISOLATIONAWARE_MANIFEST_RESOURCE_ID ((ULONG_PTR)2)

59 60
extern struct wine_pthread_functions pthread_functions;

61 62
typedef DWORD (CALLBACK *DLLENTRYPROC)(HMODULE,DWORD,LPVOID);

63
static int process_detaching = 0;  /* set on process detach to avoid deadlocks with thread detach */
64
static int free_lib_count;   /* recursion depth of LdrUnloadDll calls */
65

66 67 68 69 70
static const char * const reason_names[] =
{
    "PROCESS_DETACH",
    "PROCESS_ATTACH",
    "THREAD_ATTACH",
71 72 73
    "THREAD_DETACH",
    NULL, NULL, NULL, NULL,
    "WINE_PREATTACH"
74 75
};

76 77 78
static const WCHAR dllW[] = {'.','d','l','l',0};

/* internal representation of 32bit modules. per process. */
79
typedef struct _wine_modref
80 81 82 83
{
    LDR_MODULE            ldr;
    int                   nDeps;
    struct _wine_modref **deps;
84
} WINE_MODREF;
85

86 87 88 89 90
/* info about the current builtin dll load */
/* used to keep track of things across the register_dll constructor call */
struct builtin_load_info
{
    const WCHAR *load_path;
91
    const WCHAR *filename;
92 93 94 95
    NTSTATUS     status;
    WINE_MODREF *wm;
};

96 97
static struct builtin_load_info default_load_info;
static struct builtin_load_info *builtin_load_info = &default_load_info;
98

99
static HANDLE main_exe_file;
100 101 102 103
static UINT tls_module_count;      /* number of modules with TLS directory */
static UINT tls_total_size;        /* total size of TLS storage */
static const IMAGE_TLS_DIRECTORY **tls_dirs;  /* array of TLS directories */

104
UNICODE_STRING windows_dir = { 0, 0, NULL };  /* windows directory */
105
UNICODE_STRING system_dir = { 0, 0, NULL };  /* system directory */
106

107 108
static RTL_CRITICAL_SECTION loader_section;
static RTL_CRITICAL_SECTION_DEBUG critsect_debug =
109 110 111
{
    0, 0, &loader_section,
    { &critsect_debug.ProcessLocksList, &critsect_debug.ProcessLocksList },
112
      0, 0, { (DWORD_PTR)(__FILE__ ": loader_section") }
113
};
114
static RTL_CRITICAL_SECTION loader_section = { &critsect_debug, -1, 0, 0, 0, 0 };
115

116
static WINE_MODREF *cached_modref;
117
static WINE_MODREF *current_modref;
118
static WINE_MODREF *last_failed_modref;
119

120
static NTSTATUS load_dll( LPCWSTR load_path, LPCWSTR libname, DWORD flags, WINE_MODREF** pwm );
121
static NTSTATUS process_attach( WINE_MODREF *wm, LPVOID lpReserved );
Eric Pouech's avatar
Eric Pouech committed
122
static FARPROC find_named_export( HMODULE module, const IMAGE_EXPORT_DIRECTORY *exports,
123
                                  DWORD exp_size, const char *name, int hint, LPCWSTR load_path );
124 125

/* convert PE image VirtualAddress to Real Address */
126
static inline void *get_rva( HMODULE module, DWORD va )
127 128 129
{
    return (void *)((char *)module + va);
}
130

131
/* check whether the file name contains a path */
132
static inline int contains_path( LPCWSTR name )
133 134 135 136 137
{
    return ((*name && (name[1] == ':')) || strchrW(name, '/') || strchrW(name, '\\'));
}

/* convert from straight ASCII to Unicode without depending on the current codepage */
138
static inline void ascii_to_unicode( WCHAR *dst, const char *src, size_t len )
139 140 141 142
{
    while (len--) *dst++ = (unsigned char)*src++;
}

143 144 145 146 147 148 149 150 151 152 153 154 155

/*************************************************************************
 *		call_dll_entry_point
 *
 * Some brain-damaged dlls (ir32_32.dll for instance) modify ebx in
 * their entry point, so we need a small asm wrapper.
 */
#ifdef __i386__
extern BOOL call_dll_entry_point( DLLENTRYPROC proc, void *module, UINT reason, void *reserved );
__ASM_GLOBAL_FUNC(call_dll_entry_point,
                  "pushl %ebp\n\t"
                  "movl %esp,%ebp\n\t"
                  "pushl %ebx\n\t"
156
                  "subl $8,%esp\n\t"
157 158 159 160 161 162 163 164
                  "pushl 20(%ebp)\n\t"
                  "pushl 16(%ebp)\n\t"
                  "pushl 12(%ebp)\n\t"
                  "movl 8(%ebp),%eax\n\t"
                  "call *%eax\n\t"
                  "leal -4(%ebp),%esp\n\t"
                  "popl %ebx\n\t"
                  "popl %ebp\n\t"
165
                  "ret" )
166 167 168 169 170 171 172 173 174
#else /* __i386__ */
static inline BOOL call_dll_entry_point( DLLENTRYPROC proc, void *module,
                                         UINT reason, void *reserved )
{
    return proc( module, reason, reserved );
}
#endif /* __i386__ */


175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193
#ifdef __i386__
/*************************************************************************
 *		stub_entry_point
 *
 * Entry point for stub functions.
 */
static void stub_entry_point( const char *dll, const char *name, ... )
{
    EXCEPTION_RECORD rec;

    rec.ExceptionCode           = EXCEPTION_WINE_STUB;
    rec.ExceptionFlags          = EH_NONCONTINUABLE;
    rec.ExceptionRecord         = NULL;
#ifdef __GNUC__
    rec.ExceptionAddress        = __builtin_return_address(0);
#else
    rec.ExceptionAddress        = *((void **)&dll - 1);
#endif
    rec.NumberParameters        = 2;
194 195
    rec.ExceptionInformation[0] = (ULONG_PTR)dll;
    rec.ExceptionInformation[1] = (ULONG_PTR)name;
196 197 198 199
    for (;;) RtlRaiseException( &rec );
}


200
#include "pshpack1.h"
201 202 203 204 205 206 207 208 209 210 211
struct stub
{
    BYTE        popl_eax;   /* popl %eax */
    BYTE        pushl1;     /* pushl $name */
    const char *name;
    BYTE        pushl2;     /* pushl $dll */
    const char *dll;
    BYTE        pushl_eax;  /* pushl %eax */
    BYTE        jmp;        /* jmp stub_entry_point */
    DWORD       entry;
};
212
#include "poppack.h"
213 214 215 216 217 218

/*************************************************************************
 *		allocate_stub
 *
 * Allocate a stub entry point.
 */
219
static ULONG_PTR allocate_stub( const char *dll, const char *name )
220 221 222 223 224 225
{
#define MAX_SIZE 65536
    static struct stub *stubs;
    static unsigned int nb_stubs;
    struct stub *stub;

226
    if (nb_stubs >= MAX_SIZE / sizeof(*stub)) return 0xdeadbeef;
227 228 229

    if (!stubs)
    {
230
        SIZE_T size = MAX_SIZE;
231
        if (NtAllocateVirtualMemory( NtCurrentProcess(), (void **)&stubs, 0, &size,
232
                                     MEM_COMMIT, PAGE_EXECUTE_WRITECOPY ) != STATUS_SUCCESS)
233
            return 0xdeadbeef;
234 235 236 237 238 239 240 241 242 243
    }
    stub = &stubs[nb_stubs++];
    stub->popl_eax  = 0x58;  /* popl %eax */
    stub->pushl1    = 0x68;  /* pushl $name */
    stub->name      = name;
    stub->pushl2    = 0x68;  /* pushl $dll */
    stub->dll       = dll;
    stub->pushl_eax = 0x50;  /* pushl %eax */
    stub->jmp       = 0xe9;  /* jmp stub_entry_point */
    stub->entry     = (BYTE *)stub_entry_point - (BYTE *)(&stub->entry + 1);
244
    return (ULONG_PTR)stub;
245 246 247
}

#else  /* __i386__ */
248
static inline ULONG_PTR allocate_stub( const char *dll, const char *name ) { return 0xdeadbeef; }
249 250 251
#endif  /* __i386__ */


252
/*************************************************************************
253 254 255 256
 *		get_modref
 *
 * Looks for the referenced HMODULE in the current process
 * The loader_section must be locked while calling this function.
257
 */
258
static WINE_MODREF *get_modref( HMODULE hmod )
259
{
260 261
    PLIST_ENTRY mark, entry;
    PLDR_MODULE mod;
262

263
    if (cached_modref && cached_modref->ldr.BaseAddress == hmod) return cached_modref;
264

265 266
    mark = &NtCurrentTeb()->Peb->LdrData->InMemoryOrderModuleList;
    for (entry = mark->Flink; entry != mark; entry = entry->Flink)
267
    {
268 269 270 271
        mod = CONTAINING_RECORD(entry, LDR_MODULE, InMemoryOrderModuleList);
        if (mod->BaseAddress == hmod)
            return cached_modref = CONTAINING_RECORD(mod, WINE_MODREF, ldr);
        if (mod->BaseAddress > (void*)hmod) break;
272
    }
273
    return NULL;
274 275 276
}


277
/**********************************************************************
278
 *	    find_basename_module
279
 *
280
 * Find a module from its base name.
281 282
 * The loader_section must be locked while calling this function
 */
283
static WINE_MODREF *find_basename_module( LPCWSTR name )
284 285 286
{
    PLIST_ENTRY mark, entry;

287 288
    if (cached_modref && !strcmpiW( name, cached_modref->ldr.BaseDllName.Buffer ))
        return cached_modref;
289

290 291
    mark = &NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList;
    for (entry = mark->Flink; entry != mark; entry = entry->Flink)
292
    {
293 294 295 296 297 298
        LDR_MODULE *mod = CONTAINING_RECORD(entry, LDR_MODULE, InLoadOrderModuleList);
        if (!strcmpiW( name, mod->BaseDllName.Buffer ))
        {
            cached_modref = CONTAINING_RECORD(mod, WINE_MODREF, ldr);
            return cached_modref;
        }
299
    }
300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315
    return NULL;
}


/**********************************************************************
 *	    find_fullname_module
 *
 * Find a module from its full path name.
 * The loader_section must be locked while calling this function
 */
static WINE_MODREF *find_fullname_module( LPCWSTR name )
{
    PLIST_ENTRY mark, entry;

    if (cached_modref && !strcmpiW( name, cached_modref->ldr.FullDllName.Buffer ))
        return cached_modref;
316 317 318 319

    mark = &NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList;
    for (entry = mark->Flink; entry != mark; entry = entry->Flink)
    {
320 321 322 323 324 325
        LDR_MODULE *mod = CONTAINING_RECORD(entry, LDR_MODULE, InLoadOrderModuleList);
        if (!strcmpiW( name, mod->FullDllName.Buffer ))
        {
            cached_modref = CONTAINING_RECORD(mod, WINE_MODREF, ldr);
            return cached_modref;
        }
326
    }
327
    return NULL;
328 329 330
}


331 332 333 334 335 336
/*************************************************************************
 *		find_forwarded_export
 *
 * Find the final function pointer for a forwarded function.
 * The loader_section must be locked while calling this function.
 */
337
static FARPROC find_forwarded_export( HMODULE module, const char *forward, LPCWSTR load_path )
338
{
Eric Pouech's avatar
Eric Pouech committed
339
    const IMAGE_EXPORT_DIRECTORY *exports;
340 341
    DWORD exp_size;
    WINE_MODREF *wm;
342
    WCHAR mod_name[32];
343
    const char *end = strrchr(forward, '.');
344 345 346
    FARPROC proc = NULL;

    if (!end) return NULL;
347
    if ((end - forward) * sizeof(WCHAR) >= sizeof(mod_name)) return NULL;
348
    ascii_to_unicode( mod_name, forward, end - forward );
349 350 351 352 353 354
    mod_name[end - forward] = 0;
    if (!strchrW( mod_name, '.' ))
    {
        if ((end - forward) * sizeof(WCHAR) >= sizeof(mod_name) - sizeof(dllW)) return NULL;
        memcpy( mod_name + (end - forward), dllW, sizeof(dllW) );
    }
355

356
    if (!(wm = find_basename_module( mod_name )))
357
    {
358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374
        TRACE( "delay loading %s for '%s'\n", debugstr_w(mod_name), forward );
        if (load_dll( load_path, mod_name, 0, &wm ) == STATUS_SUCCESS &&
            !(wm->ldr.Flags & LDR_DONT_RESOLVE_REFS))
        {
            if (process_attach( wm, NULL ) != STATUS_SUCCESS)
            {
                LdrUnloadDll( wm->ldr.BaseAddress );
                wm = NULL;
            }
        }

        if (!wm)
        {
            ERR( "module not found for forward '%s' used by %s\n",
                 forward, debugstr_w(get_modref(module)->ldr.FullDllName.Buffer) );
            return NULL;
        }
375 376 377
    }
    if ((exports = RtlImageDirectoryEntryToData( wm->ldr.BaseAddress, TRUE,
                                                 IMAGE_DIRECTORY_ENTRY_EXPORT, &exp_size )))
378
        proc = find_named_export( wm->ldr.BaseAddress, exports, exp_size, end + 1, -1, load_path );
379 380 381

    if (!proc)
    {
382 383 384 385
        ERR("function not found for forward '%s' used by %s."
            " If you are using builtin %s, try using the native one instead.\n",
            forward, debugstr_w(get_modref(module)->ldr.FullDllName.Buffer),
            debugstr_w(get_modref(module)->ldr.BaseDllName.Buffer) );
386 387 388 389 390 391 392 393 394 395 396 397
    }
    return proc;
}


/*************************************************************************
 *		find_ordinal_export
 *
 * Find an exported function by ordinal.
 * The exports base must have been subtracted from the ordinal already.
 * The loader_section must be locked while calling this function.
 */
Eric Pouech's avatar
Eric Pouech committed
398
static FARPROC find_ordinal_export( HMODULE module, const IMAGE_EXPORT_DIRECTORY *exports,
399
                                    DWORD exp_size, DWORD ordinal, LPCWSTR load_path )
400 401
{
    FARPROC proc;
Eric Pouech's avatar
Eric Pouech committed
402
    const DWORD *functions = get_rva( module, exports->AddressOfFunctions );
403 404 405

    if (ordinal >= exports->NumberOfFunctions)
    {
406
        TRACE("	ordinal %d out of range!\n", ordinal + exports->Base );
407 408 409 410 411 412 413
        return NULL;
    }
    if (!functions[ordinal]) return NULL;

    proc = get_rva( module, functions[ordinal] );

    /* if the address falls into the export dir, it's a forward */
Eric Pouech's avatar
Eric Pouech committed
414 415
    if (((const char *)proc >= (const char *)exports) && 
        ((const char *)proc < (const char *)exports + exp_size))
416
        return find_forwarded_export( module, (const char *)proc, load_path );
417

418
    if (TRACE_ON(snoop))
419
    {
420 421
        const WCHAR *user = current_modref ? current_modref->ldr.BaseDllName.Buffer : NULL;
        proc = SNOOP_GetProcAddress( module, exports, exp_size, proc, ordinal, user );
422
    }
423
    if (TRACE_ON(relay))
424
    {
425
        const WCHAR *user = current_modref ? current_modref->ldr.BaseDllName.Buffer : NULL;
426
        proc = RELAY_GetProcAddress( module, exports, exp_size, proc, ordinal, user );
427 428 429 430 431 432 433 434 435 436 437
    }
    return proc;
}


/*************************************************************************
 *		find_named_export
 *
 * Find an exported function by name.
 * The loader_section must be locked while calling this function.
 */
Eric Pouech's avatar
Eric Pouech committed
438
static FARPROC find_named_export( HMODULE module, const IMAGE_EXPORT_DIRECTORY *exports,
439
                                  DWORD exp_size, const char *name, int hint, LPCWSTR load_path )
440
{
Eric Pouech's avatar
Eric Pouech committed
441 442
    const WORD *ordinals = get_rva( module, exports->AddressOfNameOrdinals );
    const DWORD *names = get_rva( module, exports->AddressOfNames );
443 444 445 446 447 448 449
    int min = 0, max = exports->NumberOfNames - 1;

    /* first check the hint */
    if (hint >= 0 && hint <= max)
    {
        char *ename = get_rva( module, names[hint] );
        if (!strcmp( ename, name ))
450
            return find_ordinal_export( module, exports, exp_size, ordinals[hint], load_path );
451 452 453 454 455 456 457 458
    }

    /* then do a binary search */
    while (min <= max)
    {
        int res, pos = (min + max) / 2;
        char *ename = get_rva( module, names[pos] );
        if (!(res = strcmp( ename, name )))
459
            return find_ordinal_export( module, exports, exp_size, ordinals[pos], load_path );
460 461 462
        if (res > 0) max = pos - 1;
        else min = pos + 1;
    }
463
    return NULL;
464 465 466 467 468 469 470 471 472 473

}


/*************************************************************************
 *		import_dll
 *
 * Import the dll specified by the given import descriptor.
 * The loader_section must be locked while calling this function.
 */
Eric Pouech's avatar
Eric Pouech committed
474
static WINE_MODREF *import_dll( HMODULE module, const IMAGE_IMPORT_DESCRIPTOR *descr, LPCWSTR load_path )
475 476 477 478
{
    NTSTATUS status;
    WINE_MODREF *wmImp;
    HMODULE imp_mod;
Eric Pouech's avatar
Eric Pouech committed
479
    const IMAGE_EXPORT_DIRECTORY *exports;
480
    DWORD exp_size;
Eric Pouech's avatar
Eric Pouech committed
481 482
    const IMAGE_THUNK_DATA *import_list;
    IMAGE_THUNK_DATA *thunk_list;
483
    WCHAR buffer[32];
Eric Pouech's avatar
Eric Pouech committed
484
    const char *name = get_rva( module, descr->Name );
485
    DWORD len = strlen(name);
486
    PVOID protect_base;
487
    SIZE_T protect_size = 0;
488
    DWORD protect_old;
489

490 491 492 493 494 495
    thunk_list = get_rva( module, (DWORD)descr->FirstThunk );
    if (descr->u.OriginalFirstThunk)
        import_list = get_rva( module, (DWORD)descr->u.OriginalFirstThunk );
    else
        import_list = thunk_list;

496 497 498
    while (len && name[len-1] == ' ') len--;  /* remove trailing spaces */

    if (len * sizeof(WCHAR) < sizeof(buffer))
499 500
    {
        ascii_to_unicode( buffer, name, len );
501
        buffer[len] = 0;
502
        status = load_dll( load_path, buffer, 0, &wmImp );
503 504 505
    }
    else  /* need to allocate a larger buffer */
    {
506
        WCHAR *ptr = RtlAllocateHeap( GetProcessHeap(), 0, (len + 1) * sizeof(WCHAR) );
507 508
        if (!ptr) return NULL;
        ascii_to_unicode( ptr, name, len );
509
        ptr[len] = 0;
510
        status = load_dll( load_path, ptr, 0, &wmImp );
511 512
        RtlFreeHeap( GetProcessHeap(), 0, ptr );
    }
513 514 515

    if (status)
    {
516
        if (status == STATUS_DLL_NOT_FOUND)
517
            ERR("Library %s (which is needed by %s) not found\n",
518
                name, debugstr_w(current_modref->ldr.FullDllName.Buffer));
519
        else
520
            ERR("Loading library %s (which is needed by %s) failed (error %x).\n",
521
                name, debugstr_w(current_modref->ldr.FullDllName.Buffer), status);
522
        return NULL;
523 524
    }

525 526 527 528 529
    /* unprotect the import address table since it can be located in
     * readonly section */
    while (import_list[protect_size].u1.Ordinal) protect_size++;
    protect_base = thunk_list;
    protect_size *= sizeof(*thunk_list);
530
    NtProtectVirtualMemory( NtCurrentProcess(), &protect_base,
531 532
                            &protect_size, PAGE_WRITECOPY, &protect_old );

533 534 535
    imp_mod = wmImp->ldr.BaseAddress;
    exports = RtlImageDirectoryEntryToData( imp_mod, TRUE, IMAGE_DIRECTORY_ENTRY_EXPORT, &exp_size );

536 537 538 539 540 541 542
    if (!exports)
    {
        /* set all imported function to deadbeef */
        while (import_list->u1.Ordinal)
        {
            if (IMAGE_SNAP_BY_ORDINAL(import_list->u1.Ordinal))
            {
543 544
                int ordinal = IMAGE_ORDINAL(import_list->u1.Ordinal);
                WARN("No implementation for %s.%d", name, ordinal );
545
                thunk_list->u1.Function = allocate_stub( name, IntToPtr(ordinal) );
546 547 548 549
            }
            else
            {
                IMAGE_IMPORT_BY_NAME *pe_name = get_rva( module, (DWORD)import_list->u1.AddressOfData );
550
                WARN("No implementation for %s.%s", name, pe_name->Name );
Mike McCormack's avatar
Mike McCormack committed
551
                thunk_list->u1.Function = allocate_stub( name, (const char*)pe_name->Name );
552
            }
553
            WARN(" imported from %s, allocating stub %p\n",
554 555
                 debugstr_w(current_modref->ldr.FullDllName.Buffer),
                 (void *)thunk_list->u1.Function );
556 557 558
            import_list++;
            thunk_list++;
        }
559
        goto done;
560
    }
561 562 563 564 565 566 567

    while (import_list->u1.Ordinal)
    {
        if (IMAGE_SNAP_BY_ORDINAL(import_list->u1.Ordinal))
        {
            int ordinal = IMAGE_ORDINAL(import_list->u1.Ordinal);

568
            thunk_list->u1.Function = (ULONG_PTR)find_ordinal_export( imp_mod, exports, exp_size,
569
                                                                      ordinal - exports->Base, load_path );
570 571
            if (!thunk_list->u1.Function)
            {
572
                thunk_list->u1.Function = allocate_stub( name, IntToPtr(ordinal) );
573
                WARN("No implementation for %s.%d imported from %s, setting to %p\n",
574 575
                     name, ordinal, debugstr_w(current_modref->ldr.FullDllName.Buffer),
                     (void *)thunk_list->u1.Function );
576
            }
577
            TRACE_(imports)("--- Ordinal %s.%d = %p\n", name, ordinal, (void *)thunk_list->u1.Function );
578 579 580 581 582
        }
        else  /* import by name */
        {
            IMAGE_IMPORT_BY_NAME *pe_name;
            pe_name = get_rva( module, (DWORD)import_list->u1.AddressOfData );
583
            thunk_list->u1.Function = (ULONG_PTR)find_named_export( imp_mod, exports, exp_size,
584 585
                                                                    (const char*)pe_name->Name,
                                                                    pe_name->Hint, load_path );
586 587
            if (!thunk_list->u1.Function)
            {
Mike McCormack's avatar
Mike McCormack committed
588
                thunk_list->u1.Function = allocate_stub( name, (const char*)pe_name->Name );
589
                WARN("No implementation for %s.%s imported from %s, setting to %p\n",
590 591
                     name, pe_name->Name, debugstr_w(current_modref->ldr.FullDllName.Buffer),
                     (void *)thunk_list->u1.Function );
592
            }
593 594
            TRACE_(imports)("--- %s %s.%d = %p\n",
                            pe_name->Name, name, pe_name->Hint, (void *)thunk_list->u1.Function);
595 596 597 598
        }
        import_list++;
        thunk_list++;
    }
599 600 601

done:
    /* restore old protection of the import address table */
602
    NtProtectVirtualMemory( NtCurrentProcess(), &protect_base, &protect_size, protect_old, NULL );
603 604 605 606
    return wmImp;
}


607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632
/***********************************************************************
 *           create_module_activation_context
 */
static NTSTATUS create_module_activation_context( LDR_MODULE *module )
{
    NTSTATUS status;
    LDR_RESOURCE_INFO info;
    const IMAGE_RESOURCE_DATA_ENTRY *entry;

    info.Type = RT_MANIFEST;
    info.Name = ISOLATIONAWARE_MANIFEST_RESOURCE_ID;
    info.Language = 0;
    if (!(status = LdrFindResource_U( module->BaseAddress, &info, 3, &entry )))
    {
        ACTCTXW ctx;
        ctx.cbSize   = sizeof(ctx);
        ctx.lpSource = NULL;
        ctx.dwFlags  = ACTCTX_FLAG_RESOURCE_NAME_VALID | ACTCTX_FLAG_HMODULE_VALID;
        ctx.hModule  = module->BaseAddress;
        ctx.lpResourceName = (LPCWSTR)ISOLATIONAWARE_MANIFEST_RESOURCE_ID;
        status = RtlCreateActivationContext( &module->ActivationContext, &ctx );
    }
    return status;
}


633
/****************************************************************
634
 *       fixup_imports
635 636 637 638
 *
 * Fixup all imports of a given module.
 * The loader_section must be locked while calling this function.
 */
639
static NTSTATUS fixup_imports( WINE_MODREF *wm, LPCWSTR load_path )
640 641
{
    int i, nb_imports;
Eric Pouech's avatar
Eric Pouech committed
642
    const IMAGE_IMPORT_DESCRIPTOR *imports;
643
    WINE_MODREF *prev;
644
    DWORD size;
645
    NTSTATUS status;
646
    ULONG_PTR cookie;
647

648 649 650
    if (!(wm->ldr.Flags & LDR_DONT_RESOLVE_REFS)) return STATUS_SUCCESS;  /* already done */
    wm->ldr.Flags &= ~LDR_DONT_RESOLVE_REFS;

651 652
    if (!(imports = RtlImageDirectoryEntryToData( wm->ldr.BaseAddress, TRUE,
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT, &size )))
653
        return STATUS_SUCCESS;
654

655 656 657
    nb_imports = 0;
    while (imports[nb_imports].Name && imports[nb_imports].FirstThunk) nb_imports++;

658
    if (!nb_imports) return STATUS_SUCCESS;  /* no imports */
659

660 661 662
    if (!create_module_activation_context( &wm->ldr ))
        RtlActivateActivationContext( 0, wm->ldr.ActivationContext, &cookie );

663 664
    /* Allocate module dependency list */
    wm->nDeps = nb_imports;
665
    wm->deps  = RtlAllocateHeap( GetProcessHeap(), 0, nb_imports*sizeof(WINE_MODREF *) );
666 667 668 669

    /* load the imported modules. They are automatically
     * added to the modref list of the process.
     */
670 671
    prev = current_modref;
    current_modref = wm;
672
    status = STATUS_SUCCESS;
673 674
    for (i = 0; i < nb_imports; i++)
    {
675 676
        if (!(wm->deps[i] = import_dll( wm->ldr.BaseAddress, &imports[i], load_path )))
            status = STATUS_DLL_NOT_FOUND;
677
    }
678
    current_modref = prev;
679
    if (wm->ldr.ActivationContext) RtlDeactivateActivationContext( 0, cookie );
680
    return status;
681
}
682

683

684
/*************************************************************************
685
 *		alloc_module
686 687
 *
 * Allocate a WINE_MODREF structure and add it to the process list
688
 * The loader_section must be locked while calling this function.
689
 */
690
static WINE_MODREF *alloc_module( HMODULE hModule, LPCWSTR filename )
691 692
{
    WINE_MODREF *wm;
Eric Pouech's avatar
Eric Pouech committed
693 694
    const WCHAR *p;
    const IMAGE_NT_HEADERS *nt = RtlImageNtHeader(hModule);
695 696
    PLIST_ENTRY entry, mark;

697
    if (!(wm = RtlAllocateHeap( GetProcessHeap(), 0, sizeof(*wm) ))) return NULL;
698

699 700 701 702
    wm->nDeps    = 0;
    wm->deps     = NULL;

    wm->ldr.BaseAddress   = hModule;
703
    wm->ldr.EntryPoint    = NULL;
704
    wm->ldr.SizeOfImage   = nt->OptionalHeader.SizeOfImage;
705
    wm->ldr.Flags         = LDR_DONT_RESOLVE_REFS;
706
    wm->ldr.LoadCount     = 1;
707 708 709 710
    wm->ldr.TlsIndex      = -1;
    wm->ldr.SectionHandle = NULL;
    wm->ldr.CheckSum      = 0;
    wm->ldr.TimeDateStamp = 0;
711
    wm->ldr.ActivationContext = 0;
712 713 714 715 716 717

    RtlCreateUnicodeString( &wm->ldr.FullDllName, filename );
    if ((p = strrchrW( wm->ldr.FullDllName.Buffer, '\\' ))) p++;
    else p = wm->ldr.FullDllName.Buffer;
    RtlInitUnicodeString( &wm->ldr.BaseDllName, p );

718 719
    if (nt->OptionalHeader.Subsystem != IMAGE_SUBSYSTEM_NATIVE &&
        (nt->FileHeader.Characteristics & IMAGE_FILE_DLL))
720
    {
721 722 723
        wm->ldr.Flags |= LDR_IMAGE_IS_DLL;
        if (nt->OptionalHeader.AddressOfEntryPoint)
            wm->ldr.EntryPoint = (char *)hModule + nt->OptionalHeader.AddressOfEntryPoint;
724 725
    }

726 727
    InsertTailList(&NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList,
                   &wm->ldr.InLoadOrderModuleList);
728

729 730 731 732 733 734
    /* insert module in MemoryList, sorted in increasing base addresses */
    mark = &NtCurrentTeb()->Peb->LdrData->InMemoryOrderModuleList;
    for (entry = mark->Flink; entry != mark; entry = entry->Flink)
    {
        if (CONTAINING_RECORD(entry, LDR_MODULE, InMemoryOrderModuleList)->BaseAddress > wm->ldr.BaseAddress)
            break;
735
    }
736 737 738 739 740 741 742 743
    entry->Blink->Flink = &wm->ldr.InMemoryOrderModuleList;
    wm->ldr.InMemoryOrderModuleList.Blink = entry->Blink;
    wm->ldr.InMemoryOrderModuleList.Flink = entry;
    entry->Blink = &wm->ldr.InMemoryOrderModuleList;

    /* wait until init is called for inserting into this list */
    wm->ldr.InInitializationOrderModuleList.Flink = NULL;
    wm->ldr.InInitializationOrderModuleList.Blink = NULL;
744 745 746 747 748 749

    if (!(nt->OptionalHeader.DllCharacteristics & IMAGE_DLLCHARACTERISTICS_NX_COMPAT))
    {
        WARN( "disabling no-exec because of %s\n", debugstr_w(wm->ldr.BaseDllName.Buffer) );
        VIRTUAL_SetForceExec( TRUE );
    }
750 751 752 753
    return wm;
}


754 755 756 757 758 759 760
/*************************************************************************
 *              alloc_process_tls
 *
 * Allocate the process-wide structure for module TLS storage.
 */
static NTSTATUS alloc_process_tls(void)
{
761 762
    PLIST_ENTRY mark, entry;
    PLDR_MODULE mod;
Eric Pouech's avatar
Eric Pouech committed
763
    const IMAGE_TLS_DIRECTORY *dir;
764 765
    ULONG size, i;

766 767
    mark = &NtCurrentTeb()->Peb->LdrData->InMemoryOrderModuleList;
    for (entry = mark->Flink; entry != mark; entry = entry->Flink)
768
    {
769 770
        mod = CONTAINING_RECORD(entry, LDR_MODULE, InMemoryOrderModuleList);
        if (!(dir = RtlImageDirectoryEntryToData( mod->BaseAddress, TRUE,
771 772 773 774 775 776 777 778 779 780 781
                                                  IMAGE_DIRECTORY_ENTRY_TLS, &size )))
            continue;
        size = (dir->EndAddressOfRawData - dir->StartAddressOfRawData) + dir->SizeOfZeroFill;
        if (!size) continue;
        tls_total_size += size;
        tls_module_count++;
    }
    if (!tls_module_count) return STATUS_SUCCESS;

    TRACE( "count %u size %u\n", tls_module_count, tls_total_size );

782
    tls_dirs = RtlAllocateHeap( GetProcessHeap(), 0, tls_module_count * sizeof(*tls_dirs) );
783 784
    if (!tls_dirs) return STATUS_NO_MEMORY;

785
    for (i = 0, entry = mark->Flink; entry != mark; entry = entry->Flink)
786
    {
787 788
        mod = CONTAINING_RECORD(entry, LDR_MODULE, InMemoryOrderModuleList);
        if (!(dir = RtlImageDirectoryEntryToData( mod->BaseAddress, TRUE,
789 790 791
                                                  IMAGE_DIRECTORY_ENTRY_TLS, &size )))
            continue;
        tls_dirs[i] = dir;
792
        *(DWORD *)dir->AddressOfIndex = i;
793 794
        mod->TlsIndex = i;
        mod->LoadCount = -1;  /* can't unload it */
795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813
        i++;
    }
    return STATUS_SUCCESS;
}


/*************************************************************************
 *              alloc_thread_tls
 *
 * Allocate the per-thread structure for module TLS storage.
 */
static NTSTATUS alloc_thread_tls(void)
{
    void **pointers;
    char *data;
    UINT i;

    if (!tls_module_count) return STATUS_SUCCESS;

814
    if (!(pointers = RtlAllocateHeap( GetProcessHeap(), 0,
815 816 817
                                      tls_module_count * sizeof(*pointers) )))
        return STATUS_NO_MEMORY;

818
    if (!(data = RtlAllocateHeap( GetProcessHeap(), 0, tls_total_size )))
819
    {
820
        RtlFreeHeap( GetProcessHeap(), 0, pointers );
821 822 823 824 825 826 827 828
        return STATUS_NO_MEMORY;
    }

    for (i = 0; i < tls_module_count; i++)
    {
        const IMAGE_TLS_DIRECTORY *dir = tls_dirs[i];
        ULONG size = dir->EndAddressOfRawData - dir->StartAddressOfRawData;

829
        TRACE( "thread %04x idx %d: %d/%d bytes from %p to %p\n",
830 831 832 833 834 835 836 837 838
               GetCurrentThreadId(), i, size, dir->SizeOfZeroFill,
               (void *)dir->StartAddressOfRawData, data );

        pointers[i] = data;
        memcpy( data, (void *)dir->StartAddressOfRawData, size );
        data += size;
        memset( data, 0, dir->SizeOfZeroFill );
        data += dir->SizeOfZeroFill;
    }
839
    NtCurrentTeb()->ThreadLocalStoragePointer = pointers;
840 841 842 843
    return STATUS_SUCCESS;
}


844 845 846 847 848 849 850 851 852 853 854 855
/*************************************************************************
 *              call_tls_callbacks
 */
static void call_tls_callbacks( HMODULE module, UINT reason )
{
    const IMAGE_TLS_DIRECTORY *dir;
    const PIMAGE_TLS_CALLBACK *callback;
    ULONG dirsize;

    dir = RtlImageDirectoryEntryToData( module, TRUE, IMAGE_DIRECTORY_ENTRY_TLS, &dirsize );
    if (!dir || !dir->AddressOfCallBacks) return;

856
    for (callback = (const PIMAGE_TLS_CALLBACK *)dir->AddressOfCallBacks; *callback; callback++)
857 858
    {
        if (TRACE_ON(relay))
859
            DPRINTF("%04x:Call TLS callback (proc=%p,module=%p,reason=%s,reserved=0)\n",
860
                    GetCurrentThreadId(), *callback, module, reason_names[reason] );
861 862 863 864
        __TRY
        {
            (*callback)( module, reason, NULL );
        }
865
        __EXCEPT_ALL
866 867 868 869 870 871 872
        {
            if (TRACE_ON(relay))
                DPRINTF("%04x:exception in TLS callback (proc=%p,module=%p,reason=%s,reserved=0)\n",
                        GetCurrentThreadId(), callback, module, reason_names[reason] );
            return;
        }
        __ENDTRY
873
        if (TRACE_ON(relay))
874
            DPRINTF("%04x:Ret  TLS callback (proc=%p,module=%p,reason=%s,reserved=0)\n",
875 876 877 878 879
                    GetCurrentThreadId(), *callback, module, reason_names[reason] );
    }
}


880 881 882
/*************************************************************************
 *              MODULE_InitDLL
 */
883
static NTSTATUS MODULE_InitDLL( WINE_MODREF *wm, UINT reason, LPVOID lpReserved )
884
{
885
    WCHAR mod_name[32];
886
    NTSTATUS status = STATUS_SUCCESS;
887 888
    DLLENTRYPROC entry = wm->ldr.EntryPoint;
    void *module = wm->ldr.BaseAddress;
889
    BOOL retv = TRUE;
890 891 892

    /* Skip calls for modules loaded with special load flags */

893
    if (wm->ldr.Flags & LDR_DONT_RESOLVE_REFS) return STATUS_SUCCESS;
894
    if (wm->ldr.TlsIndex != -1) call_tls_callbacks( wm->ldr.BaseAddress, reason );
895
    if (!entry) return STATUS_SUCCESS;
896 897

    if (TRACE_ON(relay))
898
    {
899
        size_t len = min( wm->ldr.BaseDllName.Length, sizeof(mod_name)-sizeof(WCHAR) );
900 901
        memcpy( mod_name, wm->ldr.BaseDllName.Buffer, len );
        mod_name[len / sizeof(WCHAR)] = 0;
902
        DPRINTF("%04x:Call PE DLL (proc=%p,module=%p %s,reason=%s,res=%p)\n",
903 904
                GetCurrentThreadId(), entry, module, debugstr_w(mod_name),
                reason_names[reason], lpReserved );
905
    }
906 907
    else TRACE("(%p %s,%s,%p) - CALL\n", module, debugstr_w(wm->ldr.BaseDllName.Buffer),
               reason_names[reason], lpReserved );
908

909 910 911 912 913 914
    __TRY
    {
        retv = call_dll_entry_point( entry, module, reason, lpReserved );
        if (!retv)
            status = STATUS_DLL_INIT_FAILED;
    }
915
    __EXCEPT_ALL
916 917 918 919 920 921 922
    {
        if (TRACE_ON(relay))
            DPRINTF("%04x:exception in PE entry point (proc=%p,module=%p,reason=%s,res=%p)\n",
                    GetCurrentThreadId(), entry, module, reason_names[reason], lpReserved );
        status = GetExceptionCode();
    }
    __ENDTRY
923 924

    /* The state of the module list may have changed due to the call
925
       to the dll. We cannot assume that this module has not been
926
       deleted.  */
927
    if (TRACE_ON(relay))
928
        DPRINTF("%04x:Ret  PE DLL (proc=%p,module=%p %s,reason=%s,res=%p) retval=%x\n",
929 930
                GetCurrentThreadId(), entry, module, debugstr_w(mod_name),
                reason_names[reason], lpReserved, retv );
931
    else TRACE("(%p,%s,%p) - RETURN %d\n", module, reason_names[reason], lpReserved, retv );
932

933
    return status;
934 935 936 937
}


/*************************************************************************
938
 *		process_attach
939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964
 *
 * Send the process attach notification to all DLLs the given module
 * depends on (recursively). This is somewhat complicated due to the fact that
 *
 * - we have to respect the module dependencies, i.e. modules implicitly
 *   referenced by another module have to be initialized before the module
 *   itself can be initialized
 *
 * - the initialization routine of a DLL can itself call LoadLibrary,
 *   thereby introducing a whole new set of dependencies (even involving
 *   the 'old' modules) at any time during the whole process
 *
 * (Note that this routine can be recursively entered not only directly
 *  from itself, but also via LoadLibrary from one of the called initialization
 *  routines.)
 *
 * Furthermore, we need to rearrange the main WINE_MODREF list to allow
 * the process *detach* notifications to be sent in the correct order.
 * This must not only take into account module dependencies, but also
 * 'hidden' dependencies created by modules calling LoadLibrary in their
 * attach notification routine.
 *
 * The strategy is rather simple: we move a WINE_MODREF to the head of the
 * list after the attach notification has returned.  This implies that the
 * detach notifications are called in the reverse of the sequence the attach
 * notifications *returned*.
965 966
 *
 * The loader_section must be locked while calling this function.
967
 */
968
static NTSTATUS process_attach( WINE_MODREF *wm, LPVOID lpReserved )
969
{
970
    NTSTATUS status = STATUS_SUCCESS;
971
    ULONG_PTR cookie;
972 973
    int i;

974 975
    if (process_detaching) return status;

976
    /* prevent infinite recursion in case of cyclical dependencies */
977 978
    if (    ( wm->ldr.Flags & LDR_LOAD_IN_PROGRESS )
         || ( wm->ldr.Flags & LDR_PROCESS_ATTACHED ) )
979
        return status;
980

981
    TRACE("(%s,%p) - START\n", debugstr_w(wm->ldr.BaseDllName.Buffer), lpReserved );
982 983

    /* Tag current MODREF to prevent recursive loop */
984
    wm->ldr.Flags |= LDR_LOAD_IN_PROGRESS;
985
    if (lpReserved) wm->ldr.LoadCount = -1;  /* pin it if imported by the main exe */
986
    if (wm->ldr.ActivationContext) RtlActivateActivationContext( 0, wm->ldr.ActivationContext, &cookie );
987 988

    /* Recursively attach all DLLs this one depends on */
989 990 991
    for ( i = 0; i < wm->nDeps; i++ )
    {
        if (!wm->deps[i]) continue;
992
        if ((status = process_attach( wm->deps[i], lpReserved )) != STATUS_SUCCESS) break;
993
    }
994 995

    /* Call DLL entry point */
996
    if (status == STATUS_SUCCESS)
997
    {
998 999
        WINE_MODREF *prev = current_modref;
        current_modref = wm;
1000 1001
        status = MODULE_InitDLL( wm, DLL_PROCESS_ATTACH, lpReserved );
        if (status == STATUS_SUCCESS)
1002 1003
            wm->ldr.Flags |= LDR_PROCESS_ATTACHED;
        else
1004 1005 1006 1007 1008
        {
            /* point to the name so LdrInitializeThunk can print it */
            last_failed_modref = wm;
            WARN("Initialization of %s failed\n", debugstr_w(wm->ldr.BaseDllName.Buffer));
        }
1009
        current_modref = prev;
1010 1011
    }

1012 1013 1014
    if (!wm->ldr.InInitializationOrderModuleList.Flink)
        InsertTailList(&NtCurrentTeb()->Peb->LdrData->InInitializationOrderModuleList,
                       &wm->ldr.InInitializationOrderModuleList);
1015

1016
    if (wm->ldr.ActivationContext) RtlDeactivateActivationContext( 0, cookie );
1017
    /* Remove recursion flag */
1018
    wm->ldr.Flags &= ~LDR_LOAD_IN_PROGRESS;
1019

1020
    TRACE("(%s,%p) - END\n", debugstr_w(wm->ldr.BaseDllName.Buffer), lpReserved );
1021
    return status;
1022 1023
}

1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052

/**********************************************************************
 *	    attach_implicitly_loaded_dlls
 *
 * Attach to the (builtin) dlls that have been implicitly loaded because
 * of a dependency at the Unix level, but not imported at the Win32 level.
 */
static void attach_implicitly_loaded_dlls( LPVOID reserved )
{
    for (;;)
    {
        PLIST_ENTRY mark, entry;

        mark = &NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList;
        for (entry = mark->Flink; entry != mark; entry = entry->Flink)
        {
            LDR_MODULE *mod = CONTAINING_RECORD(entry, LDR_MODULE, InLoadOrderModuleList);

            if (mod->Flags & (LDR_LOAD_IN_PROGRESS | LDR_PROCESS_ATTACHED)) continue;
            TRACE( "found implicitly loaded %s, attaching to it\n",
                   debugstr_w(mod->BaseDllName.Buffer));
            process_attach( CONTAINING_RECORD(mod, WINE_MODREF, ldr), reserved );
            break;  /* restart the search from the start */
        }
        if (entry == mark) break;  /* nothing found */
    }
}


1053
/*************************************************************************
1054
 *		process_detach
1055 1056
 *
 * Send DLL process detach notifications.  See the comment about calling
1057
 * sequence at process_attach.  Unless the bForceDetach flag
1058 1059
 * is set, only DLLs with zero refcount are notified.
 */
1060
static void process_detach( BOOL bForceDetach, LPVOID lpReserved )
1061
{
1062 1063
    PLIST_ENTRY mark, entry;
    PLDR_MODULE mod;
1064 1065 1066

    RtlEnterCriticalSection( &loader_section );
    if (bForceDetach) process_detaching = 1;
1067
    mark = &NtCurrentTeb()->Peb->LdrData->InInitializationOrderModuleList;
1068 1069
    do
    {
1070
        for (entry = mark->Blink; entry != mark; entry = entry->Blink)
1071
        {
1072 1073
            mod = CONTAINING_RECORD(entry, LDR_MODULE, 
                                    InInitializationOrderModuleList);
1074
            /* Check whether to detach this DLL */
1075
            if ( !(mod->Flags & LDR_PROCESS_ATTACHED) )
1076
                continue;
1077
            if ( mod->LoadCount && !bForceDetach )
1078 1079 1080
                continue;

            /* Call detach notification */
1081 1082 1083
            mod->Flags &= ~LDR_PROCESS_ATTACHED;
            MODULE_InitDLL( CONTAINING_RECORD(mod, WINE_MODREF, ldr), 
                            DLL_PROCESS_DETACH, lpReserved );
1084 1085 1086 1087 1088

            /* Restart at head of WINE_MODREF list, as entries might have
               been added and/or removed while performing the call ... */
            break;
        }
1089
    } while (entry != mark);
1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100

    RtlLeaveCriticalSection( &loader_section );
}

/*************************************************************************
 *		MODULE_DllThreadAttach
 *
 * Send DLL thread attach notifications. These are sent in the
 * reverse sequence of process detach notification.
 *
 */
1101
NTSTATUS MODULE_DllThreadAttach( LPVOID lpReserved )
1102
{
1103 1104 1105
    PLIST_ENTRY mark, entry;
    PLDR_MODULE mod;
    NTSTATUS    status;
1106 1107

    /* don't do any attach calls if process is exiting */
1108
    if (process_detaching) return STATUS_SUCCESS;
1109 1110 1111 1112
    /* FIXME: there is still a race here */

    RtlEnterCriticalSection( &loader_section );

1113
    if ((status = alloc_thread_tls()) != STATUS_SUCCESS) goto done;
1114

1115 1116
    mark = &NtCurrentTeb()->Peb->LdrData->InInitializationOrderModuleList;
    for (entry = mark->Flink; entry != mark; entry = entry->Flink)
1117
    {
1118 1119 1120
        mod = CONTAINING_RECORD(entry, LDR_MODULE, 
                                InInitializationOrderModuleList);
        if ( !(mod->Flags & LDR_PROCESS_ATTACHED) )
1121
            continue;
1122
        if ( mod->Flags & LDR_NO_DLL_CALLS )
1123 1124
            continue;

1125 1126
        MODULE_InitDLL( CONTAINING_RECORD(mod, WINE_MODREF, ldr),
                        DLL_THREAD_ATTACH, lpReserved );
1127 1128
    }

1129
done:
1130
    RtlLeaveCriticalSection( &loader_section );
1131
    return status;
1132 1133
}

1134 1135 1136 1137 1138
/******************************************************************
 *		LdrDisableThreadCalloutsForDll (NTDLL.@)
 *
 */
NTSTATUS WINAPI LdrDisableThreadCalloutsForDll(HMODULE hModule)
1139
{
1140 1141 1142 1143 1144
    WINE_MODREF *wm;
    NTSTATUS    ret = STATUS_SUCCESS;

    RtlEnterCriticalSection( &loader_section );

1145
    wm = get_modref( hModule );
1146
    if (!wm || wm->ldr.TlsIndex != -1)
1147
        ret = STATUS_DLL_NOT_FOUND;
1148
    else
1149
        wm->ldr.Flags |= LDR_NO_DLL_CALLS;
1150 1151 1152 1153

    RtlLeaveCriticalSection( &loader_section );

    return ret;
1154
}
1155

1156 1157 1158 1159 1160
/******************************************************************
 *              LdrFindEntryForAddress (NTDLL.@)
 *
 * The loader_section must be locked while calling this function
 */
1161
NTSTATUS WINAPI LdrFindEntryForAddress(const void* addr, PLDR_MODULE* pmod)
1162
{
1163 1164
    PLIST_ENTRY mark, entry;
    PLDR_MODULE mod;
1165

1166 1167
    mark = &NtCurrentTeb()->Peb->LdrData->InMemoryOrderModuleList;
    for (entry = mark->Flink; entry != mark; entry = entry->Flink)
1168
    {
1169 1170
        mod = CONTAINING_RECORD(entry, LDR_MODULE, InMemoryOrderModuleList);
        if ((const void *)mod->BaseAddress <= addr &&
Eric Pouech's avatar
Eric Pouech committed
1171
            (const char *)addr < (char*)mod->BaseAddress + mod->SizeOfImage)
1172
        {
1173
            *pmod = mod;
1174 1175
            return STATUS_SUCCESS;
        }
1176
        if ((const void *)mod->BaseAddress > addr) break;
1177 1178 1179 1180
    }
    return STATUS_NO_MORE_ENTRIES;
}

1181 1182 1183 1184 1185 1186 1187 1188 1189
/******************************************************************
 *		LdrLockLoaderLock  (NTDLL.@)
 *
 * Note: flags are not implemented.
 * Flag 0x01 is used to raise exceptions on errors.
 * Flag 0x02 is used to avoid waiting on the section (does RtlTryEnterCriticalSection instead).
 */
NTSTATUS WINAPI LdrLockLoaderLock( ULONG flags, ULONG *result, ULONG *magic )
{
1190
    if (flags) FIXME( "flags %x not supported\n", flags );
1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213

    if (result) *result = 1;
    if (!magic) return STATUS_INVALID_PARAMETER_3;
    RtlEnterCriticalSection( &loader_section );
    *magic = GetCurrentThreadId();
    return STATUS_SUCCESS;
}


/******************************************************************
 *		LdrUnlockLoaderUnlock  (NTDLL.@)
 */
NTSTATUS WINAPI LdrUnlockLoaderLock( ULONG flags, ULONG magic )
{
    if (magic)
    {
        if (magic != GetCurrentThreadId()) return STATUS_INVALID_PARAMETER_2;
        RtlLeaveCriticalSection( &loader_section );
    }
    return STATUS_SUCCESS;
}


1214 1215
/******************************************************************
 *		LdrGetProcedureAddress  (NTDLL.@)
1216
 */
1217 1218
NTSTATUS WINAPI LdrGetProcedureAddress(HMODULE module, const ANSI_STRING *name,
                                       ULONG ord, PVOID *address)
1219
{
1220 1221 1222
    IMAGE_EXPORT_DIRECTORY *exports;
    DWORD exp_size;
    NTSTATUS ret = STATUS_PROCEDURE_NOT_FOUND;
1223

1224
    RtlEnterCriticalSection( &loader_section );
1225

1226 1227 1228 1229
    /* check if the module itself is invalid to return the proper error */
    if (!get_modref( module )) ret = STATUS_DLL_NOT_FOUND;
    else if ((exports = RtlImageDirectoryEntryToData( module, TRUE,
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT, &exp_size )))
1230
    {
1231 1232 1233
        LPCWSTR load_path = NtCurrentTeb()->Peb->ProcessParameters->DllPath.Buffer;
        void *proc = name ? find_named_export( module, exports, exp_size, name->Buffer, -1, load_path )
                          : find_ordinal_export( module, exports, exp_size, ord - exports->Base, load_path );
1234 1235 1236 1237 1238 1239
        if (proc)
        {
            *address = proc;
            ret = STATUS_SUCCESS;
        }
    }
1240

1241 1242
    RtlLeaveCriticalSection( &loader_section );
    return ret;
1243
}
1244 1245


1246 1247 1248 1249 1250
/***********************************************************************
 *           is_fake_dll
 *
 * Check if a loaded native dll is a Wine fake dll.
 */
1251
static BOOL is_fake_dll( HANDLE handle )
1252 1253
{
    static const char fakedll_signature[] = "Wine placeholder DLL";
1254 1255 1256 1257
    char buffer[sizeof(IMAGE_DOS_HEADER) + sizeof(fakedll_signature)];
    const IMAGE_DOS_HEADER *dos = (const IMAGE_DOS_HEADER *)buffer;
    IO_STATUS_BLOCK io;
    LARGE_INTEGER offset;
1258

1259 1260 1261 1262
    offset.QuadPart = 0;
    if (NtReadFile( handle, 0, NULL, 0, &io, buffer, sizeof(buffer), &offset, NULL )) return FALSE;
    if (io.Information < sizeof(buffer)) return FALSE;
    if (dos->e_magic != IMAGE_DOS_SIGNATURE) return FALSE;
1263 1264 1265 1266 1267 1268
    if (dos->e_lfanew >= sizeof(*dos) + sizeof(fakedll_signature) &&
        !memcmp( dos + 1, fakedll_signature, sizeof(fakedll_signature) )) return TRUE;
    return FALSE;
}


1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310
/***********************************************************************
 *           get_builtin_fullname
 *
 * Build the full pathname for a builtin dll.
 */
static WCHAR *get_builtin_fullname( const WCHAR *path, const char *filename )
{
    static const WCHAR soW[] = {'.','s','o',0};
    WCHAR *p, *fullname;
    size_t i, len = strlen(filename);

    /* check if path can correspond to the dll we have */
    if (path && (p = strrchrW( path, '\\' )))
    {
        p++;
        for (i = 0; i < len; i++)
            if (tolowerW(p[i]) != tolowerW( (WCHAR)filename[i]) ) break;
        if (i == len && (!p[len] || !strcmpiW( p + len, soW )))
        {
            /* the filename matches, use path as the full path */
            len += p - path;
            if ((fullname = RtlAllocateHeap( GetProcessHeap(), 0, (len + 1) * sizeof(WCHAR) )))
            {
                memcpy( fullname, path, len * sizeof(WCHAR) );
                fullname[len] = 0;
            }
            return fullname;
        }
    }

    if ((fullname = RtlAllocateHeap( GetProcessHeap(), 0,
                                     system_dir.MaximumLength + (len + 1) * sizeof(WCHAR) )))
    {
        memcpy( fullname, system_dir.Buffer, system_dir.Length );
        p = fullname + system_dir.Length / sizeof(WCHAR);
        if (p > fullname && p[-1] != '\\') *p++ = '\\';
        ascii_to_unicode( p, filename, len + 1 );
    }
    return fullname;
}


1311 1312 1313 1314 1315 1316 1317
/***********************************************************************
 *           load_builtin_callback
 *
 * Load a library in memory; callback function for wine_dll_register
 */
static void load_builtin_callback( void *module, const char *filename )
{
1318
    static const WCHAR emptyW[1];
1319
    void *addr;
1320 1321
    IMAGE_NT_HEADERS *nt;
    WINE_MODREF *wm;
1322
    WCHAR *fullname;
1323
    const WCHAR *load_path;
1324
    SIZE_T size;
1325 1326 1327 1328 1329 1330 1331 1332 1333

    if (!module)
    {
        ERR("could not map image for %s\n", filename ? filename : "main exe" );
        return;
    }
    if (!(nt = RtlImageNtHeader( module )))
    {
        ERR( "bad module for %s\n", filename ? filename : "main exe" );
1334
        builtin_load_info->status = STATUS_INVALID_IMAGE_FORMAT;
1335 1336
        return;
    }
1337
    addr = module;
1338 1339
    size = nt->OptionalHeader.SizeOfImage;
    NtAllocateVirtualMemory( NtCurrentProcess(), &addr, 0, &size,
1340
                             MEM_SYSTEM | MEM_IMAGE, PAGE_EXECUTE_WRITECOPY );
1341 1342
    /* create the MODREF */

1343
    if (!(fullname = get_builtin_fullname( builtin_load_info->filename, filename )))
1344 1345
    {
        ERR( "can't load %s\n", filename );
1346
        builtin_load_info->status = STATUS_NO_MEMORY;
1347 1348 1349
        return;
    }

1350 1351
    wm = alloc_module( module, fullname );
    RtlFreeHeap( GetProcessHeap(), 0, fullname );
1352 1353 1354
    if (!wm)
    {
        ERR( "can't load %s\n", filename );
1355
        builtin_load_info->status = STATUS_NO_MEMORY;
1356 1357 1358 1359
        return;
    }
    wm->ldr.Flags |= LDR_WINE_INTERNAL;

1360 1361
    if (!(nt->FileHeader.Characteristics & IMAGE_FILE_DLL) &&
        !NtCurrentTeb()->Peb->ImageBaseAddress)  /* if we already have an executable, ignore this one */
1362
    {
1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380
        NtCurrentTeb()->Peb->ImageBaseAddress = module;
    }
    else
    {
        /* fixup imports */

        load_path = builtin_load_info->load_path;
        if (!load_path) load_path = NtCurrentTeb()->Peb->ProcessParameters->DllPath.Buffer;
        if (!load_path) load_path = emptyW;
        if (fixup_imports( wm, load_path ) != STATUS_SUCCESS)
        {
            /* the module has only be inserted in the load & memory order lists */
            RemoveEntryList(&wm->ldr.InLoadOrderModuleList);
            RemoveEntryList(&wm->ldr.InMemoryOrderModuleList);
            /* FIXME: free the modref */
            builtin_load_info->status = STATUS_DLL_NOT_FOUND;
            return;
        }
1381
    }
1382

1383
    builtin_load_info->wm = wm;
1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394
    TRACE( "loaded %s %p %p\n", filename, wm, module );

    /* send the DLL load event */

    SERVER_START_REQ( load_dll )
    {
        req->handle     = 0;
        req->base       = module;
        req->size       = nt->OptionalHeader.SizeOfImage;
        req->dbg_offset = nt->FileHeader.PointerToSymbolTable;
        req->dbg_size   = nt->FileHeader.NumberOfSymbols;
1395 1396
        req->name       = &wm->ldr.FullDllName.Buffer;
        wine_server_add_data( req, wm->ldr.FullDllName.Buffer, wm->ldr.FullDllName.Length );
1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408
        wine_server_call( req );
    }
    SERVER_END_REQ;

    /* setup relay debugging entry points */
    if (TRACE_ON(relay)) RELAY_SetupDLL( module );
}


/******************************************************************************
 *	load_native_dll  (internal)
 */
1409 1410
static NTSTATUS load_native_dll( LPCWSTR load_path, LPCWSTR name, HANDLE file,
                                 DWORD flags, WINE_MODREF** pwm )
1411 1412
{
    void *module;
1413
    HANDLE mapping;
1414 1415 1416
    OBJECT_ATTRIBUTES attr;
    LARGE_INTEGER size;
    IMAGE_NT_HEADERS *nt;
1417
    SIZE_T len = 0;
1418 1419 1420
    WINE_MODREF *wm;
    NTSTATUS status;

1421
    TRACE("Trying native dll %s\n", debugstr_w(name));
1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432

    attr.Length                   = sizeof(attr);
    attr.RootDirectory            = 0;
    attr.ObjectName               = NULL;
    attr.Attributes               = 0;
    attr.SecurityDescriptor       = NULL;
    attr.SecurityQualityOfService = NULL;
    size.QuadPart = 0;

    status = NtCreateSection( &mapping, STANDARD_RIGHTS_REQUIRED | SECTION_QUERY | SECTION_MAP_READ,
                              &attr, &size, 0, SEC_IMAGE, file );
1433
    if (status != STATUS_SUCCESS) return status;
1434 1435

    module = NULL;
1436
    status = NtMapViewOfSection( mapping, NtCurrentProcess(),
1437 1438
                                 &module, 0, 0, &size, &len, ViewShare, 0, PAGE_READONLY );
    NtClose( mapping );
1439
    if (status != STATUS_SUCCESS) return status;
1440 1441 1442

    /* create the MODREF */

1443
    if (!(wm = alloc_module( module, name ))) return STATUS_NO_MEMORY;
1444 1445 1446 1447 1448

    /* fixup imports */

    if (!(flags & DONT_RESOLVE_DLL_REFERENCES))
    {
1449
        if ((status = fixup_imports( wm, load_path )) != STATUS_SUCCESS)
1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461
        {
            /* the module has only be inserted in the load & memory order lists */
            RemoveEntryList(&wm->ldr.InLoadOrderModuleList);
            RemoveEntryList(&wm->ldr.InMemoryOrderModuleList);

            /* FIXME: there are several more dangling references
             * left. Including dlls loaded by this dll before the
             * failed one. Unrolling is rather difficult with the
             * current structure and we can leave them lying
             * around with no problems, so we don't care.
             * As these might reference our wm, we don't free it.
             */
1462
            return status;
1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476
        }
    }

    /* send DLL load event */

    nt = RtlImageNtHeader( module );

    SERVER_START_REQ( load_dll )
    {
        req->handle     = file;
        req->base       = module;
        req->size       = nt->OptionalHeader.SizeOfImage;
        req->dbg_offset = nt->FileHeader.PointerToSymbolTable;
        req->dbg_size   = nt->FileHeader.NumberOfSymbols;
1477 1478
        req->name       = &wm->ldr.FullDllName.Buffer;
        wine_server_add_data( req, wm->ldr.FullDllName.Buffer, wm->ldr.FullDllName.Length );
1479 1480 1481 1482
        wine_server_call( req );
    }
    SERVER_END_REQ;

1483
    if ((wm->ldr.Flags & LDR_IMAGE_IS_DLL) && TRACE_ON(snoop)) SNOOP_SetupDLL( module );
1484

1485
    TRACE_(loaddll)( "Loaded %s at %p: native\n", debugstr_w(wm->ldr.FullDllName.Buffer), module );
1486

1487
    wm->ldr.LoadCount = 1;
1488
    *pwm = wm;
1489
    return STATUS_SUCCESS;
1490 1491 1492
}


1493 1494 1495
/***********************************************************************
 *           load_builtin_dll
 */
1496 1497
static NTSTATUS load_builtin_dll( LPCWSTR load_path, LPCWSTR path, HANDLE file,
                                  DWORD flags, WINE_MODREF** pwm )
1498
{
1499 1500 1501
    char error[256], dllname[MAX_PATH];
    const WCHAR *name, *p;
    DWORD len, i;
1502
    void *handle = NULL;
1503
    struct builtin_load_info info, *prev_info;
1504 1505 1506

    /* Fix the name in case we have a full path and extension */
    name = path;
1507 1508
    if ((p = strrchrW( name, '\\' ))) name = p + 1;
    if ((p = strrchrW( name, '/' ))) name = p + 1;
1509

1510
    /* load_library will modify info.status. Note also that load_library can be
1511
     * called several times, if the .so file we're loading has dependencies.
1512
     * info.status will gather all the errors we may get while loading all these
1513 1514
     * libraries
     */
1515
    info.load_path = load_path;
1516
    info.filename  = NULL;
1517 1518
    info.status    = STATUS_SUCCESS;
    info.wm        = NULL;
1519 1520 1521 1522 1523 1524

    if (file)  /* we have a real file, try to load it */
    {
        UNICODE_STRING nt_name;
        ANSI_STRING unix_name;

1525 1526
        TRACE("Trying built-in %s\n", debugstr_w(path));

1527 1528 1529
        if (!RtlDosPathNameToNtPathName_U( path, &nt_name, NULL, NULL ))
            return STATUS_DLL_NOT_FOUND;

1530
        if (wine_nt_to_unix_file_name( &nt_name, &unix_name, FILE_OPEN, FALSE ))
1531
        {
1532 1533
            RtlFreeUnicodeString( &nt_name );
            return STATUS_DLL_NOT_FOUND;
1534
        }
1535 1536 1537 1538 1539
        prev_info = builtin_load_info;
        info.filename = nt_name.Buffer + 4;  /* skip \??\ */
        builtin_load_info = &info;
        handle = wine_dlopen( unix_name.Buffer, RTLD_NOW, error, sizeof(error) );
        builtin_load_info = prev_info;
1540
        RtlFreeUnicodeString( &nt_name );
1541 1542 1543 1544 1545 1546
        RtlFreeHeap( GetProcessHeap(), 0, unix_name.Buffer );
        if (!handle)
        {
            WARN( "failed to load .so lib for builtin %s: %s\n", debugstr_w(path), error );
            return STATUS_INVALID_IMAGE_FORMAT;
        }
1547 1548 1549
    }
    else
    {
1550 1551
        int file_exists;

1552 1553
        TRACE("Trying built-in %s\n", debugstr_w(name));

1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567
        /* we don't want to depend on the current codepage here */
        len = strlenW( name ) + 1;
        if (len >= sizeof(dllname)) return STATUS_NAME_TOO_LONG;
        for (i = 0; i < len; i++)
        {
            if (name[i] > 127) return STATUS_DLL_NOT_FOUND;
            dllname[i] = (char)name[i];
            if (dllname[i] >= 'A' && dllname[i] <= 'Z') dllname[i] += 'a' - 'A';
        }

        prev_info = builtin_load_info;
        builtin_load_info = &info;
        handle = wine_dll_load( dllname, error, sizeof(error), &file_exists );
        builtin_load_info = prev_info;
1568
        if (!handle)
1569
        {
1570 1571 1572 1573 1574 1575 1576 1577 1578
            if (!file_exists)
            {
                /* The file does not exist -> WARN() */
                WARN("cannot open .so lib for builtin %s: %s\n", debugstr_w(name), error);
                return STATUS_DLL_NOT_FOUND;
            }
            /* ERR() for all other errors (missing functions, ...) */
            ERR("failed to load .so lib for builtin %s: %s\n", debugstr_w(name), error );
            return STATUS_PROCEDURE_NOT_FOUND;
1579 1580
        }
    }
1581

1582 1583 1584 1585 1586
    if (info.status != STATUS_SUCCESS)
    {
        wine_dll_unload( handle );
        return info.status;
    }
1587

1588 1589
    if (!info.wm)
    {
1590
        PLIST_ENTRY mark, entry;
1591

1592 1593
        /* The constructor wasn't called, this means the .so is already
         * loaded under a different name. Try to find the wm for it. */
1594

1595 1596
        mark = &NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList;
        for (entry = mark->Flink; entry != mark; entry = entry->Flink)
1597
        {
1598 1599 1600 1601
            LDR_MODULE *mod = CONTAINING_RECORD(entry, LDR_MODULE, InLoadOrderModuleList);
            if (mod->Flags & LDR_WINE_INTERNAL && mod->SectionHandle == handle)
            {
                info.wm = CONTAINING_RECORD(mod, WINE_MODREF, ldr);
1602 1603
                TRACE( "Found %s at %p for builtin %s\n",
                       debugstr_w(info.wm->ldr.FullDllName.Buffer), info.wm->ldr.BaseAddress, debugstr_w(path) );
1604 1605
                break;
            }
1606
        }
1607
        wine_dll_unload( handle );  /* release the libdl refcount */
1608
        if (!info.wm) return STATUS_INVALID_IMAGE_FORMAT;
1609
        if (info.wm->ldr.LoadCount != -1) info.wm->ldr.LoadCount++;
1610 1611 1612
    }
    else
    {
1613
        TRACE_(loaddll)( "Loaded %s at %p: builtin\n", debugstr_w(info.wm->ldr.FullDllName.Buffer), info.wm->ldr.BaseAddress );
1614
        info.wm->ldr.LoadCount = 1;
1615
        info.wm->ldr.SectionHandle = handle;
1616
    }
1617

1618
    *pwm = info.wm;
1619 1620 1621 1622
    return STATUS_SUCCESS;
}


1623 1624 1625 1626 1627 1628 1629 1630
/***********************************************************************
 *	find_actctx_dll
 *
 * Find the full path (if any) of the dll from the activation context.
 */
static NTSTATUS find_actctx_dll( LPCWSTR libname, LPWSTR *fullname )
{
    static const WCHAR winsxsW[] = {'\\','w','i','n','s','x','s','\\'};
1631
    static const WCHAR dotManifestW[] = {'.','m','a','n','i','f','e','s','t',0};
1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663

    ACTIVATION_CONTEXT_ASSEMBLY_DETAILED_INFORMATION *info;
    ACTCTX_SECTION_KEYED_DATA data;
    UNICODE_STRING nameW;
    NTSTATUS status;
    SIZE_T needed, size = 1024;
    WCHAR *p;

    RtlInitUnicodeString( &nameW, libname );
    data.cbSize = sizeof(data);
    status = RtlFindActivationContextSectionString( FIND_ACTCTX_SECTION_KEY_RETURN_HACTCTX, NULL,
                                                    ACTIVATION_CONTEXT_SECTION_DLL_REDIRECTION,
                                                    &nameW, &data );
    if (status != STATUS_SUCCESS) return status;

    for (;;)
    {
        if (!(info = RtlAllocateHeap( GetProcessHeap(), 0, size )))
        {
            status = STATUS_NO_MEMORY;
            goto done;
        }
        status = RtlQueryInformationActivationContext( 0, data.hActCtx, &data.ulAssemblyRosterIndex,
                                                       AssemblyDetailedInformationInActivationContext,
                                                       info, size, &needed );
        if (status == STATUS_SUCCESS) break;
        if (status != STATUS_BUFFER_TOO_SMALL) goto done;
        RtlFreeHeap( GetProcessHeap(), 0, info );
        size = needed;
        /* restart with larger buffer */
    }

1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686
    if ((p = strrchrW( info->lpAssemblyManifestPath, '\\' )))
    {
        DWORD dirlen = info->ulAssemblyDirectoryNameLength / sizeof(WCHAR);

        p++;
        if (strncmpiW( p, info->lpAssemblyDirectoryName, dirlen ) || strcmpiW( p + dirlen, dotManifestW ))
        {
            /* manifest name does not match directory name, so it's not a global
             * windows/winsxs manifest; use the manifest directory name instead */
            dirlen = p - info->lpAssemblyManifestPath;
            needed = (dirlen + 1) * sizeof(WCHAR) + nameW.Length;
            if (!(*fullname = p = RtlAllocateHeap( GetProcessHeap(), 0, needed )))
            {
                status = STATUS_NO_MEMORY;
                goto done;
            }
            memcpy( p, info->lpAssemblyManifestPath, dirlen * sizeof(WCHAR) );
            p += dirlen;
            strcpyW( p, libname );
            goto done;
        }
    }

1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709
    needed = (windows_dir.Length + sizeof(winsxsW) + info->ulAssemblyDirectoryNameLength +
              nameW.Length + 2*sizeof(WCHAR));

    if (!(*fullname = p = RtlAllocateHeap( GetProcessHeap(), 0, needed )))
    {
        status = STATUS_NO_MEMORY;
        goto done;
    }
    memcpy( p, windows_dir.Buffer, windows_dir.Length );
    p += windows_dir.Length / sizeof(WCHAR);
    memcpy( p, winsxsW, sizeof(winsxsW) );
    p += sizeof(winsxsW) / sizeof(WCHAR);
    memcpy( p, info->lpAssemblyDirectoryName, info->ulAssemblyDirectoryNameLength );
    p += info->ulAssemblyDirectoryNameLength / sizeof(WCHAR);
    *p++ = '\\';
    strcpyW( p, libname );
done:
    RtlFreeHeap( GetProcessHeap(), 0, info );
    RtlReleaseActivationContext( data.hActCtx );
    return status;
}


1710 1711 1712 1713 1714 1715 1716 1717
/***********************************************************************
 *	find_dll_file
 *
 * Find the file (or already loaded module) for a given dll name.
 */
static NTSTATUS find_dll_file( const WCHAR *load_path, const WCHAR *libname,
                               WCHAR *filename, ULONG *size, WINE_MODREF **pwm, HANDLE *handle )
{
1718 1719 1720
    OBJECT_ATTRIBUTES attr;
    IO_STATUS_BLOCK io;
    UNICODE_STRING nt_name;
1721
    WCHAR *file_part, *ext, *dllname;
1722 1723
    ULONG len;

1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736
    /* first append .dll if needed */

    dllname = NULL;
    if (!(ext = strrchrW( libname, '.')) || strchrW( ext, '/' ) || strchrW( ext, '\\'))
    {
        if (!(dllname = RtlAllocateHeap( GetProcessHeap(), 0,
                                         (strlenW(libname) * sizeof(WCHAR)) + sizeof(dllW) )))
            return STATUS_NO_MEMORY;
        strcpyW( dllname, libname );
        strcatW( dllname, dllW );
        libname = dllname;
    }

1737
    nt_name.Buffer = NULL;
1738 1739 1740

    if (!contains_path( libname ))
    {
1741
        NTSTATUS status;
1742
        WCHAR *fullname = NULL;
1743

1744
        if ((*pwm = find_basename_module( libname )) != NULL) goto found;
1745 1746 1747 1748

        status = find_actctx_dll( libname, &fullname );
        if (status == STATUS_SUCCESS)
        {
1749
            TRACE ("found %s for %s\n", debugstr_w(fullname), debugstr_w(libname) );
1750 1751 1752 1753 1754 1755 1756 1757
            RtlFreeHeap( GetProcessHeap(), 0, dllname );
            libname = dllname = fullname;
        }
        else if (status != STATUS_SXS_KEY_NOT_FOUND)
        {
            RtlFreeHeap( GetProcessHeap(), 0, dllname );
            return status;
        }
1758 1759
    }

1760 1761 1762
    if (RtlDetermineDosPathNameType_U( libname ) == RELATIVE_PATH)
    {
        /* we need to search for it */
1763
        len = RtlDosSearchPath_U( load_path, libname, NULL, *size, filename, &file_part );
1764 1765
        if (len)
        {
1766
            if (len >= *size) goto overflow;
1767
            if ((*pwm = find_fullname_module( filename )) || !handle) goto found;
1768

1769
            if (!RtlDosPathNameToNtPathName_U( filename, &nt_name, NULL, NULL ))
1770 1771
            {
                RtlFreeHeap( GetProcessHeap(), 0, dllname );
1772
                return STATUS_NO_MEMORY;
1773
            }
1774 1775 1776 1777 1778 1779
            attr.Length = sizeof(attr);
            attr.RootDirectory = 0;
            attr.Attributes = OBJ_CASE_INSENSITIVE;
            attr.ObjectName = &nt_name;
            attr.SecurityDescriptor = NULL;
            attr.SecurityQualityOfService = NULL;
1780
            if (NtOpenFile( handle, GENERIC_READ, &attr, &io, FILE_SHARE_READ|FILE_SHARE_DELETE, 0 )) *handle = 0;
1781
            goto found;
1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792
        }

        /* not found */

        if (!contains_path( libname ))
        {
            /* if libname doesn't contain a path at all, we simply return the name as is,
             * to be loaded as builtin */
            len = strlenW(libname) * sizeof(WCHAR);
            if (len >= *size) goto overflow;
            strcpyW( filename, libname );
1793
            goto found;
1794 1795 1796 1797 1798
        }
    }

    /* absolute path name, or relative path name but not found above */

1799
    if (!RtlDosPathNameToNtPathName_U( libname, &nt_name, &file_part, NULL ))
1800 1801
    {
        RtlFreeHeap( GetProcessHeap(), 0, dllname );
1802
        return STATUS_NO_MEMORY;
1803
    }
1804
    len = nt_name.Length - 4*sizeof(WCHAR);  /* for \??\ prefix */
1805
    if (len >= *size) goto overflow;
1806
    memcpy( filename, nt_name.Buffer + 4, len + sizeof(WCHAR) );
1807
    if (!(*pwm = find_fullname_module( filename )) && handle)
1808 1809 1810 1811 1812 1813 1814
    {
        attr.Length = sizeof(attr);
        attr.RootDirectory = 0;
        attr.Attributes = OBJ_CASE_INSENSITIVE;
        attr.ObjectName = &nt_name;
        attr.SecurityDescriptor = NULL;
        attr.SecurityQualityOfService = NULL;
1815
        if (NtOpenFile( handle, GENERIC_READ, &attr, &io, FILE_SHARE_READ|FILE_SHARE_DELETE, 0 )) *handle = 0;
1816
    }
1817
found:
1818
    RtlFreeUnicodeString( &nt_name );
1819
    RtlFreeHeap( GetProcessHeap(), 0, dllname );
1820 1821 1822
    return STATUS_SUCCESS;

overflow:
1823
    RtlFreeUnicodeString( &nt_name );
1824
    RtlFreeHeap( GetProcessHeap(), 0, dllname );
1825 1826 1827 1828 1829
    *size = len + sizeof(WCHAR);
    return STATUS_BUFFER_TOO_SMALL;
}


1830
/***********************************************************************
1831
 *	load_dll  (internal)
1832 1833
 *
 * Load a PE style module according to the load order.
1834
 * The loader_section must be locked while calling this function.
1835
 */
1836
static NTSTATUS load_dll( LPCWSTR load_path, LPCWSTR libname, DWORD flags, WINE_MODREF** pwm )
1837
{
1838
    enum loadorder loadorder;
1839 1840 1841
    WCHAR buffer[32];
    WCHAR *filename;
    ULONG size;
1842
    WINE_MODREF *main_exe;
1843
    HANDLE handle = 0;
1844
    NTSTATUS nts;
1845

1846
    TRACE( "looking for %s in %s\n", debugstr_w(libname), debugstr_w(load_path) );
1847

1848
    *pwm = NULL;
1849 1850 1851
    filename = buffer;
    size = sizeof(buffer);
    for (;;)
1852
    {
1853 1854 1855 1856 1857 1858
        nts = find_dll_file( load_path, libname, filename, &size, pwm, &handle );
        if (nts == STATUS_SUCCESS) break;
        if (filename != buffer) RtlFreeHeap( GetProcessHeap(), 0, filename );
        if (nts != STATUS_BUFFER_TOO_SMALL) return nts;
        /* grow the buffer and retry */
        if (!(filename = RtlAllocateHeap( GetProcessHeap(), 0, size ))) return STATUS_NO_MEMORY;
1859
    }
1860 1861

    if (*pwm)  /* found already loaded module */
1862
    {
1863 1864
        if ((*pwm)->ldr.LoadCount != -1) (*pwm)->ldr.LoadCount++;

1865 1866
        if (!(flags & DONT_RESOLVE_DLL_REFERENCES)) fixup_imports( *pwm, load_path );

1867
        TRACE("Found %s for %s at %p, count=%d\n",
1868 1869 1870 1871
              debugstr_w((*pwm)->ldr.FullDllName.Buffer), debugstr_w(libname),
              (*pwm)->ldr.BaseAddress, (*pwm)->ldr.LoadCount);
        if (filename != buffer) RtlFreeHeap( GetProcessHeap(), 0, filename );
        return STATUS_SUCCESS;
1872 1873
    }

1874
    main_exe = get_modref( NtCurrentTeb()->Peb->ImageBaseAddress );
1875
    loadorder = get_load_order( main_exe ? main_exe->ldr.BaseDllName.Buffer : NULL, filename );
1876

1877 1878 1879 1880 1881 1882 1883
    if (handle && is_fake_dll( handle ))
    {
        TRACE( "%s is a fake Wine dll\n", debugstr_w(filename) );
        NtClose( handle );
        handle = 0;
    }

1884
    switch(loadorder)
1885
    {
1886 1887 1888 1889 1890 1891 1892 1893 1894 1895
    case LO_INVALID:
        nts = STATUS_NO_MEMORY;
        break;
    case LO_DISABLED:
        nts = STATUS_DLL_NOT_FOUND;
        break;
    case LO_NATIVE:
    case LO_NATIVE_BUILTIN:
        if (!handle) nts = STATUS_DLL_NOT_FOUND;
        else
1896
        {
1897
            nts = load_native_dll( load_path, filename, handle, flags, pwm );
1898 1899 1900
            if (nts == STATUS_INVALID_FILE_FOR_SECTION)
                /* not in PE format, maybe it's a builtin */
                nts = load_builtin_dll( load_path, filename, handle, flags, pwm );
1901
        }
1902
        if (nts == STATUS_DLL_NOT_FOUND && loadorder == LO_NATIVE_BUILTIN)
1903 1904
            nts = load_builtin_dll( load_path, filename, 0, flags, pwm );
        break;
1905 1906 1907
    case LO_BUILTIN:
    case LO_BUILTIN_NATIVE:
    case LO_DEFAULT:  /* default is builtin,native */
1908 1909 1910
        nts = load_builtin_dll( load_path, filename, handle, flags, pwm );
        if (!handle) break;  /* nothing else we can try */
        /* file is not a builtin library, try without using the specified file */
1911 1912 1913
        if (nts != STATUS_SUCCESS)
            nts = load_builtin_dll( load_path, filename, 0, flags, pwm );
        if (nts == STATUS_SUCCESS && loadorder == LO_DEFAULT &&
1914
            (MODULE_InitDLL( *pwm, DLL_WINE_PREATTACH, NULL ) != STATUS_SUCCESS))
1915 1916 1917 1918 1919 1920
        {
            /* stub-only dll, try native */
            TRACE( "%s pre-attach returned FALSE, preferring native\n", debugstr_w(filename) );
            LdrUnloadDll( (*pwm)->ldr.BaseAddress );
            nts = STATUS_DLL_NOT_FOUND;
        }
1921
        if (nts == STATUS_DLL_NOT_FOUND && loadorder != LO_BUILTIN)
1922 1923 1924
            nts = load_native_dll( load_path, filename, handle, flags, pwm );
        break;
    }
1925

1926 1927 1928 1929 1930 1931 1932 1933 1934
    if (nts == STATUS_SUCCESS)
    {
        /* Initialize DLL just loaded */
        TRACE("Loaded module %s (%s) at %p\n", debugstr_w(filename),
              ((*pwm)->ldr.Flags & LDR_WINE_INTERNAL) ? "builtin" : "native",
              (*pwm)->ldr.BaseAddress);
        if (handle) NtClose( handle );
        if (filename != buffer) RtlFreeHeap( GetProcessHeap(), 0, filename );
        return nts;
1935 1936
    }

1937
    WARN("Failed to load module %s; status=%x\n", debugstr_w(libname), nts);
1938
    if (handle) NtClose( handle );
1939
    if (filename != buffer) RtlFreeHeap( GetProcessHeap(), 0, filename );
1940
    return nts;
1941 1942 1943 1944 1945
}

/******************************************************************
 *		LdrLoadDll (NTDLL.@)
 */
1946 1947
NTSTATUS WINAPI LdrLoadDll(LPCWSTR path_name, DWORD flags,
                           const UNICODE_STRING *libname, HMODULE* hModule)
1948 1949
{
    WINE_MODREF *wm;
1950
    NTSTATUS nts;
1951 1952 1953

    RtlEnterCriticalSection( &loader_section );

1954 1955
    if (!path_name) path_name = NtCurrentTeb()->Peb->ProcessParameters->DllPath.Buffer;
    nts = load_dll( path_name, libname->Buffer, flags, &wm );
1956 1957

    if (nts == STATUS_SUCCESS && !(wm->ldr.Flags & LDR_DONT_RESOLVE_REFS))
1958
    {
1959
        nts = process_attach( wm, NULL );
1960
        if (nts != STATUS_SUCCESS)
1961
        {
1962
            LdrUnloadDll(wm->ldr.BaseAddress);
1963 1964 1965
            wm = NULL;
        }
    }
1966
    *hModule = (wm) ? wm->ldr.BaseAddress : NULL;
1967

1968
    RtlLeaveCriticalSection( &loader_section );
1969 1970 1971
    return nts;
}

1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995

/******************************************************************
 *		LdrGetDllHandle (NTDLL.@)
 */
NTSTATUS WINAPI LdrGetDllHandle( LPCWSTR load_path, ULONG flags, const UNICODE_STRING *name, HMODULE *base )
{
    NTSTATUS status;
    WCHAR buffer[128];
    WCHAR *filename;
    ULONG size;
    WINE_MODREF *wm;

    RtlEnterCriticalSection( &loader_section );

    if (!load_path) load_path = NtCurrentTeb()->Peb->ProcessParameters->DllPath.Buffer;

    filename = buffer;
    size = sizeof(buffer);
    for (;;)
    {
        status = find_dll_file( load_path, name->Buffer, filename, &size, &wm, NULL );
        if (filename != buffer) RtlFreeHeap( GetProcessHeap(), 0, filename );
        if (status != STATUS_BUFFER_TOO_SMALL) break;
        /* grow the buffer and retry */
1996 1997 1998 1999 2000
        if (!(filename = RtlAllocateHeap( GetProcessHeap(), 0, size )))
        {
            status = STATUS_NO_MEMORY;
            break;
        }
2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014
    }

    if (status == STATUS_SUCCESS)
    {
        if (wm) *base = wm->ldr.BaseAddress;
        else status = STATUS_DLL_NOT_FOUND;
    }

    RtlLeaveCriticalSection( &loader_section );
    TRACE( "%s -> %p (load path %s)\n", debugstr_us(name), status ? NULL : *base, debugstr_w(load_path) );
    return status;
}


2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038
/******************************************************************
 *		LdrAddRefDll (NTDLL.@)
 */
NTSTATUS WINAPI LdrAddRefDll( ULONG flags, HMODULE module )
{
    NTSTATUS ret = STATUS_SUCCESS;
    WINE_MODREF *wm;

    if (flags) FIXME( "%p flags %x not implemented\n", module, flags );

    RtlEnterCriticalSection( &loader_section );

    if ((wm = get_modref( module )))
    {
        if (wm->ldr.LoadCount != -1) wm->ldr.LoadCount++;
        TRACE( "(%s) ldr.LoadCount: %d\n", debugstr_w(wm->ldr.BaseDllName.Buffer), wm->ldr.LoadCount );
    }
    else ret = STATUS_INVALID_PARAMETER;

    RtlLeaveCriticalSection( &loader_section );
    return ret;
}


2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073
/***********************************************************************
 *           LdrProcessRelocationBlock  (NTDLL.@)
 *
 * Apply relocations to a given page of a mapped PE image.
 */
IMAGE_BASE_RELOCATION * WINAPI LdrProcessRelocationBlock( void *page, UINT count,
                                                          USHORT *relocs, INT delta )
{
    while (count--)
    {
        USHORT offset = *relocs & 0xfff;
        int type = *relocs >> 12;
        switch(type)
        {
        case IMAGE_REL_BASED_ABSOLUTE:
            break;
        case IMAGE_REL_BASED_HIGH:
            *(short *)((char *)page + offset) += HIWORD(delta);
            break;
        case IMAGE_REL_BASED_LOW:
            *(short *)((char *)page + offset) += LOWORD(delta);
            break;
        case IMAGE_REL_BASED_HIGHLOW:
            *(int *)((char *)page + offset) += delta;
            break;
        default:
            FIXME("Unknown/unsupported fixup type %x.\n", type);
            return NULL;
        }
        relocs++;
    }
    return (IMAGE_BASE_RELOCATION *)relocs;  /* return address of next block */
}


2074 2075 2076 2077 2078 2079 2080 2081 2082 2083 2084 2085
/******************************************************************
 *		LdrQueryProcessModuleInformation
 *
 */
NTSTATUS WINAPI LdrQueryProcessModuleInformation(PSYSTEM_MODULE_INFORMATION smi, 
                                                 ULONG buf_size, ULONG* req_size)
{
    SYSTEM_MODULE*      sm = &smi->Modules[0];
    ULONG               size = sizeof(ULONG);
    NTSTATUS            nts = STATUS_SUCCESS;
    ANSI_STRING         str;
    char*               ptr;
2086 2087
    PLIST_ENTRY         mark, entry;
    PLDR_MODULE         mod;
2088
    WORD id = 0;
2089 2090 2091 2092

    smi->ModulesCount = 0;

    RtlEnterCriticalSection( &loader_section );
2093 2094
    mark = &NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList;
    for (entry = mark->Flink; entry != mark; entry = entry->Flink)
2095
    {
2096
        mod = CONTAINING_RECORD(entry, LDR_MODULE, InLoadOrderModuleList);
2097 2098 2099 2100 2101
        size += sizeof(*sm);
        if (size <= buf_size)
        {
            sm->Reserved1 = 0; /* FIXME */
            sm->Reserved2 = 0; /* FIXME */
2102 2103 2104
            sm->ImageBaseAddress = mod->BaseAddress;
            sm->ImageSize = mod->SizeOfImage;
            sm->Flags = mod->Flags;
2105
            sm->Id = id++;
2106 2107 2108 2109
            sm->Rank = 0; /* FIXME */
            sm->Unknown = 0; /* FIXME */
            str.Length = 0;
            str.MaximumLength = MAXIMUM_FILENAME_LENGTH;
Mike McCormack's avatar
Mike McCormack committed
2110
            str.Buffer = (char*)sm->Name;
2111
            RtlUnicodeStringToAnsiString(&str, &mod->FullDllName, FALSE);
Mike McCormack's avatar
Mike McCormack committed
2112 2113
            ptr = strrchr(str.Buffer, '\\');
            sm->NameOffset = (ptr != NULL) ? (ptr - str.Buffer + 1) : 0;
2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126

            smi->ModulesCount++;
            sm++;
        }
        else nts = STATUS_INFO_LENGTH_MISMATCH;
    }
    RtlLeaveCriticalSection( &loader_section );

    if (req_size) *req_size = size;

    return nts;
}

2127 2128 2129 2130 2131 2132 2133 2134 2135 2136

/******************************************************************
 *		RtlDllShutdownInProgress  (NTDLL.@)
 */
BOOLEAN WINAPI RtlDllShutdownInProgress(void)
{
    return process_detaching;
}


2137 2138 2139 2140
/******************************************************************
 *		LdrShutdownProcess (NTDLL.@)
 *
 */
2141
void WINAPI LdrShutdownProcess(void)
2142 2143
{
    TRACE("()\n");
2144
    process_detach( TRUE, (LPVOID)1 );
2145 2146 2147 2148 2149 2150
}

/******************************************************************
 *		LdrShutdownThread (NTDLL.@)
 *
 */
2151
void WINAPI LdrShutdownThread(void)
2152
{
2153 2154 2155
    PLIST_ENTRY mark, entry;
    PLDR_MODULE mod;

2156 2157 2158
    TRACE("()\n");

    /* don't do any detach calls if process is exiting */
2159
    if (process_detaching) return;
2160 2161 2162 2163
    /* FIXME: there is still a race here */

    RtlEnterCriticalSection( &loader_section );

2164 2165
    mark = &NtCurrentTeb()->Peb->LdrData->InInitializationOrderModuleList;
    for (entry = mark->Blink; entry != mark; entry = entry->Blink)
2166
    {
2167 2168 2169
        mod = CONTAINING_RECORD(entry, LDR_MODULE, 
                                InInitializationOrderModuleList);
        if ( !(mod->Flags & LDR_PROCESS_ATTACHED) )
2170
            continue;
2171
        if ( mod->Flags & LDR_NO_DLL_CALLS )
2172 2173
            continue;

2174 2175
        MODULE_InitDLL( CONTAINING_RECORD(mod, WINE_MODREF, ldr), 
                        DLL_THREAD_DETACH, NULL );
2176 2177 2178
    }

    RtlLeaveCriticalSection( &loader_section );
2179
    RtlFreeHeap( GetProcessHeap(), 0, NtCurrentTeb()->ThreadLocalStoragePointer );
2180 2181
}

2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201 2202 2203 2204 2205 2206

/***********************************************************************
 *           free_modref
 *
 */
static void free_modref( WINE_MODREF *wm )
{
    RemoveEntryList(&wm->ldr.InLoadOrderModuleList);
    RemoveEntryList(&wm->ldr.InMemoryOrderModuleList);
    if (wm->ldr.InInitializationOrderModuleList.Flink)
        RemoveEntryList(&wm->ldr.InInitializationOrderModuleList);

    TRACE(" unloading %s\n", debugstr_w(wm->ldr.FullDllName.Buffer));
    if (!TRACE_ON(module))
        TRACE_(loaddll)("Unloaded module %s : %s\n",
                        debugstr_w(wm->ldr.FullDllName.Buffer),
                        (wm->ldr.Flags & LDR_WINE_INTERNAL) ? "builtin" : "native" );

    SERVER_START_REQ( unload_dll )
    {
        req->base = wm->ldr.BaseAddress;
        wine_server_call( req );
    }
    SERVER_END_REQ;

2207
    RtlReleaseActivationContext( wm->ldr.ActivationContext );
2208 2209 2210 2211 2212 2213 2214 2215
    NtUnmapViewOfSection( NtCurrentProcess(), wm->ldr.BaseAddress );
    if (wm->ldr.Flags & LDR_WINE_INTERNAL) wine_dll_unload( wm->ldr.SectionHandle );
    if (cached_modref == wm) cached_modref = NULL;
    RtlFreeUnicodeString( &wm->ldr.FullDllName );
    RtlFreeHeap( GetProcessHeap(), 0, wm->deps );
    RtlFreeHeap( GetProcessHeap(), 0, wm );
}

2216 2217 2218 2219 2220
/***********************************************************************
 *           MODULE_FlushModrefs
 *
 * Remove all unused modrefs and call the internal unloading routines
 * for the library type.
2221 2222
 *
 * The loader_section must be locked while calling this function.
2223 2224 2225
 */
static void MODULE_FlushModrefs(void)
{
2226 2227 2228
    PLIST_ENTRY mark, entry, prev;
    PLDR_MODULE mod;
    WINE_MODREF*wm;
2229

2230 2231
    mark = &NtCurrentTeb()->Peb->LdrData->InInitializationOrderModuleList;
    for (entry = mark->Blink; entry != mark; entry = prev)
2232
    {
2233
        mod = CONTAINING_RECORD(entry, LDR_MODULE, InInitializationOrderModuleList);
2234 2235
        wm = CONTAINING_RECORD(mod, WINE_MODREF, ldr);
        prev = entry->Blink;
2236 2237
        if (!mod->LoadCount) free_modref( wm );
    }
2238

2239 2240 2241 2242 2243 2244 2245 2246
    /* check load order list too for modules that haven't been initialized yet */
    mark = &NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList;
    for (entry = mark->Blink; entry != mark; entry = prev)
    {
        mod = CONTAINING_RECORD(entry, LDR_MODULE, InLoadOrderModuleList);
        wm = CONTAINING_RECORD(mod, WINE_MODREF, ldr);
        prev = entry->Blink;
        if (!mod->LoadCount) free_modref( wm );
2247 2248 2249 2250 2251 2252
    }
}

/***********************************************************************
 *           MODULE_DecRefCount
 *
2253
 * The loader_section must be locked while calling this function.
2254 2255 2256 2257 2258
 */
static void MODULE_DecRefCount( WINE_MODREF *wm )
{
    int i;

2259
    if ( wm->ldr.Flags & LDR_UNLOAD_IN_PROGRESS )
2260 2261
        return;

2262
    if ( wm->ldr.LoadCount <= 0 )
2263 2264
        return;

2265
    --wm->ldr.LoadCount;
2266
    TRACE("(%s) ldr.LoadCount: %d\n", debugstr_w(wm->ldr.BaseDllName.Buffer), wm->ldr.LoadCount );
2267

2268
    if ( wm->ldr.LoadCount == 0 )
2269
    {
2270
        wm->ldr.Flags |= LDR_UNLOAD_IN_PROGRESS;
2271 2272 2273 2274 2275

        for ( i = 0; i < wm->nDeps; i++ )
            if ( wm->deps[i] )
                MODULE_DecRefCount( wm->deps[i] );

2276
        wm->ldr.Flags &= ~LDR_UNLOAD_IN_PROGRESS;
2277 2278 2279 2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294 2295 2296 2297 2298 2299 2300
    }
}

/******************************************************************
 *		LdrUnloadDll (NTDLL.@)
 *
 *
 */
NTSTATUS WINAPI LdrUnloadDll( HMODULE hModule )
{
    NTSTATUS retv = STATUS_SUCCESS;

    TRACE("(%p)\n", hModule);

    RtlEnterCriticalSection( &loader_section );

    /* if we're stopping the whole process (and forcing the removal of all
     * DLLs) the library will be freed anyway
     */
    if (!process_detaching)
    {
        WINE_MODREF *wm;

        free_lib_count++;
2301
        if ((wm = get_modref( hModule )) != NULL)
2302
        {
2303
            TRACE("(%s) - START\n", debugstr_w(wm->ldr.BaseDllName.Buffer));
2304 2305 2306 2307 2308 2309 2310

            /* Recursively decrement reference counts */
            MODULE_DecRefCount( wm );

            /* Call process detach notifications */
            if ( free_lib_count <= 1 )
            {
2311
                process_detach( FALSE, NULL );
2312 2313 2314 2315 2316 2317 2318 2319 2320 2321 2322 2323 2324 2325 2326 2327
                MODULE_FlushModrefs();
            }

            TRACE("END\n");
        }
        else
            retv = STATUS_DLL_NOT_FOUND;

        free_lib_count--;
    }

    RtlLeaveCriticalSection( &loader_section );

    return retv;
}

2328 2329 2330 2331 2332
/***********************************************************************
 *           RtlImageNtHeader   (NTDLL.@)
 */
PIMAGE_NT_HEADERS WINAPI RtlImageNtHeader(HMODULE hModule)
{
2333
    IMAGE_NT_HEADERS *ret;
2334

2335 2336 2337 2338 2339 2340 2341 2342 2343 2344 2345
    __TRY
    {
        IMAGE_DOS_HEADER *dos = (IMAGE_DOS_HEADER *)hModule;

        ret = NULL;
        if (dos->e_magic == IMAGE_DOS_SIGNATURE)
        {
            ret = (IMAGE_NT_HEADERS *)((char *)dos + dos->e_lfanew);
            if (ret->Signature != IMAGE_NT_SIGNATURE) ret = NULL;
        }
    }
2346
    __EXCEPT_PAGE_FAULT
2347
    {
2348
        return NULL;
2349
    }
2350
    __ENDTRY
2351 2352 2353 2354
    return ret;
}


2355 2356 2357 2358 2359 2360 2361 2362 2363
/***********************************************************************
 *           attach_process_dlls
 *
 * Initial attach to all the dlls loaded by the process.
 */
static NTSTATUS attach_process_dlls( void *wm )
{
    NTSTATUS status;

2364 2365
    pthread_functions.sigprocmask( SIG_UNBLOCK, &server_block_set, NULL );

2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376 2377 2378 2379
    RtlEnterCriticalSection( &loader_section );
    if ((status = process_attach( wm, (LPVOID)1 )) != STATUS_SUCCESS)
    {
        if (last_failed_modref)
            ERR( "%s failed to initialize, aborting\n",
                 debugstr_w(last_failed_modref->ldr.BaseDllName.Buffer) + 1 );
        return status;
    }
    attach_implicitly_loaded_dlls( (LPVOID)1 );
    RtlLeaveCriticalSection( &loader_section );
    return status;
}


2380 2381 2382 2383
/******************************************************************
 *		LdrInitializeThunk (NTDLL.@)
 *
 */
2384
void WINAPI LdrInitializeThunk( ULONG unknown1, ULONG unknown2, ULONG unknown3, ULONG unknown4 )
2385 2386 2387
{
    NTSTATUS status;
    WINE_MODREF *wm;
2388
    LPCWSTR load_path;
2389
    SIZE_T stack_size;
2390 2391 2392
    PEB *peb = NtCurrentTeb()->Peb;
    IMAGE_NT_HEADERS *nt = RtlImageNtHeader( peb->ImageBaseAddress );

2393 2394
    if (main_exe_file) NtClose( main_exe_file );  /* at this point the main module is created */

2395
    /* allocate the modref for the main exe (if not already done) */
2396 2397 2398
    wm = get_modref( peb->ImageBaseAddress );
    assert( wm );
    if (wm->ldr.Flags & LDR_IMAGE_IS_DLL)
2399
    {
2400 2401
        ERR("%s is a dll, not an executable\n", debugstr_w(wm->ldr.FullDllName.Buffer) );
        exit(1);
2402
    }
2403

2404
    peb->LoaderLock = &loader_section;
2405 2406
    peb->ProcessParameters->ImagePathName = wm->ldr.FullDllName;
    version_init( wm->ldr.FullDllName.Buffer );
2407

2408 2409 2410 2411
    /* the main exe needs to be the first in the load order list */
    RemoveEntryList( &wm->ldr.InLoadOrderModuleList );
    InsertHeadList( &peb->LdrData->InLoadOrderModuleList, &wm->ldr.InLoadOrderModuleList );

2412 2413 2414 2415
    stack_size = max( nt->OptionalHeader.SizeOfStackReserve, nt->OptionalHeader.SizeOfStackCommit );
    if (stack_size < 1024 * 1024) stack_size = 1024 * 1024;  /* Xlib needs a large stack */

    if ((status = virtual_alloc_thread_stack( NULL, stack_size )) != STATUS_SUCCESS) goto error;
2416
    if ((status = server_init_process_done()) != STATUS_SUCCESS) goto error;
2417

2418
    actctx_init();
2419 2420
    load_path = NtCurrentTeb()->Peb->ProcessParameters->DllPath.Buffer;
    if ((status = fixup_imports( wm, load_path )) != STATUS_SUCCESS) goto error;
2421 2422
    if ((status = alloc_process_tls()) != STATUS_SUCCESS) goto error;
    if ((status = alloc_thread_tls()) != STATUS_SUCCESS) goto error;
2423
    if (nt->FileHeader.Characteristics & IMAGE_FILE_LARGE_ADDRESS_AWARE) VIRTUAL_UseLargeAddressSpace();
2424

2425 2426
    status = wine_call_on_stack( attach_process_dlls, wm, NtCurrentTeb()->Tib.StackBase );
    if (status != STATUS_SUCCESS) goto error;
2427

2428
    virtual_clear_thread_stack();
2429
    return;
2430 2431

error:
2432
    ERR( "Main exe initialization for %s failed, status %x\n",
2433
         debugstr_w(peb->ProcessParameters->ImagePathName.Buffer), status );
2434
    NtTerminateProcess( GetCurrentProcess(), status );
2435 2436 2437
}


2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468
/***********************************************************************
 *           RtlImageDirectoryEntryToData   (NTDLL.@)
 */
PVOID WINAPI RtlImageDirectoryEntryToData( HMODULE module, BOOL image, WORD dir, ULONG *size )
{
    const IMAGE_NT_HEADERS *nt;
    DWORD addr;

    if ((ULONG_PTR)module & 1)  /* mapped as data file */
    {
        module = (HMODULE)((ULONG_PTR)module & ~1);
        image = FALSE;
    }
    if (!(nt = RtlImageNtHeader( module ))) return NULL;
    if (dir >= nt->OptionalHeader.NumberOfRvaAndSizes) return NULL;
    if (!(addr = nt->OptionalHeader.DataDirectory[dir].VirtualAddress)) return NULL;
    *size = nt->OptionalHeader.DataDirectory[dir].Size;
    if (image || addr < nt->OptionalHeader.SizeOfHeaders) return (char *)module + addr;

    /* not mapped as image, need to find the section containing the virtual address */
    return RtlImageRvaToVa( nt, module, addr, NULL );
}


/***********************************************************************
 *           RtlImageRvaToSection   (NTDLL.@)
 */
PIMAGE_SECTION_HEADER WINAPI RtlImageRvaToSection( const IMAGE_NT_HEADERS *nt,
                                                   HMODULE module, DWORD rva )
{
    int i;
Eric Pouech's avatar
Eric Pouech committed
2469 2470 2471 2472
    const IMAGE_SECTION_HEADER *sec;

    sec = (const IMAGE_SECTION_HEADER*)((const char*)&nt->OptionalHeader +
                                        nt->FileHeader.SizeOfOptionalHeader);
2473 2474 2475
    for (i = 0; i < nt->FileHeader.NumberOfSections; i++, sec++)
    {
        if ((sec->VirtualAddress <= rva) && (sec->VirtualAddress + sec->SizeOfRawData > rva))
Eric Pouech's avatar
Eric Pouech committed
2476
            return (PIMAGE_SECTION_HEADER)sec;
2477 2478 2479 2480 2481 2482 2483 2484 2485 2486 2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500
    }
    return NULL;
}


/***********************************************************************
 *           RtlImageRvaToVa   (NTDLL.@)
 */
PVOID WINAPI RtlImageRvaToVa( const IMAGE_NT_HEADERS *nt, HMODULE module,
                              DWORD rva, IMAGE_SECTION_HEADER **section )
{
    IMAGE_SECTION_HEADER *sec;

    if (section && *section)  /* try this section first */
    {
        sec = *section;
        if ((sec->VirtualAddress <= rva) && (sec->VirtualAddress + sec->SizeOfRawData > rva))
            goto found;
    }
    if (!(sec = RtlImageRvaToSection( nt, module, rva ))) return NULL;
 found:
    if (section) *section = sec;
    return (char *)module + sec->PointerToRawData + (rva - sec->VirtualAddress);
}
2501 2502


2503 2504 2505 2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518
/***********************************************************************
 *           RtlPcToFileHeader   (NTDLL.@)
 */
PVOID WINAPI RtlPcToFileHeader( PVOID pc, PVOID *address )
{
    LDR_MODULE *module;
    PVOID ret = NULL;

    RtlEnterCriticalSection( &loader_section );
    if (!LdrFindEntryForAddress( pc, &module )) ret = module->BaseAddress;
    RtlLeaveCriticalSection( &loader_section );
    *address = ret;
    return ret;
}


2519 2520 2521 2522 2523 2524 2525 2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540
/***********************************************************************
 *           NtLoadDriver   (NTDLL.@)
 *           ZwLoadDriver   (NTDLL.@)
 */
NTSTATUS WINAPI NtLoadDriver( const UNICODE_STRING *DriverServiceName )
{
    FIXME("(%p), stub!\n",DriverServiceName);
    return STATUS_NOT_IMPLEMENTED;
}


/***********************************************************************
 *           NtUnloadDriver   (NTDLL.@)
 *           ZwUnloadDriver   (NTDLL.@)
 */
NTSTATUS WINAPI NtUnloadDriver( const UNICODE_STRING *DriverServiceName )
{
    FIXME("(%p), stub!\n",DriverServiceName);
    return STATUS_NOT_IMPLEMENTED;
}


2541 2542 2543 2544 2545 2546 2547 2548 2549 2550
/******************************************************************
 *		DllMain   (NTDLL.@)
 */
BOOL WINAPI DllMain( HINSTANCE inst, DWORD reason, LPVOID reserved )
{
    if (reason == DLL_PROCESS_ATTACH) LdrDisableThreadCalloutsForDll( inst );
    return TRUE;
}


2551 2552 2553 2554 2555 2556 2557 2558 2559 2560
/******************************************************************
 *		__wine_init_windows_dir   (NTDLL.@)
 *
 * Windows and system dir initialization once kernel32 has been loaded.
 */
void __wine_init_windows_dir( const WCHAR *windir, const WCHAR *sysdir )
{
    PLIST_ENTRY mark, entry;
    LPWSTR buffer, p;

2561
    RtlCreateUnicodeString( &windows_dir, windir );
2562
    RtlCreateUnicodeString( &system_dir, sysdir );
2563
    strcpyW( user_shared_data->NtSystemRoot, windir );
2564 2565 2566 2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 2578 2579 2580 2581 2582 2583 2584 2585

    /* prepend the system dir to the name of the already created modules */
    mark = &NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList;
    for (entry = mark->Flink; entry != mark; entry = entry->Flink)
    {
        LDR_MODULE *mod = CONTAINING_RECORD( entry, LDR_MODULE, InLoadOrderModuleList );

        assert( mod->Flags & LDR_WINE_INTERNAL );

        buffer = RtlAllocateHeap( GetProcessHeap(), 0,
                                  system_dir.Length + mod->FullDllName.Length + 2*sizeof(WCHAR) );
        if (!buffer) continue;
        strcpyW( buffer, system_dir.Buffer );
        p = buffer + strlenW( buffer );
        if (p > buffer && p[-1] != '\\') *p++ = '\\';
        strcpyW( p, mod->FullDllName.Buffer );
        RtlInitUnicodeString( &mod->FullDllName, buffer );
        RtlInitUnicodeString( &mod->BaseDllName, p );
    }
}


2586
/***********************************************************************
2587
 *           __wine_process_init
2588
 */
2589
void __wine_process_init(void)
2590
{
2591
    static const WCHAR kernel32W[] = {'k','e','r','n','e','l','3','2','.','d','l','l',0};
2592

2593 2594 2595
    WINE_MODREF *wm;
    NTSTATUS status;
    ANSI_STRING func_name;
2596
    void (* DECLSPEC_NORETURN init_func)(void);
2597
    extern mode_t FILE_umask;
2598

2599
    main_exe_file = thread_init();
2600

2601 2602 2603 2604
    /* retrieve current umask */
    FILE_umask = umask(0777);
    umask( FILE_umask );

2605
    /* setup the load callback and create ntdll modref */
2606
    wine_dll_set_callback( load_builtin_callback );
2607

2608
    if ((status = load_builtin_dll( NULL, kernel32W, 0, 0, &wm )) != STATUS_SUCCESS)
2609
    {
2610
        MESSAGE( "wine: could not load kernel32.dll, status %x\n", status );
2611 2612
        exit(1);
    }
2613 2614 2615
    RtlInitAnsiString( &func_name, "UnhandledExceptionFilter" );
    LdrGetProcedureAddress( wm->ldr.BaseAddress, &func_name, 0, (void **)&unhandled_exception_filter );

2616 2617 2618 2619
    RtlInitAnsiString( &func_name, "__wine_kernel_init" );
    if ((status = LdrGetProcedureAddress( wm->ldr.BaseAddress, &func_name,
                                          0, (void **)&init_func )) != STATUS_SUCCESS)
    {
2620
        MESSAGE( "wine: could not find __wine_kernel_init in kernel32.dll, status %x\n", status );
2621 2622 2623
        exit(1);
    }
    init_func();
2624
}