blob: 4e5555e917fc58f8501def58fbdf3e1c5def618d [file] [log] [blame]
Guido van Rossum22a1d361999-12-20 21:18:49 +00001
2/* Support for dynamic loading of extension modules */
3
Christian Heimes123d5c92008-01-04 03:15:05 +00004#include "Python.h"
5
Martin v. Löwis0e8bd7e2006-06-10 12:23:46 +00006#ifdef HAVE_DIRECT_H
Guido van Rossum22a1d361999-12-20 21:18:49 +00007#include <direct.h>
Martin v. Löwis0e8bd7e2006-06-10 12:23:46 +00008#endif
Mark Hammond1f7838b2000-10-05 10:54:45 +00009#include <ctype.h>
Guido van Rossum22a1d361999-12-20 21:18:49 +000010
Guido van Rossum22a1d361999-12-20 21:18:49 +000011#include "importdl.h"
Kristján Valur Jónsson629ec262007-05-26 19:31:39 +000012#include <windows.h>
Guido van Rossum22a1d361999-12-20 21:18:49 +000013
Mark Hammond9f4f56d2009-01-27 23:12:23 +000014// "activation context" magic - see dl_nt.c...
15extern ULONG_PTR _Py_ActivateActCtx();
16void _Py_DeactivateActCtx(ULONG_PTR cookie);
17
Guido van Rossum22a1d361999-12-20 21:18:49 +000018const struct filedescr _PyImport_DynLoadFiletab[] = {
19#ifdef _DEBUG
Antoine Pitrouc83ea132010-05-09 14:46:46 +000020 {"_d.pyd", "rb", C_EXTENSION},
Guido van Rossum22a1d361999-12-20 21:18:49 +000021#else
Antoine Pitrouc83ea132010-05-09 14:46:46 +000022 {".pyd", "rb", C_EXTENSION},
Guido van Rossum22a1d361999-12-20 21:18:49 +000023#endif
Antoine Pitrouc83ea132010-05-09 14:46:46 +000024 {0, 0}
Guido van Rossum22a1d361999-12-20 21:18:49 +000025};
26
27
Mark Hammond1f7838b2000-10-05 10:54:45 +000028/* Case insensitive string compare, to avoid any dependencies on particular
29 C RTL implementations */
30
31static int strcasecmp (char *string1, char *string2)
Antoine Pitrouc83ea132010-05-09 14:46:46 +000032{
33 int first, second;
Mark Hammond1f7838b2000-10-05 10:54:45 +000034
Antoine Pitrouc83ea132010-05-09 14:46:46 +000035 do {
36 first = tolower(*string1);
37 second = tolower(*string2);
38 string1++;
39 string2++;
40 } while (first && first == second);
Mark Hammond1f7838b2000-10-05 10:54:45 +000041
Antoine Pitrouc83ea132010-05-09 14:46:46 +000042 return (first - second);
43}
Mark Hammond1f7838b2000-10-05 10:54:45 +000044
45
46/* Function to return the name of the "python" DLL that the supplied module
47 directly imports. Looks through the list of imported modules and
48 returns the first entry that starts with "python" (case sensitive) and
49 is followed by nothing but numbers until the separator (period).
50
51 Returns a pointer to the import name, or NULL if no matching name was
52 located.
53
54 This function parses through the PE header for the module as loaded in
55 memory by the system loader. The PE header is accessed as documented by
56 Microsoft in the MSDN PE and COFF specification (2/99), and handles
57 both PE32 and PE32+. It only worries about the direct import table and
58 not the delay load import table since it's unlikely an extension is
59 going to be delay loading Python (after all, it's already loaded).
60
61 If any magic values are not found (e.g., the PE header or optional
62 header magic), then this function simply returns NULL. */
63
64#define DWORD_AT(mem) (*(DWORD *)(mem))
65#define WORD_AT(mem) (*(WORD *)(mem))
66
67static char *GetPythonImport (HINSTANCE hModule)
68{
Antoine Pitrouc83ea132010-05-09 14:46:46 +000069 unsigned char *dllbase, *import_data, *import_name;
70 DWORD pe_offset, opt_offset;
71 WORD opt_magic;
72 int num_dict_off, import_off;
Mark Hammond1f7838b2000-10-05 10:54:45 +000073
Antoine Pitrouc83ea132010-05-09 14:46:46 +000074 /* Safety check input */
75 if (hModule == NULL) {
76 return NULL;
77 }
Mark Hammond1f7838b2000-10-05 10:54:45 +000078
Antoine Pitrouc83ea132010-05-09 14:46:46 +000079 /* Module instance is also the base load address. First portion of
80 memory is the MS-DOS loader, which holds the offset to the PE
81 header (from the load base) at 0x3C */
82 dllbase = (unsigned char *)hModule;
83 pe_offset = DWORD_AT(dllbase + 0x3C);
Mark Hammond1f7838b2000-10-05 10:54:45 +000084
Antoine Pitrouc83ea132010-05-09 14:46:46 +000085 /* The PE signature must be "PE\0\0" */
86 if (memcmp(dllbase+pe_offset,"PE\0\0",4)) {
87 return NULL;
88 }
Mark Hammond1f7838b2000-10-05 10:54:45 +000089
Antoine Pitrouc83ea132010-05-09 14:46:46 +000090 /* Following the PE signature is the standard COFF header (20
91 bytes) and then the optional header. The optional header starts
92 with a magic value of 0x10B for PE32 or 0x20B for PE32+ (PE32+
93 uses 64-bits for some fields). It might also be 0x107 for a ROM
94 image, but we don't process that here.
Mark Hammond1f7838b2000-10-05 10:54:45 +000095
Antoine Pitrouc83ea132010-05-09 14:46:46 +000096 The optional header ends with a data dictionary that directly
97 points to certain types of data, among them the import entries
98 (in the second table entry). Based on the header type, we
99 determine offsets for the data dictionary count and the entry
100 within the dictionary pointing to the imports. */
Mark Hammond1f7838b2000-10-05 10:54:45 +0000101
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000102 opt_offset = pe_offset + 4 + 20;
103 opt_magic = WORD_AT(dllbase+opt_offset);
104 if (opt_magic == 0x10B) {
105 /* PE32 */
106 num_dict_off = 92;
107 import_off = 104;
108 } else if (opt_magic == 0x20B) {
109 /* PE32+ */
110 num_dict_off = 108;
111 import_off = 120;
112 } else {
113 /* Unsupported */
114 return NULL;
115 }
Mark Hammond1f7838b2000-10-05 10:54:45 +0000116
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000117 /* Now if an import table exists, offset to it and walk the list of
118 imports. The import table is an array (ending when an entry has
119 empty values) of structures (20 bytes each), which contains (at
120 offset 12) a relative address (to the module base) at which a
121 string constant holding the import name is located. */
Mark Hammond1f7838b2000-10-05 10:54:45 +0000122
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000123 if (DWORD_AT(dllbase + opt_offset + num_dict_off) >= 2) {
124 /* We have at least 2 tables - the import table is the second
125 one. But still it may be that the table size is zero */
126 if (0 == DWORD_AT(dllbase + opt_offset + import_off + sizeof(DWORD)))
127 return NULL;
128 import_data = dllbase + DWORD_AT(dllbase +
129 opt_offset +
130 import_off);
131 while (DWORD_AT(import_data)) {
132 import_name = dllbase + DWORD_AT(import_data+12);
133 if (strlen(import_name) >= 6 &&
134 !strncmp(import_name,"python",6)) {
135 char *pch;
Mark Hammond1f7838b2000-10-05 10:54:45 +0000136
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000137 /* Ensure python prefix is followed only
138 by numbers to the end of the basename */
139 pch = import_name + 6;
Thomas Heller1df04612004-07-02 08:53:57 +0000140#ifdef _DEBUG
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000141 while (*pch && pch[0] != '_' && pch[1] != 'd' && pch[2] != '.') {
Thomas Heller1df04612004-07-02 08:53:57 +0000142#else
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000143 while (*pch && *pch != '.') {
Thomas Heller1df04612004-07-02 08:53:57 +0000144#endif
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000145 if (*pch >= '0' && *pch <= '9') {
146 pch++;
147 } else {
148 pch = NULL;
149 break;
150 }
151 }
Mark Hammond1f7838b2000-10-05 10:54:45 +0000152
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000153 if (pch) {
154 /* Found it - return the name */
155 return import_name;
156 }
157 }
158 import_data += 20;
159 }
160 }
161
162 return NULL;
Mark Hammond1f7838b2000-10-05 10:54:45 +0000163}
Mark Hammond1f7838b2000-10-05 10:54:45 +0000164
165
Guido van Rossum96a8fb71999-12-22 14:09:35 +0000166dl_funcptr _PyImport_GetDynLoadFunc(const char *fqname, const char *shortname,
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000167 const char *pathname, FILE *fp)
Guido van Rossum22a1d361999-12-20 21:18:49 +0000168{
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000169 dl_funcptr p;
170 char funcname[258], *import_python;
Guido van Rossum96a8fb71999-12-22 14:09:35 +0000171
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000172 PyOS_snprintf(funcname, sizeof(funcname), "init%.200s", shortname);
Guido van Rossum22a1d361999-12-20 21:18:49 +0000173
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000174 {
175 HINSTANCE hDLL = NULL;
176 char pathbuf[260];
177 LPTSTR dummy;
178 unsigned int old_mode;
179 ULONG_PTR cookie = 0;
180 /* We use LoadLibraryEx so Windows looks for dependent DLLs
181 in directory of pathname first. However, Windows95
182 can sometimes not work correctly unless the absolute
183 path is used. If GetFullPathName() fails, the LoadLibrary
184 will certainly fail too, so use its error code */
Christian Heimesb2302ba2008-01-23 17:15:06 +0000185
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000186 /* Don't display a message box when Python can't load a DLL */
187 old_mode = SetErrorMode(SEM_FAILCRITICALERRORS);
Christian Heimesb2302ba2008-01-23 17:15:06 +0000188
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000189 if (GetFullPathName(pathname,
190 sizeof(pathbuf),
191 pathbuf,
192 &dummy)) {
193 ULONG_PTR cookie = _Py_ActivateActCtx();
194 /* XXX This call doesn't exist in Windows CE */
195 hDLL = LoadLibraryEx(pathname, NULL,
196 LOAD_WITH_ALTERED_SEARCH_PATH);
197 _Py_DeactivateActCtx(cookie);
198 }
Christian Heimesb2302ba2008-01-23 17:15:06 +0000199
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000200 /* restore old error mode settings */
201 SetErrorMode(old_mode);
Christian Heimesb2302ba2008-01-23 17:15:06 +0000202
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000203 if (hDLL==NULL){
204 char errBuf[256];
205 unsigned int errorCode;
Guido van Rossum22a1d361999-12-20 21:18:49 +0000206
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000207 /* Get an error string from Win32 error code */
208 char theInfo[256]; /* Pointer to error text
209 from system */
210 int theLength; /* Length of error text */
Guido van Rossum22a1d361999-12-20 21:18:49 +0000211
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000212 errorCode = GetLastError();
Guido van Rossum22a1d361999-12-20 21:18:49 +0000213
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000214 theLength = FormatMessage(
215 FORMAT_MESSAGE_FROM_SYSTEM |
216 FORMAT_MESSAGE_IGNORE_INSERTS, /* flags */
217 NULL, /* message source */
218 errorCode, /* the message (error) ID */
219 0, /* default language environment */
220 (LPTSTR) theInfo, /* the buffer */
221 sizeof(theInfo), /* the buffer size */
222 NULL); /* no additional format args. */
Guido van Rossum22a1d361999-12-20 21:18:49 +0000223
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000224 /* Problem: could not get the error message.
225 This should not happen if called correctly. */
226 if (theLength == 0) {
227 PyOS_snprintf(errBuf, sizeof(errBuf),
228 "DLL load failed with error code %d",
229 errorCode);
230 } else {
231 size_t len;
232 /* For some reason a \r\n
233 is appended to the text */
234 if (theLength >= 2 &&
235 theInfo[theLength-2] == '\r' &&
236 theInfo[theLength-1] == '\n') {
237 theLength -= 2;
238 theInfo[theLength] = '\0';
239 }
240 strcpy(errBuf, "DLL load failed: ");
241 len = strlen(errBuf);
242 strncpy(errBuf+len, theInfo,
243 sizeof(errBuf)-len);
244 errBuf[sizeof(errBuf)-1] = '\0';
245 }
246 PyErr_SetString(PyExc_ImportError, errBuf);
247 return NULL;
248 } else {
249 char buffer[256];
Mark Hammond1f7838b2000-10-05 10:54:45 +0000250
Thomas Heller1df04612004-07-02 08:53:57 +0000251#ifdef _DEBUG
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000252 PyOS_snprintf(buffer, sizeof(buffer), "python%d%d_d.dll",
Thomas Heller1df04612004-07-02 08:53:57 +0000253#else
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000254 PyOS_snprintf(buffer, sizeof(buffer), "python%d%d.dll",
Thomas Heller1df04612004-07-02 08:53:57 +0000255#endif
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000256 PY_MAJOR_VERSION,PY_MINOR_VERSION);
257 import_python = GetPythonImport(hDLL);
Mark Hammond1f7838b2000-10-05 10:54:45 +0000258
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000259 if (import_python &&
260 strcasecmp(buffer,import_python)) {
261 PyOS_snprintf(buffer, sizeof(buffer),
262 "Module use of %.150s conflicts "
263 "with this version of Python.",
264 import_python);
265 PyErr_SetString(PyExc_ImportError,buffer);
266 FreeLibrary(hDLL);
267 return NULL;
268 }
269 }
270 p = GetProcAddress(hDLL, funcname);
271 }
Guido van Rossum22a1d361999-12-20 21:18:49 +0000272
Antoine Pitrouc83ea132010-05-09 14:46:46 +0000273 return p;
Guido van Rossum22a1d361999-12-20 21:18:49 +0000274}