1 | #include "Daodan_Patch.h"
|
---|
2 | #include "Patches/Utility.h"
|
---|
3 | #include <beaengine/BeaEngine.h>
|
---|
4 |
|
---|
5 | #include <windows.h>
|
---|
6 | #include <stdlib.h>
|
---|
7 | #include <string.h>
|
---|
8 |
|
---|
9 | bool DDrPatch_MakeJump(void* from, void* to)
|
---|
10 | {
|
---|
11 | DWORD oldp;
|
---|
12 |
|
---|
13 | if (VirtualProtect(from, 5, PAGE_EXECUTE_READWRITE, &oldp))
|
---|
14 | {
|
---|
15 | *((unsigned char*)from) = 0xe9; // jmp rel32
|
---|
16 | from = (char*)from + 1;
|
---|
17 | *(int*)from = (unsigned int)to - (unsigned int)from - 4;
|
---|
18 | VirtualProtect(from, 5, oldp, &oldp);
|
---|
19 | return true;
|
---|
20 | }
|
---|
21 | else
|
---|
22 | return false;
|
---|
23 | }
|
---|
24 |
|
---|
25 | bool DDrPatch_MakeCall(void* from, void* to)
|
---|
26 | {
|
---|
27 | DWORD oldp;
|
---|
28 |
|
---|
29 | if (VirtualProtect(from, 5, PAGE_EXECUTE_READWRITE, &oldp))
|
---|
30 | {
|
---|
31 | *((unsigned char*)from) = 0xe8; // call rel32
|
---|
32 | from = (char*)from + 1;
|
---|
33 | *(int*)from = (unsigned int)to - (unsigned int)from - 4;
|
---|
34 | VirtualProtect(from, 5, oldp, &oldp);
|
---|
35 | return true;
|
---|
36 | }
|
---|
37 | else
|
---|
38 | return false;
|
---|
39 | }
|
---|
40 |
|
---|
41 | void* DDrPatch_MakeDetour(void* from, void* to)
|
---|
42 | {
|
---|
43 | int len = 0;
|
---|
44 |
|
---|
45 | /*
|
---|
46 | STARTUPMESSAGE("Orig before", 0);
|
---|
47 | DDrPatch_PrintDisasm(from, 10, 0);
|
---|
48 | */
|
---|
49 | DISASM disasm;
|
---|
50 | memset(&disasm, 0, sizeof(DISASM));
|
---|
51 | disasm.EIP = (UIntPtr) from;
|
---|
52 |
|
---|
53 | char* trampoline = malloc(40);
|
---|
54 | DDrPatch_NOOP(trampoline, 40);
|
---|
55 | int pos = 0;
|
---|
56 | int branches = 0;
|
---|
57 |
|
---|
58 | while (((void*)disasm.EIP - from) < 5) {
|
---|
59 | len = Disasm(&disasm);
|
---|
60 | if (len != UNKNOWN_OPCODE) {
|
---|
61 | if ((disasm.Instruction.Category & 0xffff) == CONTROL_TRANSFER) {
|
---|
62 | if (disasm.Prefix.Number > 0) {
|
---|
63 | STARTUPMESSAGE("Detour: Branch in trampoline area from address 0x%08x with prefixes", from);
|
---|
64 | return (void*)-1;
|
---|
65 | }
|
---|
66 | branches++;
|
---|
67 | int target = disasm.Instruction.AddrValue;
|
---|
68 | bool targetInTrampoline = ((void*)((int)disasm.Instruction.AddrValue) - from) < 5;
|
---|
69 | switch (disasm.Instruction.BranchType) {
|
---|
70 | case JmpType:
|
---|
71 | case CallType:
|
---|
72 | if (targetInTrampoline) {
|
---|
73 | int offset = disasm.Instruction.AddrValue - disasm.EIP;
|
---|
74 | if (disasm.Instruction.BranchType == JmpType)
|
---|
75 | DDrPatch_MakeJump(&trampoline[pos], &trampoline[pos]+offset);
|
---|
76 | else
|
---|
77 | DDrPatch_MakeCall(&trampoline[pos], &trampoline[pos]+offset);
|
---|
78 | } else {
|
---|
79 | if (disasm.Instruction.BranchType == JmpType)
|
---|
80 | DDrPatch_MakeJump(&trampoline[pos], (void*)target);
|
---|
81 | else
|
---|
82 | DDrPatch_MakeCall(&trampoline[pos], (void*)target);
|
---|
83 | }
|
---|
84 | pos += 5;
|
---|
85 | break;
|
---|
86 | case RetType:
|
---|
87 | case JECXZ:
|
---|
88 | memcpy(&trampoline[pos], (void*)disasm.EIP, len);
|
---|
89 | pos += len;
|
---|
90 | break;
|
---|
91 | // Opcode +1
|
---|
92 | case JO:
|
---|
93 | case JC:
|
---|
94 | case JE:
|
---|
95 | case JNA:
|
---|
96 | case JS:
|
---|
97 | case JP:
|
---|
98 | case JL:
|
---|
99 | case JNG:
|
---|
100 | if (targetInTrampoline) {
|
---|
101 | memcpy(&trampoline[pos], (void*)disasm.EIP, len);
|
---|
102 | pos += len;
|
---|
103 | } else {
|
---|
104 | trampoline[pos++] = disasm.Instruction.Opcode + 1;
|
---|
105 | trampoline[pos++] = 5;
|
---|
106 | DDrPatch_MakeJump(&trampoline[pos], (void*)target);
|
---|
107 | pos += 5;
|
---|
108 | }
|
---|
109 | break;
|
---|
110 | // Opcode -1
|
---|
111 | case JNO:
|
---|
112 | case JNC:
|
---|
113 | case JNE:
|
---|
114 | case JA:
|
---|
115 | case JNS:
|
---|
116 | case JNP:
|
---|
117 | case JNL:
|
---|
118 | case JG:
|
---|
119 | if (targetInTrampoline) {
|
---|
120 | memcpy(&trampoline[pos], (void*)disasm.EIP, len);
|
---|
121 | pos += len;
|
---|
122 | } else {
|
---|
123 | trampoline[pos++] = disasm.Instruction.Opcode - 1;
|
---|
124 | trampoline[pos++] = 5;
|
---|
125 | DDrPatch_MakeJump(&trampoline[pos], (void*)target);
|
---|
126 | pos += 5;
|
---|
127 | }
|
---|
128 | break;
|
---|
129 | default:
|
---|
130 | STARTUPMESSAGE("Detour: Unknown branch in trampoline area from address 0x%08x", from);
|
---|
131 | return (void*)-1;
|
---|
132 | }
|
---|
133 | } else {
|
---|
134 | memcpy(&trampoline[pos], (void*)disasm.EIP, len);
|
---|
135 | pos += len;
|
---|
136 | }
|
---|
137 | disasm.EIP += (UIntPtr)len;
|
---|
138 | }
|
---|
139 | else {
|
---|
140 | STARTUPMESSAGE("Detour: Unknown opcode in trampoline area from address 0x%08x", from);
|
---|
141 | return (void*)-1;
|
---|
142 | }
|
---|
143 | }
|
---|
144 |
|
---|
145 | if (branches > 1) {
|
---|
146 | STARTUPMESSAGE("Detour: Too many branches in trampoline'd code from address 0x%08x: %d", from, branches);
|
---|
147 | return (void*)-1;
|
---|
148 | }
|
---|
149 |
|
---|
150 |
|
---|
151 | DDrPatch_MakeJump(&trampoline[pos], (void*)disasm.EIP);
|
---|
152 | DDrPatch_NOOP(from, (void*)disasm.EIP - from);
|
---|
153 |
|
---|
154 | DWORD oldp;
|
---|
155 | if (!VirtualProtect(trampoline, 40, PAGE_EXECUTE_READWRITE, &oldp)) {
|
---|
156 | STARTUPMESSAGE("Detour: Could not mark page for trampoline as executable: from address 0x%08x", from);
|
---|
157 | return (void*)-1;
|
---|
158 | }
|
---|
159 | DDrPatch_MakeJump(from, to);
|
---|
160 |
|
---|
161 | /*
|
---|
162 | STARTUPMESSAGE("Trampoline", 0);
|
---|
163 | DDrPatch_PrintDisasm(trampoline, 10, 6);
|
---|
164 |
|
---|
165 | STARTUPMESSAGE("Orig after", 0);
|
---|
166 | DDrPatch_PrintDisasm(disasm.EIP, 7, 0);
|
---|
167 |
|
---|
168 | STARTUPMESSAGE("Orig start after", 0);
|
---|
169 | DDrPatch_PrintDisasm(from, 3, 6);
|
---|
170 | */
|
---|
171 | return trampoline;
|
---|
172 | }
|
---|
173 |
|
---|
174 | bool DDrPatch_String(char* dest, const unsigned char* string, int length)
|
---|
175 | {
|
---|
176 | DWORD oldp;
|
---|
177 |
|
---|
178 | if (VirtualProtect(dest, length, PAGE_EXECUTE_READWRITE, &oldp))
|
---|
179 | {
|
---|
180 | memcpy(dest, string, length);
|
---|
181 | VirtualProtect(dest, length, oldp, &oldp);
|
---|
182 | return true;
|
---|
183 | }
|
---|
184 | else
|
---|
185 | return false;
|
---|
186 | }
|
---|
187 |
|
---|
188 | bool DDrPatch_Byte(char* dest, unsigned char value)
|
---|
189 | {
|
---|
190 | DWORD oldp;
|
---|
191 |
|
---|
192 | if (VirtualProtect(dest, 1, PAGE_EXECUTE_READWRITE, &oldp))
|
---|
193 | {
|
---|
194 | *dest = value;
|
---|
195 | VirtualProtect(dest, 1, oldp, &oldp);
|
---|
196 | return true;
|
---|
197 | }
|
---|
198 | else
|
---|
199 | return false;
|
---|
200 | }
|
---|
201 |
|
---|
202 | bool DDrPatch_Int32(int* dest, unsigned int value)
|
---|
203 | {
|
---|
204 | DWORD oldp;
|
---|
205 |
|
---|
206 | if (VirtualProtect(dest, 4, PAGE_EXECUTE_READWRITE, &oldp))
|
---|
207 | {
|
---|
208 | *dest = value;
|
---|
209 | VirtualProtect(dest, 4, oldp, &oldp);
|
---|
210 | return true;
|
---|
211 | }
|
---|
212 | else
|
---|
213 | return false;
|
---|
214 | }
|
---|
215 |
|
---|
216 | bool DDrPatch_Int16(short* dest, unsigned short value)
|
---|
217 | {
|
---|
218 | DWORD oldp;
|
---|
219 |
|
---|
220 | if (VirtualProtect(dest, 2, PAGE_EXECUTE_READWRITE, &oldp))
|
---|
221 | {
|
---|
222 | *dest = value;
|
---|
223 | VirtualProtect(dest, 2, oldp, &oldp);
|
---|
224 | return true;
|
---|
225 | }
|
---|
226 | else
|
---|
227 | return false;
|
---|
228 | }
|
---|
229 |
|
---|
230 | bool DDrPatch_NOOP(char* dest, unsigned int length)
|
---|
231 | {
|
---|
232 | DWORD oldp;
|
---|
233 |
|
---|
234 | if (VirtualProtect(dest, length, PAGE_EXECUTE_READWRITE, &oldp))
|
---|
235 | {
|
---|
236 | memset(dest, 0x90, length);
|
---|
237 | VirtualProtect(dest, length, oldp, &oldp);
|
---|
238 | return true;
|
---|
239 | }
|
---|
240 | else
|
---|
241 | return false;
|
---|
242 | }
|
---|
243 |
|
---|
244 | void* DDrPatch_ExecutableASM(char* from, char* nextInst, const unsigned char* code, int length)
|
---|
245 | {
|
---|
246 | char* newCode = malloc(length+5);
|
---|
247 | if (!DDrPatch_NOOP(newCode, length+5))
|
---|
248 | return (void*)-1;
|
---|
249 |
|
---|
250 | memcpy(newCode, code, length);
|
---|
251 | if (!DDrPatch_MakeJump(&newCode[length], nextInst))
|
---|
252 | return (void*)-1;
|
---|
253 |
|
---|
254 | DWORD oldp;
|
---|
255 | if (!VirtualProtect(newCode, length+5, PAGE_EXECUTE_READWRITE, &oldp)) {
|
---|
256 | STARTUPMESSAGE("ExecASM: Could not mark page for new code as executable: from address 0x%08x", from);
|
---|
257 | return (void*)-1;
|
---|
258 | }
|
---|
259 |
|
---|
260 | if (!DDrPatch_MakeJump(from, newCode))
|
---|
261 | return (void*)-1;
|
---|
262 |
|
---|
263 | return newCode;
|
---|
264 | }
|
---|
265 |
|
---|
266 | void DDrPatch_PrintDisasm(void* addr, int instLimit, int sizeLimit)
|
---|
267 | {
|
---|
268 | DISASM MyDisasm;
|
---|
269 | int len = 0;
|
---|
270 | int size = 0;
|
---|
271 | int i = 0;
|
---|
272 |
|
---|
273 | memset(&MyDisasm, 0, sizeof(DISASM));
|
---|
274 |
|
---|
275 | MyDisasm.EIP = (UIntPtr) addr;
|
---|
276 |
|
---|
277 | STARTUPMESSAGE("", 0);
|
---|
278 | STARTUPMESSAGE("Disassembly @ 0x%06x", addr);
|
---|
279 |
|
---|
280 | if (sizeLimit <= 0)
|
---|
281 | sizeLimit = 20 * instLimit;
|
---|
282 |
|
---|
283 | while ((i < instLimit) && (size < sizeLimit)) {
|
---|
284 | len = Disasm(&MyDisasm);
|
---|
285 | if (len != UNKNOWN_OPCODE) {
|
---|
286 | size += len;
|
---|
287 | STARTUPMESSAGE(" %s, Opcode: 0x%x, len: %d, branch: %d, to: 0x%06x", MyDisasm.CompleteInstr, MyDisasm.Instruction.Opcode, len, MyDisasm.Instruction.BranchType, MyDisasm.Instruction.AddrValue);
|
---|
288 | STARTUPMESSAGE(" Cat: 0x%04x, prefix count: %d", MyDisasm.Instruction.Category & 0xffff, MyDisasm.Prefix.Number );
|
---|
289 |
|
---|
290 | MyDisasm.EIP += (UIntPtr)len;
|
---|
291 | i++;
|
---|
292 | }
|
---|
293 | };
|
---|
294 |
|
---|
295 | STARTUPMESSAGE("", 0);
|
---|
296 | }
|
---|
297 |
|
---|