blob: 8431c5b3b2f308eb55090d1afbc439fb6dd0a669 [file] [log] [blame]
Guido van Rossum22a1d361999-12-20 21:18:49 +00001
2/* Support for dynamic loading of extension modules */
3
Christian Heimesfaf2f632008-01-06 16:59:19 +00004#include "Python.h"
5
Thomas Wouters0e3f5912006-08-11 14:57:12 +00006#ifdef HAVE_DIRECT_H
Guido van Rossum22a1d361999-12-20 21:18:49 +00007#include <direct.h>
Thomas Wouters0e3f5912006-08-11 14:57:12 +00008#endif
Mark Hammond1f7838b2000-10-05 10:54:45 +00009#include <ctype.h>
Guido van Rossum22a1d361999-12-20 21:18:49 +000010
Guido van Rossum22a1d361999-12-20 21:18:49 +000011#include "importdl.h"
Steve Dower03a144b2014-12-15 20:45:23 -080012#include "patchlevel.h"
Guido van Rossume7ba4952007-06-06 23:52:48 +000013#include <windows.h>
Guido van Rossum22a1d361999-12-20 21:18:49 +000014
Guido van Rossum22a1d361999-12-20 21:18:49 +000015#ifdef _DEBUG
Steve Dower03a144b2014-12-15 20:45:23 -080016#define PYD_DEBUG_SUFFIX "_d"
Guido van Rossum22a1d361999-12-20 21:18:49 +000017#else
Steve Dower03a144b2014-12-15 20:45:23 -080018#define PYD_DEBUG_SUFFIX ""
Guido van Rossum22a1d361999-12-20 21:18:49 +000019#endif
Steve Dower03a144b2014-12-15 20:45:23 -080020
Steve Dower03a144b2014-12-15 20:45:23 -080021#ifdef PYD_PLATFORM_TAG
Serhiy Storchaka12b25382015-11-05 17:43:42 +020022#define PYD_TAGGED_SUFFIX PYD_DEBUG_SUFFIX ".cp" Py_STRINGIFY(PY_MAJOR_VERSION) Py_STRINGIFY(PY_MINOR_VERSION) "-" PYD_PLATFORM_TAG ".pyd"
Steve Dower03a144b2014-12-15 20:45:23 -080023#else
Serhiy Storchaka12b25382015-11-05 17:43:42 +020024#define PYD_TAGGED_SUFFIX PYD_DEBUG_SUFFIX ".cp" Py_STRINGIFY(PY_MAJOR_VERSION) Py_STRINGIFY(PY_MINOR_VERSION) ".pyd"
Steve Dower03a144b2014-12-15 20:45:23 -080025#endif
26
27#define PYD_UNTAGGED_SUFFIX PYD_DEBUG_SUFFIX ".pyd"
28
29const char *_PyImport_DynLoadFiletab[] = {
30 PYD_TAGGED_SUFFIX,
31 PYD_UNTAGGED_SUFFIX,
Brett Cannon2657df42012-05-04 15:20:40 -040032 NULL
Guido van Rossum22a1d361999-12-20 21:18:49 +000033};
34
Mark Hammond1f7838b2000-10-05 10:54:45 +000035/* Function to return the name of the "python" DLL that the supplied module
36 directly imports. Looks through the list of imported modules and
37 returns the first entry that starts with "python" (case sensitive) and
38 is followed by nothing but numbers until the separator (period).
39
40 Returns a pointer to the import name, or NULL if no matching name was
41 located.
42
43 This function parses through the PE header for the module as loaded in
44 memory by the system loader. The PE header is accessed as documented by
45 Microsoft in the MSDN PE and COFF specification (2/99), and handles
46 both PE32 and PE32+. It only worries about the direct import table and
47 not the delay load import table since it's unlikely an extension is
48 going to be delay loading Python (after all, it's already loaded).
49
50 If any magic values are not found (e.g., the PE header or optional
51 header magic), then this function simply returns NULL. */
52
53#define DWORD_AT(mem) (*(DWORD *)(mem))
54#define WORD_AT(mem) (*(WORD *)(mem))
55
56static char *GetPythonImport (HINSTANCE hModule)
57{
Antoine Pitrouf95a1b32010-05-09 15:52:27 +000058 unsigned char *dllbase, *import_data, *import_name;
59 DWORD pe_offset, opt_offset;
60 WORD opt_magic;
61 int num_dict_off, import_off;
Mark Hammond1f7838b2000-10-05 10:54:45 +000062
Antoine Pitrouf95a1b32010-05-09 15:52:27 +000063 /* Safety check input */
64 if (hModule == NULL) {
65 return NULL;
66 }
Mark Hammond1f7838b2000-10-05 10:54:45 +000067
Antoine Pitrouf95a1b32010-05-09 15:52:27 +000068 /* Module instance is also the base load address. First portion of
69 memory is the MS-DOS loader, which holds the offset to the PE
70 header (from the load base) at 0x3C */
71 dllbase = (unsigned char *)hModule;
72 pe_offset = DWORD_AT(dllbase + 0x3C);
Mark Hammond1f7838b2000-10-05 10:54:45 +000073
Antoine Pitrouf95a1b32010-05-09 15:52:27 +000074 /* The PE signature must be "PE\0\0" */
75 if (memcmp(dllbase+pe_offset,"PE\0\0",4)) {
76 return NULL;
77 }
Mark Hammond1f7838b2000-10-05 10:54:45 +000078
Antoine Pitrouf95a1b32010-05-09 15:52:27 +000079 /* Following the PE signature is the standard COFF header (20
80 bytes) and then the optional header. The optional header starts
81 with a magic value of 0x10B for PE32 or 0x20B for PE32+ (PE32+
82 uses 64-bits for some fields). It might also be 0x107 for a ROM
83 image, but we don't process that here.
Mark Hammond1f7838b2000-10-05 10:54:45 +000084
Antoine Pitrouf95a1b32010-05-09 15:52:27 +000085 The optional header ends with a data dictionary that directly
86 points to certain types of data, among them the import entries
87 (in the second table entry). Based on the header type, we
88 determine offsets for the data dictionary count and the entry
89 within the dictionary pointing to the imports. */
Mark Hammond1f7838b2000-10-05 10:54:45 +000090
Antoine Pitrouf95a1b32010-05-09 15:52:27 +000091 opt_offset = pe_offset + 4 + 20;
92 opt_magic = WORD_AT(dllbase+opt_offset);
93 if (opt_magic == 0x10B) {
94 /* PE32 */
95 num_dict_off = 92;
96 import_off = 104;
97 } else if (opt_magic == 0x20B) {
98 /* PE32+ */
99 num_dict_off = 108;
100 import_off = 120;
101 } else {
102 /* Unsupported */
103 return NULL;
104 }
Mark Hammond1f7838b2000-10-05 10:54:45 +0000105
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000106 /* Now if an import table exists, offset to it and walk the list of
107 imports. The import table is an array (ending when an entry has
108 empty values) of structures (20 bytes each), which contains (at
109 offset 12) a relative address (to the module base) at which a
110 string constant holding the import name is located. */
Mark Hammond1f7838b2000-10-05 10:54:45 +0000111
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000112 if (DWORD_AT(dllbase + opt_offset + num_dict_off) >= 2) {
113 /* We have at least 2 tables - the import table is the second
114 one. But still it may be that the table size is zero */
115 if (0 == DWORD_AT(dllbase + opt_offset + import_off + sizeof(DWORD)))
116 return NULL;
117 import_data = dllbase + DWORD_AT(dllbase +
118 opt_offset +
119 import_off);
120 while (DWORD_AT(import_data)) {
121 import_name = dllbase + DWORD_AT(import_data+12);
122 if (strlen(import_name) >= 6 &&
123 !strncmp(import_name,"python",6)) {
124 char *pch;
Mark Hammond1f7838b2000-10-05 10:54:45 +0000125
Martin v. Löwis4d0d4712010-12-03 20:14:31 +0000126#ifndef _DEBUG
127 /* In a release version, don't claim that python3.dll is
128 a Python DLL. */
129 if (strcmp(import_name, "python3.dll") == 0) {
130 import_data += 20;
131 continue;
132 }
133#endif
134
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000135 /* Ensure python prefix is followed only
136 by numbers to the end of the basename */
137 pch = import_name + 6;
Thomas Heller1df04612004-07-02 08:53:57 +0000138#ifdef _DEBUG
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000139 while (*pch && pch[0] != '_' && pch[1] != 'd' && pch[2] != '.') {
Thomas Heller1df04612004-07-02 08:53:57 +0000140#else
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000141 while (*pch && *pch != '.') {
Thomas Heller1df04612004-07-02 08:53:57 +0000142#endif
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000143 if (*pch >= '0' && *pch <= '9') {
144 pch++;
145 } else {
146 pch = NULL;
147 break;
148 }
149 }
Mark Hammond1f7838b2000-10-05 10:54:45 +0000150
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000151 if (pch) {
152 /* Found it - return the name */
153 return import_name;
154 }
155 }
156 import_data += 20;
157 }
158 }
159
160 return NULL;
Mark Hammond1f7838b2000-10-05 10:54:45 +0000161}
Mark Hammond1f7838b2000-10-05 10:54:45 +0000162
Nick Coghland5cacbb2015-05-23 22:24:10 +1000163dl_funcptr _PyImport_FindSharedFuncptrWindows(const char *prefix,
164 const char *shortname,
165 PyObject *pathname, FILE *fp)
Guido van Rossum22a1d361999-12-20 21:18:49 +0000166{
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000167 dl_funcptr p;
168 char funcname[258], *import_python;
Serhiy Storchakaf7eae0a2017-06-28 08:30:06 +0300169 const wchar_t *wpathname;
Guido van Rossum96a8fb71999-12-22 14:09:35 +0000170
Martin v. Löwis4d0d4712010-12-03 20:14:31 +0000171 _Py_CheckPython3();
Martin v. Löwis4d0d4712010-12-03 20:14:31 +0000172
Serhiy Storchakaf7eae0a2017-06-28 08:30:06 +0300173 wpathname = _PyUnicode_AsUnicode(pathname);
Victor Stinner33354472011-11-21 02:01:41 +0100174 if (wpathname == NULL)
175 return NULL;
176
Steve Dower76891542015-05-23 08:59:25 -0700177 PyOS_snprintf(funcname, sizeof(funcname), "%.20s_%.200s", prefix, shortname);
Guido van Rossum22a1d361999-12-20 21:18:49 +0000178
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000179 {
180 HINSTANCE hDLL = NULL;
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000181 unsigned int old_mode;
Victor Stinner67002af2011-10-02 20:35:10 +0200182
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000183 /* Don't display a message box when Python can't load a DLL */
184 old_mode = SetErrorMode(SEM_FAILCRITICALERRORS);
Christian Heimesbbffeb62008-01-24 09:42:52 +0000185
Steve Dower2438cdf2019-03-29 16:37:16 -0700186 /* bpo-36085: We use LoadLibraryEx with restricted search paths
187 to avoid DLL preloading attacks and enable use of the
188 AddDllDirectory function. We add SEARCH_DLL_LOAD_DIR to
189 ensure DLLs adjacent to the PYD are preferred. */
Tony Roberts4860f012019-02-02 18:16:42 +0100190 Py_BEGIN_ALLOW_THREADS
Victor Stinner33354472011-11-21 02:01:41 +0100191 hDLL = LoadLibraryExW(wpathname, NULL,
Steve Dower2438cdf2019-03-29 16:37:16 -0700192 LOAD_LIBRARY_SEARCH_DEFAULT_DIRS |
193 LOAD_LIBRARY_SEARCH_DLL_LOAD_DIR);
Tony Roberts4860f012019-02-02 18:16:42 +0100194 Py_END_ALLOW_THREADS
Christian Heimesbbffeb62008-01-24 09:42:52 +0000195
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000196 /* restore old error mode settings */
197 SetErrorMode(old_mode);
Christian Heimesbbffeb62008-01-24 09:42:52 +0000198
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000199 if (hDLL==NULL){
200 PyObject *message;
201 unsigned int errorCode;
Guido van Rossum22a1d361999-12-20 21:18:49 +0000202
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000203 /* Get an error string from Win32 error code */
204 wchar_t theInfo[256]; /* Pointer to error text
205 from system */
206 int theLength; /* Length of error text */
Guido van Rossum22a1d361999-12-20 21:18:49 +0000207
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000208 errorCode = GetLastError();
Guido van Rossum22a1d361999-12-20 21:18:49 +0000209
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000210 theLength = FormatMessageW(
211 FORMAT_MESSAGE_FROM_SYSTEM |
212 FORMAT_MESSAGE_IGNORE_INSERTS, /* flags */
213 NULL, /* message source */
214 errorCode, /* the message (error) ID */
215 MAKELANGID(LANG_NEUTRAL,
216 SUBLANG_DEFAULT),
217 /* Default language */
218 theInfo, /* the buffer */
Gregory P. Smithb803c6c2013-03-23 16:05:36 -0700219 sizeof(theInfo) / sizeof(wchar_t), /* size in wchars */
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000220 NULL); /* no additional format args. */
Guido van Rossum22a1d361999-12-20 21:18:49 +0000221
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000222 /* Problem: could not get the error message.
223 This should not happen if called correctly. */
224 if (theLength == 0) {
225 message = PyUnicode_FromFormat(
shireenrao24fe4602019-08-17 16:50:39 -0400226 "DLL load failed with error code %u while importing %s",
227 errorCode, shortname);
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000228 } else {
229 /* For some reason a \r\n
230 is appended to the text */
231 if (theLength >= 2 &&
232 theInfo[theLength-2] == '\r' &&
233 theInfo[theLength-1] == '\n') {
234 theLength -= 2;
235 theInfo[theLength] = '\0';
236 }
shireenrao24fe4602019-08-17 16:50:39 -0400237 message = PyUnicode_FromFormat(
238 "DLL load failed while importing %s: ", shortname);
Amaury Forgeot d'Arcd6179e12008-01-03 23:42:13 +0000239
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000240 PyUnicode_AppendAndDel(&message,
Victor Stinner9d3b93b2011-11-22 02:27:30 +0100241 PyUnicode_FromWideChar(
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000242 theInfo,
243 theLength));
244 }
Victor Stinner67002af2011-10-02 20:35:10 +0200245 if (message != NULL) {
Richard Oudkerk409f9022013-06-10 15:38:54 +0100246 PyObject *shortname_obj = PyUnicode_FromString(shortname);
247 PyErr_SetImportError(message, shortname_obj, pathname);
248 Py_XDECREF(shortname_obj);
Brian Curtin09b86d12012-04-17 16:57:09 -0500249 Py_DECREF(message);
Victor Stinner67002af2011-10-02 20:35:10 +0200250 }
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000251 return NULL;
252 } else {
253 char buffer[256];
Mark Hammond1f7838b2000-10-05 10:54:45 +0000254
Victor Stinner2d322272011-04-04 23:05:53 +0200255 PyOS_snprintf(buffer, sizeof(buffer),
Thomas Heller1df04612004-07-02 08:53:57 +0000256#ifdef _DEBUG
Victor Stinner2d322272011-04-04 23:05:53 +0200257 "python%d%d_d.dll",
Thomas Heller1df04612004-07-02 08:53:57 +0000258#else
Victor Stinner2d322272011-04-04 23:05:53 +0200259 "python%d%d.dll",
Thomas Heller1df04612004-07-02 08:53:57 +0000260#endif
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000261 PY_MAJOR_VERSION,PY_MINOR_VERSION);
262 import_python = GetPythonImport(hDLL);
Mark Hammond1f7838b2000-10-05 10:54:45 +0000263
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000264 if (import_python &&
Minmin Gong05f2d842019-07-13 06:11:43 -0700265 _stricmp(buffer,import_python)) {
Victor Stinner2d322272011-04-04 23:05:53 +0200266 PyErr_Format(PyExc_ImportError,
267 "Module use of %.150s conflicts "
268 "with this version of Python.",
269 import_python);
Tony Roberts4860f012019-02-02 18:16:42 +0100270 Py_BEGIN_ALLOW_THREADS
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000271 FreeLibrary(hDLL);
Tony Roberts4860f012019-02-02 18:16:42 +0100272 Py_END_ALLOW_THREADS
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000273 return NULL;
274 }
275 }
Tony Roberts4860f012019-02-02 18:16:42 +0100276 Py_BEGIN_ALLOW_THREADS
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000277 p = GetProcAddress(hDLL, funcname);
Tony Roberts4860f012019-02-02 18:16:42 +0100278 Py_END_ALLOW_THREADS
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000279 }
Guido van Rossum22a1d361999-12-20 21:18:49 +0000280
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000281 return p;
Guido van Rossum22a1d361999-12-20 21:18:49 +0000282}