2 * 386-specific Win32 relay functions
4 * Copyright 1997 Alexandre Julliard
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
22 #include "wine/port.h"
29 #include "wine/unicode.h"
30 #include "wine/debug.h"
31 #include "ntdll_misc.h"
33 WINE_DEFAULT_DEBUG_CHANNEL(relay);
34 WINE_DECLARE_DEBUG_CHANNEL(snoop);
36 const char **debug_relay_excludelist = NULL;
37 const char **debug_relay_includelist = NULL;
38 const char **debug_snoop_excludelist = NULL;
39 const char **debug_snoop_includelist = NULL;
41 static const char **debug_from_relay_excludelist;
42 static const char **debug_from_relay_includelist;
44 /***********************************************************************
47 * Build a function list from a ';'-separated string.
49 static const char **build_list( const WCHAR *bufferW )
53 const char *p = buffer;
56 RtlUnicodeToMultiByteN( buffer, sizeof(buffer), NULL,
57 bufferW, (strlenW(bufferW)+1) * sizeof(WCHAR) );
59 while ((p = strchr( p, ';' )))
64 /* allocate count+1 pointers, plus the space for a copy of the string */
65 if ((ret = RtlAllocateHeap( ntdll_get_process_heap(), 0, (count+1) * sizeof(char*) + strlen(buffer) + 1 )))
67 char *str = (char *)(ret + count + 1);
70 strcpy( str, buffer );
75 if (!(p = strchr( p, ';' ))) break;
84 /***********************************************************************
85 * RELAY_InitDebugLists
87 * Build the relay include/exclude function lists.
89 void RELAY_InitDebugLists(void)
91 OBJECT_ATTRIBUTES attr;
97 static const WCHAR configW[] = {'M','a','c','h','i','n','e','\\',
98 'S','o','f','t','w','a','r','e','\\',
100 'W','i','n','e','\\',
101 'C','o','n','f','i','g','\\',
102 'D','e','b','u','g',0};
103 static const WCHAR RelayIncludeW[] = {'R','e','l','a','y','I','n','c','l','u','d','e',0};
104 static const WCHAR RelayExcludeW[] = {'R','e','l','a','y','E','x','c','l','u','d','e',0};
105 static const WCHAR SnoopIncludeW[] = {'S','n','o','o','p','I','n','c','l','u','d','e',0};
106 static const WCHAR SnoopExcludeW[] = {'S','n','o','o','p','E','x','c','l','u','d','e',0};
107 static const WCHAR RelayFromIncludeW[] = {'R','e','l','a','y','F','r','o','m','I','n','c','l','u','d','e',0};
108 static const WCHAR RelayFromExcludeW[] = {'R','e','l','a','y','F','r','o','m','E','x','c','l','u','d','e',0};
110 attr.Length = sizeof(attr);
111 attr.RootDirectory = 0;
112 attr.ObjectName = &name;
114 attr.SecurityDescriptor = NULL;
115 attr.SecurityQualityOfService = NULL;
116 RtlInitUnicodeString( &name, configW );
118 if (NtOpenKey( &hkey, KEY_ALL_ACCESS, &attr )) return;
120 str = (WCHAR *)((KEY_VALUE_PARTIAL_INFORMATION *)buffer)->Data;
121 RtlInitUnicodeString( &name, RelayIncludeW );
122 if (!NtQueryValueKey( hkey, &name, KeyValuePartialInformation, buffer, sizeof(buffer), &count ))
124 TRACE("RelayInclude = %s\n", debugstr_w(str) );
125 debug_relay_includelist = build_list( str );
128 RtlInitUnicodeString( &name, RelayExcludeW );
129 if (!NtQueryValueKey( hkey, &name, KeyValuePartialInformation, buffer, sizeof(buffer), &count ))
131 TRACE( "RelayExclude = %s\n", debugstr_w(str) );
132 debug_relay_excludelist = build_list( str );
135 RtlInitUnicodeString( &name, SnoopIncludeW );
136 if (!NtQueryValueKey( hkey, &name, KeyValuePartialInformation, buffer, sizeof(buffer), &count ))
138 TRACE_(snoop)( "SnoopInclude = %s\n", debugstr_w(str) );
139 debug_snoop_includelist = build_list( str );
142 RtlInitUnicodeString( &name, SnoopExcludeW );
143 if (!NtQueryValueKey( hkey, &name, KeyValuePartialInformation, buffer, sizeof(buffer), &count ))
145 TRACE_(snoop)( "SnoopExclude = %s\n", debugstr_w(str) );
146 debug_snoop_excludelist = build_list( str );
149 RtlInitUnicodeString( &name, RelayFromIncludeW );
150 if (!NtQueryValueKey( hkey, &name, KeyValuePartialInformation, buffer, sizeof(buffer), &count ))
152 TRACE("RelayFromInclude = %s\n", debugstr_w(str) );
153 debug_from_relay_includelist = build_list( str );
156 RtlInitUnicodeString( &name, RelayFromExcludeW );
157 if (!NtQueryValueKey( hkey, &name, KeyValuePartialInformation, buffer, sizeof(buffer), &count ))
159 TRACE( "RelayFromExclude = %s\n", debugstr_w(str) );
160 debug_from_relay_excludelist = build_list( str );
171 BYTE call; /* 0xe8 call callfrom32 (relative) */
172 DWORD callfrom32 WINE_PACKED; /* RELAY_CallFrom32 relative addr */
173 BYTE ret; /* 0xc2 ret $n or 0xc3 ret */
174 WORD args; /* nb of args to remove from the stack */
175 void *orig; /* original entry point */
176 DWORD argtypes; /* argument types */
180 /***********************************************************************
181 * check_relay_include
183 * Check if a given function must be included in the relay output.
185 static BOOL check_relay_include( const char *module, const char *func )
187 const char **listitem;
190 if (!debug_relay_excludelist && !debug_relay_includelist) return TRUE;
191 if (debug_relay_excludelist)
194 listitem = debug_relay_excludelist;
199 listitem = debug_relay_includelist;
201 for(; *listitem; listitem++)
203 char *p = strrchr( *listitem, '.' );
204 if (p && p > *listitem) /* check module and function */
206 int len = p - *listitem;
207 if (strncasecmp( *listitem, module, len-1 ) || module[len]) continue;
208 if (!strcmp( p + 1, func ) || !strcmp( p + 1, "*" )) return !show;
210 else /* function only */
212 if (!strcmp( *listitem, func )) return !show;
219 /***********************************************************************
220 * check_relay_from_module
222 * Check if calls from a given module must be included in the relay output.
224 static BOOL check_relay_from_module( const char *module )
226 const char **listitem;
229 if (!debug_from_relay_excludelist && !debug_from_relay_includelist) return TRUE;
230 if (debug_from_relay_excludelist)
233 listitem = debug_from_relay_excludelist;
238 listitem = debug_from_relay_includelist;
240 for(; *listitem; listitem++)
244 if (!strcasecmp( *listitem, module )) return !show;
245 len = strlen( *listitem );
246 if (!strncasecmp( *listitem, module, len ) && !strcasecmp( module + len, ".dll" ))
253 /***********************************************************************
256 * Find the name of an exported function.
258 static const char *find_exported_name( const char *module,
259 IMAGE_EXPORT_DIRECTORY *exp, int ordinal )
262 const char *ret = NULL;
264 WORD *ordptr = (WORD *)(module + exp->AddressOfNameOrdinals);
265 for (i = 0; i < exp->NumberOfNames; i++, ordptr++)
266 if (*ordptr + exp->Base == ordinal) break;
267 if (i < exp->NumberOfNames)
268 ret = module + ((DWORD*)(module + exp->AddressOfNames))[i];
273 /***********************************************************************
276 * Get the name of the DLL entry point corresponding to a relay address.
278 static void get_entry_point( char *buffer, DEBUG_ENTRY_POINT *relay )
280 IMAGE_EXPORT_DIRECTORY *exp = NULL;
281 DEBUG_ENTRY_POINT *debug;
282 char *p, *base = NULL;
285 PLIST_ENTRY mark, entry;
286 PLDR_MODULE mod = NULL;
289 /* First find the module */
291 mark = &NtCurrentTeb()->Peb->LdrData->InLoadOrderModuleList;
292 for (entry = mark->Flink; entry != mark; entry = entry->Flink)
294 mod = CONTAINING_RECORD(entry, LDR_MODULE, InLoadOrderModuleList);
295 if (!(mod->Flags & LDR_WINE_INTERNAL)) continue;
296 exp = RtlImageDirectoryEntryToData( mod->BaseAddress, TRUE, IMAGE_DIRECTORY_ENTRY_EXPORT, &size );
298 debug = (DEBUG_ENTRY_POINT *)((char *)exp + size);
299 if (debug <= relay && relay < debug + exp->NumberOfFunctions)
301 ordinal = relay - debug;
306 /* Now find the function */
308 base = (char *)mod->BaseAddress;
309 strcpy( buffer, base + exp->Name );
310 p = buffer + strlen(buffer);
311 if (p > buffer + 4 && !strcasecmp( p - 4, ".dll" )) p -= 4;
313 if ((name = find_exported_name( base, exp, ordinal + exp->Base )))
314 sprintf( p, ".%s", name );
316 sprintf( p, ".%ld", ordinal + exp->Base );
320 /***********************************************************************
323 static inline void RELAY_PrintArgs( int *args, int nb_args, unsigned int typemask )
327 if ((typemask & 3) && HIWORD(*args))
330 DPRINTF( "%08x %s", *args, debugstr_w((LPWSTR)*args) );
332 DPRINTF( "%08x %s", *args, debugstr_a((LPCSTR)*args) );
334 else DPRINTF( "%08x", *args );
335 if (nb_args) DPRINTF( "," );
342 typedef LONGLONG (*LONGLONG_CPROC)();
343 typedef LONGLONG (WINAPI *LONGLONG_FARPROC)();
346 /***********************************************************************
347 * call_cdecl_function
349 static LONGLONG call_cdecl_function( LONGLONG_CPROC func, int nb_args, const int *args )
354 case 0: ret = func(); break;
355 case 1: ret = func(args[0]); break;
356 case 2: ret = func(args[0],args[1]); break;
357 case 3: ret = func(args[0],args[1],args[2]); break;
358 case 4: ret = func(args[0],args[1],args[2],args[3]); break;
359 case 5: ret = func(args[0],args[1],args[2],args[3],args[4]); break;
360 case 6: ret = func(args[0],args[1],args[2],args[3],args[4],
362 case 7: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
364 case 8: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
365 args[6],args[7]); break;
366 case 9: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
367 args[6],args[7],args[8]); break;
368 case 10: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
369 args[6],args[7],args[8],args[9]); break;
370 case 11: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
371 args[6],args[7],args[8],args[9],args[10]); break;
372 case 12: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
373 args[6],args[7],args[8],args[9],args[10],
375 case 13: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
376 args[6],args[7],args[8],args[9],args[10],args[11],
378 case 14: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
379 args[6],args[7],args[8],args[9],args[10],args[11],
380 args[12],args[13]); break;
381 case 15: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
382 args[6],args[7],args[8],args[9],args[10],args[11],
383 args[12],args[13],args[14]); break;
384 case 16: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
385 args[6],args[7],args[8],args[9],args[10],args[11],
386 args[12],args[13],args[14],args[15]); break;
388 ERR( "Unsupported nb of args %d\n", nb_args );
397 /***********************************************************************
398 * call_stdcall_function
400 static LONGLONG call_stdcall_function( LONGLONG_FARPROC func, int nb_args, const int *args )
405 case 0: ret = func(); break;
406 case 1: ret = func(args[0]); break;
407 case 2: ret = func(args[0],args[1]); break;
408 case 3: ret = func(args[0],args[1],args[2]); break;
409 case 4: ret = func(args[0],args[1],args[2],args[3]); break;
410 case 5: ret = func(args[0],args[1],args[2],args[3],args[4]); break;
411 case 6: ret = func(args[0],args[1],args[2],args[3],args[4],
413 case 7: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
415 case 8: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
416 args[6],args[7]); break;
417 case 9: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
418 args[6],args[7],args[8]); break;
419 case 10: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
420 args[6],args[7],args[8],args[9]); break;
421 case 11: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
422 args[6],args[7],args[8],args[9],args[10]); break;
423 case 12: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
424 args[6],args[7],args[8],args[9],args[10],
426 case 13: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
427 args[6],args[7],args[8],args[9],args[10],args[11],
429 case 14: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
430 args[6],args[7],args[8],args[9],args[10],args[11],
431 args[12],args[13]); break;
432 case 15: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
433 args[6],args[7],args[8],args[9],args[10],args[11],
434 args[12],args[13],args[14]); break;
435 case 16: ret = func(args[0],args[1],args[2],args[3],args[4],args[5],
436 args[6],args[7],args[8],args[9],args[10],args[11],
437 args[12],args[13],args[14],args[15]); break;
439 ERR( "Unsupported nb of args %d\n", nb_args );
448 /***********************************************************************
451 * Stack layout on entry to this function:
456 * (esp) return addr to relay code
458 static LONGLONG RELAY_CallFrom32( int ret_addr, ... )
463 int *args = &ret_addr + 1;
464 /* Relay addr is the return address for this function */
465 BYTE *relay_addr = (BYTE *)__builtin_return_address(0);
466 DEBUG_ENTRY_POINT *relay = (DEBUG_ENTRY_POINT *)(relay_addr - 5);
467 WORD nb_args = relay->args / sizeof(int);
471 get_entry_point( buffer, relay );
473 DPRINTF( "%04lx:Call %s(", GetCurrentThreadId(), buffer );
474 RELAY_PrintArgs( args, nb_args, relay->argtypes );
475 DPRINTF( ") ret=%08x\n", ret_addr );
478 if (relay->ret == 0xc3) /* cdecl */
480 ret = call_cdecl_function( (LONGLONG_CPROC)relay->orig, nb_args, args );
484 ret = call_stdcall_function( (LONGLONG_FARPROC)relay->orig, nb_args, args );
489 BOOL ret64 = (relay->argtypes & 0x80000000) && (nb_args < 16);
491 DPRINTF( "%04lx:Ret %s() retval=%08x%08x ret=%08x\n",
492 GetCurrentThreadId(),
493 buffer, (UINT)(ret >> 32), (UINT)ret, ret_addr );
495 DPRINTF( "%04lx:Ret %s() retval=%08x ret=%08x\n",
496 GetCurrentThreadId(),
497 buffer, (UINT)ret, ret_addr );
503 /***********************************************************************
504 * RELAY_CallFrom32Regs
506 * Stack layout (esp is context->Esp, not the current %esp):
510 * (esp) return addr to caller
511 * (esp-4) return addr to DEBUG_ENTRY_POINT
512 * (esp-8) ptr to relay entry code for RELAY_CallFrom32Regs
513 * ... >128 bytes space free to be modified (ensured by the assembly glue)
515 void WINAPI RELAY_DoCallFrom32Regs( CONTEXT86 *context )
522 BYTE *relay_addr = *((BYTE **)context->Esp - 1);
523 DEBUG_ENTRY_POINT *relay = (DEBUG_ENTRY_POINT *)(relay_addr - 5);
524 WORD nb_args = relay->args / sizeof(int);
526 /* remove extra stuff from the stack */
527 context->Eip = *(DWORD *)context->Esp;
528 context->Esp += sizeof(DWORD);
529 args = (int *)context->Esp;
530 if (relay->ret == 0xc2) /* stdcall */
531 context->Esp += nb_args * sizeof(int);
533 entry_point = (BYTE *)relay->orig;
534 assert( *entry_point == 0xe8 /* lcall */ );
538 get_entry_point( buffer, relay );
540 DPRINTF( "%04lx:Call %s(", GetCurrentThreadId(), buffer );
541 RELAY_PrintArgs( args, nb_args, relay->argtypes );
542 DPRINTF( ") ret=%08lx fs=%04lx\n", context->Eip, context->SegFs );
544 DPRINTF(" eax=%08lx ebx=%08lx ecx=%08lx edx=%08lx esi=%08lx edi=%08lx\n",
545 context->Eax, context->Ebx, context->Ecx,
546 context->Edx, context->Esi, context->Edi );
547 DPRINTF(" ebp=%08lx esp=%08lx ds=%04lx es=%04lx gs=%04lx flags=%08lx\n",
548 context->Ebp, context->Esp, context->SegDs,
549 context->SegEs, context->SegGs, context->EFlags );
552 /* Now call the real function */
554 memcpy( args_copy, args, nb_args * sizeof(args[0]) );
555 args_copy[nb_args] = (int)context; /* append context argument */
556 if (relay->ret == 0xc3) /* cdecl */
558 call_cdecl_function( *(LONGLONG_CPROC *)(entry_point + 5), nb_args+1, args_copy );
562 call_stdcall_function( *(LONGLONG_FARPROC *)(entry_point + 5), nb_args+1, args_copy );
567 DPRINTF( "%04lx:Ret %s() retval=%08lx ret=%08lx fs=%04lx\n",
568 GetCurrentThreadId(),
569 buffer, context->Eax, context->Eip, context->SegFs );
571 DPRINTF(" eax=%08lx ebx=%08lx ecx=%08lx edx=%08lx esi=%08lx edi=%08lx\n",
572 context->Eax, context->Ebx, context->Ecx,
573 context->Edx, context->Esi, context->Edi );
574 DPRINTF(" ebp=%08lx esp=%08lx ds=%04lx es=%04lx gs=%04lx flags=%08lx\n",
575 context->Ebp, context->Esp, context->SegDs,
576 context->SegEs, context->SegGs, context->EFlags );
580 void WINAPI RELAY_CallFrom32Regs(void);
581 __ASM_GLOBAL_FUNC( RELAY_CallFrom32Regs,
582 "call " __ASM_NAME("__wine_call_from_32_regs") "\n\t"
583 ".long " __ASM_NAME("RELAY_DoCallFrom32Regs") ",0" );
586 /* check whether the function at addr starts with a call to __wine_call_from_32_regs */
587 static BOOL is_register_entry_point( const BYTE *addr )
589 extern void __wine_call_from_32_regs();
593 if (*addr != 0xe8) return FALSE; /* not a call */
594 /* check if call target is __wine_call_from_32_regs */
595 offset = (int *)(addr + 1);
596 if (*offset == (char *)__wine_call_from_32_regs - (char *)(offset + 1)) return TRUE;
597 /* now check if call target is an import table jump to __wine_call_from_32_regs */
598 addr = (BYTE *)(offset + 1) + *offset;
599 if (addr[0] != 0xff || addr[1] != 0x25) return FALSE; /* not an indirect jmp */
600 ptr = *(void **)(addr + 2); /* get indirect jmp target address */
601 return (*(char **)ptr == (char *)__wine_call_from_32_regs);
605 /***********************************************************************
606 * RELAY_GetProcAddress
608 * Return the proc address to use for a given function.
610 FARPROC RELAY_GetProcAddress( HMODULE module, IMAGE_EXPORT_DIRECTORY *exports,
611 DWORD exp_size, FARPROC proc, const char *user )
613 DEBUG_ENTRY_POINT *debug = (DEBUG_ENTRY_POINT *)proc;
614 DEBUG_ENTRY_POINT *list = (DEBUG_ENTRY_POINT *)((char *)exports + exp_size);
616 if (debug < list || debug >= list + exports->NumberOfFunctions) return proc;
617 if (list + (debug - list) != debug) return proc; /* not a valid address */
618 if (check_relay_from_module( user )) return proc; /* we want to relay it */
619 if (!debug->call) return proc; /* not a normal function */
620 if (debug->call != 0xe8 && debug->call != 0xe9) return proc; /* not a debug thunk at all */
625 /***********************************************************************
628 * Setup relay debugging for a built-in dll.
630 void RELAY_SetupDLL( const char *module )
632 IMAGE_EXPORT_DIRECTORY *exports;
633 DEBUG_ENTRY_POINT *debug;
637 char *p, dllname[80];
640 exports = RtlImageDirectoryEntryToData( (HMODULE)module, TRUE,
641 IMAGE_DIRECTORY_ENTRY_EXPORT, &size );
642 if (!exports) return;
643 debug = (DEBUG_ENTRY_POINT *)((char *)exports + size);
644 funcs = (DWORD *)(module + exports->AddressOfFunctions);
645 strcpy( dllname, module + exports->Name );
646 p = dllname + strlen(dllname) - 4;
647 if (p > dllname && !strcasecmp( p, ".dll" )) *p = 0;
649 for (i = 0; i < exports->NumberOfFunctions; i++, funcs++, debug++)
653 if (!debug->call) continue; /* not a normal function */
654 if (debug->call != 0xe8 && debug->call != 0xe9) break; /* not a debug thunk at all */
656 if ((name = find_exported_name( module, exports, i + exports->Base )))
657 on = check_relay_include( dllname, name );
661 debug->call = 0xe8; /* call relative */
662 if (is_register_entry_point( debug->orig ))
663 debug->callfrom32 = (char *)RELAY_CallFrom32Regs - (char *)&debug->ret;
665 debug->callfrom32 = (char *)RELAY_CallFrom32 - (char *)&debug->ret;
669 debug->call = 0xe9; /* jmp relative */
670 debug->callfrom32 = (char *)debug->orig - (char *)&debug->ret;
673 debug->orig = (FARPROC)(module + (DWORD)*funcs);
674 *funcs = (char *)debug - module;
680 FARPROC RELAY_GetProcAddress( HMODULE module, IMAGE_EXPORT_DIRECTORY *exports,
681 DWORD exp_size, FARPROC proc, const char *user )
686 void RELAY_SetupDLL( const char *module )
690 #endif /* __i386__ */