blob: 5702ab2cd71ba124b18ee035ee63cebf69740b63 [file] [log] [blame]
Guido van Rossum22a1d361999-12-20 21:18:49 +00001
2/* Support for dynamic loading of extension modules */
3
Christian Heimesfaf2f632008-01-06 16:59:19 +00004#include "Python.h"
5
Thomas Wouters0e3f5912006-08-11 14:57:12 +00006#ifdef HAVE_DIRECT_H
Guido van Rossum22a1d361999-12-20 21:18:49 +00007#include <direct.h>
Thomas Wouters0e3f5912006-08-11 14:57:12 +00008#endif
Mark Hammond1f7838b2000-10-05 10:54:45 +00009#include <ctype.h>
Guido van Rossum22a1d361999-12-20 21:18:49 +000010
Guido van Rossum22a1d361999-12-20 21:18:49 +000011#include "importdl.h"
Steve Dower03a144b2014-12-15 20:45:23 -080012#include "patchlevel.h"
Guido van Rossume7ba4952007-06-06 23:52:48 +000013#include <windows.h>
Guido van Rossum22a1d361999-12-20 21:18:49 +000014
Guido van Rossum22a1d361999-12-20 21:18:49 +000015#ifdef _DEBUG
Steve Dower03a144b2014-12-15 20:45:23 -080016#define PYD_DEBUG_SUFFIX "_d"
Guido van Rossum22a1d361999-12-20 21:18:49 +000017#else
Steve Dower03a144b2014-12-15 20:45:23 -080018#define PYD_DEBUG_SUFFIX ""
Guido van Rossum22a1d361999-12-20 21:18:49 +000019#endif
Steve Dower03a144b2014-12-15 20:45:23 -080020
Steve Dower03a144b2014-12-15 20:45:23 -080021#ifdef PYD_PLATFORM_TAG
Serhiy Storchaka12b25382015-11-05 17:43:42 +020022#define PYD_TAGGED_SUFFIX PYD_DEBUG_SUFFIX ".cp" Py_STRINGIFY(PY_MAJOR_VERSION) Py_STRINGIFY(PY_MINOR_VERSION) "-" PYD_PLATFORM_TAG ".pyd"
Steve Dower03a144b2014-12-15 20:45:23 -080023#else
Serhiy Storchaka12b25382015-11-05 17:43:42 +020024#define PYD_TAGGED_SUFFIX PYD_DEBUG_SUFFIX ".cp" Py_STRINGIFY(PY_MAJOR_VERSION) Py_STRINGIFY(PY_MINOR_VERSION) ".pyd"
Steve Dower03a144b2014-12-15 20:45:23 -080025#endif
26
27#define PYD_UNTAGGED_SUFFIX PYD_DEBUG_SUFFIX ".pyd"
28
29const char *_PyImport_DynLoadFiletab[] = {
30 PYD_TAGGED_SUFFIX,
31 PYD_UNTAGGED_SUFFIX,
Brett Cannon2657df42012-05-04 15:20:40 -040032 NULL
Guido van Rossum22a1d361999-12-20 21:18:49 +000033};
34
Mark Hammond1f7838b2000-10-05 10:54:45 +000035/* Function to return the name of the "python" DLL that the supplied module
36 directly imports. Looks through the list of imported modules and
37 returns the first entry that starts with "python" (case sensitive) and
38 is followed by nothing but numbers until the separator (period).
39
40 Returns a pointer to the import name, or NULL if no matching name was
41 located.
42
43 This function parses through the PE header for the module as loaded in
44 memory by the system loader. The PE header is accessed as documented by
45 Microsoft in the MSDN PE and COFF specification (2/99), and handles
46 both PE32 and PE32+. It only worries about the direct import table and
47 not the delay load import table since it's unlikely an extension is
48 going to be delay loading Python (after all, it's already loaded).
49
50 If any magic values are not found (e.g., the PE header or optional
51 header magic), then this function simply returns NULL. */
52
53#define DWORD_AT(mem) (*(DWORD *)(mem))
54#define WORD_AT(mem) (*(WORD *)(mem))
55
56static char *GetPythonImport (HINSTANCE hModule)
57{
Antoine Pitrouf95a1b32010-05-09 15:52:27 +000058 unsigned char *dllbase, *import_data, *import_name;
59 DWORD pe_offset, opt_offset;
60 WORD opt_magic;
61 int num_dict_off, import_off;
Mark Hammond1f7838b2000-10-05 10:54:45 +000062
Antoine Pitrouf95a1b32010-05-09 15:52:27 +000063 /* Safety check input */
64 if (hModule == NULL) {
65 return NULL;
66 }
Mark Hammond1f7838b2000-10-05 10:54:45 +000067
Antoine Pitrouf95a1b32010-05-09 15:52:27 +000068 /* Module instance is also the base load address. First portion of
69 memory is the MS-DOS loader, which holds the offset to the PE
70 header (from the load base) at 0x3C */
71 dllbase = (unsigned char *)hModule;
72 pe_offset = DWORD_AT(dllbase + 0x3C);
Mark Hammond1f7838b2000-10-05 10:54:45 +000073
Antoine Pitrouf95a1b32010-05-09 15:52:27 +000074 /* The PE signature must be "PE\0\0" */
75 if (memcmp(dllbase+pe_offset,"PE\0\0",4)) {
76 return NULL;
77 }
Mark Hammond1f7838b2000-10-05 10:54:45 +000078
Antoine Pitrouf95a1b32010-05-09 15:52:27 +000079 /* Following the PE signature is the standard COFF header (20
80 bytes) and then the optional header. The optional header starts
81 with a magic value of 0x10B for PE32 or 0x20B for PE32+ (PE32+
82 uses 64-bits for some fields). It might also be 0x107 for a ROM
83 image, but we don't process that here.
Mark Hammond1f7838b2000-10-05 10:54:45 +000084
Antoine Pitrouf95a1b32010-05-09 15:52:27 +000085 The optional header ends with a data dictionary that directly
86 points to certain types of data, among them the import entries
87 (in the second table entry). Based on the header type, we
88 determine offsets for the data dictionary count and the entry
89 within the dictionary pointing to the imports. */
Mark Hammond1f7838b2000-10-05 10:54:45 +000090
Antoine Pitrouf95a1b32010-05-09 15:52:27 +000091 opt_offset = pe_offset + 4 + 20;
92 opt_magic = WORD_AT(dllbase+opt_offset);
93 if (opt_magic == 0x10B) {
94 /* PE32 */
95 num_dict_off = 92;
96 import_off = 104;
97 } else if (opt_magic == 0x20B) {
98 /* PE32+ */
99 num_dict_off = 108;
100 import_off = 120;
101 } else {
102 /* Unsupported */
103 return NULL;
104 }
Mark Hammond1f7838b2000-10-05 10:54:45 +0000105
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000106 /* Now if an import table exists, offset to it and walk the list of
107 imports. The import table is an array (ending when an entry has
108 empty values) of structures (20 bytes each), which contains (at
109 offset 12) a relative address (to the module base) at which a
110 string constant holding the import name is located. */
Mark Hammond1f7838b2000-10-05 10:54:45 +0000111
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000112 if (DWORD_AT(dllbase + opt_offset + num_dict_off) >= 2) {
113 /* We have at least 2 tables - the import table is the second
114 one. But still it may be that the table size is zero */
115 if (0 == DWORD_AT(dllbase + opt_offset + import_off + sizeof(DWORD)))
116 return NULL;
117 import_data = dllbase + DWORD_AT(dllbase +
118 opt_offset +
119 import_off);
120 while (DWORD_AT(import_data)) {
121 import_name = dllbase + DWORD_AT(import_data+12);
122 if (strlen(import_name) >= 6 &&
123 !strncmp(import_name,"python",6)) {
124 char *pch;
Mark Hammond1f7838b2000-10-05 10:54:45 +0000125
Martin v. Löwis4d0d4712010-12-03 20:14:31 +0000126#ifndef _DEBUG
127 /* In a release version, don't claim that python3.dll is
128 a Python DLL. */
129 if (strcmp(import_name, "python3.dll") == 0) {
130 import_data += 20;
131 continue;
132 }
133#endif
134
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000135 /* Ensure python prefix is followed only
136 by numbers to the end of the basename */
137 pch = import_name + 6;
Thomas Heller1df04612004-07-02 08:53:57 +0000138#ifdef _DEBUG
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000139 while (*pch && pch[0] != '_' && pch[1] != 'd' && pch[2] != '.') {
Thomas Heller1df04612004-07-02 08:53:57 +0000140#else
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000141 while (*pch && *pch != '.') {
Thomas Heller1df04612004-07-02 08:53:57 +0000142#endif
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000143 if (*pch >= '0' && *pch <= '9') {
144 pch++;
145 } else {
146 pch = NULL;
147 break;
148 }
149 }
Mark Hammond1f7838b2000-10-05 10:54:45 +0000150
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000151 if (pch) {
152 /* Found it - return the name */
153 return import_name;
154 }
155 }
156 import_data += 20;
157 }
158 }
159
160 return NULL;
Mark Hammond1f7838b2000-10-05 10:54:45 +0000161}
Mark Hammond1f7838b2000-10-05 10:54:45 +0000162
Nick Coghland5cacbb2015-05-23 22:24:10 +1000163dl_funcptr _PyImport_FindSharedFuncptrWindows(const char *prefix,
164 const char *shortname,
165 PyObject *pathname, FILE *fp)
Guido van Rossum22a1d361999-12-20 21:18:49 +0000166{
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000167 dl_funcptr p;
168 char funcname[258], *import_python;
Guido van Rossum96a8fb71999-12-22 14:09:35 +0000169
Martin v. Löwis4d0d4712010-12-03 20:14:31 +0000170 _Py_CheckPython3();
Martin v. Löwis4d0d4712010-12-03 20:14:31 +0000171
Serhiy Storchaka4c8f09d2020-07-10 23:26:06 +0300172#if USE_UNICODE_WCHAR_CACHE
173 const wchar_t *wpathname = _PyUnicode_AsUnicode(pathname);
174#else /* USE_UNICODE_WCHAR_CACHE */
175 wchar_t *wpathname = PyUnicode_AsWideCharString(pathname, NULL);
176#endif /* USE_UNICODE_WCHAR_CACHE */
Victor Stinner33354472011-11-21 02:01:41 +0100177 if (wpathname == NULL)
178 return NULL;
179
Steve Dower76891542015-05-23 08:59:25 -0700180 PyOS_snprintf(funcname, sizeof(funcname), "%.20s_%.200s", prefix, shortname);
Guido van Rossum22a1d361999-12-20 21:18:49 +0000181
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000182 {
183 HINSTANCE hDLL = NULL;
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000184 unsigned int old_mode;
Victor Stinner67002af2011-10-02 20:35:10 +0200185
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000186 /* Don't display a message box when Python can't load a DLL */
187 old_mode = SetErrorMode(SEM_FAILCRITICALERRORS);
Christian Heimesbbffeb62008-01-24 09:42:52 +0000188
Steve Dower2438cdf2019-03-29 16:37:16 -0700189 /* bpo-36085: We use LoadLibraryEx with restricted search paths
190 to avoid DLL preloading attacks and enable use of the
191 AddDllDirectory function. We add SEARCH_DLL_LOAD_DIR to
192 ensure DLLs adjacent to the PYD are preferred. */
Tony Roberts4860f012019-02-02 18:16:42 +0100193 Py_BEGIN_ALLOW_THREADS
Victor Stinner33354472011-11-21 02:01:41 +0100194 hDLL = LoadLibraryExW(wpathname, NULL,
Steve Dower2438cdf2019-03-29 16:37:16 -0700195 LOAD_LIBRARY_SEARCH_DEFAULT_DIRS |
196 LOAD_LIBRARY_SEARCH_DLL_LOAD_DIR);
Tony Roberts4860f012019-02-02 18:16:42 +0100197 Py_END_ALLOW_THREADS
Serhiy Storchaka4c8f09d2020-07-10 23:26:06 +0300198#if !USE_UNICODE_WCHAR_CACHE
199 PyMem_Free(wpathname);
200#endif /* USE_UNICODE_WCHAR_CACHE */
Christian Heimesbbffeb62008-01-24 09:42:52 +0000201
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000202 /* restore old error mode settings */
203 SetErrorMode(old_mode);
Christian Heimesbbffeb62008-01-24 09:42:52 +0000204
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000205 if (hDLL==NULL){
206 PyObject *message;
207 unsigned int errorCode;
Guido van Rossum22a1d361999-12-20 21:18:49 +0000208
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000209 /* Get an error string from Win32 error code */
210 wchar_t theInfo[256]; /* Pointer to error text
211 from system */
212 int theLength; /* Length of error text */
Guido van Rossum22a1d361999-12-20 21:18:49 +0000213
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000214 errorCode = GetLastError();
Guido van Rossum22a1d361999-12-20 21:18:49 +0000215
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000216 theLength = FormatMessageW(
217 FORMAT_MESSAGE_FROM_SYSTEM |
218 FORMAT_MESSAGE_IGNORE_INSERTS, /* flags */
219 NULL, /* message source */
220 errorCode, /* the message (error) ID */
221 MAKELANGID(LANG_NEUTRAL,
222 SUBLANG_DEFAULT),
223 /* Default language */
224 theInfo, /* the buffer */
Gregory P. Smithb803c6c2013-03-23 16:05:36 -0700225 sizeof(theInfo) / sizeof(wchar_t), /* size in wchars */
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000226 NULL); /* no additional format args. */
Guido van Rossum22a1d361999-12-20 21:18:49 +0000227
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000228 /* Problem: could not get the error message.
229 This should not happen if called correctly. */
230 if (theLength == 0) {
231 message = PyUnicode_FromFormat(
shireenrao24fe4602019-08-17 16:50:39 -0400232 "DLL load failed with error code %u while importing %s",
233 errorCode, shortname);
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000234 } else {
235 /* For some reason a \r\n
236 is appended to the text */
237 if (theLength >= 2 &&
238 theInfo[theLength-2] == '\r' &&
239 theInfo[theLength-1] == '\n') {
240 theLength -= 2;
241 theInfo[theLength] = '\0';
242 }
shireenrao24fe4602019-08-17 16:50:39 -0400243 message = PyUnicode_FromFormat(
244 "DLL load failed while importing %s: ", shortname);
Amaury Forgeot d'Arcd6179e12008-01-03 23:42:13 +0000245
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000246 PyUnicode_AppendAndDel(&message,
Victor Stinner9d3b93b2011-11-22 02:27:30 +0100247 PyUnicode_FromWideChar(
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000248 theInfo,
249 theLength));
250 }
Victor Stinner67002af2011-10-02 20:35:10 +0200251 if (message != NULL) {
Richard Oudkerk409f9022013-06-10 15:38:54 +0100252 PyObject *shortname_obj = PyUnicode_FromString(shortname);
253 PyErr_SetImportError(message, shortname_obj, pathname);
254 Py_XDECREF(shortname_obj);
Brian Curtin09b86d12012-04-17 16:57:09 -0500255 Py_DECREF(message);
Victor Stinner67002af2011-10-02 20:35:10 +0200256 }
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000257 return NULL;
258 } else {
259 char buffer[256];
Mark Hammond1f7838b2000-10-05 10:54:45 +0000260
Victor Stinner2d322272011-04-04 23:05:53 +0200261 PyOS_snprintf(buffer, sizeof(buffer),
Thomas Heller1df04612004-07-02 08:53:57 +0000262#ifdef _DEBUG
Victor Stinner2d322272011-04-04 23:05:53 +0200263 "python%d%d_d.dll",
Thomas Heller1df04612004-07-02 08:53:57 +0000264#else
Victor Stinner2d322272011-04-04 23:05:53 +0200265 "python%d%d.dll",
Thomas Heller1df04612004-07-02 08:53:57 +0000266#endif
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000267 PY_MAJOR_VERSION,PY_MINOR_VERSION);
268 import_python = GetPythonImport(hDLL);
Mark Hammond1f7838b2000-10-05 10:54:45 +0000269
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000270 if (import_python &&
Minmin Gong05f2d842019-07-13 06:11:43 -0700271 _stricmp(buffer,import_python)) {
Victor Stinner2d322272011-04-04 23:05:53 +0200272 PyErr_Format(PyExc_ImportError,
273 "Module use of %.150s conflicts "
274 "with this version of Python.",
275 import_python);
Tony Roberts4860f012019-02-02 18:16:42 +0100276 Py_BEGIN_ALLOW_THREADS
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000277 FreeLibrary(hDLL);
Tony Roberts4860f012019-02-02 18:16:42 +0100278 Py_END_ALLOW_THREADS
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000279 return NULL;
280 }
281 }
Tony Roberts4860f012019-02-02 18:16:42 +0100282 Py_BEGIN_ALLOW_THREADS
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000283 p = GetProcAddress(hDLL, funcname);
Tony Roberts4860f012019-02-02 18:16:42 +0100284 Py_END_ALLOW_THREADS
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000285 }
Guido van Rossum22a1d361999-12-20 21:18:49 +0000286
Antoine Pitrouf95a1b32010-05-09 15:52:27 +0000287 return p;
Guido van Rossum22a1d361999-12-20 21:18:49 +0000288}