2 * 386-specific Win16 dll<->dll snooping functions
4 * Copyright 1998 Marcus Meissner
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
22 #include "wine/port.h"
30 #include "wine/winbase16.h"
31 #include "wine/library.h"
33 #include "stackframe.h"
34 #include "builtin16.h"
37 #include "wine/debug.h"
39 WINE_DEFAULT_DEBUG_CHANNEL(snoop
);
45 void WINAPI
SNOOP16_Entry(FARPROC proc
, LPBYTE args
, CONTEXT86
*context
);
46 void WINAPI
SNOOP16_Return(FARPROC proc
, LPBYTE args
, CONTEXT86
*context
);
48 typedef struct tagSNOOP16_FUN
{
50 BYTE lcall
; /* 0x9a call absolute with segment */
58 typedef struct tagSNOOP16_DLL
{
62 struct tagSNOOP16_DLL
*next
;
66 typedef struct tagSNOOP16_RETURNENTRY
{
68 BYTE lcall
; /* 0x9a call absolute with segment */
75 WORD
*args
; /* saved args across a stdcall */
76 } SNOOP16_RETURNENTRY
;
78 typedef struct tagSNOOP16_RETURNENTRIES
{
79 SNOOP16_RETURNENTRY entry
[65500/sizeof(SNOOP16_RETURNENTRY
)];
81 struct tagSNOOP16_RETURNENTRIES
*next
;
82 } SNOOP16_RETURNENTRIES
;
84 typedef struct tagSNOOP16_RELAY
{
85 WORD pushbp
; /* 0x5566 */
86 BYTE pusheax
; /* 0x50 */
87 WORD pushax
; /* 0x5066 */
88 BYTE pushl
; /* 0x68 */
89 DWORD realfun
; /* SNOOP16_Return */
90 BYTE lcall
; /* 0x9a call absolute with segment */
93 WORD lret
; /* 0xcb66 */
98 static SNOOP16_DLL
*firstdll
= NULL
;
99 static SNOOP16_RETURNENTRIES
*firstrets
= NULL
;
100 static SNOOP16_RELAY
*snr
;
101 static HANDLE16 xsnr
= 0;
104 SNOOP16_RegisterDLL(NE_MODULE
*pModule
,LPCSTR name
) {
105 SNOOP16_DLL
**dll
= &(firstdll
);
108 if (!TRACE_ON(snoop
)) return;
110 TRACE("hmod=%x, name=%s\n", pModule
->self
, name
);
113 xsnr
=GLOBAL_Alloc(GMEM_ZEROINIT
,2*sizeof(*snr
),0,WINE_LDT_FLAGS_CODE
|WINE_LDT_FLAGS_32BIT
);
114 snr
= GlobalLock16(xsnr
);
115 snr
[0].pushbp
= 0x5566;
116 snr
[0].pusheax
= 0x50;
117 snr
[0].pushax
= 0x5066;
119 snr
[0].realfun
= (DWORD
)SNOOP16_Entry
;
121 snr
[0].callfromregs
= (DWORD
)__wine_call_from_16_regs
;
122 snr
[0].seg
= wine_get_cs();
123 snr
[0].lret
= 0xcb66;
125 snr
[1].pushbp
= 0x5566;
126 snr
[1].pusheax
= 0x50;
127 snr
[1].pushax
= 0x5066;
129 snr
[1].realfun
= (DWORD
)SNOOP16_Return
;
131 snr
[1].callfromregs
= (DWORD
)__wine_call_from_16_regs
;
132 snr
[1].seg
= wine_get_cs();
133 snr
[1].lret
= 0xcb66;
136 if ((*dll
)->hmod
== pModule
->self
)
138 /* another dll, loaded at the same address */
139 GlobalUnlock16((*dll
)->funhandle
);
140 GlobalFree16((*dll
)->funhandle
);
143 dll
= &((*dll
)->next
);
145 *dll
= HeapReAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY
, *dll
, sizeof(SNOOP16_DLL
)+strlen(name
));
147 (*dll
)->hmod
= pModule
->self
;
148 if ((s
=strrchr(name
,'\\')))
150 strcpy( (*dll
)->name
, name
);
151 if ((s
=strrchr((*dll
)->name
,'.')))
153 (*dll
)->funhandle
= GlobalHandleToSel16(GLOBAL_Alloc(GMEM_ZEROINIT
,65535,0,WINE_LDT_FLAGS_CODE
));
154 (*dll
)->funs
= GlobalLock16((*dll
)->funhandle
);
156 HeapFree(GetProcessHeap(),0,*dll
);
157 FIXME("out of memory\n");
163 SNOOP16_GetProcAddress16(HMODULE16 hmod
,DWORD ordinal
,FARPROC16 origfun
) {
164 SNOOP16_DLL
*dll
= firstdll
;
166 NE_MODULE
*pModule
= NE_GetPtr(hmod
);
170 if (!TRACE_ON(snoop
) || !pModule
|| !HIWORD(origfun
))
172 if (!*(LPBYTE
)MapSL((SEGPTR
)origfun
)) /* 0x00 is an imposs. opcode, poss. dataref. */
175 if (hmod
== dll
->hmod
)
179 if (!dll
) /* probably internal */
181 if (ordinal
>65535/sizeof(SNOOP16_FUN
))
183 fun
= dll
->funs
+ordinal
;
186 fun
->snr
= MAKELONG(0,xsnr
);
187 fun
->origfun
= origfun
;
189 return (FARPROC16
)(SEGPTR
)MAKELONG(((char*)fun
-(char*)dll
->funs
),dll
->funhandle
);
190 cpnt
= (unsigned char *)pModule
+ pModule
->name_table
;
192 cpnt
+= *cpnt
+ 1 + sizeof(WORD
);
193 if (*(WORD
*)(cpnt
+*cpnt
+1) == ordinal
) {
194 sprintf(name
,"%.*s",*cpnt
,cpnt
+1);
198 /* Now search the non-resident names table */
200 if (!*cpnt
&& pModule
->nrname_handle
) {
201 cpnt
= (char *)GlobalLock16( pModule
->nrname_handle
);
203 cpnt
+= *cpnt
+ 1 + sizeof(WORD
);
204 if (*(WORD
*)(cpnt
+*cpnt
+1) == ordinal
) {
205 sprintf(name
,"%.*s",*cpnt
,cpnt
+1);
212 fun
->name
= HeapAlloc(GetProcessHeap(),0,strlen(name
)+1);
213 strcpy( fun
->name
, name
);
216 fun
->name
= HeapAlloc(GetProcessHeap(),HEAP_ZERO_MEMORY
,1); /* empty string */
218 if (!SNOOP_ShowDebugmsgSnoop(dll
->name
, ordinal
, fun
->name
))
221 /* more magic. do not try to snoop thunk data entries (MMSYSTEM) */
222 if (strchr(fun
->name
,'_')) {
223 char *s
=strchr(fun
->name
,'_');
225 if (!strncasecmp(s
,"_thunkdata",10)) {
226 HeapFree(GetProcessHeap(),0,fun
->name
);
232 fun
->snr
= MAKELONG(0,xsnr
);
233 fun
->origfun
= origfun
;
235 return (FARPROC16
)(SEGPTR
)MAKELONG(((char*)fun
-(char*)dll
->funs
),dll
->funhandle
);
238 #define CALLER1REF (*(DWORD*)(MapSL( MAKESEGPTR(context->SegSs,LOWORD(context->Esp)+4))))
239 void WINAPI
SNOOP16_Entry(FARPROC proc
, LPBYTE args
, CONTEXT86
*context
) {
241 DWORD entry
=(DWORD
)MapSL( MAKESEGPTR(context
->SegCs
,LOWORD(context
->Eip
)) )-5;
242 WORD xcs
= context
->SegCs
;
243 SNOOP16_DLL
*dll
= firstdll
;
244 SNOOP16_FUN
*fun
= NULL
;
245 SNOOP16_RETURNENTRIES
**rets
= &firstrets
;
246 SNOOP16_RETURNENTRY
*ret
;
250 if (xcs
== dll
->funhandle
) {
251 fun
= (SNOOP16_FUN
*)entry
;
252 ordinal
= fun
-dll
->funs
;
258 FIXME("entrypoint 0x%08lx not found\n",entry
);
262 for (i
=0;i
<sizeof((*rets
)->entry
)/sizeof((*rets
)->entry
[0]);i
++)
263 if (!(*rets
)->entry
[i
].origreturn
)
265 if (i
!=sizeof((*rets
)->entry
)/sizeof((*rets
)->entry
[0]))
267 rets
= &((*rets
)->next
);
270 HANDLE16 hand
= GlobalHandleToSel16(GLOBAL_Alloc(GMEM_ZEROINIT
,65535,0,WINE_LDT_FLAGS_CODE
));
271 *rets
= GlobalLock16(hand
);
272 (*rets
)->rethandle
= hand
;
273 i
= 0; /* entry 0 is free */
275 ret
= &((*rets
)->entry
[i
]);
277 ret
->snr
= MAKELONG(sizeof(SNOOP16_RELAY
),xsnr
);
278 ret
->origreturn
= (FARPROC16
)CALLER1REF
;
279 CALLER1REF
= MAKELONG((char*)&(ret
->lcall
)-(char*)((*rets
)->entry
),(*rets
)->rethandle
);
282 ret
->ordinal
= ordinal
;
283 ret
->origSP
= LOWORD(context
->Esp
);
285 context
->Eip
= LOWORD(fun
->origfun
);
286 context
->SegCs
= HIWORD(fun
->origfun
);
289 DPRINTF("CALL %s.%ld: %s(",dll
->name
,ordinal
,fun
->name
);
290 if (fun
->nrofargs
>0) {
294 DPRINTF("%04x%s",*(WORD
*)((char *) MapSL( MAKESEGPTR(context
->SegSs
,LOWORD(context
->Esp
)) )+8+sizeof(WORD
)*i
),i
?",":"");
295 if (max
!=fun
->nrofargs
)
297 } else if (fun
->nrofargs
<0) {
298 DPRINTF("<unknown, check return>");
299 ret
->args
= HeapAlloc(GetProcessHeap(),0,16*sizeof(WORD
));
300 memcpy(ret
->args
,(LPBYTE
)((char *) MapSL( MAKESEGPTR(context
->SegSs
,LOWORD(context
->Esp
)) )+8),sizeof(WORD
)*16);
302 DPRINTF(") ret=%04x:%04x\n",HIWORD(ret
->origreturn
),LOWORD(ret
->origreturn
));
305 void WINAPI
SNOOP16_Return(FARPROC proc
, LPBYTE args
, CONTEXT86
*context
) {
306 SNOOP16_RETURNENTRY
*ret
= (SNOOP16_RETURNENTRY
*)((char *) MapSL( MAKESEGPTR(context
->SegCs
,LOWORD(context
->Eip
)) )-5);
308 /* We haven't found out the nrofargs yet. If we called a cdecl
309 * function it is too late anyway and we can just set '0' (which
310 * will be the difference between orig and current SP
311 * If pascal -> everything ok.
313 if (ret
->dll
->funs
[ret
->ordinal
].nrofargs
<0) {
314 ret
->dll
->funs
[ret
->ordinal
].nrofargs
=(LOWORD(context
->Esp
)-ret
->origSP
-4)/2;
316 context
->Eip
= LOWORD(ret
->origreturn
);
317 context
->SegCs
= HIWORD(ret
->origreturn
);
321 DPRINTF("RET %s.%ld: %s(",ret
->dll
->name
,ret
->ordinal
,ret
->dll
->funs
[ret
->ordinal
].name
);
322 max
= ret
->dll
->funs
[ret
->ordinal
].nrofargs
;
329 DPRINTF("%04x%s",ret
->args
[i
],i
?",":"");
330 if (max
!=ret
->dll
->funs
[ret
->ordinal
].nrofargs
)
332 DPRINTF(") retval = %04x:%04x ret=%04x:%04x\n",
333 (WORD
)context
->Edx
,(WORD
)context
->Eax
,
334 HIWORD(ret
->origreturn
),LOWORD(ret
->origreturn
)
336 HeapFree(GetProcessHeap(),0,ret
->args
);
339 DPRINTF("RET %s.%ld: %s() retval = %04x:%04x ret=%04x:%04x\n",
340 ret
->dll
->name
,ret
->ordinal
,ret
->dll
->funs
[ret
->ordinal
].name
,
341 (WORD
)context
->Edx
,(WORD
)context
->Eax
,
342 HIWORD(ret
->origreturn
),LOWORD(ret
->origreturn
)
344 ret
->origreturn
= NULL
; /* mark as empty */
346 #else /* !__i386__ */
347 void SNOOP16_RegisterDLL(NE_MODULE
*pModule
,LPCSTR name
) {
348 if (!TRACE_ON(snoop
)) return;
349 FIXME("snooping works only on i386 for now.\n");
352 FARPROC16
SNOOP16_GetProcAddress16(HMODULE16 hmod
,DWORD ordinal
,FARPROC16 origfun
) {
355 #endif /* !__i386__ */