| 1 |
#include "Daodan_Patch.h" |
| 2 |
#include "Patches/Utility.h" |
| 3 |
#include <beaengine/BeaEngine.h> |
| 4 |
|
| 5 |
#include <windows.h> |
| 6 |
#include <stdlib.h> |
| 7 |
#include <string.h> |
| 8 |
|
| 9 |
bool DDrPatch_MakeJump(void* from, void* to) |
| 10 |
{ |
| 11 |
DWORD oldp; |
| 12 |
|
| 13 |
if (VirtualProtect(from, 5, PAGE_EXECUTE_READWRITE, &oldp)) |
| 14 |
{ |
| 15 |
*((unsigned char*)from) = 0xe9; // jmp rel32 |
| 16 |
from = (char*)from + 1; |
| 17 |
*(int*)from = (unsigned int)to - (unsigned int)from - 4; |
| 18 |
VirtualProtect(from, 5, oldp, &oldp); |
| 19 |
return true; |
| 20 |
} |
| 21 |
else |
| 22 |
return false; |
| 23 |
} |
| 24 |
|
| 25 |
bool DDrPatch_MakeCall(void* from, void* to) |
| 26 |
{ |
| 27 |
DWORD oldp; |
| 28 |
|
| 29 |
if (VirtualProtect(from, 5, PAGE_EXECUTE_READWRITE, &oldp)) |
| 30 |
{ |
| 31 |
*((unsigned char*)from) = 0xe8; // call rel32 |
| 32 |
from = (char*)from + 1; |
| 33 |
*(int*)from = (unsigned int)to - (unsigned int)from - 4; |
| 34 |
VirtualProtect(from, 5, oldp, &oldp); |
| 35 |
return true; |
| 36 |
} |
| 37 |
else |
| 38 |
return false; |
| 39 |
} |
| 40 |
|
| 41 |
void* DDrPatch_MakeDetour(void* from, void* to) |
| 42 |
{ |
| 43 |
int len = 0; |
| 44 |
|
| 45 |
/* |
| 46 |
STARTUPMESSAGE("Orig before", 0); |
| 47 |
DDrPatch_PrintDisasm(from, 10, 0); |
| 48 |
*/ |
| 49 |
DISASM disasm; |
| 50 |
memset(&disasm, 0, sizeof(DISASM)); |
| 51 |
disasm.EIP = (UIntPtr) from; |
| 52 |
|
| 53 |
char* trampoline = malloc(40); |
| 54 |
DDrPatch_NOOP(trampoline, 40); |
| 55 |
int pos = 0; |
| 56 |
int branches = 0; |
| 57 |
|
| 58 |
while (((void*)disasm.EIP - from) < 5) { |
| 59 |
len = Disasm(&disasm); |
| 60 |
if (len != UNKNOWN_OPCODE) { |
| 61 |
if ((disasm.Instruction.Category & 0xffff) == CONTROL_TRANSFER) { |
| 62 |
if (disasm.Prefix.Number > 0) { |
| 63 |
STARTUPMESSAGE("Detour: Branch in trampoline area from address 0x%08x with prefixes", from); |
| 64 |
return (void*)-1; |
| 65 |
} |
| 66 |
branches++; |
| 67 |
int target = disasm.Instruction.AddrValue; |
| 68 |
bool targetInTrampoline = ((void*)((int)disasm.Instruction.AddrValue) - from) < 5; |
| 69 |
switch (disasm.Instruction.BranchType) { |
| 70 |
case JmpType: |
| 71 |
case CallType: |
| 72 |
if (targetInTrampoline) { |
| 73 |
int offset = disasm.Instruction.AddrValue - disasm.EIP; |
| 74 |
if (disasm.Instruction.BranchType == JmpType) |
| 75 |
DDrPatch_MakeJump(&trampoline[pos], &trampoline[pos]+offset); |
| 76 |
else |
| 77 |
DDrPatch_MakeCall(&trampoline[pos], &trampoline[pos]+offset); |
| 78 |
} else { |
| 79 |
if (disasm.Instruction.BranchType == JmpType) |
| 80 |
DDrPatch_MakeJump(&trampoline[pos], (void*)target); |
| 81 |
else |
| 82 |
DDrPatch_MakeCall(&trampoline[pos], (void*)target); |
| 83 |
} |
| 84 |
pos += 5; |
| 85 |
break; |
| 86 |
case RetType: |
| 87 |
case JECXZ: |
| 88 |
memcpy(&trampoline[pos], (void*)disasm.EIP, len); |
| 89 |
pos += len; |
| 90 |
break; |
| 91 |
// Opcode +1 |
| 92 |
case JO: |
| 93 |
case JC: |
| 94 |
case JE: |
| 95 |
case JNA: |
| 96 |
case JS: |
| 97 |
case JP: |
| 98 |
case JL: |
| 99 |
case JNG: |
| 100 |
if (targetInTrampoline) { |
| 101 |
memcpy(&trampoline[pos], (void*)disasm.EIP, len); |
| 102 |
pos += len; |
| 103 |
} else { |
| 104 |
trampoline[pos++] = disasm.Instruction.Opcode + 1; |
| 105 |
trampoline[pos++] = 5; |
| 106 |
DDrPatch_MakeJump(&trampoline[pos], (void*)target); |
| 107 |
pos += 5; |
| 108 |
} |
| 109 |
break; |
| 110 |
// Opcode -1 |
| 111 |
case JNO: |
| 112 |
case JNC: |
| 113 |
case JNE: |
| 114 |
case JA: |
| 115 |
case JNS: |
| 116 |
case JNP: |
| 117 |
case JNL: |
| 118 |
case JG: |
| 119 |
if (targetInTrampoline) { |
| 120 |
memcpy(&trampoline[pos], (void*)disasm.EIP, len); |
| 121 |
pos += len; |
| 122 |
} else { |
| 123 |
trampoline[pos++] = disasm.Instruction.Opcode - 1; |
| 124 |
trampoline[pos++] = 5; |
| 125 |
DDrPatch_MakeJump(&trampoline[pos], (void*)target); |
| 126 |
pos += 5; |
| 127 |
} |
| 128 |
break; |
| 129 |
default: |
| 130 |
STARTUPMESSAGE("Detour: Unknown branch in trampoline area from address 0x%08x", from); |
| 131 |
return (void*)-1; |
| 132 |
} |
| 133 |
} else { |
| 134 |
memcpy(&trampoline[pos], (void*)disasm.EIP, len); |
| 135 |
pos += len; |
| 136 |
} |
| 137 |
disasm.EIP += (UIntPtr)len; |
| 138 |
} |
| 139 |
else { |
| 140 |
STARTUPMESSAGE("Detour: Unknown opcode in trampoline area from address 0x%08x", from); |
| 141 |
return (void*)-1; |
| 142 |
} |
| 143 |
} |
| 144 |
|
| 145 |
if (branches > 1) { |
| 146 |
STARTUPMESSAGE("Detour: Too many branches in trampoline'd code from address 0x%08x: %d", from, branches); |
| 147 |
return (void*)-1; |
| 148 |
} |
| 149 |
|
| 150 |
|
| 151 |
DDrPatch_MakeJump(&trampoline[pos], (void*)disasm.EIP); |
| 152 |
DDrPatch_NOOP(from, (void*)disasm.EIP - from); |
| 153 |
|
| 154 |
DWORD oldp; |
| 155 |
if (!VirtualProtect(trampoline, 40, PAGE_EXECUTE_READWRITE, &oldp)) { |
| 156 |
STARTUPMESSAGE("Detour: Could not mark page for trampoline as executable: from address 0x%08x", from); |
| 157 |
return (void*)-1; |
| 158 |
} |
| 159 |
DDrPatch_MakeJump(from, to); |
| 160 |
|
| 161 |
/* |
| 162 |
STARTUPMESSAGE("Trampoline", 0); |
| 163 |
DDrPatch_PrintDisasm(trampoline, 10, 6); |
| 164 |
|
| 165 |
STARTUPMESSAGE("Orig after", 0); |
| 166 |
DDrPatch_PrintDisasm(disasm.EIP, 7, 0); |
| 167 |
|
| 168 |
STARTUPMESSAGE("Orig start after", 0); |
| 169 |
DDrPatch_PrintDisasm(from, 3, 6); |
| 170 |
*/ |
| 171 |
return trampoline; |
| 172 |
} |
| 173 |
|
| 174 |
bool DDrPatch_String(char* dest, const unsigned char* string, int length) |
| 175 |
{ |
| 176 |
DWORD oldp; |
| 177 |
|
| 178 |
if (VirtualProtect(dest, length, PAGE_EXECUTE_READWRITE, &oldp)) |
| 179 |
{ |
| 180 |
memcpy(dest, string, length); |
| 181 |
VirtualProtect(dest, length, oldp, &oldp); |
| 182 |
return true; |
| 183 |
} |
| 184 |
else |
| 185 |
return false; |
| 186 |
} |
| 187 |
|
| 188 |
bool DDrPatch_Byte(char* dest, unsigned char value) |
| 189 |
{ |
| 190 |
DWORD oldp; |
| 191 |
|
| 192 |
if (VirtualProtect(dest, 1, PAGE_EXECUTE_READWRITE, &oldp)) |
| 193 |
{ |
| 194 |
*dest = value; |
| 195 |
VirtualProtect(dest, 1, oldp, &oldp); |
| 196 |
return true; |
| 197 |
} |
| 198 |
else |
| 199 |
return false; |
| 200 |
} |
| 201 |
|
| 202 |
bool DDrPatch_Int32(int* dest, unsigned int value) |
| 203 |
{ |
| 204 |
DWORD oldp; |
| 205 |
|
| 206 |
if (VirtualProtect(dest, 4, PAGE_EXECUTE_READWRITE, &oldp)) |
| 207 |
{ |
| 208 |
*dest = value; |
| 209 |
VirtualProtect(dest, 4, oldp, &oldp); |
| 210 |
return true; |
| 211 |
} |
| 212 |
else |
| 213 |
return false; |
| 214 |
} |
| 215 |
|
| 216 |
bool DDrPatch_Int16(short* dest, unsigned short value) |
| 217 |
{ |
| 218 |
DWORD oldp; |
| 219 |
|
| 220 |
if (VirtualProtect(dest, 2, PAGE_EXECUTE_READWRITE, &oldp)) |
| 221 |
{ |
| 222 |
*dest = value; |
| 223 |
VirtualProtect(dest, 2, oldp, &oldp); |
| 224 |
return true; |
| 225 |
} |
| 226 |
else |
| 227 |
return false; |
| 228 |
} |
| 229 |
|
| 230 |
bool DDrPatch_NOOP(char* dest, unsigned int length) |
| 231 |
{ |
| 232 |
DWORD oldp; |
| 233 |
|
| 234 |
if (VirtualProtect(dest, length, PAGE_EXECUTE_READWRITE, &oldp)) |
| 235 |
{ |
| 236 |
memset(dest, 0x90, length); |
| 237 |
VirtualProtect(dest, length, oldp, &oldp); |
| 238 |
return true; |
| 239 |
} |
| 240 |
else |
| 241 |
return false; |
| 242 |
} |
| 243 |
|
| 244 |
void* DDrPatch_ExecutableASM(char* from, char* nextInst, const unsigned char* code, int length) |
| 245 |
{ |
| 246 |
char* newCode = malloc(length+5); |
| 247 |
if (!DDrPatch_NOOP(newCode, length+5)) |
| 248 |
return (void*)-1; |
| 249 |
|
| 250 |
memcpy(newCode, code, length); |
| 251 |
if (!DDrPatch_MakeJump(&newCode[length], nextInst)) |
| 252 |
return (void*)-1; |
| 253 |
|
| 254 |
DWORD oldp; |
| 255 |
if (!VirtualProtect(newCode, length+5, PAGE_EXECUTE_READWRITE, &oldp)) { |
| 256 |
STARTUPMESSAGE("ExecASM: Could not mark page for new code as executable: from address 0x%08x", from); |
| 257 |
return (void*)-1; |
| 258 |
} |
| 259 |
|
| 260 |
if (!DDrPatch_MakeJump(from, newCode)) |
| 261 |
return (void*)-1; |
| 262 |
|
| 263 |
return newCode; |
| 264 |
} |
| 265 |
|
| 266 |
void DDrPatch_PrintDisasm(void* addr, int instLimit, int sizeLimit) |
| 267 |
{ |
| 268 |
DISASM MyDisasm; |
| 269 |
int len = 0; |
| 270 |
int size = 0; |
| 271 |
int i = 0; |
| 272 |
|
| 273 |
memset(&MyDisasm, 0, sizeof(DISASM)); |
| 274 |
|
| 275 |
MyDisasm.EIP = (UIntPtr) addr; |
| 276 |
|
| 277 |
STARTUPMESSAGE("", 0); |
| 278 |
STARTUPMESSAGE("Disassembly @ 0x%06x", addr); |
| 279 |
|
| 280 |
if (sizeLimit <= 0) |
| 281 |
sizeLimit = 20 * instLimit; |
| 282 |
|
| 283 |
while ((i < instLimit) && (size < sizeLimit)) { |
| 284 |
len = Disasm(&MyDisasm); |
| 285 |
if (len != UNKNOWN_OPCODE) { |
| 286 |
size += len; |
| 287 |
STARTUPMESSAGE(" %s, Opcode: 0x%x, len: %d, branch: %d, to: 0x%06x", MyDisasm.CompleteInstr, MyDisasm.Instruction.Opcode, len, MyDisasm.Instruction.BranchType, MyDisasm.Instruction.AddrValue); |
| 288 |
STARTUPMESSAGE(" Cat: 0x%04x, prefix count: %d", MyDisasm.Instruction.Category & 0xffff, MyDisasm.Prefix.Number ); |
| 289 |
|
| 290 |
MyDisasm.EIP += (UIntPtr)len; |
| 291 |
i++; |
| 292 |
} |
| 293 |
}; |
| 294 |
|
| 295 |
STARTUPMESSAGE("", 0); |
| 296 |
} |
| 297 |
|