2016-01-05 23:01:17 +08:00
|
|
|
// main.cc
|
|
|
|
// 8/24/2013 jichi
|
|
|
|
// Branch: ITH_DLL/main.cpp, rev 128
|
|
|
|
// 8/24/2013 TODO: Clean up this file
|
|
|
|
|
|
|
|
#ifdef _MSC_VER
|
|
|
|
# pragma warning (disable:4100) // C4100: unreference formal parameter
|
|
|
|
//# pragma warning (disable:4733) // C4733: Inline asm assigning to 'FS:0' : handler not registered as safe handler
|
|
|
|
#endif // _MSC_VER
|
|
|
|
|
|
|
|
#include "src/main.h"
|
2018-07-01 14:08:51 +08:00
|
|
|
#include "src/engine/engine.h"
|
2016-01-05 23:01:17 +08:00
|
|
|
#include "src/engine/match.h"
|
|
|
|
#include "src/hijack/texthook.h"
|
|
|
|
#include "src/util/growl.h"
|
|
|
|
#include "src/except.h"
|
|
|
|
#include "include/const.h"
|
|
|
|
#include "include/defs.h"
|
|
|
|
#include "ithsys/ithsys.h"
|
2018-05-21 04:10:07 +08:00
|
|
|
#include "util/util.h"
|
2016-01-05 23:01:17 +08:00
|
|
|
#include <cstdio> // for swprintf
|
|
|
|
//#include "ntinspect/ntinspect.h"
|
|
|
|
//#include "winseh/winseh.h"
|
|
|
|
//#include <boost/foreach.hpp>
|
|
|
|
//#include "md5.h"
|
|
|
|
//#include <ITH\AVL.h>
|
|
|
|
//#include <ITH\ntdll.h>
|
|
|
|
|
|
|
|
// Global variables
|
|
|
|
|
|
|
|
// jichi 6/3/2014: memory range of the current module
|
|
|
|
DWORD processStartAddress,
|
|
|
|
processStopAddress;
|
|
|
|
|
|
|
|
enum { HOOK_BUFFER_SIZE = MAX_HOOK * sizeof(TextHook) };
|
|
|
|
//#define MAX_HOOK (HOOK_BUFFER_SIZE/sizeof(TextHook))
|
|
|
|
DWORD hook_buff_len = HOOK_BUFFER_SIZE;
|
|
|
|
|
|
|
|
namespace { FilterRange _filter[IHF_FILTER_CAPACITY]; }
|
|
|
|
FilterRange *filter = _filter;
|
|
|
|
|
|
|
|
WCHAR hm_section[0x100];
|
|
|
|
HANDLE hSection;
|
|
|
|
bool running,
|
|
|
|
live = false;
|
2018-05-21 01:11:55 +08:00
|
|
|
int currentHook = 0,
|
2016-01-05 23:01:17 +08:00
|
|
|
user_hook_count = 0;
|
|
|
|
DWORD trigger = 0;
|
|
|
|
HANDLE
|
|
|
|
hFile,
|
|
|
|
hMutex,
|
|
|
|
hmMutex;
|
2018-06-14 09:52:45 +08:00
|
|
|
HMODULE currentModule;
|
2018-05-21 05:07:42 +08:00
|
|
|
//DWORD current_process_id;
|
2016-01-05 23:01:17 +08:00
|
|
|
extern DWORD enter_count;
|
|
|
|
//extern LPWSTR current_dir;
|
|
|
|
extern DWORD engine_type;
|
|
|
|
|
2018-05-21 04:10:07 +08:00
|
|
|
BOOL WINAPI DllMain(HINSTANCE hModule, DWORD fdwReason, LPVOID unused)
|
2016-01-05 23:01:17 +08:00
|
|
|
{
|
2018-05-21 04:10:07 +08:00
|
|
|
static HANDLE pipeThread;
|
2016-01-05 23:01:17 +08:00
|
|
|
|
|
|
|
|
|
|
|
switch (fdwReason) {
|
|
|
|
case DLL_PROCESS_ATTACH:
|
|
|
|
{
|
2018-05-21 05:07:42 +08:00
|
|
|
static bool attached_ = false;
|
|
|
|
if (attached_) // already attached
|
2018-05-21 04:10:07 +08:00
|
|
|
{
|
|
|
|
return TRUE;
|
|
|
|
}
|
2018-05-21 05:07:42 +08:00
|
|
|
attached_ = true;
|
2016-01-05 23:01:17 +08:00
|
|
|
|
2018-05-21 04:10:07 +08:00
|
|
|
DisableThreadLibraryCalls(hModule);
|
2016-01-05 23:01:17 +08:00
|
|
|
|
2018-06-14 09:52:45 +08:00
|
|
|
swprintf(hm_section, ITH_SECTION_ L"%d", GetCurrentProcessId());
|
2016-01-05 23:01:17 +08:00
|
|
|
|
|
|
|
// jichi 9/25/2013: Interprocedural communication with vnrsrv.
|
2018-06-14 04:24:52 +08:00
|
|
|
hSection = CreateFileMappingW(INVALID_HANDLE_VALUE, nullptr, PAGE_EXECUTE_READWRITE, 0, HOOK_SECTION_SIZE, hm_section);
|
2018-06-21 07:04:18 +08:00
|
|
|
::hookman = nullptr;
|
|
|
|
NtMapViewOfSection(hSection, NtCurrentProcess(),
|
|
|
|
(LPVOID *)&::hookman, 0, hook_buff_len, 0, &hook_buff_len, ViewUnmap, 0,
|
|
|
|
PAGE_EXECUTE_READWRITE);
|
|
|
|
// Artikash 6/20/2018: This crashes certain games (https://vndb.org/v7738). No idea why.
|
|
|
|
//::hookman = (TextHook*)MapViewOfFile(hSection, FILE_MAP_READ | FILE_MAP_WRITE, 0, 0, HOOK_SECTION_SIZE / 2);
|
2016-01-05 23:01:17 +08:00
|
|
|
|
2018-06-14 09:52:45 +08:00
|
|
|
::processStartAddress = (DWORD)GetModuleHandleW(nullptr);
|
2016-01-05 23:01:17 +08:00
|
|
|
|
2018-07-01 14:08:51 +08:00
|
|
|
// Artikash 7/1/2018: No idea how the everliving fuck this works, but it finds the process stop address.
|
|
|
|
PROCESS_BASIC_INFORMATION info;
|
|
|
|
NtQueryInformationProcess(GetCurrentProcess(), ProcessBasicInformation, &info, sizeof(PROCESS_BASIC_INFORMATION), 0);
|
|
|
|
::processStopAddress = ::processStartAddress + ((LDR_DATA_TABLE_ENTRY*)&info.PebBaseAddress->Ldr->InLoadOrderModuleList.Flink->Flink)->SizeOfImage;
|
|
|
|
|
2016-01-05 23:01:17 +08:00
|
|
|
{
|
|
|
|
wchar_t hm_mutex[0x100];
|
2018-06-14 09:52:45 +08:00
|
|
|
swprintf(hm_mutex, ITH_HOOKMAN_MUTEX_ L"%d", GetCurrentProcessId());
|
|
|
|
::hmMutex = CreateMutexW(nullptr, FALSE, hm_mutex);
|
2016-01-05 23:01:17 +08:00
|
|
|
}
|
|
|
|
{
|
|
|
|
wchar_t dll_mutex[0x100];
|
2018-06-14 09:52:45 +08:00
|
|
|
swprintf(dll_mutex, ITH_PROCESS_MUTEX_ L"%d", GetCurrentProcessId());
|
2016-01-05 23:01:17 +08:00
|
|
|
DWORD exists;
|
2018-06-14 09:52:45 +08:00
|
|
|
::hMutex = CreateMutexW(nullptr, TRUE, dll_mutex); // jichi 9/18/2013: own is true, make sure the injected dll is singleton
|
|
|
|
if (GetLastError() == ERROR_ALREADY_EXISTS)
|
2016-01-05 23:01:17 +08:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
::running = true;
|
|
|
|
::current_available = ::hookman;
|
2018-06-14 09:52:45 +08:00
|
|
|
::currentModule = hModule;
|
2016-01-05 23:01:17 +08:00
|
|
|
|
2018-06-21 14:59:40 +08:00
|
|
|
pipeThread = CreateThread(nullptr, 0, PipeManager, 0, 0, nullptr);
|
2016-01-05 23:01:17 +08:00
|
|
|
} break;
|
|
|
|
case DLL_PROCESS_DETACH:
|
|
|
|
{
|
|
|
|
static bool detached_ = false;
|
|
|
|
if (detached_) // already detached
|
|
|
|
return TRUE;
|
|
|
|
detached_ = true;
|
|
|
|
|
|
|
|
// jichi 10/2/2103: Cannot use __try in functions that require object unwinding
|
|
|
|
//ITH_TRY {
|
|
|
|
::running = false;
|
|
|
|
::live = false;
|
|
|
|
|
|
|
|
Engine::terminate();
|
|
|
|
|
2018-05-21 01:11:55 +08:00
|
|
|
if (pipeThread) {
|
2018-06-14 04:24:52 +08:00
|
|
|
WaitForSingleObject(pipeThread, TIMEOUT);
|
|
|
|
CloseHandle(pipeThread);
|
2016-01-05 23:01:17 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
for (TextHook *man = ::hookman; man->RemoveHook(); man++);
|
|
|
|
for (TextHook *man = ::hookman; man < ::hookman + MAX_HOOK; man++)
|
|
|
|
man->ClearHook();
|
|
|
|
//if (ith_has_section)
|
2018-06-14 04:24:52 +08:00
|
|
|
UnmapViewOfFile(::hookman);
|
|
|
|
|
|
|
|
CloseHandle(hSection);
|
|
|
|
CloseHandle(hMutex);
|
|
|
|
CloseHandle(hmMutex);
|
2016-01-05 23:01:17 +08:00
|
|
|
//} ITH_EXCEPT {}
|
|
|
|
} break;
|
|
|
|
}
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
//extern "C" {
|
|
|
|
DWORD NewHook(const HookParam &hp, LPCSTR name, DWORD flag)
|
|
|
|
{
|
|
|
|
CHAR str[128];
|
|
|
|
int current = ::current_available - ::hookman;
|
|
|
|
if (current < MAX_HOOK) {
|
|
|
|
//flag &= 0xffff;
|
|
|
|
//if ((flag & HOOK_AUXILIARY) == 0)
|
|
|
|
flag |= HOOK_ADDITIONAL;
|
|
|
|
if (name == NULL || name[0] == '\0')
|
|
|
|
{
|
|
|
|
sprintf(str, "UserHook%d", user_hook_count++);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
strcpy(str, name);
|
|
|
|
}
|
|
|
|
|
2018-06-21 07:17:35 +08:00
|
|
|
ConsoleOutput("vnrcli:NewHook: try inserting hook:");
|
|
|
|
ConsoleOutput(name);
|
2016-01-05 23:01:17 +08:00
|
|
|
|
|
|
|
// jichi 7/13/2014: This function would raise when too many hooks added
|
|
|
|
::hookman[current].InitHook(hp, str, flag & 0xffff);
|
|
|
|
|
|
|
|
if (::hookman[current].InsertHook() == 0) {
|
|
|
|
ConsoleOutput("vnrcli:NewHook: hook inserted");
|
2018-07-05 11:17:40 +08:00
|
|
|
NotifyHookInsert(hp, name);
|
2016-01-05 23:01:17 +08:00
|
|
|
} else
|
|
|
|
ConsoleOutput("vnrcli:NewHook:WARNING: failed to insert hook");
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
DWORD RemoveHook(DWORD addr)
|
|
|
|
{
|
|
|
|
for (int i = 0; i < MAX_HOOK; i++)
|
|
|
|
if (::hookman[i].Address ()== addr) {
|
|
|
|
::hookman[i].ClearHook();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
DWORD SwitchTrigger(DWORD t)
|
|
|
|
{
|
|
|
|
trigger = t;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-06-19 13:37:42 +08:00
|
|
|
// EOF
|