2016-01-05 23:01:17 +08:00
|
|
|
// host.cc
|
|
|
|
// 8/24/2013 jichi
|
|
|
|
// Branch IHF/main.cpp, rev 111
|
|
|
|
// 8/24/2013 TODO: Clean up this file
|
|
|
|
|
|
|
|
//#ifdef _MSC_VER
|
|
|
|
//# pragma warning(disable:4800) // C4800: forcing value to bool (performance warning)
|
|
|
|
//#endif // _MSC_VER
|
|
|
|
|
|
|
|
//#include "customfilter.h"
|
|
|
|
#include "growl.h"
|
|
|
|
#include "host.h"
|
|
|
|
#include "host_p.h"
|
|
|
|
#include "settings.h"
|
|
|
|
#include "vnrhook/include/const.h"
|
|
|
|
#include "vnrhook/include/defs.h"
|
|
|
|
#include "vnrhook/include/types.h"
|
|
|
|
#include "ithsys/ithsys.h"
|
|
|
|
#include <commctrl.h>
|
2018-06-13 08:02:41 +08:00
|
|
|
#include <string>
|
2018-05-25 16:34:40 +08:00
|
|
|
#include "extensions/Extensions.h"
|
2016-01-05 23:01:17 +08:00
|
|
|
|
|
|
|
#define DEBUG "vnrhost/host.cc"
|
|
|
|
|
2018-05-12 04:46:05 +08:00
|
|
|
namespace
|
|
|
|
{ // unnamed
|
2016-01-05 23:01:17 +08:00
|
|
|
|
2018-05-12 04:46:05 +08:00
|
|
|
CRITICAL_SECTION hostCs;
|
|
|
|
HANDLE preventDuplicationMutex; // jichi 9/28/2013: used to guard pipe
|
|
|
|
HANDLE hookMutex; // jichi 9/28/2013: used to guard hook modification
|
2016-01-05 23:01:17 +08:00
|
|
|
} // unnamed namespace
|
|
|
|
|
|
|
|
//extern LPWSTR current_dir;
|
2018-05-12 04:46:05 +08:00
|
|
|
extern CRITICAL_SECTION detachCs;
|
2016-01-05 23:01:17 +08:00
|
|
|
|
|
|
|
Settings *settings;
|
2018-05-12 04:46:05 +08:00
|
|
|
HWND dummyWindow;
|
2016-01-05 23:01:17 +08:00
|
|
|
BOOL running;
|
|
|
|
|
2018-06-12 07:49:28 +08:00
|
|
|
#define ITH_SYNC_HOOK MutexLocker locker(::hookMutex)
|
2016-01-05 23:01:17 +08:00
|
|
|
|
2018-05-12 04:46:05 +08:00
|
|
|
namespace
|
|
|
|
{ // unnamed
|
2016-01-05 23:01:17 +08:00
|
|
|
|
2018-05-12 04:46:05 +08:00
|
|
|
void GetDebugPrivileges()
|
2018-05-21 01:11:55 +08:00
|
|
|
{ // Artikash 5/19/2018: Is it just me or is this function 100% superfluous?
|
2018-05-12 04:46:05 +08:00
|
|
|
HANDLE processToken;
|
2018-05-21 01:11:55 +08:00
|
|
|
TOKEN_PRIVILEGES Privileges = {1, {0x14, 0, SE_PRIVILEGE_ENABLED}};
|
2016-01-05 23:01:17 +08:00
|
|
|
|
2018-05-12 04:46:05 +08:00
|
|
|
OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &processToken);
|
|
|
|
AdjustTokenPrivileges(processToken, FALSE, &Privileges, 0, nullptr, nullptr);
|
|
|
|
CloseHandle(processToken);
|
|
|
|
}
|
2016-01-05 23:01:17 +08:00
|
|
|
|
|
|
|
} // unnamed namespace
|
|
|
|
|
|
|
|
void CreateNewPipe();
|
|
|
|
|
2018-05-12 04:46:05 +08:00
|
|
|
BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID unused)
|
2016-01-05 23:01:17 +08:00
|
|
|
{
|
2018-05-12 04:46:05 +08:00
|
|
|
switch (fdwReason)
|
|
|
|
{
|
|
|
|
case DLL_PROCESS_ATTACH:
|
|
|
|
DisableThreadLibraryCalls(hinstDLL);
|
|
|
|
InitializeCriticalSection(&::hostCs);
|
|
|
|
GetDebugPrivileges();
|
|
|
|
// jichi 12/20/2013: Since I already have a GUI, I don't have to InitCommonControls()
|
2018-05-21 01:11:55 +08:00
|
|
|
// Used by timers.
|
2018-06-12 07:49:28 +08:00
|
|
|
// InitCommonControls();
|
2018-05-12 04:46:05 +08:00
|
|
|
// jichi 8/24/2013: Create hidden window so that ITH can access timer and events
|
|
|
|
dummyWindow = CreateWindowW(L"Button", L"InternalWindow", 0, 0, 0, 0, 0, 0, 0, hinstDLL, 0);
|
|
|
|
break;
|
|
|
|
case DLL_PROCESS_DETACH:
|
|
|
|
if (::running)
|
|
|
|
CloseHost();
|
|
|
|
DeleteCriticalSection(&::hostCs);
|
|
|
|
DestroyWindow(dummyWindow);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return true;
|
2016-01-05 23:01:17 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
enum { IHS_SIZE = 0x80 };
|
2018-05-12 04:46:05 +08:00
|
|
|
enum { IHS_BUFF_SIZE = IHS_SIZE - sizeof(HookParam) };
|
2016-01-05 23:01:17 +08:00
|
|
|
|
|
|
|
struct InsertHookStruct
|
|
|
|
{
|
2018-05-12 04:46:05 +08:00
|
|
|
SendParam sp;
|
|
|
|
BYTE name_buffer[IHS_SIZE];
|
2016-01-05 23:01:17 +08:00
|
|
|
};
|
|
|
|
|
2018-05-12 04:46:05 +08:00
|
|
|
IHFSERVICE bool IHFAPI OpenHost()
|
2016-01-05 23:01:17 +08:00
|
|
|
{
|
2018-05-12 04:46:05 +08:00
|
|
|
bool success;
|
|
|
|
EnterCriticalSection(&::hostCs);
|
|
|
|
|
|
|
|
preventDuplicationMutex = CreateMutexW(nullptr, TRUE, ITH_SERVER_MUTEX);
|
|
|
|
if (GetLastError() == ERROR_ALREADY_EXISTS || ::running)
|
|
|
|
{
|
|
|
|
GROWL_WARN(L"I am sorry that this game is attached by some other VNR ><\nPlease restart the game and try again!");
|
|
|
|
success = false;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2018-05-25 16:34:40 +08:00
|
|
|
LoadExtensions();
|
2018-05-12 04:46:05 +08:00
|
|
|
::running = true;
|
|
|
|
::settings = new Settings;
|
|
|
|
::man = new HookManager;
|
|
|
|
InitializeCriticalSection(&detachCs);
|
|
|
|
::hookMutex = CreateMutexW(nullptr, FALSE, ITH_SERVER_HOOK_MUTEX);
|
|
|
|
success = true;
|
|
|
|
}
|
|
|
|
LeaveCriticalSection(&::hostCs);
|
|
|
|
return success;
|
2016-01-05 23:01:17 +08:00
|
|
|
}
|
|
|
|
|
2018-05-12 04:46:05 +08:00
|
|
|
IHFSERVICE void IHFAPI StartHost()
|
2016-01-05 23:01:17 +08:00
|
|
|
{
|
2018-05-12 04:46:05 +08:00
|
|
|
CreateNewPipe();
|
2016-01-05 23:01:17 +08:00
|
|
|
}
|
|
|
|
|
2018-05-12 04:46:05 +08:00
|
|
|
IHFSERVICE void IHFAPI CloseHost()
|
2016-01-05 23:01:17 +08:00
|
|
|
{
|
2018-05-12 04:46:05 +08:00
|
|
|
EnterCriticalSection(&::hostCs);
|
|
|
|
if (::running)
|
|
|
|
{
|
2018-05-21 04:10:07 +08:00
|
|
|
::running = false;
|
2018-05-12 04:46:05 +08:00
|
|
|
delete man;
|
|
|
|
delete settings;
|
|
|
|
CloseHandle(::hookMutex);
|
|
|
|
CloseHandle(preventDuplicationMutex);
|
|
|
|
DeleteCriticalSection(&detachCs);
|
|
|
|
}
|
|
|
|
LeaveCriticalSection(&::hostCs);
|
2016-01-05 23:01:17 +08:00
|
|
|
}
|
|
|
|
|
2018-05-12 04:46:05 +08:00
|
|
|
IHFSERVICE bool IHFAPI InjectProcessById(DWORD processId, DWORD timeout)
|
2016-01-05 23:01:17 +08:00
|
|
|
{
|
2018-05-12 04:46:05 +08:00
|
|
|
bool success = true;
|
|
|
|
|
|
|
|
if (processId == GetCurrentProcessId())
|
|
|
|
{
|
|
|
|
success = false;
|
|
|
|
}
|
|
|
|
|
2018-06-13 08:02:41 +08:00
|
|
|
CloseHandle(CreateMutexW(nullptr, FALSE, (ITH_HOOKMAN_MUTEX_ + std::to_wstring(processId)).c_str()));
|
2018-05-12 04:46:05 +08:00
|
|
|
if (GetLastError() == ERROR_ALREADY_EXISTS)
|
|
|
|
{
|
|
|
|
man->AddConsoleOutput(L"already locked");
|
|
|
|
success = false;
|
|
|
|
}
|
|
|
|
|
2018-05-21 01:11:55 +08:00
|
|
|
HMODULE textHooker = LoadLibraryExW(ITH_DLL, nullptr, DONT_RESOLVE_DLL_REFERENCES);
|
2018-05-12 04:46:05 +08:00
|
|
|
if (textHooker == nullptr)
|
|
|
|
{
|
|
|
|
success = false;
|
|
|
|
}
|
|
|
|
wchar_t textHookerPath[MAX_PATH];
|
|
|
|
unsigned int textHookerPathSize = GetModuleFileNameW(textHooker, textHookerPath, MAX_PATH) * 2 + 2;
|
|
|
|
FreeLibrary(textHooker);
|
|
|
|
|
|
|
|
HANDLE processHandle = OpenProcess(PROCESS_ALL_ACCESS, FALSE, processId);
|
|
|
|
if (processHandle == INVALID_HANDLE_VALUE || processHandle == nullptr)
|
|
|
|
{
|
|
|
|
success = false;
|
|
|
|
}
|
|
|
|
|
2018-05-21 01:11:55 +08:00
|
|
|
LPTHREAD_START_ROUTINE loadLibraryStartRoutine = (LPTHREAD_START_ROUTINE)GetProcAddress(GetModuleHandleA("kernel32.dll"), "LoadLibraryW");
|
2018-05-12 04:46:05 +08:00
|
|
|
|
|
|
|
if (success)
|
|
|
|
{
|
|
|
|
if (LPVOID remoteData = VirtualAllocEx(processHandle, nullptr, textHookerPathSize, MEM_RESERVE | MEM_COMMIT, PAGE_READWRITE))
|
|
|
|
{
|
|
|
|
if (WriteProcessMemory(processHandle, remoteData, textHookerPath, textHookerPathSize, nullptr))
|
|
|
|
{
|
2018-05-21 01:11:55 +08:00
|
|
|
if (HANDLE thread = CreateRemoteThread(processHandle, nullptr, 0, loadLibraryStartRoutine, remoteData, 0, nullptr))
|
2018-05-12 04:46:05 +08:00
|
|
|
{
|
|
|
|
WaitForSingleObject(thread, timeout);
|
|
|
|
CloseHandle(thread);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
success = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
success = false;
|
|
|
|
}
|
|
|
|
VirtualFreeEx(processHandle, remoteData, textHookerPathSize, MEM_RELEASE);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
success = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!success)
|
|
|
|
{
|
|
|
|
man->AddConsoleOutput(L"error: could not inject");
|
|
|
|
}
|
|
|
|
|
|
|
|
CloseHandle(processHandle);
|
|
|
|
return success;
|
2016-01-05 23:01:17 +08:00
|
|
|
}
|
|
|
|
|
2018-05-21 04:10:07 +08:00
|
|
|
IHFSERVICE bool IHFAPI DetachProcessById(DWORD processId)
|
2018-05-12 04:46:05 +08:00
|
|
|
{
|
2018-05-14 03:33:36 +08:00
|
|
|
ITH_SYNC_HOOK;
|
2018-05-21 04:10:07 +08:00
|
|
|
DWORD command = HOST_COMMAND_DETACH;
|
2018-06-01 14:36:51 +08:00
|
|
|
return WriteFile(man->GetHostPipeByPID(processId), &command, sizeof(command), nullptr, nullptr);
|
2018-05-12 04:46:05 +08:00
|
|
|
}
|
2016-01-05 23:01:17 +08:00
|
|
|
|
2018-05-14 03:33:36 +08:00
|
|
|
IHFSERVICE void IHFAPI GetHostHookManager(HookManager** hookman)
|
2016-01-05 23:01:17 +08:00
|
|
|
{
|
2018-05-14 03:33:36 +08:00
|
|
|
if (::running)
|
|
|
|
{
|
|
|
|
*hookman = man;
|
|
|
|
}
|
2016-01-05 23:01:17 +08:00
|
|
|
}
|
|
|
|
|
2018-05-14 03:33:36 +08:00
|
|
|
IHFSERVICE void IHFAPI GetHostSettings(Settings **p)
|
2016-01-05 23:01:17 +08:00
|
|
|
{
|
2018-05-14 03:33:36 +08:00
|
|
|
if (::running)
|
|
|
|
{
|
|
|
|
*p = settings;
|
|
|
|
}
|
2016-01-05 23:01:17 +08:00
|
|
|
}
|
|
|
|
|
2018-05-21 01:11:55 +08:00
|
|
|
// Artikash 5/11/2018: I don't understand the following operations, so I'm making minimal changes in cleanup
|
2016-01-05 23:01:17 +08:00
|
|
|
|
|
|
|
IHFSERVICE DWORD IHFAPI Host_InsertHook(DWORD pid, HookParam *hp, LPCSTR name)
|
|
|
|
{
|
|
|
|
ITH_SYNC_HOOK;
|
|
|
|
|
2018-06-01 14:36:51 +08:00
|
|
|
HANDLE hCmd = man->GetHostPipeByPID(pid);
|
2016-01-05 23:01:17 +08:00
|
|
|
if (hCmd == 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
InsertHookStruct s;
|
|
|
|
s.sp.type = HOST_COMMAND_NEW_HOOK;
|
|
|
|
s.sp.hp = *hp;
|
|
|
|
size_t len;
|
|
|
|
if (name)
|
|
|
|
len = ::strlen(name);
|
|
|
|
else
|
|
|
|
len = 0;
|
|
|
|
if (len) {
|
|
|
|
if (len >= IHS_BUFF_SIZE) len = IHS_BUFF_SIZE - 1;
|
|
|
|
memcpy(s.name_buffer, name, len);
|
|
|
|
}
|
|
|
|
s.name_buffer[len] = 0;
|
|
|
|
IO_STATUS_BLOCK ios;
|
2018-05-14 03:33:36 +08:00
|
|
|
DWORD unused;
|
|
|
|
WriteFile(hCmd, &s, IHS_SIZE, &unused, nullptr);
|
2016-01-05 23:01:17 +08:00
|
|
|
|
|
|
|
//memcpy(&sp.hp,hp,sizeof(HookParam));
|
|
|
|
//cmdq->AddRequest(sp, pid);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
IHFSERVICE DWORD IHFAPI Host_RemoveHook(DWORD pid, DWORD addr)
|
|
|
|
{
|
|
|
|
ITH_SYNC_HOOK;
|
|
|
|
|
|
|
|
HANDLE hRemoved,hCmd;
|
2018-06-01 14:36:51 +08:00
|
|
|
hCmd = man->GetHostPipeByPID(pid);
|
2016-01-05 23:01:17 +08:00
|
|
|
if (hCmd == 0)
|
|
|
|
return -1;
|
2018-05-14 03:33:36 +08:00
|
|
|
hRemoved = CreateEventW(nullptr, TRUE, FALSE, ITH_REMOVEHOOK_EVENT);
|
2016-01-05 23:01:17 +08:00
|
|
|
SendParam sp = {};
|
|
|
|
IO_STATUS_BLOCK ios;
|
|
|
|
sp.type = HOST_COMMAND_REMOVE_HOOK;
|
|
|
|
sp.hp.address = addr;
|
|
|
|
//cmdq -> AddRequest(sp, pid);
|
2018-05-14 03:33:36 +08:00
|
|
|
DWORD unused;
|
|
|
|
WriteFile(hCmd, &sp, sizeof(sp), &unused, nullptr);
|
2016-01-05 23:01:17 +08:00
|
|
|
// jichi 10/22/2013: Timeout might crash vnrsrv
|
|
|
|
//const LONGLONG timeout = HOOK_TIMEOUT;
|
|
|
|
//NtWaitForSingleObject(hRemoved, 0, (PLARGE_INTEGER)&timeout);
|
2018-05-14 03:33:36 +08:00
|
|
|
WaitForSingleObject(hRemoved, MAXDWORD);
|
|
|
|
CloseHandle(hRemoved);
|
2016-01-05 23:01:17 +08:00
|
|
|
man -> RemoveSingleHook(pid, sp.hp.address);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
// EOF
|