ReactOS  0.4.13-dev-100-gc8611ae
ldrinit.c
Go to the documentation of this file.
1 /*
2  * COPYRIGHT: See COPYING in the top level directory
3  * PROJECT: ReactOS NT User-Mode Library
4  * FILE: dll/ntdll/ldr/ldrinit.c
5  * PURPOSE: User-Mode Process/Thread Startup
6  * PROGRAMMERS: Alex Ionescu (alex@relsoft.net)
7  * Aleksey Bragin (aleksey@reactos.org)
8  */
9 
10 /* INCLUDES *****************************************************************/
11 
12 #include <ntdll.h>
13 #include <compat_undoc.h>
14 #include <compatguid_undoc.h>
15 
16 #define NDEBUG
17 #include <debug.h>
18 
19 
20 /* GLOBALS *******************************************************************/
21 
24 UNICODE_STRING ImageExecOptionsString = RTL_CONSTANT_STRING(L"\\Registry\\Machine\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options");
29 
36 
38 
42 extern PTEB LdrpTopLevelDllBeingLoadedTeb; // defined in rtlsupp.c!
45 
46 static NTSTATUS (WINAPI *Kernel32ProcessInitPostImportFunction)(VOID);
47 static BOOL (WINAPI *Kernel32BaseQueryModuleData)(IN LPSTR ModuleName, IN LPSTR Unk1, IN PVOID Unk2, IN PVOID Unk3, IN PVOID Unk4);
48 
66 
68 
71 {
73  -1,
74  0,
75  0,
76  0,
77  0
78 };
80 
82 
85 
86 //extern LIST_ENTRY RtlCriticalSectionList;
87 
91 
92 ULONG RtlpDisableHeapLookaside; // TODO: Move to heap.c
94 
96 void actctx_init(void);
98 
99 #ifdef _WIN64
100 #define DEFAULT_SECURITY_COOKIE 0x00002B992DDFA232ll
101 #else
102 #define DEFAULT_SECURITY_COOKIE 0xBB40E64E
103 #endif
104 
105 /* FUNCTIONS *****************************************************************/
106 
107 /*
108  * @implemented
109  */
110 NTSTATUS
111 NTAPI
113  IN BOOLEAN Wow64,
114  OUT PHANDLE NewKeyHandle)
115 {
116  PHANDLE RootKeyLocation;
117  HANDLE RootKey;
118  UNICODE_STRING SubKeyString;
121  PWCHAR p1;
122 
123  /* Check which root key to open */
124  if (Wow64)
125  RootKeyLocation = &Wow64ExecOptionsKey;
126  else
127  RootKeyLocation = &ImageExecOptionsKey;
128 
129  /* Get the current key */
130  RootKey = *RootKeyLocation;
131 
132  /* Setup the object attributes */
134  Wow64 ?
137  NULL,
138  NULL);
139 
140  /* Open the root key */
142  if (NT_SUCCESS(Status))
143  {
144  /* Write the key handle */
145  if (InterlockedCompareExchangePointer(RootKeyLocation, RootKey, NULL) != NULL)
146  {
147  /* Someone already opened it, use it instead */
148  NtClose(RootKey);
149  RootKey = *RootKeyLocation;
150  }
151 
152  /* Extract the name */
153  SubKeyString = *SubKey;
154  p1 = (PWCHAR)((ULONG_PTR)SubKeyString.Buffer + SubKeyString.Length);
155  while (SubKeyString.Length)
156  {
157  if (p1[-1] == L'\\') break;
158  p1--;
159  SubKeyString.Length -= sizeof(*p1);
160  }
161  SubKeyString.Buffer = p1;
162  SubKeyString.Length = SubKey->Length - SubKeyString.Length;
163 
164  /* Setup the object attributes */
166  &SubKeyString,
168  RootKey,
169  NULL);
170 
171  /* Open the setting key */
172  Status = ZwOpenKey((PHANDLE)NewKeyHandle, GENERIC_READ, &ObjectAttributes);
173  }
174 
175  /* Return to caller */
176  return Status;
177 }
178 
179 /*
180  * @implemented
181  */
182 NTSTATUS
183 NTAPI
186  IN ULONG Type,
187  OUT PVOID Buffer,
190 {
191  ULONG KeyInfo[256];
192  UNICODE_STRING ValueNameString, IntegerString;
193  ULONG KeyInfoSize, ResultSize;
194  PKEY_VALUE_PARTIAL_INFORMATION KeyValueInformation = (PKEY_VALUE_PARTIAL_INFORMATION)&KeyInfo;
195  BOOLEAN FreeHeap = FALSE;
197 
198  /* Build a string for the value name */
199  Status = RtlInitUnicodeStringEx(&ValueNameString, ValueName);
200  if (!NT_SUCCESS(Status)) return Status;
201 
202  /* Query the value */
203  Status = ZwQueryValueKey(KeyHandle,
204  &ValueNameString,
206  KeyValueInformation,
207  sizeof(KeyInfo),
208  &ResultSize);
210  {
211  /* Our local buffer wasn't enough, allocate one */
212  KeyInfoSize = sizeof(KEY_VALUE_PARTIAL_INFORMATION) +
213  KeyValueInformation->DataLength;
214  KeyValueInformation = RtlAllocateHeap(RtlGetProcessHeap(),
215  0,
216  KeyInfoSize);
217  if (KeyValueInformation != NULL)
218  {
219  /* Try again */
220  Status = ZwQueryValueKey(KeyHandle,
221  &ValueNameString,
223  KeyValueInformation,
224  KeyInfoSize,
225  &ResultSize);
226  FreeHeap = TRUE;
227  }
228  else
229  {
230  /* Give up this time */
232  }
233  }
234 
235  /* Check for success */
236  if (NT_SUCCESS(Status))
237  {
238  /* Handle binary data */
239  if (KeyValueInformation->Type == REG_BINARY)
240  {
241  /* Check validity */
242  if ((Buffer) && (KeyValueInformation->DataLength <= BufferSize))
243  {
244  /* Copy into buffer */
246  &KeyValueInformation->Data,
247  KeyValueInformation->DataLength);
248  }
249  else
250  {
252  }
253 
254  /* Copy the result length */
255  if (ReturnedLength) *ReturnedLength = KeyValueInformation->DataLength;
256  }
257  else if (KeyValueInformation->Type == REG_DWORD)
258  {
259  /* Check for valid type */
260  if (KeyValueInformation->Type != Type)
261  {
262  /* Error */
264  }
265  else
266  {
267  /* Check validity */
268  if ((Buffer) &&
269  (BufferSize == sizeof(ULONG)) &&
270  (KeyValueInformation->DataLength <= BufferSize))
271  {
272  /* Copy into buffer */
274  &KeyValueInformation->Data,
275  KeyValueInformation->DataLength);
276  }
277  else
278  {
280  }
281 
282  /* Copy the result length */
283  if (ReturnedLength) *ReturnedLength = KeyValueInformation->DataLength;
284  }
285  }
286  else if (KeyValueInformation->Type != REG_SZ)
287  {
288  /* We got something weird */
290  }
291  else
292  {
293  /* String, check what you requested */
294  if (Type == REG_DWORD)
295  {
296  /* Validate */
297  if (BufferSize != sizeof(ULONG))
298  {
299  /* Invalid size */
300  BufferSize = 0;
302  }
303  else
304  {
305  /* OK, we know what you want... */
306  IntegerString.Buffer = (PWSTR)KeyValueInformation->Data;
307  IntegerString.Length = (USHORT)KeyValueInformation->DataLength -
308  sizeof(WCHAR);
309  IntegerString.MaximumLength = (USHORT)KeyValueInformation->DataLength;
310  Status = RtlUnicodeStringToInteger(&IntegerString, 0, (PULONG)Buffer);
311  }
312  }
313  else
314  {
315  /* Validate */
316  if (KeyValueInformation->DataLength > BufferSize)
317  {
318  /* Invalid */
320  }
321  else
322  {
323  /* Set the size */
324  BufferSize = KeyValueInformation->DataLength;
325  }
326 
327  /* Copy the string */
328  RtlMoveMemory(Buffer, &KeyValueInformation->Data, BufferSize);
329  }
330 
331  /* Copy the result length */
332  if (ReturnedLength) *ReturnedLength = KeyValueInformation->DataLength;
333  }
334  }
335 
336  /* Check if buffer was in heap */
337  if (FreeHeap) RtlFreeHeap(RtlGetProcessHeap(), 0, KeyValueInformation);
338 
339  /* Return status */
340  return Status;
341 }
342 
343 /*
344  * @implemented
345  */
346 NTSTATUS
347 NTAPI
350  IN ULONG Type,
351  OUT PVOID Buffer,
354  IN BOOLEAN Wow64)
355 {
358 
359  /* Open a handle to the key */
360  Status = LdrOpenImageFileOptionsKey(SubKey, Wow64, &KeyHandle);
361 
362  /* Check for success */
363  if (NT_SUCCESS(Status))
364  {
365  /* Query the data */
367  ValueName,
368  Type,
369  Buffer,
370  BufferSize,
372 
373  /* Close the key */
375  }
376 
377  /* Return to caller */
378  return Status;
379 }
380 
381 /*
382  * @implemented
383  */
384 NTSTATUS
385 NTAPI
388  IN ULONG Type,
389  OUT PVOID Buffer,
392 {
393  /* Call the newer function */
395  ValueName,
396  Type,
397  Buffer,
398  BufferSize,
400  FALSE);
401 }
402 
403 VOID
404 NTAPI
406 {
407  // Ignored atm
408 }
409 
410 PVOID
411 NTAPI
413 {
415  ULONG DirSize;
416  PVOID Cookie = NULL;
417 
418  /* Check NT header first */
419  if (!RtlImageNtHeader(BaseAddress)) return NULL;
420 
421  /* Get the pointer to the config directory */
423  TRUE,
425  &DirSize);
426 
427  /* Check for sanity */
428  if (!ConfigDir ||
429  (DirSize != 64 && ConfigDir->Size != DirSize) ||
430  (ConfigDir->Size < 0x48))
431  return NULL;
432 
433  /* Now get the cookie */
434  Cookie = (PVOID)ConfigDir->SecurityCookie;
435 
436  /* Check this cookie */
437  if ((PCHAR)Cookie <= (PCHAR)BaseAddress ||
438  (PCHAR)Cookie >= (PCHAR)BaseAddress + SizeOfImage)
439  {
440  Cookie = NULL;
441  }
442 
443  /* Return validated security cookie */
444  return Cookie;
445 }
446 
447 PVOID
448 NTAPI
450 {
453  ULONG_PTR NewCookie;
454 
455  /* Fetch address of the cookie */
457 
458  if (Cookie)
459  {
460  /* Check if it's a default one */
461  if ((*Cookie == DEFAULT_SECURITY_COOKIE) ||
462  (*Cookie == 0xBB40))
463  {
464  /* Make up a cookie from a bunch of values which may uniquely represent
465  current moment of time, environment, etc */
467 
468  NewCookie = Counter.LowPart ^ Counter.HighPart;
469  NewCookie ^= (ULONG_PTR)NtCurrentTeb()->ClientId.UniqueProcess;
470  NewCookie ^= (ULONG_PTR)NtCurrentTeb()->ClientId.UniqueThread;
471 
472  /* Loop like it's done in KeQueryTickCount(). We don't want to call it directly. */
473  while (SharedUserData->SystemTime.High1Time != SharedUserData->SystemTime.High2Time)
474  {
475  YieldProcessor();
476  };
477 
478  /* Calculate the milliseconds value and xor it to the cookie */
479  NewCookie ^= Int64ShrlMod32(UInt32x32To64(SharedUserData->TickCountMultiplier, SharedUserData->TickCount.LowPart), 24) +
480  (SharedUserData->TickCountMultiplier * (SharedUserData->TickCount.High1Time << 8));
481 
482  /* Make the cookie 16bit if necessary */
483  if (*Cookie == 0xBB40) NewCookie &= 0xFFFF;
484 
485  /* If the result is 0 or the same as we got, just subtract one from the existing value
486  and that's it */
487  if ((NewCookie == 0) || (NewCookie == *Cookie))
488  {
489  NewCookie = *Cookie - 1;
490  }
491 
492  /* Set the new cookie value */
493  *Cookie = NewCookie;
494  }
495  }
496 
497  return Cookie;
498 }
499 
500 VOID
501 NTAPI
503 {
504  PPEB Peb = NtCurrentPeb();
505  PLDR_DATA_TABLE_ENTRY LdrEntry;
506  PLIST_ENTRY NextEntry, ListHead;
507  RTL_CALLER_ALLOCATED_ACTIVATION_CONTEXT_STACK_FRAME_EXTENDED ActCtx;
509  PVOID EntryPoint;
510 
511  DPRINT("LdrpInitializeThread() called for %wZ (%p/%p)\n",
513  NtCurrentTeb()->RealClientId.UniqueProcess,
514  NtCurrentTeb()->RealClientId.UniqueThread);
515 
516  /* Allocate an Activation Context Stack */
517  DPRINT("ActivationContextStack %p\n", NtCurrentTeb()->ActivationContextStackPointer);
518  Status = RtlAllocateActivationContextStack(&NtCurrentTeb()->ActivationContextStackPointer);
519  if (!NT_SUCCESS(Status))
520  {
521  DPRINT1("Warning: Unable to allocate ActivationContextStack\n");
522  }
523 
524  /* Make sure we are not shutting down */
525  if (LdrpShutdownInProgress) return;
526 
527  /* Allocate TLS */
528  LdrpAllocateTls();
529 
530  /* Start at the beginning */
531  ListHead = &Peb->Ldr->InMemoryOrderModuleList;
532  NextEntry = ListHead->Flink;
533  while (NextEntry != ListHead)
534  {
535  /* Get the current entry */
536  LdrEntry = CONTAINING_RECORD(NextEntry, LDR_DATA_TABLE_ENTRY, InMemoryOrderLinks);
537 
538  /* Make sure it's not ourselves */
539  if (Peb->ImageBaseAddress != LdrEntry->DllBase)
540  {
541  /* Check if we should call */
542  if (!(LdrEntry->Flags & LDRP_DONT_CALL_FOR_THREADS))
543  {
544  /* Get the entrypoint */
545  EntryPoint = LdrEntry->EntryPoint;
546 
547  /* Check if we are ready to call it */
548  if ((EntryPoint) &&
549  (LdrEntry->Flags & LDRP_PROCESS_ATTACH_CALLED) &&
550  (LdrEntry->Flags & LDRP_IMAGE_DLL))
551  {
552  /* Set up the Act Ctx */
553  ActCtx.Size = sizeof(ActCtx);
554  ActCtx.Format = 1;
556 
557  /* Activate the ActCtx */
559  LdrEntry->EntryPointActivationContext);
560 
561  _SEH2_TRY
562  {
563  /* Check if it has TLS */
564  if (LdrEntry->TlsIndex)
565  {
566  /* Make sure we're not shutting down */
568  {
569  /* Call TLS */
571  }
572  }
573 
574  /* Make sure we're not shutting down */
576  {
577  /* Call the Entrypoint */
578  DPRINT("%wZ - Calling entry point at %p for thread attaching, %p/%p\n",
579  &LdrEntry->BaseDllName, LdrEntry->EntryPoint,
580  NtCurrentTeb()->RealClientId.UniqueProcess,
581  NtCurrentTeb()->RealClientId.UniqueThread);
583  LdrEntry->DllBase,
585  NULL);
586  }
587  }
589  {
590  DPRINT1("WARNING: Exception 0x%x during LdrpCallInitRoutine(DLL_THREAD_ATTACH) for %wZ\n",
591  _SEH2_GetExceptionCode(), &LdrEntry->BaseDllName);
592  }
593  _SEH2_END;
594 
595  /* Deactivate the ActCtx */
597  }
598  }
599  }
600 
601  /* Next entry */
602  NextEntry = NextEntry->Flink;
603  }
604 
605  /* Check for TLS */
607  {
608  /* Set up the Act Ctx */
609  ActCtx.Size = sizeof(ActCtx);
610  ActCtx.Format = 1;
612 
613  /* Activate the ActCtx */
616 
617  _SEH2_TRY
618  {
619  /* Do TLS callbacks */
621  }
623  {
624  /* Do nothing */
625  }
626  _SEH2_END;
627 
628  /* Deactivate the ActCtx */
630  }
631 
632  DPRINT("LdrpInitializeThread() done\n");
633 }
634 
635 NTSTATUS
636 NTAPI
638 {
639  PLDR_DATA_TABLE_ENTRY LocalArray[16];
640  PLIST_ENTRY ListHead;
641  PLIST_ENTRY NextEntry;
642  PLDR_DATA_TABLE_ENTRY LdrEntry, *LdrRootEntry, OldInitializer;
643  PVOID EntryPoint;
644  ULONG Count, i;
645  //ULONG BreakOnInit;
647  PPEB Peb = NtCurrentPeb();
648  RTL_CALLER_ALLOCATED_ACTIVATION_CONTEXT_STACK_FRAME_EXTENDED ActCtx;
649  ULONG BreakOnDllLoad;
650  PTEB OldTldTeb;
651  BOOLEAN DllStatus;
652 
653  DPRINT("LdrpRunInitializeRoutines() called for %wZ (%p/%p)\n",
655  NtCurrentTeb()->RealClientId.UniqueProcess,
656  NtCurrentTeb()->RealClientId.UniqueThread);
657 
658  /* Check the Loader Lock */
660 
661  /* Get the number of entries to call */
662  if ((Count = LdrpClearLoadInProgress()))
663  {
664  /* Check if we can use our local buffer */
665  if (Count > 16)
666  {
667  /* Allocate space for all the entries */
668  LdrRootEntry = RtlAllocateHeap(LdrpHeap,
669  0,
670  Count * sizeof(*LdrRootEntry));
671  if (!LdrRootEntry) return STATUS_NO_MEMORY;
672  }
673  else
674  {
675  /* Use our local array */
676  LdrRootEntry = LocalArray;
677  }
678  }
679  else
680  {
681  /* Don't need one */
682  LdrRootEntry = NULL;
683  }
684 
685  /* Show debug message */
686  if (ShowSnaps)
687  {
688  DPRINT1("[%p,%p] LDR: Real INIT LIST for Process %wZ\n",
689  NtCurrentTeb()->RealClientId.UniqueThread,
690  NtCurrentTeb()->RealClientId.UniqueProcess,
692  }
693 
694  /* Loop in order */
696  NextEntry = ListHead->Flink;
697  i = 0;
698  while (NextEntry != ListHead)
699  {
700  /* Get the Data Entry */
701  LdrEntry = CONTAINING_RECORD(NextEntry, LDR_DATA_TABLE_ENTRY, InInitializationOrderLinks);
702 
703  /* Check if we have a Root Entry */
704  if (LdrRootEntry)
705  {
706  /* Check flags */
707  if (!(LdrEntry->Flags & LDRP_ENTRY_PROCESSED))
708  {
709  /* Setup the Cookie for the DLL */
710  LdrpInitSecurityCookie(LdrEntry);
711 
712  /* Check for valid entrypoint */
713  if (LdrEntry->EntryPoint)
714  {
715  /* Write in array */
716  ASSERT(i < Count);
717  LdrRootEntry[i] = LdrEntry;
718 
719  /* Display debug message */
720  if (ShowSnaps)
721  {
722  DPRINT1("[%p,%p] LDR: %wZ init routine %p\n",
723  NtCurrentTeb()->RealClientId.UniqueThread,
724  NtCurrentTeb()->RealClientId.UniqueProcess,
725  &LdrEntry->FullDllName,
726  LdrEntry->EntryPoint);
727  }
728  i++;
729  }
730  }
731  }
732 
733  /* Set the flag */
734  LdrEntry->Flags |= LDRP_ENTRY_PROCESSED;
735  NextEntry = NextEntry->Flink;
736  }
737 
739 
740  /* If we got a context, then we have to call Kernel32 for TS support */
741  if (Context)
742  {
743  /* Check if we have one */
744  if (Kernel32ProcessInitPostImportFunction)
745  {
746  /* Call it */
747  Status = Kernel32ProcessInitPostImportFunction();
748  if (!NT_SUCCESS(Status))
749  {
750  DPRINT1("LDR: LdrpRunInitializeRoutines - Failed running kernel32 post-import function, Status=0x%08lx\n", Status);
751  }
752  }
753  /* Clear it */
754  Kernel32ProcessInitPostImportFunction = NULL;
755  }
756 
757  /* No root entry? return */
758  if (!LdrRootEntry)
759  return Status;
760 
761  /* Set the TLD TEB */
762  OldTldTeb = LdrpTopLevelDllBeingLoadedTeb;
764 
765  /* Loop */
766  i = 0;
767  while (i < Count)
768  {
769  /* Get an entry */
770  LdrEntry = LdrRootEntry[i];
771 
772  /* FIXME: Verify NX Compat */
773 
774  /* Move to next entry */
775  i++;
776 
777  /* Get its entrypoint */
778  EntryPoint = LdrEntry->EntryPoint;
779 
780  /* Are we being debugged? */
781  BreakOnDllLoad = 0;
783  {
784  /* Check if we should break on load */
786  L"BreakOnDllLoad",
787  REG_DWORD,
788  &BreakOnDllLoad,
789  sizeof(ULONG),
790  NULL);
791  if (!NT_SUCCESS(Status)) BreakOnDllLoad = 0;
792 
793  /* Reset status back to STATUS_SUCCESS */
795  }
796 
797  /* Break if aksed */
798  if (BreakOnDllLoad)
799  {
800  /* Check if we should show a message */
801  if (ShowSnaps)
802  {
803  DPRINT1("LDR: %wZ loaded.", &LdrEntry->BaseDllName);
804  DPRINT1(" - About to call init routine at %p\n", EntryPoint);
805  }
806 
807  /* Break in debugger */
808  DbgBreakPoint();
809  }
810 
811  /* Make sure we have an entrypoint */
812  if (EntryPoint)
813  {
814  /* Save the old Dll Initializer and write the current one */
815  OldInitializer = LdrpCurrentDllInitializer;
816  LdrpCurrentDllInitializer = LdrEntry;
817 
818  /* Set up the Act Ctx */
819  ActCtx.Size = sizeof(ActCtx);
820  ActCtx.Format = 1;
822 
823  /* Activate the ActCtx */
825  LdrEntry->EntryPointActivationContext);
826 
827  _SEH2_TRY
828  {
829  /* Check if it has TLS */
830  if (LdrEntry->TlsIndex && Context)
831  {
832  /* Call TLS */
834  }
835 
836  /* Call the Entrypoint */
837  if (ShowSnaps)
838  {
839  DPRINT1("%wZ - Calling entry point at %p for DLL_PROCESS_ATTACH\n",
840  &LdrEntry->BaseDllName, EntryPoint);
841  }
842  DllStatus = LdrpCallInitRoutine(EntryPoint,
843  LdrEntry->DllBase,
845  Context);
846  }
848  {
849  DllStatus = FALSE;
850  DPRINT1("WARNING: Exception 0x%x during LdrpCallInitRoutine(DLL_PROCESS_ATTACH) for %wZ\n",
851  _SEH2_GetExceptionCode(), &LdrEntry->BaseDllName);
852  }
853  _SEH2_END;
854 
855  /* Deactivate the ActCtx */
857 
858  /* Save the Current DLL Initializer */
859  LdrpCurrentDllInitializer = OldInitializer;
860 
861  /* Mark the entry as processed */
862  LdrEntry->Flags |= LDRP_PROCESS_ATTACH_CALLED;
863 
864  /* Fail if DLL init failed */
865  if (!DllStatus)
866  {
867  DPRINT1("LDR: DLL_PROCESS_ATTACH for dll \"%wZ\" (InitRoutine: %p) failed\n",
868  &LdrEntry->BaseDllName, EntryPoint);
869 
871  goto Quickie;
872  }
873  }
874  }
875 
876  /* Loop in order */
878  NextEntry = NextEntry->Flink;
879  while (NextEntry != ListHead)
880  {
881  /* Get the Data Entry */
882  LdrEntry = CONTAINING_RECORD(NextEntry, LDR_DATA_TABLE_ENTRY, InInitializationOrderLinks);
883 
884  /* FIXME: Verify NX Compat */
885  // LdrpCheckNXCompatibility()
886 
887  /* Next entry */
888  NextEntry = NextEntry->Flink;
889  }
890 
891  /* Check for TLS */
892  if (LdrpImageHasTls && Context)
893  {
894  /* Set up the Act Ctx */
895  ActCtx.Size = sizeof(ActCtx);
896  ActCtx.Format = 1;
898 
899  /* Activate the ActCtx */
902 
903  _SEH2_TRY
904  {
905  /* Do TLS callbacks */
907  }
909  {
910  /* Do nothing */
911  }
912  _SEH2_END;
913 
914  /* Deactivate the ActCtx */
916  }
917 
918 Quickie:
919  /* Restore old TEB */
920  LdrpTopLevelDllBeingLoadedTeb = OldTldTeb;
921 
922  /* Check if the array is in the heap */
923  if (LdrRootEntry != LocalArray)
924  {
925  /* Free the array */
926  RtlFreeHeap(LdrpHeap, 0, LdrRootEntry);
927  }
928 
929  /* Return to caller */
930  DPRINT("LdrpRunInitializeRoutines() done\n");
931  return Status;
932 }
933 
934 /*
935  * @implemented
936  */
937 NTSTATUS
938 NTAPI
940 {
941  PPEB Peb = NtCurrentPeb();
942  PLDR_DATA_TABLE_ENTRY LdrEntry;
943  PLIST_ENTRY NextEntry, ListHead;
944  RTL_CALLER_ALLOCATED_ACTIVATION_CONTEXT_STACK_FRAME_EXTENDED ActCtx;
945  PVOID EntryPoint;
946 
947  DPRINT("LdrShutdownProcess() called for %wZ\n", &LdrpImageEntry->BaseDllName);
949 
950  /* Tell the Shim Engine */
951  if (g_ShimsEnabled)
952  {
955  SE_ProcessDying();
956  }
957 
958  /* Tell the world */
959  if (ShowSnaps)
960  {
961  DPRINT1("\n");
962  }
963 
964  /* Set the shutdown variables */
965  LdrpShutdownThreadId = NtCurrentTeb()->RealClientId.UniqueThread;
967 
968  /* Enter the Loader Lock */
970 
971  /* Cleanup trace logging data (Etw) */
972  if (SharedUserData->TraceLogging)
973  {
974  /* FIXME */
975  DPRINT1("We don't support Etw yet.\n");
976  }
977 
978  /* Start at the end */
980  NextEntry = ListHead->Blink;
981  while (NextEntry != ListHead)
982  {
983  /* Get the current entry */
984  LdrEntry = CONTAINING_RECORD(NextEntry, LDR_DATA_TABLE_ENTRY, InInitializationOrderLinks);
985  NextEntry = NextEntry->Blink;
986 
987  /* Make sure it's not ourselves */
988  if (Peb->ImageBaseAddress != LdrEntry->DllBase)
989  {
990  /* Get the entrypoint */
991  EntryPoint = LdrEntry->EntryPoint;
992 
993  /* Check if we are ready to call it */
994  if (EntryPoint &&
995  (LdrEntry->Flags & LDRP_PROCESS_ATTACH_CALLED) &&
996  LdrEntry->Flags)
997  {
998  /* Set up the Act Ctx */
999  ActCtx.Size = sizeof(ActCtx);
1000  ActCtx.Format = 1;
1002 
1003  /* Activate the ActCtx */
1005  LdrEntry->EntryPointActivationContext);
1006 
1007  _SEH2_TRY
1008  {
1009  /* Check if it has TLS */
1010  if (LdrEntry->TlsIndex)
1011  {
1012  /* Call TLS */
1014  }
1015 
1016  /* Call the Entrypoint */
1017  DPRINT("%wZ - Calling entry point at %p for thread detaching\n",
1018  &LdrEntry->BaseDllName, LdrEntry->EntryPoint);
1019  LdrpCallInitRoutine(EntryPoint,
1020  LdrEntry->DllBase,
1022  (PVOID)1);
1023  }
1025  {
1026  DPRINT1("WARNING: Exception 0x%x during LdrpCallInitRoutine(DLL_PROCESS_DETACH) for %wZ\n",
1027  _SEH2_GetExceptionCode(), &LdrEntry->BaseDllName);
1028  }
1029  _SEH2_END;
1030 
1031  /* Deactivate the ActCtx */
1033  }
1034  }
1035  }
1036 
1037  /* Check for TLS */
1038  if (LdrpImageHasTls)
1039  {
1040  /* Set up the Act Ctx */
1041  ActCtx.Size = sizeof(ActCtx);
1042  ActCtx.Format = 1;
1044 
1045  /* Activate the ActCtx */
1048 
1049  _SEH2_TRY
1050  {
1051  /* Do TLS callbacks */
1053  }
1055  {
1056  /* Do nothing */
1057  }
1058  _SEH2_END;
1059 
1060  /* Deactivate the ActCtx */
1062  }
1063 
1064  /* FIXME: Do Heap detection and Etw final shutdown */
1065 
1066  /* Release the lock */
1068  DPRINT("LdrpShutdownProcess() done\n");
1069 
1070  return STATUS_SUCCESS;
1071 }
1072 
1073 /*
1074  * @implemented
1075  */
1076 NTSTATUS
1077 NTAPI
1079 {
1080  PPEB Peb = NtCurrentPeb();
1081  PTEB Teb = NtCurrentTeb();
1082  PLDR_DATA_TABLE_ENTRY LdrEntry;
1083  PLIST_ENTRY NextEntry, ListHead;
1084  RTL_CALLER_ALLOCATED_ACTIVATION_CONTEXT_STACK_FRAME_EXTENDED ActCtx;
1085  PVOID EntryPoint;
1086 
1087  DPRINT("LdrShutdownThread() called for %wZ\n",
1089 
1090  /* Cleanup trace logging data (Etw) */
1091  if (SharedUserData->TraceLogging)
1092  {
1093  /* FIXME */
1094  DPRINT1("We don't support Etw yet.\n");
1095  }
1096 
1097  /* Get the Ldr Lock */
1099 
1100  /* Start at the end */
1101  ListHead = &Peb->Ldr->InInitializationOrderModuleList;
1102  NextEntry = ListHead->Blink;
1103  while (NextEntry != ListHead)
1104  {
1105  /* Get the current entry */
1106  LdrEntry = CONTAINING_RECORD(NextEntry, LDR_DATA_TABLE_ENTRY, InInitializationOrderLinks);
1107  NextEntry = NextEntry->Blink;
1108 
1109  /* Make sure it's not ourselves */
1110  if (Peb->ImageBaseAddress != LdrEntry->DllBase)
1111  {
1112  /* Check if we should call */
1113  if (!(LdrEntry->Flags & LDRP_DONT_CALL_FOR_THREADS) &&
1114  (LdrEntry->Flags & LDRP_PROCESS_ATTACH_CALLED) &&
1115  (LdrEntry->Flags & LDRP_IMAGE_DLL))
1116  {
1117  /* Get the entrypoint */
1118  EntryPoint = LdrEntry->EntryPoint;
1119 
1120  /* Check if we are ready to call it */
1121  if (EntryPoint)
1122  {
1123  /* Set up the Act Ctx */
1124  ActCtx.Size = sizeof(ActCtx);
1125  ActCtx.Format = 1;
1127 
1128  /* Activate the ActCtx */
1130  LdrEntry->EntryPointActivationContext);
1131 
1132  _SEH2_TRY
1133  {
1134  /* Check if it has TLS */
1135  if (LdrEntry->TlsIndex)
1136  {
1137  /* Make sure we're not shutting down */
1139  {
1140  /* Call TLS */
1142  }
1143  }
1144 
1145  /* Make sure we're not shutting down */
1147  {
1148  /* Call the Entrypoint */
1149  DPRINT("%wZ - Calling entry point at %p for thread detaching\n",
1150  &LdrEntry->BaseDllName, LdrEntry->EntryPoint);
1151  LdrpCallInitRoutine(EntryPoint,
1152  LdrEntry->DllBase,
1154  NULL);
1155  }
1156  }
1158  {
1159  DPRINT1("WARNING: Exception 0x%x during LdrpCallInitRoutine(DLL_THREAD_DETACH) for %wZ\n",
1160  _SEH2_GetExceptionCode(), &LdrEntry->BaseDllName);
1161  }
1162  _SEH2_END;
1163 
1164  /* Deactivate the ActCtx */
1166  }
1167  }
1168  }
1169  }
1170 
1171  /* Check for TLS */
1172  if (LdrpImageHasTls)
1173  {
1174  /* Set up the Act Ctx */
1175  ActCtx.Size = sizeof(ActCtx);
1176  ActCtx.Format = 1;
1178 
1179  /* Activate the ActCtx */
1182 
1183  _SEH2_TRY
1184  {
1185  /* Do TLS callbacks */
1187  }
1189  {
1190  /* Do nothing */
1191  }
1192  _SEH2_END;
1193 
1194  /* Deactivate the ActCtx */
1196  }
1197 
1198  /* Free TLS */
1199  LdrpFreeTls();
1201 
1202  /* Check for expansion slots */
1203  if (Teb->TlsExpansionSlots)
1204  {
1205  /* Free expansion slots */
1206  RtlFreeHeap(RtlGetProcessHeap(), 0, Teb->TlsExpansionSlots);
1207  }
1208 
1209  /* Check for FLS Data */
1210  if (Teb->FlsData)
1211  {
1212  /* Mimic BaseRundownFls */
1213  ULONG n, FlsHighIndex;
1214  PRTL_FLS_DATA pFlsData;
1215  PFLS_CALLBACK_FUNCTION lpCallback;
1216 
1217  pFlsData = Teb->FlsData;
1218 
1220  FlsHighIndex = NtCurrentPeb()->FlsHighIndex;
1221  RemoveEntryList(&pFlsData->ListEntry);
1223 
1224  for (n = 1; n <= FlsHighIndex; ++n)
1225  {
1226  lpCallback = NtCurrentPeb()->FlsCallback[n];
1227  if (lpCallback && pFlsData->Data[n])
1228  {
1229  lpCallback(pFlsData->Data[n]);
1230  }
1231  }
1232 
1233  RtlFreeHeap(RtlGetProcessHeap(), 0, pFlsData);
1234  Teb->FlsData = NULL;
1235  }
1236 
1237  /* Check for Fiber data */
1238  if (Teb->HasFiberData)
1239  {
1240  /* Free Fiber data*/
1241  RtlFreeHeap(RtlGetProcessHeap(), 0, Teb->NtTib.FiberData);
1242  Teb->NtTib.FiberData = NULL;
1243  }
1244 
1245  /* Free the activation context stack */
1247  DPRINT("LdrShutdownThread() done\n");
1248 
1249  return STATUS_SUCCESS;
1250 }
1251 
1252 NTSTATUS
1253 NTAPI
1255 {
1256  PLIST_ENTRY NextEntry, ListHead;
1257  PLDR_DATA_TABLE_ENTRY LdrEntry;
1258  PIMAGE_TLS_DIRECTORY TlsDirectory;
1259  PLDRP_TLS_DATA TlsData;
1260  ULONG Size;
1261 
1262  /* Initialize the TLS List */
1264 
1265  /* Loop all the modules */
1266  ListHead = &NtCurrentPeb()->Ldr->InLoadOrderModuleList;
1267  NextEntry = ListHead->Flink;
1268  while (ListHead != NextEntry)
1269  {
1270  /* Get the entry */
1271  LdrEntry = CONTAINING_RECORD(NextEntry, LDR_DATA_TABLE_ENTRY, InLoadOrderLinks);
1272  NextEntry = NextEntry->Flink;
1273 
1274  /* Get the TLS directory */
1275  TlsDirectory = RtlImageDirectoryEntryToData(LdrEntry->DllBase,
1276  TRUE,
1278  &Size);
1279 
1280  /* Check if we have a directory */
1281  if (!TlsDirectory) continue;
1282 
1283  /* Check if the image has TLS */
1285 
1286  /* Show debug message */
1287  if (ShowSnaps)
1288  {
1289  DPRINT1("LDR: Tls Found in %wZ at %p\n",
1290  &LdrEntry->BaseDllName,
1291  TlsDirectory);
1292  }
1293 
1294  /* Allocate an entry */
1295  TlsData = RtlAllocateHeap(RtlGetProcessHeap(), 0, sizeof(LDRP_TLS_DATA));
1296  if (!TlsData) return STATUS_NO_MEMORY;
1297 
1298  /* Lock the DLL and mark it for TLS Usage */
1299  LdrEntry->LoadCount = -1;
1300  LdrEntry->TlsIndex = -1;
1301 
1302  /* Save the cached TLS data */
1303  TlsData->TlsDirectory = *TlsDirectory;
1304  InsertTailList(&LdrpTlsList, &TlsData->TlsLinks);
1305 
1306  /* Update the index */
1309  }
1310 
1311  /* Done setting up TLS, allocate entries */
1312  return LdrpAllocateTls();
1313 }
1314 
1315 NTSTATUS
1316 NTAPI
1318 {
1319  PTEB Teb = NtCurrentTeb();
1320  PLIST_ENTRY NextEntry, ListHead;
1321  PLDRP_TLS_DATA TlsData;
1322  SIZE_T TlsDataSize;
1323  PVOID *TlsVector;
1324 
1325  /* Check if we have any entries */
1327  return STATUS_SUCCESS;
1328 
1329  /* Allocate the vector array */
1330  TlsVector = RtlAllocateHeap(RtlGetProcessHeap(),
1331  0,
1332  LdrpNumberOfTlsEntries * sizeof(PVOID));
1333  if (!TlsVector) return STATUS_NO_MEMORY;
1334  Teb->ThreadLocalStoragePointer = TlsVector;
1335 
1336  /* Loop the TLS Array */
1337  ListHead = &LdrpTlsList;
1338  NextEntry = ListHead->Flink;
1339  while (NextEntry != ListHead)
1340  {
1341  /* Get the entry */
1342  TlsData = CONTAINING_RECORD(NextEntry, LDRP_TLS_DATA, TlsLinks);
1343  NextEntry = NextEntry->Flink;
1344 
1345  /* Allocate this vector */
1346  TlsDataSize = TlsData->TlsDirectory.EndAddressOfRawData -
1348  TlsVector[TlsData->TlsDirectory.Characteristics] = RtlAllocateHeap(RtlGetProcessHeap(),
1349  0,
1350  TlsDataSize);
1351  if (!TlsVector[TlsData->TlsDirectory.Characteristics])
1352  {
1353  /* Out of memory */
1354  return STATUS_NO_MEMORY;
1355  }
1356 
1357  /* Show debug message */
1358  if (ShowSnaps)
1359  {
1360  DPRINT1("LDR: TlsVector %p Index %lu = %p copied from %x to %p\n",
1361  TlsVector,
1362  TlsData->TlsDirectory.Characteristics,
1363  &TlsVector[TlsData->TlsDirectory.Characteristics],
1365  TlsVector[TlsData->TlsDirectory.Characteristics]);
1366  }
1367 
1368  /* Copy the data */
1369  RtlCopyMemory(TlsVector[TlsData->TlsDirectory.Characteristics],
1371  TlsDataSize);
1372  }
1373 
1374  /* Done */
1375  return STATUS_SUCCESS;
1376 }
1377 
1378 VOID
1379 NTAPI
1381 {
1382  PLIST_ENTRY ListHead, NextEntry;
1383  PLDRP_TLS_DATA TlsData;
1384  PVOID *TlsVector;
1385  PTEB Teb = NtCurrentTeb();
1386 
1387  /* Get a pointer to the vector array */
1388  TlsVector = Teb->ThreadLocalStoragePointer;
1389  if (!TlsVector) return;
1390 
1391  /* Loop through it */
1392  ListHead = &LdrpTlsList;
1393  NextEntry = ListHead->Flink;
1394  while (NextEntry != ListHead)
1395  {
1396  TlsData = CONTAINING_RECORD(NextEntry, LDRP_TLS_DATA, TlsLinks);
1397  NextEntry = NextEntry->Flink;
1398 
1399  /* Free each entry */
1400  if (TlsVector[TlsData->TlsDirectory.Characteristics])
1401  {
1402  RtlFreeHeap(RtlGetProcessHeap(),
1403  0,
1404  TlsVector[TlsData->TlsDirectory.Characteristics]);
1405  }
1406  }
1407 
1408  /* Free the array itself */
1409  RtlFreeHeap(RtlGetProcessHeap(),
1410  0,
1411  TlsVector);
1412 }
1413 
1414 NTSTATUS
1415 NTAPI
1417 {
1418  NTSTATUS Status;
1419  HANDLE KeyHandle;
1420  ULONG ExecuteOptions, MinimumStackCommit = 0, GlobalFlag;
1421 
1422  /* Return error if we were not provided a pointer where to save the options key handle */
1423  if (!OptionsKey) return STATUS_INVALID_HANDLE;
1424 
1425  /* Zero initialize the options key pointer */
1426  *OptionsKey = NULL;
1427 
1428  /* Open the options key */
1429  Status = LdrOpenImageFileOptionsKey(ImagePathName, 0, &KeyHandle);
1430 
1431  /* Save it if it was opened successfully */
1432  if (NT_SUCCESS(Status))
1433  *OptionsKey = KeyHandle;
1434 
1435  if (KeyHandle)
1436  {
1437  /* There are image specific options, read them starting with NXCOMPAT */
1439  L"ExecuteOptions",
1440  4,
1441  &ExecuteOptions,
1442  sizeof(ExecuteOptions),
1443  0);
1444 
1445  if (NT_SUCCESS(Status))
1446  {
1447  /* TODO: Set execution options for the process */
1448  /*
1449  if (ExecuteOptions == 0)
1450  ExecuteOptions = 1;
1451  else
1452  ExecuteOptions = 2;
1453  ZwSetInformationProcess(NtCurrentProcess(),
1454  ProcessExecuteFlags,
1455  &ExecuteOptions,
1456  sizeof(ULONG));*/
1457 
1458  }
1459 
1460  /* Check if this image uses large pages */
1461  if (Peb->ImageUsesLargePages)
1462  {
1463  /* TODO: If it does, open large page key */
1464  UNIMPLEMENTED;
1465  }
1466 
1467  /* Get various option values */
1469  L"DisableHeapLookaside",
1470  REG_DWORD,
1472  sizeof(RtlpDisableHeapLookaside),
1473  NULL);
1474 
1476  L"ShutdownFlags",
1477  REG_DWORD,
1479  sizeof(RtlpShutdownProcessFlags),
1480  NULL);
1481 
1483  L"MinimumStackCommitInBytes",
1484  REG_DWORD,
1485  &MinimumStackCommit,
1486  sizeof(MinimumStackCommit),
1487  NULL);
1488 
1489  /* Update PEB's minimum stack commit if it's lower */
1490  if (Peb->MinimumStackCommit < MinimumStackCommit)
1491  Peb->MinimumStackCommit = MinimumStackCommit;
1492 
1493  /* Set the global flag */
1495  L"GlobalFlag",
1496  REG_DWORD,
1497  &GlobalFlag,
1498  sizeof(GlobalFlag),
1499  NULL);
1500 
1501  if (NT_SUCCESS(Status))
1502  Peb->NtGlobalFlag = GlobalFlag;
1503  else
1504  GlobalFlag = 0;
1505 
1506  /* Call AVRF if necessary */
1508  {
1510  if (!NT_SUCCESS(Status))
1511  {
1512  DPRINT1("AVRF: LdrpInitializeApplicationVerifierPackage failed with %08X\n", Status);
1513  }
1514  }
1515  }
1516  else
1517  {
1518  /* There are no image-specific options, so perform global initialization */
1520  {
1521  /* Initialize app verifier package */
1523  if (!NT_SUCCESS(Status))
1524  {
1525  DPRINT1("AVRF: LdrpInitializeApplicationVerifierPackage failed with %08X\n", Status);
1526  }
1527  }
1528  }
1529 
1530  return STATUS_SUCCESS;
1531 }
1532 
1533 VOID
1534 NTAPI
1536 {
1537  UNIMPLEMENTED;
1538 }
1539 
1540 VOID
1541 NTAPI
1543 {
1544  static const GUID* GuidOrder[] = { &COMPAT_GUID_WIN10, &COMPAT_GUID_WIN81, &COMPAT_GUID_WIN8,
1545  &COMPAT_GUID_WIN7, &COMPAT_GUID_VISTA };
1546  static const DWORD GuidVersions[] = { WINVER_WIN10, WINVER_WIN81, WINVER_WIN8, WINVER_WIN7, WINVER_VISTA };
1547 
1548  ULONG Buffer[(sizeof(COMPATIBILITY_CONTEXT_ELEMENT) * 10 + sizeof(ACTIVATION_CONTEXT_COMPATIBILITY_INFORMATION)) / sizeof(ULONG)];
1549  ACTIVATION_CONTEXT_COMPATIBILITY_INFORMATION* ContextCompatInfo;
1550  SIZE_T SizeRequired;
1551  NTSTATUS Status;
1552  DWORD n, cur;
1553  ReactOS_ShimData* pShimData = *pOldShimData;
1554 
1555  C_ASSERT(RTL_NUMBER_OF(GuidOrder) == RTL_NUMBER_OF(GuidVersions));
1556 
1557  if (pShimData)
1558  {
1559  if (pShimData->dwMagic != REACTOS_SHIMDATA_MAGIC ||
1560  pShimData->dwSize != sizeof(ReactOS_ShimData))
1561  {
1562  DPRINT1("LdrpInitializeProcessCompat: Corrupt pShimData (0x%x, %u)\n", pShimData->dwMagic, pShimData->dwSize);
1563  return;
1564  }
1565  if (pShimData->dwRosProcessCompatVersion)
1566  {
1567  DPRINT1("LdrpInitializeProcessCompat: ProcessCompatVersion already set to 0x%x\n", pShimData->dwRosProcessCompatVersion);
1568  return;
1569  }
1570  }
1571 
1572  SizeRequired = sizeof(Buffer);
1574  NULL,
1575  NULL,
1576  CompatibilityInformationInActivationContext,
1577  Buffer,
1578  sizeof(Buffer),
1579  &SizeRequired);
1580 
1581  if (!NT_SUCCESS(Status))
1582  {
1583  DPRINT1("LdrpInitializeProcessCompat: Unable to query process actctx with status %x\n", Status);
1584  return;
1585  }
1586 
1587  ContextCompatInfo = (ACTIVATION_CONTEXT_COMPATIBILITY_INFORMATION*)Buffer;
1588  /* No Compatibility elements present, bail out */
1589  if (ContextCompatInfo->ElementCount == 0)
1590  return;
1591 
1592  /* Search for known GUID's, starting from newest to oldest. */
1593  for (cur = 0; cur < RTL_NUMBER_OF(GuidOrder); ++cur)
1594  {
1595  for (n = 0; n < ContextCompatInfo->ElementCount; ++n)
1596  {
1597  if (ContextCompatInfo->Elements[n].Type == ACTCX_COMPATIBILITY_ELEMENT_TYPE_OS &&
1598  RtlCompareMemory(&ContextCompatInfo->Elements[n].Id, GuidOrder[cur], sizeof(GUID)) == sizeof(GUID))
1599  {
1600  /* If this process did not need shim data before, allocate and store it */
1601  if (pShimData == NULL)
1602  {
1603  PPEB Peb = NtCurrentPeb();
1604 
1605  ASSERT(Peb->pShimData == NULL);
1606  pShimData = RtlAllocateHeap(Peb->ProcessHeap, HEAP_ZERO_MEMORY, sizeof(*pShimData));
1607 
1608  if (!pShimData)
1609  {
1610  DPRINT1("LdrpInitializeProcessCompat: Unable to allocated %u bytes\n", sizeof(*pShimData));
1611  return;
1612  }
1613 
1614  pShimData->dwSize = sizeof(*pShimData);
1615  pShimData->dwMagic = REACTOS_SHIMDATA_MAGIC;
1616 
1617  Peb->pShimData = pShimData;
1618  *pOldShimData = pShimData;
1619  }
1620 
1621  /* Store the highest found version, and bail out. */
1622  pShimData->dwRosProcessCompatVersion = GuidVersions[cur];
1623  DPRINT1("LdrpInitializeProcessCompat: Found guid for winver 0x%x\n", GuidVersions[cur]);
1624  return;
1625  }
1626  }
1627  }
1628 }
1629 
1630 VOID
1631 NTAPI
1633 {
1634  UNICODE_STRING ImagePathName = ProcessParameters->ImagePathName;
1635  WCHAR LocalBuffer[MAX_PATH];
1636  UNICODE_STRING DotLocal;
1637  NTSTATUS Status;
1639 
1640  RequiredSize = ImagePathName.Length + LdrpDotLocal.Length + sizeof(UNICODE_NULL);
1641  if (RequiredSize <= sizeof(LocalBuffer))
1642  {
1643  RtlInitEmptyUnicodeString(&DotLocal, LocalBuffer, sizeof(LocalBuffer));
1644  }
1646  {
1647  DotLocal.Buffer = RtlAllocateHeap(RtlGetProcessHeap(), 0, RequiredSize);
1648  DotLocal.Length = 0;
1649  DotLocal.MaximumLength = RequiredSize;
1650  if (!DotLocal.Buffer)
1651  DPRINT1("LDR: Failed to allocate memory for .local check\n");
1652  }
1653  else
1654  {
1655  DotLocal.Buffer = NULL;
1656  DotLocal.Length = 0;
1657  DotLocal.MaximumLength = 0;
1658  DPRINT1("LDR: String too big for .local check\n");
1659  }
1660 
1661  if (DotLocal.Buffer)
1662  {
1663  Status = RtlAppendUnicodeStringToString(&DotLocal, &ImagePathName);
1665  if (NT_SUCCESS(Status))
1666  {
1669  }
1670 
1671  if (NT_SUCCESS(Status))
1672  {
1673  if (RtlDoesFileExists_UStr(&DotLocal))
1674  {
1676  }
1677  }
1678  else
1679  {
1680  DPRINT1("LDR: Failed to append: 0x%lx\n", Status);
1681  }
1682 
1683  if (DotLocal.Buffer != LocalBuffer)
1684  {
1685  RtlFreeHeap(RtlGetProcessHeap(), 0, DotLocal.Buffer);
1686  }
1687  }
1688 }
1689 
1690 
1691 NTSTATUS
1692 NTAPI
1695 {
1696  RTL_HEAP_PARAMETERS HeapParameters;
1697  ULONG ComSectionSize;
1698  ANSI_STRING BaseProcessInitPostImportName = RTL_CONSTANT_STRING("BaseProcessInitPostImport");
1699  ANSI_STRING BaseQueryModuleDataName = RTL_CONSTANT_STRING("BaseQueryModuleData");
1700  PVOID OldShimData;
1702  //UNICODE_STRING LocalFileName, FullImageName;
1703  HANDLE SymLinkHandle;
1704  //ULONG DebugHeapOnly;
1705  UNICODE_STRING CommandLine, NtSystemRoot, ImagePathName, FullPath, ImageFileName, KnownDllString;
1706  PPEB Peb = NtCurrentPeb();
1707  BOOLEAN IsDotNetImage = FALSE;
1708  BOOLEAN FreeCurDir = FALSE;
1709  //HANDLE CompatKey;
1710  PRTL_USER_PROCESS_PARAMETERS ProcessParameters;
1711  //LPWSTR ImagePathBuffer;
1712  ULONG ConfigSize;
1714  HANDLE OptionsKey;
1715  ULONG HeapFlags;
1716  PIMAGE_NT_HEADERS NtHeader;
1717  LPWSTR NtDllName = NULL;
1718  NTSTATUS Status, ImportStatus;
1719  NLSTABLEINFO NlsTable;
1721  PTEB Teb = NtCurrentTeb();
1722  PLIST_ENTRY ListHead;
1723  PLIST_ENTRY NextEntry;
1724  ULONG i;
1725  PWSTR ImagePath;
1726  ULONG DebugProcessHeapOnly = 0;
1727  PLDR_DATA_TABLE_ENTRY NtLdrEntry;
1728  PWCHAR Current;
1729  ULONG ExecuteOptions = 0;
1730  PVOID ViewBase;
1731 
1732  /* Set a NULL SEH Filter */
1734 
1735  /* Get the image path */
1736  ImagePath = Peb->ProcessParameters->ImagePathName.Buffer;
1737 
1738  /* Check if it's not normalized */
1740  {
1741  /* Normalize it*/
1742  ImagePath = (PWSTR)((ULONG_PTR)ImagePath + (ULONG_PTR)Peb->ProcessParameters);
1743  }
1744 
1745  /* Create a unicode string for the Image Path */
1746  ImagePathName.Length = Peb->ProcessParameters->ImagePathName.Length;
1747  ImagePathName.MaximumLength = ImagePathName.Length + sizeof(WCHAR);
1748  ImagePathName.Buffer = ImagePath;
1749 
1750  /* Get the NT Headers */
1751  NtHeader = RtlImageNtHeader(Peb->ImageBaseAddress);
1752 
1753  /* Get the execution options */
1754  Status = LdrpInitializeExecutionOptions(&ImagePathName, Peb, &OptionsKey);
1755 
1756  /* Check if this is a .NET executable */
1758  TRUE,
1760  &ComSectionSize))
1761  {
1762  /* Remember this for later */
1763  IsDotNetImage = TRUE;
1764  }
1765 
1766  /* Save the NTDLL Base address */
1768 
1769  /* If this is a Native Image */
1771  {
1772  /* Then do DLL Validation */
1774  }
1775 
1776  /* Save the old Shim Data */
1777  OldShimData = Peb->pShimData;
1778 
1779  /* ReactOS specific: do not clear it. (Windows starts doing the same in later versions) */
1780  //Peb->pShimData = NULL;
1781 
1782  /* Save the number of processors and CS Timeout */
1785 
1786  /* Normalize the parameters */
1787  ProcessParameters = RtlNormalizeProcessParams(Peb->ProcessParameters);
1788  if (ProcessParameters)
1789  {
1790  /* Save the Image and Command Line Names */
1791  ImageFileName = ProcessParameters->ImagePathName;
1792  CommandLine = ProcessParameters->CommandLine;
1793  }
1794  else
1795  {
1796  /* It failed, initialize empty strings */
1797  RtlInitUnicodeString(&ImageFileName, NULL);
1798  RtlInitUnicodeString(&CommandLine, NULL);
1799  }
1800 
1801  /* Initialize NLS data */
1805  &NlsTable);
1806 
1807  /* Reset NLS Translations */
1808  RtlResetRtlTranslations(&NlsTable);
1809 
1810  /* Get the Image Config Directory */
1812  TRUE,
1814  &ConfigSize);
1815 
1816  /* Setup the Heap Parameters */
1817  RtlZeroMemory(&HeapParameters, sizeof(HeapParameters));
1818  HeapFlags = HEAP_GROWABLE;
1819  HeapParameters.Length = sizeof(HeapParameters);
1820 
1821  /* Check if we have Configuration Data */
1822  if ((LoadConfig) && (ConfigSize == sizeof(IMAGE_LOAD_CONFIG_DIRECTORY)))
1823  {
1824  /* FIXME: Custom heap settings and misc. */
1825  DPRINT1("We don't support LOAD_CONFIG data yet\n");
1826  }
1827 
1828  /* Check for custom affinity mask */
1830  {
1831  /* Set it */
1835  sizeof(Peb->ImageProcessAffinityMask));
1836  }
1837 
1838  /* Check if verbose debugging (ShowSnaps) was requested */
1840 
1841  /* Start verbose debugging messages right now if they were requested */
1842  if (ShowSnaps)
1843  {
1844  DPRINT1("LDR: PID: 0x%p started - '%wZ'\n",
1845  Teb->ClientId.UniqueProcess,
1846  &CommandLine);
1847  }
1848 
1849  /* If the timeout is too long */
1850  if (RtlpTimeout.QuadPart < Int32x32To64(3600, -10000000))
1851  {
1852  /* Then disable CS Timeout */
1854  }
1855 
1856  /* Initialize Critical Section Data */
1858 
1859  /* Initialize VEH Call lists */
1861 
1862  /* Set TLS/FLS Bitmap data */
1863  Peb->FlsBitmap = &FlsBitMap;
1864  Peb->TlsBitmap = &TlsBitMap;
1866 
1867  /* Initialize FLS Bitmap */
1869  Peb->FlsBitmapBits,
1871  RtlSetBit(&FlsBitMap, 0);
1873 
1874  /* Initialize TLS Bitmap */
1876  Peb->TlsBitmapBits,
1878  RtlSetBit(&TlsBitMap, 0);
1883 
1884  /* Initialize the Hash Table */
1885  for (i = 0; i < LDR_HASH_TABLE_ENTRIES; i++)
1886  {
1888  }
1889 
1890  /* Initialize the Loader Lock */
1891  // FIXME: What's the point of initing it manually, if two lines lower
1892  // a call to RtlInitializeCriticalSection() is being made anyway?
1893  //InsertTailList(&RtlCriticalSectionList, &LdrpLoaderLock.DebugInfo->ProcessLocksList);
1894  //LdrpLoaderLock.DebugInfo->CriticalSection = &LdrpLoaderLock;
1897 
1898  /* Check if User Stack Trace Database support was requested */
1900  {
1901  DPRINT1("We don't support user stack trace databases yet\n");
1902  }
1903 
1904  /* Setup Fast PEB Lock */
1907  //Peb->FastPebLockRoutine = (PPEBLOCKROUTINE)RtlEnterCriticalSection;
1908  //Peb->FastPebUnlockRoutine = (PPEBLOCKROUTINE)RtlLeaveCriticalSection;
1909 
1910  /* Setup Callout Lock and Notification list */
1911  //RtlInitializeCriticalSection(&RtlpCalloutEntryLock);
1913 
1914  /* For old executables, use 16-byte aligned heap */
1915  if ((NtHeader->OptionalHeader.MajorSubsystemVersion <= 3) &&
1916  (NtHeader->OptionalHeader.MinorSubsystemVersion < 51))
1917  {
1918  HeapFlags |= HEAP_CREATE_ALIGN_16;
1919  }
1920 
1921  /* Setup the Heap */
1923  Peb->ProcessHeap = RtlCreateHeap(HeapFlags,
1924  NULL,
1926  NtHeader->OptionalHeader.SizeOfHeapCommit,
1927  NULL,
1928  &HeapParameters);
1929 
1930  if (!Peb->ProcessHeap)
1931  {
1932  DPRINT1("Failed to create process heap\n");
1933  return STATUS_NO_MEMORY;
1934  }
1935 
1936  /* Allocate an Activation Context Stack */
1938  if (!NT_SUCCESS(Status)) return Status;
1939 
1940  RtlZeroMemory(&HeapParameters, sizeof(HeapParameters));
1941  HeapFlags = HEAP_GROWABLE | HEAP_CLASS_1;
1942  HeapParameters.Length = sizeof(HeapParameters);
1943  LdrpHeap = RtlCreateHeap(HeapFlags, 0, 0x10000, 0x6000, 0, &HeapParameters);
1944  if (!LdrpHeap)
1945  {
1946  DPRINT1("Failed to create loader private heap\n");
1947  return STATUS_NO_MEMORY;
1948  }
1949 
1950  /* Check for Debug Heap */
1951  if (OptionsKey)
1952  {
1953  /* Query the setting */
1954  Status = LdrQueryImageFileKeyOption(OptionsKey,
1955  L"DebugProcessHeapOnly",
1956  REG_DWORD,
1957  &DebugProcessHeapOnly,
1958  sizeof(ULONG),
1959  NULL);
1960 
1961  if (NT_SUCCESS(Status))
1962  {
1963  /* Reset DPH if requested */
1964  if (RtlpPageHeapEnabled && DebugProcessHeapOnly)
1965  {
1968  }
1969  }
1970  }
1971 
1972  /* Build the NTDLL Path */
1973  FullPath.Buffer = StringBuffer;
1974  FullPath.Length = 0;
1975  FullPath.MaximumLength = sizeof(StringBuffer);
1978  RtlAppendUnicodeToString(&FullPath, L"\\System32\\");
1979 
1980  /* Open the Known DLLs directory */
1981  RtlInitUnicodeString(&KnownDllString, L"\\KnownDlls");
1983  &KnownDllString,
1985  NULL,
1986  NULL);
1989  &ObjectAttributes);
1990 
1991  /* Check if it exists */
1992  if (NT_SUCCESS(Status))
1993  {
1994  /* Open the Known DLLs Path */
1995  RtlInitUnicodeString(&KnownDllString, L"KnownDllPath");
1997  &KnownDllString,
2000  NULL);
2001  Status = NtOpenSymbolicLinkObject(&SymLinkHandle,
2003  &ObjectAttributes);
2004  if (NT_SUCCESS(Status))
2005  {
2006  /* Query the path */
2010  Status = ZwQuerySymbolicLinkObject(SymLinkHandle, &LdrpKnownDllPath, NULL);
2011  NtClose(SymLinkHandle);
2012  if (!NT_SUCCESS(Status))
2013  {
2014  DPRINT1("LDR: %s - failed call to ZwQuerySymbolicLinkObject with status %x\n", "", Status);
2015  return Status;
2016  }
2017  }
2018  }
2019 
2020  /* Check if we failed */
2021  if (!NT_SUCCESS(Status))
2022  {
2023  /* Assume System32 */
2026  LdrpKnownDllPath.Length -= sizeof(WCHAR);
2027  }
2028 
2029  /* If we have process parameters, get the default path and current path */
2030  if (ProcessParameters)
2031  {
2032  /* Check if we have a Dll Path */
2033  if (ProcessParameters->DllPath.Length)
2034  {
2035  /* Get the path */
2036  LdrpDefaultPath = *(PUNICODE_STRING)&ProcessParameters->DllPath;
2037  }
2038  else
2039  {
2040  /* We need a valid path */
2041  DPRINT1("No valid DllPath was given!\n");
2043  }
2044 
2045  /* Set the current directory */
2046  CurrentDirectory = ProcessParameters->CurrentDirectory.DosPath;
2047 
2048  /* Check if it's empty or invalid */
2049  if ((!CurrentDirectory.Buffer) ||
2050  (CurrentDirectory.Buffer[0] == UNICODE_NULL) ||
2051  (!CurrentDirectory.Length))
2052  {
2053  /* Allocate space for the buffer */
2055  0,
2056  3 * sizeof(WCHAR) +
2057  sizeof(UNICODE_NULL));
2058  if (!CurrentDirectory.Buffer)
2059  {
2060  DPRINT1("LDR: LdrpInitializeProcess - unable to allocate current working directory buffer\n");
2061  // FIXME: And what?
2062  }
2063 
2064  /* Copy the drive of the system root */
2066  SharedUserData->NtSystemRoot,
2067  3 * sizeof(WCHAR));
2068  CurrentDirectory.Buffer[3] = UNICODE_NULL;
2069  CurrentDirectory.Length = 3 * sizeof(WCHAR);
2070  CurrentDirectory.MaximumLength = CurrentDirectory.Length + sizeof(WCHAR);
2071 
2072  FreeCurDir = TRUE;
2073  DPRINT("Using dynamically allocd curdir\n");
2074  }
2075  else
2076  {
2077  /* Use the local buffer */
2078  DPRINT("Using local system root\n");
2079  }
2080  }
2081 
2082  /* Setup Loader Data */
2083  Peb->Ldr = &PebLdr;
2087  PebLdr.Length = sizeof(PEB_LDR_DATA);
2089 
2090  /* Allocate a data entry for the Image */
2092 
2093  /* Set it up */
2095  LdrpImageEntry->LoadCount = -1;
2097  LdrpImageEntry->FullDllName = ImageFileName;
2098 
2099  if (IsDotNetImage)
2101  else
2102  LdrpImageEntry->Flags = 0;
2103 
2104  /* Check if the name is empty */
2105  if (!ImageFileName.Buffer[0])
2106  {
2107  /* Use the same Base name */
2109  }
2110  else
2111  {
2112  /* Find the last slash */
2113  Current = ImageFileName.Buffer;
2114  while (*Current)
2115  {
2116  if (*Current++ == '\\')
2117  {
2118  /* Set this path */
2119  NtDllName = Current;
2120  }
2121  }
2122 
2123  /* Did we find anything? */
2124  if (!NtDllName)
2125  {
2126  /* Use the same Base name */
2128  }
2129  else
2130  {
2131  /* Setup the name */
2132  LdrpImageEntry->BaseDllName.Length = (USHORT)((ULONG_PTR)ImageFileName.Buffer + ImageFileName.Length - (ULONG_PTR)NtDllName);
2134  LdrpImageEntry->BaseDllName.Buffer = (PWSTR)((ULONG_PTR)ImageFileName.Buffer +
2135  (ImageFileName.Length - LdrpImageEntry->BaseDllName.Length));
2136  }
2137  }
2138 
2139  /* Processing done, insert it */
2142 
2143  /* Now add an entry for NTDLL */
2145  NtLdrEntry->Flags = LDRP_IMAGE_DLL;
2146  NtLdrEntry->EntryPoint = LdrpFetchAddressOfEntryPoint(NtLdrEntry->DllBase);
2147  NtLdrEntry->LoadCount = -1;
2148  NtLdrEntry->EntryPointActivationContext = 0;
2149 
2150  NtLdrEntry->FullDllName.Length = FullPath.Length;
2151  NtLdrEntry->FullDllName.MaximumLength = FullPath.MaximumLength;
2152  NtLdrEntry->FullDllName.Buffer = StringBuffer;
2154 
2155  NtLdrEntry->BaseDllName.Length = NtDllString.Length;
2157  NtLdrEntry->BaseDllName.Buffer = NtDllString.Buffer;
2158 
2159  /* Processing done, insert it */
2160  LdrpNtDllDataTableEntry = NtLdrEntry;
2161  LdrpInsertMemoryTableEntry(NtLdrEntry);
2162 
2163  /* Let the world know */
2164  if (ShowSnaps)
2165  {
2166  DPRINT1("LDR: NEW PROCESS\n");
2167  DPRINT1(" Image Path: %wZ (%wZ)\n", &LdrpImageEntry->FullDllName, &LdrpImageEntry->BaseDllName);
2168  DPRINT1(" Current Directory: %wZ\n", &CurrentDirectory);
2169  DPRINT1(" Search Path: %wZ\n", &LdrpDefaultPath);
2170  }
2171 
2172  /* Link the Init Order List */
2175 
2176  /* Initialize Wine's active context implementation for the current process */
2177  actctx_init();
2178 
2179  /* ReactOS specific */
2180  LdrpInitializeProcessCompat(&OldShimData);
2181 
2182  /* Set the current directory */
2184  if (!NT_SUCCESS(Status))
2185  {
2186  /* We failed, check if we should free it */
2187  if (FreeCurDir) RtlFreeUnicodeString(&CurrentDirectory);
2188 
2189  /* Set it to the NT Root */
2192  }
2193  else
2194  {
2195  /* We're done with it, free it */
2196  if (FreeCurDir) RtlFreeUnicodeString(&CurrentDirectory);
2197  }
2198 
2199  /* Check if we should look for a .local file */
2200  if (ProcessParameters && !(ProcessParameters->Flags & RTL_USER_PROCESS_PARAMETERS_LOCAL_DLL_PATH))
2201  {
2202  LdrpInitializeDotLocalSupport(ProcessParameters);
2203  }
2204 
2205  /* Check if the Application Verifier was enabled */
2207  {
2209  if (!NT_SUCCESS(Status))
2210  {
2211  DPRINT1("LDR: AVrfInitializeVerifier failed (ntstatus 0x%x)\n", Status);
2212  return Status;
2213  }
2214 
2215  }
2216 
2217  if (IsDotNetImage)
2218  {
2219  /* FIXME */
2220  DPRINT1("We don't support .NET applications yet\n");
2221  }
2222 
2225  {
2226  PVOID Kernel32BaseAddress;
2227  PVOID FunctionAddress;
2228 
2229  Status = LdrLoadDll(NULL, NULL, &Kernel32String, &Kernel32BaseAddress);
2230 
2231  if (!NT_SUCCESS(Status))
2232  {
2233  if (ShowSnaps)
2234  DPRINT1("LDR: Unable to load %wZ, Status=0x%08lx\n", &Kernel32String, Status);
2235  return Status;
2236  }
2237 
2238  Status = LdrGetProcedureAddress(Kernel32BaseAddress,
2239  &BaseProcessInitPostImportName,
2240  0,
2241  &FunctionAddress);
2242 
2243  if (!NT_SUCCESS(Status))
2244  {
2245  if (ShowSnaps)
2246  DPRINT1("LDR: Unable to find post-import process init function, Status=0x%08lx\n", &Kernel32String, Status);
2247  return Status;
2248  }
2249  Kernel32ProcessInitPostImportFunction = FunctionAddress;
2250 
2251  Status = LdrGetProcedureAddress(Kernel32BaseAddress,
2252  &BaseQueryModuleDataName,
2253  0,
2254  &FunctionAddress);
2255 
2256  if (!NT_SUCCESS(Status))
2257  {
2258  if (ShowSnaps)
2259  DPRINT1("LDR: Unable to find BaseQueryModuleData, Status=0x%08lx\n", &Kernel32String, Status);
2260  return Status;
2261  }
2262  Kernel32BaseQueryModuleData = FunctionAddress;
2263  }
2264 
2265  /* Walk the IAT and load all the DLLs */
2267 
2268  /* Check if relocation is needed */
2269  if (Peb->ImageBaseAddress != (PVOID)NtHeader->OptionalHeader.ImageBase)
2270  {
2271  DPRINT1("LDR: Performing EXE relocation\n");
2272 
2273  /* Change the protection to prepare for relocation */
2274  ViewBase = Peb->ImageBaseAddress;
2275  Status = LdrpSetProtection(ViewBase, FALSE);
2276  if (!NT_SUCCESS(Status)) return Status;
2277 
2278  /* Do the relocation */
2279  Status = LdrRelocateImageWithBias(ViewBase,
2280  0LL,
2281  NULL,
2285  if (!NT_SUCCESS(Status))
2286  {
2287  DPRINT1("LdrRelocateImageWithBias() failed\n");
2288  return Status;
2289  }
2290 
2291  /* Check if a start context was provided */
2292  if (Context)
2293  {
2294  DPRINT1("WARNING: Relocated EXE Context");
2295  UNIMPLEMENTED; // We should support this
2297  }
2298 
2299  /* Restore the protection */
2300  Status = LdrpSetProtection(ViewBase, TRUE);
2301  if (!NT_SUCCESS(Status)) return Status;
2302  }
2303 
2304  /* Lock the DLLs */
2305  ListHead = &Peb->Ldr->InLoadOrderModuleList;
2306  NextEntry = ListHead->Flink;
2307  while (ListHead != NextEntry)
2308  {
2309  NtLdrEntry = CONTAINING_RECORD(NextEntry, LDR_DATA_TABLE_ENTRY, InLoadOrderLinks);
2310  NtLdrEntry->LoadCount = -1;
2311  NextEntry = NextEntry->Flink;
2312  }
2313 
2314  /* Phase 0 is done */
2316 
2317  /* Check whether all static imports were properly loaded and return here */
2318  if (!NT_SUCCESS(ImportStatus)) return ImportStatus;
2319 
2320  /* Initialize TLS */
2322  if (!NT_SUCCESS(Status))
2323  {
2324  DPRINT1("LDR: LdrpProcessInitialization failed to initialize TLS slots; status %x\n",
2325  Status);
2326  return Status;
2327  }
2328 
2329  /* FIXME Mark the DLL Ranges for Stack Traces later */
2330 
2331  /* Notify the debugger now */
2332  if (Peb->BeingDebugged)
2333  {
2334  /* Break */
2335  DbgBreakPoint();
2336 
2337  /* Update show snaps again */
2339  }
2340 
2341  /* Validate the Image for MP Usage */
2343 
2344  /* Check NX Options */
2345  if (SharedUserData->NXSupportPolicy == 1)
2346  {
2347  ExecuteOptions = 0xD;
2348  }
2349  else if (!SharedUserData->NXSupportPolicy)
2350  {
2351  ExecuteOptions = 0xA;
2352  }
2353 
2354  /* Let Mm know */
2357  &ExecuteOptions,
2358  sizeof(ULONG));
2359 
2360  // FIXME: Should be done by Application Compatibility features,
2361  // by reading the registry, etc...
2362  // For now, this is the old code from ntdll!RtlGetVersion().
2363  RtlInitEmptyUnicodeString(&Peb->CSDVersion, NULL, 0);
2364  if (((Peb->OSCSDVersion >> 8) & 0xFF) != 0)
2365  {
2366  WCHAR szCSDVersion[128];
2367  LONG i;
2368  ULONG Length = ARRAYSIZE(szCSDVersion) - 1;
2369  i = _snwprintf(szCSDVersion, Length,
2370  L"Service Pack %d",
2371  ((Peb->OSCSDVersion >> 8) & 0xFF));
2372  if (i < 0)
2373  {
2374  /* Null-terminate if it was overflowed */
2375  szCSDVersion[Length] = UNICODE_NULL;
2376  }
2377 
2378  Length *= sizeof(WCHAR);
2379  Peb->CSDVersion.Buffer = RtlAllocateHeap(RtlGetProcessHeap(),
2380  0,
2381  Length + sizeof(UNICODE_NULL));
2382  if (Peb->CSDVersion.Buffer)
2383  {
2386 
2388  szCSDVersion,
2391  }
2392  }
2393 
2394  /* Check if we had Shim Data */
2395  if (OldShimData)
2396  {
2397  /* Load the Shim Engine */
2398  Peb->AppCompatInfo = NULL;
2399  LdrpLoadShimEngine(OldShimData, &ImagePathName, OldShimData);
2400  }
2401  else
2402  {
2403  /* Check for Application Compatibility Goo */
2404  //LdrQueryApplicationCompatibilityGoo(hKey);
2405  DPRINT("Querying app compat hacks is missing!\n");
2406  }
2407 
2408  /*
2409  * FIXME: Check for special images, SecuROM, SafeDisc and other NX-
2410  * incompatible images.
2411  */
2412 
2413  /* Now call the Init Routines */
2415  if (!NT_SUCCESS(Status))
2416  {
2417  DPRINT1("LDR: LdrpProcessInitialization failed running initialization routines; status %x\n",
2418  Status);
2419  return Status;
2420  }
2421 
2422  /* Notify Shim Engine */
2423  if (g_ShimsEnabled)
2424  {
2427  SE_InstallAfterInit(&ImagePathName, OldShimData);
2428  }
2429 
2430  /* Check if we have a user-defined Post Process Routine */
2432  {
2433  /* Call it */
2435  }
2436 
2437  /* Close the key if we have one opened */
2438  if (OptionsKey) NtClose(OptionsKey);
2439 
2440  /* Return status */
2441  return Status;
2442 }
2443 
2444 VOID
2445 NTAPI
2447 {
2448  ULONG Response;
2449  PPEB Peb = NtCurrentPeb();
2450 
2451  /* Print a debug message */
2452  DPRINT1("LDR: Process initialization failure for %wZ; NTSTATUS = %08lx\n",
2454 
2455  /* Raise a hard error */
2457  {
2459  }
2460 }
2461 
2462 VOID
2463 NTAPI
2467 {
2469  PTEB Teb = NtCurrentTeb();
2470  NTSTATUS Status, LoaderStatus = STATUS_SUCCESS;
2471  MEMORY_BASIC_INFORMATION MemoryBasicInfo;
2472  PPEB Peb = NtCurrentPeb();
2473 
2474  DPRINT("LdrpInit() %p/%p\n",
2475  NtCurrentTeb()->RealClientId.UniqueProcess,
2476  NtCurrentTeb()->RealClientId.UniqueThread);
2477 
2478 #ifdef _WIN64
2479  /* Set the SList header usage */
2481 #endif /* _WIN64 */
2482 
2483  /* Check if we have a deallocation stack */
2484  if (!Teb->DeallocationStack)
2485  {
2486  /* We don't, set one */
2488  Teb->NtTib.StackLimit,
2490  &MemoryBasicInfo,
2491  sizeof(MEMORY_BASIC_INFORMATION),
2492  NULL);
2493  if (!NT_SUCCESS(Status))
2494  {
2495  /* Fail */
2498  return;
2499  }
2500 
2501  /* Set the stack */
2502  Teb->DeallocationStack = MemoryBasicInfo.AllocationBase;
2503  }
2504 
2505  /* Now check if the process is already being initialized */
2507  1,
2508  0) == 1)
2509  {
2510  /* Set the timeout to 30 milliseconds */
2511  Timeout.QuadPart = Int32x32To64(30, -10000);
2512 
2513  /* Make sure the status hasn't changed */
2514  while (LdrpProcessInitialized == 1)
2515  {
2516  /* Do the wait */
2518  }
2519  }
2520 
2521  /* Check if we have already setup LDR data */
2522  if (!Peb->Ldr)
2523  {
2524  /* Setup the Loader Lock */
2526 
2527  /* Let other code know we're initializing */
2528  LdrpInLdrInit = TRUE;
2529 
2530  /* Protect with SEH */
2531  _SEH2_TRY
2532  {
2533  /* Initialize the Process */
2534  LoaderStatus = LdrpInitializeProcess(Context,
2535  SystemArgument1);
2536 
2537  /* Check for success and if MinimumStackCommit was requested */
2538  if (NT_SUCCESS(LoaderStatus) && Peb->MinimumStackCommit)
2539  {
2540  /* Enforce the limit */
2541  //LdrpTouchThreadStack(Peb->MinimumStackCommit);
2542  UNIMPLEMENTED;
2543  }
2544  }
2546  {
2547  /* Fail with the SEH error */
2548  LoaderStatus = _SEH2_GetExceptionCode();
2549  }
2550  _SEH2_END;
2551 
2552  /* We're not initializing anymore */
2553  LdrpInLdrInit = FALSE;
2554 
2555  /* Check if init worked */
2556  if (NT_SUCCESS(LoaderStatus))
2557  {
2558  /* Set the process as Initialized */
2560  }
2561  }
2562  else
2563  {
2564  /* Loader data is there... is this a fork() ? */
2566  {
2567  /* Handle the fork() */
2568  //LoaderStatus = LdrpForkProcess();
2569  LoaderStatus = STATUS_NOT_IMPLEMENTED;
2570  UNIMPLEMENTED;
2571  }
2572  else
2573  {
2574  /* This is a new thread initializing */
2576  }
2577  }
2578 
2579  /* All done, test alert the thread */
2580  NtTestAlert();
2581 
2582  /* Return */
2583  if (!NT_SUCCESS(LoaderStatus))
2584  {
2585  /* Fail */
2586  LdrpInitFailure(LoaderStatus);
2587  RtlRaiseStatus(LoaderStatus);
2588  }
2589 }
2590 
2591 /* EOF */
PRTL_BITMAP TlsExpansionBitmap
Definition: winternl.h:346
BOOLEAN Initialized
Definition: ntddk_ex.h:222
signed char * PCHAR
Definition: retypes.h:7
VOID NTAPI LdrpCallTlsInitializers(IN PLDR_DATA_TABLE_ENTRY LdrEntry, IN ULONG Reason)
Definition: ldrutils.c:473
UNICODE_STRING ImageExecOptionsString
Definition: ldrinit.c:24
#define PF_COMPARE_EXCHANGE128
#define LDRP_ENTRY_PROCESSED
Definition: ldrtypes.h:43
IN PUNICODE_STRING IN POBJECT_ATTRIBUTES ObjectAttributes
Definition: conport.c:35
ULONG RtlpShutdownProcessFlags
Definition: ldrinit.c:93
NTSYSAPI NTSTATUS NTAPI ZwRaiseHardError(_In_ NTSTATUS ErrorStatus, _In_ ULONG NumberOfParameters, _In_ ULONG UnicodeStringParameterMask, _In_ PULONG_PTR Parameters, _In_ ULONG ValidResponseOptions, _Out_ PULONG Response)
BOOLEAN LdrpDllValidation
Definition: ldrinit.c:37
#define HEAP_CLASS_1
Definition: nt_native.h:1711
const uint16_t * PCWSTR
Definition: typedefs.h:55
#define IN
Definition: typedefs.h:38
DECLSPEC_NORETURN NTSYSAPI VOID NTAPI RtlRaiseStatus(_In_ NTSTATUS Status)
NTSTATUS NTAPI LdrQueryImageFileKeyOption(IN HANDLE KeyHandle, IN PCWSTR ValueName, IN ULONG Type, OUT PVOID Buffer, IN ULONG BufferSize, OUT PULONG ReturnedLength OPTIONAL)
Definition: ldrinit.c:184
NTSYSAPI VOID NTAPI RtlResetRtlTranslations(_In_ PNLSTABLEINFO NlsTable)
BOOLEAN g_ShimsEnabled
Definition: ldrutils.c:21
IMAGE_TLS_DIRECTORY TlsDirectory
Definition: ntdllp.h:29
#define TRUE
Definition: types.h:120
NTSYSAPI VOID NTAPI RtlCopyMemory(VOID UNALIGNED *Destination, CONST VOID UNALIGNED *Source, ULONG Length)
#define HEAP_CREATE_ALIGN_16
Definition: nt_native.h:1701
#define LL
Definition: tui.h:72
BOOLEAN LdrpShutdownInProgress
Definition: ldrinit.c:34
long __cdecl _InterlockedCompareExchange(_Interlocked_operand_ long volatile *_Destination, long _Exchange, long _Comparand)
BOOLEAN LdrpInLdrInit
Definition: ldrinit.c:30
NTSYSAPI void WINAPI RtlInitializeBitMap(PRTL_BITMAP, PULONG, ULONG)
PPEB Peb
Definition: dllmain.c:27
NTSTATUS NTAPI LdrpWalkImportDescriptor(IN LPWSTR DllPath OPTIONAL, IN PLDR_DATA_TABLE_ENTRY LdrEntry)
Definition: ldrpe.c:670
UNICODE_STRING Kernel32String
Definition: ldrinit.c:27
RTL_BITMAP FlsBitMap
Definition: ldrinit.c:51
LIST_ENTRY InInitializationOrderModuleList
Definition: ldrtypes.h:121
UNICODE_STRING LdrpKnownDllPath
Definition: ldrinit.c:63
#define STATUS_INFO_LENGTH_MISMATCH
Definition: udferr_usr.h:133
LARGE_INTEGER RtlpTimeout
Definition: critical.c:24
static PMEMKEY RootKey
Definition: registry.c:55
UNICODE_STRING NtSystemRoot
Definition: init.c:72
RTL_BITMAP TlsExpansionBitMap
Definition: ldrinit.c:50
Type
Definition: Type.h:6
#define LDRP_DONT_CALL_FOR_THREADS
Definition: ldrtypes.h:47
NTSTATUS NTAPI LdrShutdownProcess(VOID)
Definition: ldrinit.c:939
ULONG ImageProcessAffinityMask
Definition: ntddk_ex.h:307
_Must_inspect_result_ _Out_ PNDIS_STATUS _In_ NDIS_HANDLE _In_ ULONG _Out_ PNDIS_STRING _Out_ PNDIS_HANDLE KeyHandle
Definition: ndis.h:4693
#define STATUS_NOT_IMPLEMENTED
Definition: ntstatus.h:225
PVOID g_pfnSE_ProcessDying
Definition: ldrutils.c:27
USHORT MaximumLength
Definition: env_spec_w32.h:370
#define STATUS_APP_INIT_FAILURE
Definition: ntstatus.h:547
static IN LPSTR IN PVOID Unk2
Definition: ldrinit.c:47
WCHAR CurrentDirectory[1024]
Definition: chkdsk.c:74
#define REG_BINARY
Definition: nt_native.h:1496
LIST_ENTRY InLoadOrderModuleList
Definition: ldrtypes.h:119
#define STATUS_INVALID_PARAMETER
Definition: udferr_usr.h:135
#define DLL_THREAD_ATTACH
Definition: compat.h:121
#define TLS_EXPANSION_SLOTS
Definition: pstypes.h:294
uint16_t * PWSTR
Definition: typedefs.h:54
struct _LIST_ENTRY * Blink
Definition: typedefs.h:120
FORCEINLINE VOID InsertHeadList(_Inout_ PLIST_ENTRY ListHead, _Inout_ __drv_aliasesMem PLIST_ENTRY Entry)
Definition: rtlfuncs.h:201
VOID(WINAPI * PFLS_CALLBACK_FUNCTION)(PVOID)
Definition: winbase.h:1397
void actctx_init(void)
Definition: actctx.c:5003
#define IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Definition: ntimage.h:489
ULONG TlsExpansionBitmapBits[32]
Definition: winternl.h:347
PLDR_DATA_TABLE_ENTRY LdrpNtDllDataTableEntry
Definition: ldrinit.c:44
LIST_ENTRY LdrpTlsList
Definition: ldrinit.c:53
LONG NTSTATUS
Definition: precomp.h:26
BOOLEAN NTAPI RtlFreeHeap(IN PVOID HeapHandle, IN ULONG Flags, IN PVOID HeapBase)
Definition: heap.c:603
LIST_ENTRY InMemoryOrderModuleList
Definition: btrfs_drv.h:1820
NTSYSAPI VOID NTAPI RtlSetBit(_In_ PRTL_BITMAP BitMapHeader, _In_range_(<, BitMapHeader->SizeOfBitMap) ULONG BitNumber)
Definition: bitmap.c:304
NTSYSAPI NTSTATUS NTAPI ZwDelayExecution(_In_ BOOLEAN Alertable, _In_ LARGE_INTEGER *Interval)
VOID NTAPI SE_InstallAfterInit(PUNICODE_STRING ProcessImage, PVOID pShimData)
Definition: shimeng.c:1385
GLdouble n
Definition: glext.h:7729
NTSTATUS NTAPI NtQueryPerformanceCounter(OUT PLARGE_INTEGER PerformanceCounter, OUT PLARGE_INTEGER PerformanceFrequency OPTIONAL)
Definition: profile.c:278
ULONG SizeOfImage
Definition: ldrtypes.h:142
NTSYSAPI NTSTATUS NTAPI ZwOpenDirectoryObject(_Out_ PHANDLE FileHandle, _In_ ACCESS_MASK DesiredAccess, _In_ POBJECT_ATTRIBUTES ObjectAttributes)
NTSYSAPI NTSTATUS NTAPI RtlEnterCriticalSection(_In_ PRTL_CRITICAL_SECTION CriticalSection)
#define ARRAYSIZE(array)
Definition: filtermapper.c:47
NTSTATUS NTAPI NtQueryVirtualMemory(IN HANDLE ProcessHandle, IN PVOID BaseAddress, IN MEMORY_INFORMATION_CLASS MemoryInformationClass, OUT PVOID MemoryInformation, IN SIZE_T MemoryInformationLength, OUT PSIZE_T ReturnLength)
Definition: virtual.c:4284
_Inout_ __drv_aliasesMem PSLIST_ENTRY _Inout_ PSLIST_ENTRY _In_ ULONG Count
Definition: exfuncs.h:1015
ULONG FlsBitmapBits[4]
Definition: winternl.h:362
VOID NTAPI RtlReleasePebLock(VOID)
Definition: libsupp.c:82
BYTE BeingDebugged
Definition: btrfs_drv.h:1834
#define DLL_PROCESS_ATTACH
Definition: compat.h:120
ACPI_BUFFER *RetBuffer ACPI_BUFFER *RetBuffer char ACPI_WALK_RESOURCE_CALLBACK void *Context ACPI_BUFFER *RetBuffer UINT16 ACPI_RESOURCE **ResourcePtr ACPI_GENERIC_ADDRESS *Reg UINT32 *ReturnValue UINT8 UINT8 *Slp_TypB ACPI_PHYSICAL_ADDRESS PhysicalAddress64 UINT32 UINT32 *TimeElapsed UINT32 ACPI_STATUS const char UINT32 ACPI_STATUS const char UINT32 const char const char * ModuleName
Definition: acpixf.h:1252
uint16_t * PWCHAR
Definition: typedefs.h:54
HANDLE LdrpKnownDllObjectDirectory
Definition: ldrinit.c:62
static IN LPSTR IN PVOID IN PVOID IN PVOID Unk4
Definition: ldrinit.c:47
#define InsertTailList(ListHead, Entry)
char * LPSTR
Definition: xmlstorage.h:182
HANDLE UniqueProcess
Definition: compat.h:474
void DbgBreakPoint()
Definition: mach.c:558
#define UNICODE_STRING_MAX_BYTES
NTSTATUS NTAPI LdrOpenImageFileOptionsKey(IN PUNICODE_STRING SubKey, IN BOOLEAN Wow64, OUT PHANDLE NewKeyHandle)
Definition: ldrinit.c:112
BOOLEAN RtlpPageHeapEnabled
Definition: heappage.c:106
static VOID LoadConfig(HWND hwndDlg)
Definition: powershemes.c:270
#define DLL_THREAD_DETACH
Definition: compat.h:122
#define STATUS_INVALID_HANDLE
Definition: ntstatus.h:231
IMAGE_OPTIONAL_HEADER32 OptionalHeader
Definition: ntddk_ex.h:184
#define RtlMoveMemory(Destination, Source, Length)
Definition: typedefs.h:263
#define DEFAULT_SECURITY_COOKIE
Definition: ldrinit.c:102
_SEH2_TRY
Definition: create.c:4250
uint32_t ULONG_PTR
Definition: typedefs.h:63
NTSYSAPI PRTL_USER_PROCESS_PARAMETERS NTAPI RtlNormalizeProcessParams(_In_ PRTL_USER_PROCESS_PARAMETERS ProcessParameters)
VOID NTAPI LdrpInitializeDotLocalSupport(PRTL_USER_PROCESS_PARAMETERS ProcessParameters)
Definition: ldrinit.c:1632
CLIENT_ID ClientId
Definition: compat.h:488
FORCEINLINE BOOLEAN RemoveEntryList(_In_ PLIST_ENTRY Entry)
Definition: rtlfuncs.h:105
FORCEINLINE VOID YieldProcessor(VOID)
Definition: ke.h:32
PVOID DllBase
Definition: btrfs_drv.h:1805
PVOID ImageBaseAddress
Definition: ntddk_ex.h:245
PVOID NtDllBase
Definition: ldrinit.c:56
ULONG NtGlobalFlag
Definition: ntddk_ex.h:270
_In_ PUNICODE_STRING ValueName
Definition: cmfuncs.h:264
PVOID ThreadLocalStoragePointer
Definition: compat.h:490
#define IMAGE_DIRECTORY_ENTRY_TLS
Definition: pedump.c:268
GLsizei GLenum const GLvoid GLsizei GLenum GLbyte GLbyte GLbyte GLdouble GLdouble GLdouble GLfloat GLfloat GLfloat GLint GLint GLint GLshort GLshort GLshort GLubyte GLubyte GLubyte GLuint GLuint GLuint GLushort GLushort GLushort GLbyte GLbyte GLbyte GLbyte GLdouble GLdouble GLdouble GLdouble GLfloat GLfloat GLfloat GLfloat GLint GLint GLint GLint GLshort GLshort GLshort GLshort GLubyte GLubyte GLubyte GLubyte GLuint GLuint GLuint GLuint GLushort GLushort GLushort GLushort GLboolean const GLdouble const GLfloat const GLint const GLshort const GLbyte const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLdouble const GLfloat const GLfloat const GLint const GLint const GLshort const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort const GLdouble const GLfloat const GLint const GLshort GLenum GLenum GLenum GLfloat GLenum GLint GLenum GLenum GLenum GLfloat GLenum GLenum GLint GLenum GLfloat GLenum GLint GLint GLushort GLenum GLenum GLfloat GLenum GLenum GLint GLfloat const GLubyte GLenum GLenum GLenum const GLfloat GLenum GLenum const GLint GLenum GLint GLint GLsizei GLsizei GLint GLenum GLenum const GLvoid GLenum GLenum const GLfloat GLenum GLenum const GLint GLenum GLenum const GLdouble GLenum GLenum const GLfloat GLenum GLenum const GLint GLsizei GLuint GLfloat GLuint GLbitfield GLfloat GLint GLuint GLboolean GLenum GLfloat GLenum GLbitfield GLenum GLfloat GLfloat GLint GLint const GLfloat GLenum GLfloat GLfloat GLint GLint GLfloat GLfloat GLint GLint const GLfloat GLint GLfloat GLfloat GLint GLfloat GLfloat GLint GLfloat GLfloat const GLdouble const GLfloat const GLdouble const GLfloat GLint i
Definition: glfuncs.h:248
USHORT TlsIndex
Definition: ntddk_ex.h:209
long __cdecl _InterlockedIncrement(_Interlocked_operand_ long volatile *_Addend)
NTSTATUS(* NTAPI)(IN PFILE_FULL_EA_INFORMATION EaBuffer, IN ULONG EaLength, OUT PULONG ErrorOffset)
Definition: IoEaTest.cpp:117
#define UNICODE_NULL
NTSTATUS NTAPI LdrpInitializeTls(VOID)
Definition: ldrinit.c:1254
BOOLEAN LdrpLoaderLockInit
Definition: ldrinit.c:32
BOOLEAN ShowSnaps
Definition: ldrinit.c:81
long LONG
Definition: pedump.c:60
NTSYSAPI NTSTATUS NTAPI RtlLeaveCriticalSection(_In_ PRTL_CRITICAL_SECTION CriticalSection)
RTL_CRITICAL_SECTION_DEBUG LdrpLoaderLockDebug
Definition: ldrinit.c:69
VOID NTAPI RtlpInitDeferedCriticalSection(VOID)
Definition: critical.c:267
LIST_ENTRY TlsLinks
Definition: ntdllp.h:28
PVOID EntryPoint
Definition: ntddk_ex.h:203
#define WINVER_WIN10
LIST_ENTRY LdrpHashTable[LDR_HASH_TABLE_ENTRIES]
Definition: ldrinit.c:60
#define InterlockedCompareExchangePointer
Definition: interlocked.h:129
#define RTL_USER_PROCESS_PARAMETERS_PRIVATE_DLL_PATH
Definition: rtltypes.h:52
#define EXCEPTION_EXECUTE_HANDLER
Definition: excpt.h:85
NTSTATUS NTAPI LdrGetProcedureAddress(IN PVOID BaseAddress, IN PANSI_STRING Name, IN ULONG Ordinal, OUT PVOID *ProcedureAddress)
Definition: ldrapi.c:823
WCHAR LdrpKnownDllPathBuffer[128]
Definition: ldrinit.c:64
#define IMAGE_SUBSYSTEM_WINDOWS_CUI
Definition: ntimage.h:438
unsigned char BOOLEAN
ULONG RtlpDphGlobalFlags
Definition: heappage.c:107
PVOID NTAPI LdrpFetchAddressOfEntryPoint(PVOID ImageBase)
int _snwprintf(wchar_t *buffer, size_t count, const wchar_t *format,...)
smooth NULL
Definition: ftsmooth.c:416
#define IMAGE_SUBSYSTEM_NATIVE
Definition: ntimage.h:436
#define FLG_APPLICATION_VERIFIER
Definition: pstypes.h:64
NTSTATUS NTAPI LdrQueryImageFileExecutionOptionsEx(IN PUNICODE_STRING SubKey, IN PCWSTR ValueName, IN ULONG Type, OUT PVOID Buffer, IN ULONG BufferSize, OUT PULONG ReturnedLength OPTIONAL, IN BOOLEAN Wow64)
Definition: ldrinit.c:348
PVOID NTAPI RtlDecodeSystemPointer(IN PVOID Pointer)
Definition: process.c:439
void DPRINT(...)
Definition: polytest.cpp:61
BOOLEAN ReadImageFileExecOptions
Definition: ntddk_ex.h:240
Definition: bufpool.h:45
void * PVOID
Definition: retypes.h:9
RTL_BITMAP TlsBitMap
Definition: ldrinit.c:49
NTSTATUS NTAPI LdrpInitializeProcess(IN PCONTEXT Context, IN PVOID SystemArgument1)
Definition: ldrinit.c:1693
_Inout_ PRTL_BUFFER _In_ SIZE_T RequiredSize
ULONG Length
Definition: ntddk_ex.h:221
PFLT_MESSAGE_WAITER_QUEUE CONTAINING_RECORD(Csq, DEVICE_EXTENSION, IrpQueue)) -> WaiterQ.mLock) _IRQL_raises_(DISPATCH_LEVEL) VOID NTAPI FltpAcquireMessageWaiterLock(_In_ PIO_CSQ Csq, _Out_ PKIRQL Irql)
Definition: Messaging.c:560
NTSTATUS NTAPI LdrpInitializeApplicationVerifierPackage(IN HANDLE KeyHandle, IN PPEB Peb, IN BOOLEAN SystemWide, IN BOOLEAN ReadAdvancedOptions)
PVOID LdrpHeap
Definition: ldrinit.c:59
#define DLL_PROCESS_DETACH
Definition: compat.h:119
#define NtCurrentProcess()
Definition: nt_native.h:1657
#define PCHAR
Definition: match.c:90
#define REACTOS_SHIMDATA_MAGIC
Definition: compat_undoc.h:15
PVOID NTAPI RtlAllocateHeap(IN PVOID HeapHandle, IN ULONG Flags, IN SIZE_T Size)
Definition: heap.c:585
LIST_ENTRY FlsListHead
Definition: winternl.h:360
#define DIRECTORY_TRAVERSE
Definition: nt_native.h:1255
VOID NTAPI LdrpInitFailure(NTSTATUS Status)
Definition: ldrinit.c:2446
RTL_CRITICAL_SECTION LdrpLoaderLock
Definition: ldrinit.c:70
ULONG LdrpNumberOfTlsEntries
Definition: ldrinit.c:54
_In_opt_ PVOID _In_opt_ PVOID SystemArgument1
Definition: ketypes.h:675
VOID NTAPI SE_ProcessDying(VOID)
Definition: shimeng.c:1390
NTSTATUS RtlAppendUnicodeToString(IN PUNICODE_STRING Str1, IN PWSTR Str2)
Definition: string_lib.cpp:62
PUNICODE_STRING LdrpTopLevelDllBeingLoaded
Definition: ldrinit.c:40
struct _LIST_ENTRY * Flink
Definition: typedefs.h:119
NTSYSAPI VOID NTAPI RtlInitNlsTables(_In_ PUSHORT AnsiTableBase, _In_ PUSHORT OemTableBase, _In_ PUSHORT CaseTableBase, _Out_ PNLSTABLEINFO NlsTable)
LONG LdrpProcessInitialized
Definition: ldrinit.c:31
_In_ HANDLE _Outptr_result_bytebuffer_ ViewSize PVOID * BaseAddress
Definition: mmfuncs.h:404
VOID NTAPI LdrpFreeTls(VOID)
Definition: ldrinit.c:1380
UNICODE_STRING NtDllString
Definition: ldrinit.c:26
#define STATUS_OBJECT_TYPE_MISMATCH
Definition: ntstatus.h:259
BOOLEAN RtlpTimeoutDisable
Definition: ldrinit.c:58
PVOID NTAPI LdrpFetchAddressOfSecurityCookie(PVOID BaseAddress, ULONG SizeOfImage)
Definition: ldrinit.c:412
#define STATUS_INVALID_IMAGE_FORMAT
Definition: ntstatus.h:345
VOID NTAPI LdrpLoadShimEngine(IN PWSTR ImageName, IN PUNICODE_STRING ProcessImage, IN PVOID pShimData)
Definition: ldrutils.c:2766
if(!(yy_init))
Definition: macro.lex.yy.c:714
__wchar_t WCHAR
Definition: xmlstorage.h:180
NTSYSAPI NTSTATUS NTAPI RtlInitializeCriticalSection(_In_ PRTL_CRITICAL_SECTION CriticalSection)
static NTSTATUS(WINAPI *Kernel32ProcessInitPostImportFunction)(VOID)
#define NT_SUCCESS(StatCode)
Definition: apphelp.c:32
PVOID DeallocationStack
Definition: compat.h:527
VOID NTAPI LdrpInit(PCONTEXT Context, PVOID SystemArgument1, PVOID SystemArgument2)
Definition: ldrinit.c:2464
PVOID FiberData
Definition: compat.h:376
PEB_LDR_DATA PebLdr
Definition: ldrinit.c:67
struct _KEY_VALUE_PARTIAL_INFORMATION * PKEY_VALUE_PARTIAL_INFORMATION
_In_opt_ PVOID _Out_ PLARGE_INTEGER Cookie
Definition: cmfuncs.h:13
#define FLG_HEAP_PAGE_ALLOCS
Definition: pstypes.h:84
#define MAX_PATH
Definition: compat.h:26
#define WINAPI
Definition: msvc.h:8
#define HEAP_GROWABLE
Definition: nt_native.h:1693
PVOID ProcessHeap
Definition: ntddk_ex.h:249
#define BufferSize
Definition: classpnp.h:419
unsigned long DWORD
Definition: ntddk_ex.h:95
PRTL_ACTIVATION_CONTEXT_STACK_FRAME FASTCALL RtlDeactivateActivationContextUnsafeFast(IN PRTL_CALLER_ALLOCATED_ACTIVATION_CONTEXT_STACK_FRAME_EXTENDED Frame)
Definition: actctx.c:5934
NTSYSAPI VOID NTAPI RtlFreeUnicodeString(PUNICODE_STRING UnicodeString)
LARGE_INTEGER CriticalSectionTimeout
Definition: ntddk_ex.h:274
PLDR_DATA_TABLE_ENTRY LdrpImageEntry
Definition: ldrinit.c:39
static IN LPSTR Unk1
Definition: ldrinit.c:47
_In_ ULONG _In_ ULONG _In_ ULONG Length
Definition: ntddpcm.h:101
PTEB LdrpTopLevelDllBeingLoadedTeb
Definition: libsupp.c:18
_In_ PCWSTR _Out_ PVOID * ActCtx
Definition: ldrtypes.h:246
SIZE_T MinimumStackCommit
Definition: winternl.h:358
VOID NTAPI LdrpEnsureLoaderLockIsHeld(VOID)
Definition: ldrinit.c:405
NTSTATUS NTAPI NtClose(IN HANDLE Handle)
Definition: obhandle.c:3399
Definition: ncftp.h:89
#define OBJ_CASE_INSENSITIVE
Definition: winternl.h:228
BOOLEAN LdrpLdrDatabaseIsSetup
Definition: ldrinit.c:33
ASSERT((InvokeOnSuccess||InvokeOnError||InvokeOnCancel) ?(CompletionRoutine !=NULL) :TRUE)
PVOID g_pfnSE_InstallAfterInit
Definition: ldrutils.c:26
#define SharedUserData
ULONG NTAPI LdrpClearLoadInProgress(VOID)
Definition: ldrutils.c:2658
IMAGE_LOAD_CONFIG_DIRECTORY32 IMAGE_LOAD_CONFIG_DIRECTORY
Definition: ntimage.h:155
#define WINVER_WIN7
PVOID FastPebLock
Definition: ntddk_ex.h:250
UNICODE_STRING ImagePathName
Definition: btrfs_drv.h:1826
PVOID Data[RTL_FLS_MAXIMUM_AVAILABLE]
Definition: rtltypes.h:1220
static const WCHAR L[]
Definition: oid.c:1250
NTSYSAPI void WINAPI RtlFreeThreadActivationContextStack(void)
Definition: actctx.c:5395
#define RtlImageDirectoryEntryToData
Definition: compat.h:460
VOID NTAPI LdrpInitializeProcessCompat(PVOID *pOldShimData)
Definition: ldrinit.c:1542
PRTL_USER_PROCESS_PARAMETERS ProcessParameters
Definition: btrfs_drv.h:1838
PVOID *typedef PHANDLE
Definition: ntsecpkg.h:414
#define VOID
Definition: acefi.h:82
_In_ ULONG _In_ BATTERY_QUERY_INFORMATION_LEVEL _In_ LONG _In_ ULONG _Out_ PULONG ReturnedLength
Definition: batclass.h:187
Definition: btrfs_drv.h:1801
ULONG LowPart
Definition: typedefs.h:104
NTSTATUS NTAPI DECLSPEC_HOTPATCH LdrLoadDll(IN PWSTR SearchPath OPTIONAL, IN PULONG DllCharacteristics OPTIONAL, IN PUNICODE_STRING DllName, OUT PVOID *BaseAddress)
Definition: ldrapi.c:310
NTSYSAPI PVOID NTAPI RtlCreateHeap(IN ULONG Flags, IN PVOID HeapBase OPTIONAL, IN ULONG ReserveSize OPTIONAL, IN ULONG CommitSize OPTIONAL, IN PVOID Lock OPTIONAL, IN PRTL_HEAP_PARAMETERS Parameters OPTIONAL)
UNICODE_STRING Wow64OptionsString
Definition: ldrinit.c:25
#define GENERIC_READ
Definition: compat.h:124
Definition: typedefs.h:117
UNICODE_STRING CommandLine
Definition: btrfs_drv.h:1827
PVOID UnicodeCaseTableData
Definition: ntddk_ex.h:266
IN PVOID IN PVOID IN USHORT IN USHORT Size
Definition: pci.h:359
VOID NTAPI LdrpValidateImageForMp(IN PLDR_DATA_TABLE_ENTRY LdrDataTableEntry)
Definition: ldrinit.c:1535
#define WINVER_WIN8
PVOID LoaderLock
Definition: ntddk_ex.h:295
NTSTATUS NTAPI LdrQueryImageFileExecutionOptions(IN PUNICODE_STRING SubKey, IN PCWSTR ValueName, IN ULONG Type, OUT PVOID Buffer, IN ULONG BufferSize, OUT PULONG ReturnedLength OPTIONAL)
Definition: ldrinit.c:386
#define LDR_HASH_TABLE_ENTRIES
Definition: ntdllp.h:11
PVOID AppCompatInfo
Definition: winternl.h:352
VOID NTAPI LdrpInsertMemoryTableEntry(IN PLDR_DATA_TABLE_ENTRY LdrEntry)
Definition: ldrutils.c:1577
ULONG LdrpNumberOfProcessors
Definition: ldrinit.c:55
HANDLE LdrpShutdownThreadId
Definition: ldrinit.c:35
Status
Definition: gdiplustypes.h:24
_In_opt_ PVOID _In_opt_ PVOID _In_opt_ PVOID SystemArgument2
Definition: ketypes.h:675
NTSTATUS NTAPI AVrfInitializeVerifier(VOID)
Definition: verifier.c:612
VOID NTAPI RtlInitializeHeapManager(VOID)
Definition: libsupp.c:243
#define Int64ShrlMod32(a, b)
LIST_ENTRY LdrpDllNotificationList
Definition: ldrinit.c:61
static IN LPSTR IN PVOID IN PVOID Unk3
Definition: ldrinit.c:47
ULONG_PTR SIZE_T
Definition: typedefs.h:78
LIST_ENTRY ListEntry
Definition: rtltypes.h:1219
#define STATUS_DLL_INIT_FAILED
Definition: ntstatus.h:544
Definition: compat.h:484
VOID NTAPI LdrpInitializeThread(IN PCONTEXT Context)
Definition: ldrinit.c:502
PPS_POST_PROCESS_INIT_ROUTINE PostProcessInitRoutine
Definition: btrfs_drv.h:1841
#define LDRP_COR_IMAGE
Definition: ldrtypes.h:51
struct _GUID GUID
#define IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Definition: pedump.c:269
_SEH2_END
Definition: create.c:4424
ULONG LdrpFatalHardErrorCount
Definition: ldrinit.c:83
VOID NTAPI RtlpInitializeVectoredExceptionHandling(VOID)
Definition: vectoreh.c:30
static ULONG Timeout
Definition: ping.c:61
NTSYSAPI ULONG NTAPI LdrRelocateImageWithBias(_In_ PVOID NewAddress, _In_ LONGLONG AdditionalBias, _In_ PCCH LoaderName, _In_ ULONG Success, _In_ ULONG Conflict, _In_ ULONG Invalid)
FORCEINLINE struct _TEB * NtCurrentTeb(VOID)
Definition: psfuncs.h:420
#define STATUS_BUFFER_OVERFLOW
Definition: shellext.h:61
#define WINVER_VISTA
NTSTATUS NTAPI NtSetInformationProcess(IN HANDLE ProcessHandle, IN PROCESSINFOCLASS ProcessInformationClass, IN PVOID ProcessInformation, IN ULONG ProcessInformationLength)
Definition: query.c:1089
NTSTATUS NTAPI LdrpSetProtection(PVOID ViewBase, BOOLEAN Restore)
Definition: ldrutils.c:944
#define FLS_MAXIMUM_AVAILABLE
Definition: winnt_old.h:1101
UNICODE_STRING LdrpDefaultPath
Definition: ldrinit.c:65
#define NtCurrentPeb()
Definition: FLS.c:19
#define C_ASSERT(e)
Definition: ntstrsafe.h:22
unsigned short USHORT
Definition: pedump.c:61
BOOLEAN NTAPI RtlDoesFileExists_UStr(IN PUNICODE_STRING FileName)
Definition: path.c:1384
RTL_CRITICAL_SECTION FastPebLock
Definition: ldrinit.c:79
#define RTL_NUMBER_OF(x)
Definition: RtlRegistry.c:12
#define FLG_SHOW_LDR_SNAPS
Definition: pstypes.h:57
PLDR_DATA_TABLE_ENTRY NTAPI LdrpAllocateDataTableEntry(IN PVOID BaseAddress)
Definition: ldrutils.c:1544
PPEB_LDR_DATA Ldr
Definition: btrfs_drv.h:1837
struct _KEY_VALUE_PARTIAL_INFORMATION KEY_VALUE_PARTIAL_INFORMATION
#define InitializeListHead(ListHead)
Definition: env_spec_w32.h:944
#define STATUS_NO_MEMORY
Definition: ntstatus.h:246
NTSYSAPI NTSTATUS NTAPI RtlAppendUnicodeStringToString(PUNICODE_STRING Destination, PUNICODE_STRING Source)
HANDLE ImageExecOptionsKey
Definition: ldrinit.c:22
HANDLE Wow64ExecOptionsKey
Definition: ldrinit.c:23
UNICODE_STRING FullDllName
Definition: btrfs_drv.h:1807
UNICODE_STRING BaseDllName
Definition: ldrtypes.h:144
NTSTATUS NTAPI LdrpInitializeExecutionOptions(PUNICODE_STRING ImagePathName, PPEB Peb, PHANDLE OptionsKey)
Definition: ldrinit.c:1416
ULONG NumberOfProcessors
Definition: ntddk_ex.h:269
unsigned int * PULONG
Definition: retypes.h:1
NTSYSAPI NTSTATUS WINAPI RtlInitUnicodeStringEx(PUNICODE_STRING, PCWSTR)
BOOLEAN RtlpUse16ByteSLists
PACTIVATION_CONTEXT EntryPointActivationContext
Definition: ldrtypes.h:162
PLDR_DATA_TABLE_ENTRY LdrpCurrentDllInitializer
Definition: ldrinit.c:43
ULONG TlsBitmapBits[2]
Definition: ntddk_ex.h:260
NTSYSAPI NTSTATUS WINAPI RtlQueryInformationActivationContext(ULONG, HANDLE, PVOID, ULONG, PVOID, SIZE_T, SIZE_T *)
Definition: actctx.c:5438
#define HEAP_ZERO_MEMORY
Definition: compat.h:123
UNICODE_STRING * PUNICODE_STRING
Definition: env_spec_w32.h:373
VOID NTAPI RtlAcquirePebLock(VOID)
Definition: libsupp.c:72
#define DPH_FLAG_DLL_NOTIFY
Definition: ntdllp.h:24
NTSTATUS NTAPI LdrpRunInitializeRoutines(IN PCONTEXT Context OPTIONAL)
Definition: ldrinit.c:637
#define DPRINT1
Definition: precomp.h:8
NTSTATUS NTAPI NtTestAlert(VOID)
Definition: state.c:465
#define RtlImageNtHeader
Definition: compat.h:457
UNICODE_STRING DosPath
Definition: rtltypes.h:1362
static LARGE_INTEGER Counter
Definition: clock.c:43
PVOID OemCodePageData
Definition: ntddk_ex.h:265
static BOOL(WINAPI *Kernel32BaseQueryModuleData)(IN LPSTR ModuleName
NTSYSAPI NTSTATUS NTAPI RtlSetCurrentDirectory_U(_In_ PUNICODE_STRING name)
PRTL_ACTIVATION_CONTEXT_STACK_FRAME FASTCALL RtlActivateActivationContextUnsafeFast(IN PRTL_CALLER_ALLOCATED_ACTIVATION_CONTEXT_STACK_FRAME_EXTENDED Frame, IN PVOID Context)
Definition: actctx.c:5857
DWORD dwRosProcessCompatVersion
Definition: compat_undoc.h:11
#define LDRP_IMAGE_DLL
Definition: ldrtypes.h:39
NTSTATUS NTAPI LdrpAllocateTls(VOID)
Definition: ldrinit.c:1317
#define OUT
Definition: typedefs.h:39
NTSTATUS NTAPI RtlAllocateActivationContextStack(IN PACTIVATION_CONTEXT_STACK *Stack)
Definition: actctx.c:5829
#define WINVER_WIN81
Definition: compat_undoc.h:21
NTSTATUS LdrPerformRelocations(PIMAGE_NT_HEADERS NTHeaders, PVOID ImageBase)
PRTL_BITMAP FlsBitmap
Definition: winternl.h:361
ULONG Flags
Definition: ntddk_ex.h:207
NTSYSAPI NTSTATUS NTAPI RtlUnicodeStringToInteger(PUNICODE_STRING String, ULONG Base, PULONG Value)
unsigned int ULONG
Definition: retypes.h:1
#define SYMBOLIC_LINK_QUERY
Definition: nt_native.h:1265
#define DIRECTORY_QUERY
Definition: nt_native.h:1254
NTSYSAPI VOID NTAPI RtlInitUnicodeString(PUNICODE_STRING DestinationString, PCWSTR SourceString)
#define UNIMPLEMENTED
Definition: debug.h:114
struct Response Response
struct _PEB_LDR_DATA PEB_LDR_DATA
#define RtlZeroMemory(Destination, Length)
Definition: typedefs.h:261
#define ULONG_PTR
Definition: config.h:101
uint32_t * PULONG_PTR
Definition: typedefs.h:63
PVOID NTAPI LdrpInitSecurityCookie(PLDR_DATA_TABLE_ENTRY LdrEntry)
Definition: ldrinit.c:449
#define InitializeObjectAttributes(p, n, a, r, s)
Definition: reg.c:106
const UNICODE_STRING LdrpDotLocal
Definition: ldrinit.c:28
UNICODE_STRING CSDVersion
Definition: winternl.h:353
PVOID StackLimit
Definition: compat.h:373
PVOID * TlsExpansionSlots
Definition: compat.h:543
#define FLG_USER_STACK_TRACE_DB
Definition: pstypes.h:67
#define _SEH2_EXCEPT(...)
Definition: pseh2_64.h:6
#define RTL_USER_PROCESS_PARAMETERS_NORMALIZED
Definition: rtltypes.h:41
PVOID ActivationContextStackPointer
Definition: compat.h:503
#define _SEH2_GetExceptionCode()
Definition: pseh2_64.h:12
BOOLEAN InheritedAddressSpace
Definition: ntddk_ex.h:239
WCHAR * LPWSTR
Definition: xmlstorage.h:184
#define RTL_USER_PROCESS_PARAMETERS_LOCAL_DLL_PATH
Definition: rtltypes.h:53
NTSTATUS NTAPI LdrShutdownThread(VOID)
Definition: ldrinit.c:1078
IN BOOLEAN OUT PSTR Buffer
Definition: progress.h:34
#define STATUS_CONFLICTING_ADDRESSES
Definition: ntstatus.h:247
return STATUS_SUCCESS
Definition: btrfs.c:2725
PVOID TlsBitmap
Definition: ntddk_ex.h:259
#define REG_DWORD
Definition: sdbapi.c:596
signed int * PLONG
Definition: retypes.h:5
ULONG StartAddressOfRawData
Definition: ntimage.h:546
WCHAR StringBuffer[156]
Definition: ldrinit.c:41
ULONG RtlpDisableHeapLookaside
Definition: ldrinit.c:92
#define LDRP_PROCESS_ATTACH_CALLED
Definition: ldrtypes.h:48
#define UInt32x32To64(a, b)
Definition: intsafe.h:258
NT_TIB NtTib
Definition: ntddk_ex.h:332
ULONG LdrpActiveUnloadCount
Definition: ldrinit.c:84
PVOID AnsiCodePageData
Definition: ntddk_ex.h:264
VOID NTAPI RtlSetUnhandledExceptionFilter(IN PRTLP_UNHANDLED_EXCEPTION_FILTER TopLevelExceptionFilter)
Definition: exception.c:319
LIST_ENTRY InInitializationOrderLinks
Definition: ldrtypes.h:139
#define Int32x32To64(a, b)
#define RtlCompareMemory(s1, s2, l)
Definition: env_spec_w32.h:465
BOOLEAN LdrpImageHasTls
Definition: ldrinit.c:52
USHORT LoadCount
Definition: ntddk_ex.h:208
LONGLONG QuadPart
Definition: typedefs.h:112
#define TLS_MINIMUM_AVAILABLE
Definition: ntddk_ex.h:236
BOOLEAN NTAPI LdrpCallInitRoutine(IN PDLL_INIT_ROUTINE EntryPoint, IN PVOID BaseAddress, IN ULONG Reason, IN PVOID Context)
Definition: ldrutils.c:100
#define RTL_QUERY_ACTIVATION_CONTEXT_FLAG_NO_ADDREF
Definition: rtltypes.h:119
#define IMAGE_SUBSYSTEM_WINDOWS_GUI
Definition: ntimage.h:437
#define KEY_ENUMERATE_SUB_KEYS
Definition: nt_native.h:1019
#define RTL_CONSTANT_STRING(s)
Definition: tunneltest.c:14
#define REG_SZ
Definition: layer.c:22
PULONG MinorVersion OPTIONAL
Definition: CrossNt.h:68
NTSYSAPI NTSTATUS NTAPI ZwSetInformationProcess(_In_ HANDLE ProcessHandle, _In_ PROCESSINFOCLASS ProcessInformationClass, _In_ PVOID ProcessInformation, _In_ ULONG ProcessInformationLength)