/* * KERNEL32 thunks and other undocumented stuff * * Copyright 1997-1998 Marcus Meissner */ #include #include "windows.h" #include "callback.h" #include "resource.h" #include "task.h" #include "user.h" #include "heap.h" #include "module.h" #include "process.h" #include "stackframe.h" #include "heap.h" #include "selectors.h" #include "task.h" #include "win.h" #include "debug.h" /*********************************************************************** * * * Win95 internal thunks * * * ***********************************************************************/ /*********************************************************************** * Generates a FT_Prolog call. * * 0FB6D1 movzbl edx,cl * 8B1495xxxxxxxx mov edx,[4*edx + xxxxxxxx] * 68xxxxxxxx push FT_Prolog * C3 lret */ static void _write_ftprolog(LPBYTE thunk,DWORD thunkstart) { LPBYTE x; x = thunk; *x++ = 0x0f;*x++=0xb6;*x++=0xd1; /* movzbl edx,cl */ *x++ = 0x8B;*x++=0x14;*x++=0x95;*(DWORD*)x= thunkstart; x+=4; /* mov edx, [4*edx + thunkstart] */ *x++ = 0x68; *(DWORD*)x = (DWORD)GetProcAddress32(GetModuleHandle32A("KERNEL32"),"FT_Prolog"); x+=4; /* push FT_Prolog */ *x++ = 0xC3; /* lret */ /* fill rest with 0xCC / int 3 */ } /*********************************************************************** * FT_PrologPrime (KERNEL32.89) */ void WINAPI FT_PrologPrime( DWORD startind, /* [in] start of thunktable */ LPBYTE thunk /* [in] thunk codestart */ ) { _write_ftprolog(thunk,*(DWORD*)(startind+thunk)); } /*********************************************************************** * _write_qtthunk (internal) * Generates a QT_Thunk style call. * * 33C9 xor ecx, ecx * 8A4DFC mov cl , [ebp-04] * 8B148Dxxxxxxxx mov edx, [4*ecx + (EAX+EDX)] * B8yyyyyyyy mov eax, QT_Thunk * FFE0 jmp eax */ static void _write_qtthunk( LPBYTE start, /* [in] start of QT_Thunk stub */ DWORD thunkstart /* [in] start of thunk (for index lookup) */ ) { LPBYTE x; x = start; *x++ = 0x33;*x++=0xC9; /* xor ecx,ecx */ *x++ = 0x8A;*x++=0x4D;*x++=0xFC; /* movb cl,[ebp-04] */ *x++ = 0x8B;*x++=0x14;*x++=0x8D;*(DWORD*)x= thunkstart; x+=4; /* mov edx, [4*ecx + (EAX+EDX) */ *x++ = 0xB8; *(DWORD*)x = (DWORD)GetProcAddress32(GetModuleHandle32A("KERNEL32"),"QT_Thunk"); x+=4; /* mov eax , QT_Thunk */ *x++ = 0xFF; *x++ = 0xE0; /* jmp eax */ /* should fill the rest of the 32 bytes with 0xCC */ } struct thunkstruct { char magic[4]; DWORD length; DWORD ptr; DWORD x0C; DWORD x10; DWORD x14; DWORD x18; DWORD x1C; DWORD x20; }; /*********************************************************************** * ThunkConnect32 (KERNEL32) * Connects a 32bit and a 16bit thunkbuffer. */ UINT32 WINAPI ThunkConnect32( struct thunkstruct *ths, /* [in/out] thunkbuffer */ LPCSTR thunkfun16, /* [in] win16 thunkfunction */ LPCSTR module16, /* [in] name of win16 dll */ LPCSTR module32, /* [in] name of win32 dll */ HMODULE32 hmod32, /* [in] hmodule of win32 dll (used?) */ DWORD dllinitarg1 /* [in] initialisation argument */ ) { HINSTANCE16 hmm; SEGPTR thkbuf; struct thunkstruct *ths16; TRACE(thunk,"(,%s,%s,%s,%x,%lx)\n", thunkfun16,module32,module16,hmod32,dllinitarg1 ); TRACE(thunk," magic = %c%c%c%c\n", ths->magic[0], ths->magic[1], ths->magic[2], ths->magic[3] ); TRACE(thunk," length = %lx\n",ths->length); if (lstrncmp32A(ths->magic,"SL01",4)&&lstrncmp32A(ths->magic,"LS01",4)) return 0; hmm=LoadModule16(module16,NULL); if (hmm<=32) return 0; thkbuf=(SEGPTR)WIN32_GetProcAddress16(hmm,thunkfun16); if (!thkbuf) return 0; ths16=(struct thunkstruct*)PTR_SEG_TO_LIN(thkbuf); if (lstrncmp32A(ths16->magic,ths->magic,4)) return 0; if (!lstrncmp32A(ths->magic,"SL01",4)) { if (ths16->length != ths->length) return 0; ths->x0C = (DWORD)ths16; TRACE(thunk," ths16 magic is 0x%08lx\n",*(DWORD*)ths16->magic); if (*((DWORD*)ths16->magic) != 0x0000304C) return 0; if (!*(WORD*)(((LPBYTE)ths16)+0x12)) return 0; } if (!lstrncmp32A(ths->magic,"LS01",4)) { if (ths16->length != ths->length) return 0; ths->ptr = (DWORD)PTR_SEG_TO_LIN(ths16->ptr); /* code offset for QT_Thunk is at 0x1C... */ _write_qtthunk (((LPBYTE)ths) + ths->x1C,ths->ptr); /* code offset for FT_Prolog is at 0x20... */ _write_ftprolog(((LPBYTE)ths) + ths->x20,ths->ptr); return 1; } return TRUE; } /********************************************************************** * QT_Thunk (KERNEL32) * * The target address is in EDX. * The 16 bit arguments start at ESP+4. * The number of 16bit argumentbytes is EBP-ESP-0x44 (68 Byte thunksetup). * [ok] */ VOID WINAPI QT_Thunk(CONTEXT *context) { CONTEXT context16; DWORD argsize; THDB *thdb = THREAD_Current(); memcpy(&context16,context,sizeof(context16)); CS_reg(&context16) = HIWORD(EDX_reg(context)); IP_reg(&context16) = LOWORD(EDX_reg(context)); EBP_reg(&context16) = OFFSETOF( thdb->cur_stack ) + (WORD)&((STACK16FRAME*)0)->bp; argsize = EBP_reg(context)-ESP_reg(context)-0x44; memcpy( ((LPBYTE)THREAD_STACK16(thdb))-argsize, (LPBYTE)ESP_reg(context)+4, argsize ); EAX_reg(context) = Callbacks->CallRegisterShortProc( &context16, argsize ); } /********************************************************************** * WOWCallback16 (KERNEL32.62)(WOW32.2) * Calls a win16 function with a single DWORD argument. * RETURNS * the return value */ DWORD WINAPI WOWCallback16( FARPROC16 fproc, /* [in] win16 function to call */ DWORD arg /* [in] single DWORD argument to function */ ) { DWORD ret; TRACE(thunk,"(%p,0x%08lx)...\n",fproc,arg); ret = Callbacks->CallWOWCallbackProc(fproc,arg); TRACE(thunk,"... returns %ld\n",ret); return ret; } /********************************************************************** * WOWCallback16Ex (KERNEL32.55)(WOW32.3) * Calls a function in 16bit code. * RETURNS * TRUE for success */ BOOL32 WINAPI WOWCallback16Ex( FARPROC16 vpfn16, /* [in] win16 function to call */ DWORD dwFlags, /* [in] flags */ DWORD cbArgs, /* [in] nr of arguments */ LPVOID pArgs, /* [in] pointer to arguments (LPDWORD) */ LPDWORD pdwRetCode /* [out] return value of win16 function */ ) { return Callbacks->CallWOWCallback16Ex(vpfn16,dwFlags,cbArgs,pArgs,pdwRetCode); } /*********************************************************************** * _KERNEL32_52 (KERNEL32.52) * Returns a pointer to ThkBuf in the 16bit library SYSTHUNK.DLL. * [ok probably] */ LPVOID WINAPI _KERNEL32_52() { HMODULE32 hmod = LoadLibrary16("systhunk.dll"); TRACE(thunk, "systhunk.dll module %d\n", hmod); if (hmod<=32) return 0; return PTR_SEG_TO_LIN(WIN32_GetProcAddress16(hmod,"ThkBuf")); } /*********************************************************************** * _KERNEL32_43 (KERNEL32.42) * A thunkbuffer link routine * The thunkbuf looks like: * * 00: DWORD length ? don't know exactly * 04: SEGPTR ptr ? where does it point to? * The pointer ptr is written into the first DWORD of 'thunk'. * (probably correct implemented) * [ok probably] * RETURNS * segmented pointer to thunk? */ DWORD WINAPI _KERNEL32_43( LPDWORD thunk, /* [in] win32 thunk */ LPCSTR thkbuf, /* [in] thkbuffer name in win16 dll */ DWORD len, /* [in] thkbuffer length */ LPCSTR dll16, /* [in] name of win16 dll */ LPCSTR dll32 /* [in] name of win32 dll (FIXME: not used?) */ ) { HINSTANCE16 hmod; LPDWORD addr; SEGPTR segaddr; hmod = LoadLibrary16(dll16); if (hmod<32) { WARN(thunk,"failed to load 16bit DLL %s, error %d\n", dll16,hmod); return 0; } segaddr = (DWORD)WIN32_GetProcAddress16(hmod,(LPSTR)thkbuf); if (!segaddr) { WARN(thunk,"no %s exported from %s!\n",thkbuf,dll16); return 0; } addr = (LPDWORD)PTR_SEG_TO_LIN(segaddr); if (addr[0] != len) { WARN(thunk,"thkbuf length mismatch? %ld vs %ld\n",len,addr[0]); return 0; } if (!addr[1]) return 0; *(DWORD*)thunk = addr[1]; TRACE(thunk, "loaded module %d, func %s (%d) @ %p (%p), returning %p\n", hmod, HIWORD(thkbuf)==0 ? "" : thkbuf, (int)thkbuf, (void*)segaddr, addr, (void*)addr[1]); return addr[1]; } /*********************************************************************** * _KERNEL32_45 (KERNEL32.44) * Another 32->16 thunk, the difference to QT_Thunk is, that the called routine * uses 0x66 lret, and that we have to pass CX in DI. * (there seems to be some kind of BL/BX return magic too...) * * [crashes] */ VOID WINAPI _KERNEL32_45(CONTEXT *context) { CONTEXT context16; LPBYTE curstack; DWORD ret,stacksize; THDB *thdb = THREAD_Current(); TRACE(thunk,"(%%eax=0x%08lx(%%cx=0x%04lx,%%edx=0x%08lx))\n", (DWORD)EAX_reg(context),(DWORD)CX_reg(context),(DWORD)EDX_reg(context) ); stacksize = EBP_reg(context)-ESP_reg(context); TRACE(thunk," stacksize = %ld\n",stacksize); memcpy(&context16,context,sizeof(context16)); DI_reg(&context16) = CX_reg(context); CS_reg(&context16) = HIWORD(EAX_reg(context)); IP_reg(&context16) = LOWORD(EAX_reg(context)); curstack = PTR_SEG_TO_LIN(STACK16_PUSH( thdb, stacksize )); memcpy(curstack - stacksize,(LPBYTE)ESP_reg(context),stacksize); ret = Callbacks->CallRegisterLongProc(&context16,0); STACK16_POP( thdb, stacksize ); TRACE(thunk,". returned %08lx\n",ret); EAX_reg(context) = ret; } /*********************************************************************** * _KERNEL32_40 (KERNEL32.40) * YET Another 32->16 thunk, the difference to the others is still mysterious * Target address is in EDX. * * [crashes] */ VOID WINAPI _KERNEL32_40(CONTEXT *context) { CONTEXT context16; LPBYTE curstack; DWORD ret,stacksize; THDB *thdb = THREAD_Current(); __RESTORE_ES; TRACE(thunk,"(EDX=0x%08lx)\n", EDX_reg(context) ); stacksize = EBP_reg(context)-ESP_reg(context); TRACE(thunk," stacksize = %ld\n",stacksize); TRACE(thunk,"on top of stack: 0x%04x\n",*(WORD*)ESP_reg(context)); memcpy(&context16,context,sizeof(context16)); CS_reg(&context16) = HIWORD(EDX_reg(context)); IP_reg(&context16) = LOWORD(EDX_reg(context)); curstack = PTR_SEG_TO_LIN(STACK16_PUSH( thdb, stacksize )); memcpy(curstack-stacksize,(LPBYTE)ESP_reg(context),stacksize); ret = Callbacks->CallRegisterShortProc(&context16,0); STACK16_POP( thdb, stacksize ); TRACE(thunk,". returned %08lx\n",ret); EAX_reg(context) = ret; } /*********************************************************************** * (KERNEL32.41) * A thunk setup routine. * Expects a pointer to a preinitialized thunkbuffer in the first argument * looking like: * 00..03: unknown (pointer, check _41, _43, _46) * 04: EB1E jmp +0x20 * * 06..23: unknown (space for replacement code, check .90) * * 24:>E800000000 call offset 29 * 29:>58 pop eax ( target of call ) * 2A: 2D25000000 sub eax,0x00000025 ( now points to offset 4 ) * 2F: BAxxxxxxxx mov edx,xxxxxxxx * 34: 68yyyyyyyy push KERNEL32.90 * 39: C3 ret * * 3A: EB1E jmp +0x20 * 3E ... 59: unknown (space for replacement code?) * 5A: E8xxxxxxxx call <32bitoffset xxxxxxxx> * 5F: 5A pop edx * 60: 81EA25xxxxxx sub edx, 0x25xxxxxx * 66: 52 push edx * 67: 68xxxxxxxx push xxxxxxxx * 6C: 68yyyyyyyy push KERNEL32.89 * 71: C3 ret * 72: end? * This function checks if the code is there, and replaces the yyyyyyyy entries * by the functionpointers. * The thunkbuf looks like: * * 00: DWORD length ? don't know exactly * 04: SEGPTR ptr ? where does it point to? * The segpointer ptr is written into the first DWORD of 'thunk'. * [ok probably] * RETURNS * unclear, pointer to win16 thkbuffer? */ LPVOID WINAPI _KERNEL32_41( LPBYTE thunk, /* [in] win32 thunk */ LPCSTR thkbuf, /* [in] thkbuffer name in win16 dll */ DWORD len, /* [in] length of thkbuffer */ LPCSTR dll16, /* [in] name of win16 dll */ LPCSTR dll32 /* [in] name of win32 dll */ ) { HMODULE32 hkrnl32 = GetModuleHandle32A("KERNEL32"); HMODULE16 hmod; LPDWORD addr,addr2; DWORD segaddr; /* FIXME: add checks for valid code ... */ /* write pointers to kernel32.89 and kernel32.90 (+ordinal base of 1) */ *(DWORD*)(thunk+0x35) = (DWORD)GetProcAddress32(hkrnl32,(LPSTR)90); *(DWORD*)(thunk+0x6D) = (DWORD)GetProcAddress32(hkrnl32,(LPSTR)89); hmod = LoadLibrary16(dll16); if (hmod<32) { ERR(thunk,"failed to load 16bit DLL %s, error %d\n", dll16,hmod); return NULL; } segaddr = (DWORD)WIN32_GetProcAddress16(hmod,(LPSTR)thkbuf); if (!segaddr) { ERR(thunk,"no %s exported from %s!\n",thkbuf,dll16); return NULL; } addr = (LPDWORD)PTR_SEG_TO_LIN(segaddr); if (addr[0] != len) { ERR(thunk,"thkbuf length mismatch? %ld vs %ld\n",len,addr[0]); return NULL; } addr2 = PTR_SEG_TO_LIN(addr[1]); if (HIWORD(addr2)) *(DWORD*)thunk = (DWORD)addr2; TRACE(thunk, "loaded module %d, func %s(%d) @ %p (%p), returning %p\n", hmod, HIWORD(thkbuf)==0 ? "" : thkbuf, (int)thkbuf, (void*)segaddr, addr, addr2); return addr2; } /*********************************************************************** * (KERNEL32.90) * QT Thunk priming function * Rewrites the first part of the thunk to use the QT_Thunk interface * and jumps to the start of that code. * [ok] */ VOID WINAPI _KERNEL32_90(CONTEXT *context) { TRACE(thunk, "QT Thunk priming; context %p\n", context); _write_qtthunk((LPBYTE)EAX_reg(context),*(DWORD*)(EAX_reg(context)+EDX_reg(context))); /* we just call the real QT_Thunk right now * we can bypass the relaycode, for we already have the registercontext */ EDX_reg(context) = *(DWORD*)((*(DWORD*)(EAX_reg(context)+EDX_reg(context)))+4*(((BYTE*)EBP_reg(context))[-4])); return QT_Thunk(context); } /*********************************************************************** * (KERNEL32.45) * Another thunkbuf link routine. * The start of the thunkbuf looks like this: * 00: DWORD length * 04: SEGPTR address for thunkbuffer pointer * [ok probably] */ VOID WINAPI _KERNEL32_46( LPBYTE thunk, /* [in] start of thunkbuffer */ LPCSTR thkbuf, /* [in] name/ordinal of thunkbuffer in win16 dll */ DWORD len, /* [in] length of thunkbuffer */ LPCSTR dll16, /* [in] name of win16 dll containing the thkbuf */ LPCSTR dll32 /* [in] win32 dll. FIXME: strange, unused */ ) { LPDWORD addr; HMODULE16 hmod; SEGPTR segaddr; hmod = LoadLibrary16(dll16); if (hmod < 32) { ERR(thunk,"couldn't load %s, error %d\n",dll16,hmod); return; } segaddr = (SEGPTR)WIN32_GetProcAddress16(hmod,thkbuf); if (!segaddr) { ERR(thunk,"haven't found %s in %s!\n",thkbuf,dll16); return; } addr = (LPDWORD)PTR_SEG_TO_LIN(segaddr); if (addr[0] != len) { ERR(thunk,"length of thkbuf differs from expected length! " "(%ld vs %ld)\n",addr[0],len); return; } *(DWORD*)PTR_SEG_TO_LIN(addr[1]) = (DWORD)thunk; TRACE(thunk, "loaded module %d, func %s(%d) @ %p (%p)\n", hmod, HIWORD(thkbuf)==0 ? "" : thkbuf, (int)thkbuf, (void*)segaddr, addr); } /********************************************************************** * _KERNEL32_87 * Check if thunking is initialized (ss selector set up etc.) * We do that differently, so just return TRUE. * [ok] * RETURNS * TRUE for success. */ BOOL32 WINAPI _KERNEL32_87() { TRACE(thunk, "Yes, thunking is initialized\n"); return TRUE; } /********************************************************************** * _KERNEL32_88 * One of the real thunking functions. This one seems to be for 32<->32 * thunks. It should probably be capable of crossing processboundaries. * * And YES, I've seen nr=48 (somewhere in the Win95 32<->16 OLE coupling) * [ok] */ DWORD WINAPIV _KERNEL32_88( DWORD nr, /* [in] number of argument bytes */ DWORD flags, /* [in] FIXME: flags ? */ FARPROC32 fun, /* [in] function to call */ ... /* [in/out] arguments */ ) { DWORD i,ret; DWORD *args = ((DWORD *)&fun) + 1; if(TRACE_ON(thunk)){ dbg_decl_str(thunk, 256); for (i=0;ilong registers. * * 665A pop edx * 6668x arg2 x pushl * 6652 push edx * EAx arg1 x jmpf * * returns the startaddress of this thunk. * * Note, that they look very similair to the ones allocates by THUNK_Alloc. * RETURNS * segmented pointer to the start of the thunk */ DWORD WINAPI AllocSLCallback( DWORD finalizer, /* [in] finalizer function */ DWORD callback /* [in] callback function */ ) { LPBYTE x,thunk = HeapAlloc( GetProcessHeap(), 0, 32 ); WORD sel; x=thunk; *x++=0x66;*x++=0x5a; /* popl edx */ *x++=0x66;*x++=0x68;*(DWORD*)x=finalizer;x+=4; /* pushl finalizer */ *x++=0x66;*x++=0x52; /* pushl edx */ *x++=0xea;*(DWORD*)x=callback;x+=4; /* jmpf callback */ *(PDB32**)(thunk+18) = PROCESS_Current(); sel = SELECTOR_AllocBlock( thunk , 32, SEGMENT_CODE, FALSE, FALSE ); return (sel<<16)|0; } /********************************************************************** * FreeSLCallback (KERNEL32.274) * Frees the specified 16->32 callback */ void WINAPI FreeSLCallback( DWORD x /* [in] 16 bit callback (segmented pointer?) */ ) { fprintf(stderr,"FreeSLCallback(0x%08lx)\n",x); } /********************************************************************** * KERNEL_358 (KERNEL) * Allocates a code segment which starts at the address passed in x. limit * 0xfffff, and returns the pointer to the start. * RETURNS * a segmented pointer */ DWORD WINAPI _KERNEL_358(DWORD x) { WORD sel; fprintf(stderr,"_KERNEL_358(0x%08lx),stub\n",x); if (!HIWORD(x)) return x; sel = SELECTOR_AllocBlock( PTR_SEG_TO_LIN(x) , 0xffff, SEGMENT_CODE, FALSE, FALSE ); return PTR_SEG_OFF_TO_SEGPTR( sel, 0 ); } /********************************************************************** * KERNEL_359 (KERNEL) * Frees the code segment of the passed linear pointer (This has usually * been allocated by _KERNEL_358). */ VOID WINAPI _KERNEL_359( DWORD x /* [in] segmented pointer? */ ) { fprintf(stderr,"_KERNEL_359(0x%08lx),stub\n",x); if ((HIWORD(x) & 7)!=7) return; SELECTOR_FreeBlock(x>>16,1); return; } /********************************************************************** * KERNEL_471 (KERNEL.471) * RETURNS * Seems to return the uncrypted current process pointer. [Not 100% sure]. */ LPVOID WINAPI _KERNEL_471() { return PROCESS_Current(); } /********************************************************************** * KERNEL_472 (KERNEL.472) * something like GetCurrenthInstance. * RETURNS * the hInstance */ VOID WINAPI _KERNEL_472(CONTEXT *context) { fprintf(stderr,"_KERNEL_472(0x%08lx),stub\n",EAX_reg(context)); if (!EAX_reg(context)) { TDB *pTask = (TDB*)GlobalLock16(GetCurrentTask()); AX_reg(context)=pTask->hInstance; return; } if (!HIWORD(EAX_reg(context))) return; /* returns the passed value */ /* hmm ... fixme */ } /********************************************************************** * KERNEL_431 (KERNEL.431) * IsPeFormat (W32SYS.2) * Checks the passed filename if it is a PE format executeable * RETURNS * TRUE, if it is. * FALSE if not. */ BOOL16 WINAPI IsPeFormat( LPSTR fn, /* [in] filename to executeable */ HFILE16 hf16 /* [in] open file, if filename is NULL */ ) { IMAGE_DOS_HEADER mzh; HFILE32 hf=hf16; OFSTRUCT ofs; DWORD xmagic; if (fn) { hf = OpenFile32(fn,&ofs,OF_READ); if (hf==HFILE_ERROR32) return FALSE; } _llseek32(hf,0,SEEK_SET); if (sizeof(mzh)!=_lread32(hf,&mzh,sizeof(mzh))) { _lclose32(hf); return FALSE; } if (mzh.e_magic!=IMAGE_DOS_SIGNATURE) { fprintf(stderr,"file has not got dos signature!\n"); _lclose32(hf); return FALSE; } _llseek32(hf,mzh.e_lfanew,SEEK_SET); if (sizeof(DWORD)!=_lread32(hf,&xmagic,sizeof(DWORD))) { _lclose32(hf); return FALSE; } _lclose32(hf); return (xmagic == IMAGE_NT_SIGNATURE); } /*********************************************************************** * WOWHandle32 (KERNEL32.57)(WOW32.16) * Converts a win16 handle of type into the respective win32 handle. * We currently just return this handle, since most handles are the same * for win16 and win32. * RETURNS * The new handle */ HANDLE32 WINAPI WOWHandle32( WORD handle, /* [in] win16 handle */ WOW_HANDLE_TYPE type /* [in] handle type */ ) { fprintf(stderr,"WOWHandle32(0x%04x,%d)\n",handle,type); return (HANDLE32)handle; } /*********************************************************************** * FUNC004 (KERNEL.631) * A 16->32 thunk setup function. * Gets called from a thunkbuffer (value of EAX). It overwrites the start * with a jmp to a kernel32 function. The kernel32 function gets passed EDX. * (and possibly CX). */ void WINAPI FUNC004( CONTEXT *context /* [in/out] register context from 1632-relay */ ) { FIXME(reg,",STUB (edx is 0x%08lx, eax is 0x%08lx,edx[0x10] is 0x%08lx)!\n", EDX_reg(context), EAX_reg(context), ((DWORD*)PTR_SEG_TO_LIN(EDX_reg(context)))[0x10/4] ); #if 0 { LPBYTE x,target = (LPBYTE)PTR_SEG_TO_LIN(EAX_reg(context)); WORD ds,cs; GET_DS(ds); GET_CS(cs); /* Won't work anyway since we don't know the function called in KERNEL32 -Marcus*/ x = target; *x++= 0xb8; *(WORD*)x= ds;x+=2; /* mov ax,KERNEL32_DS */ *x++= 0x8e; *x++ = 0xc0; /* mov es,ax */ *x++= 0x66; *x++ = 0xba; *(DWORD*)x=EDX_reg(context);x+=4; /* mov edx, $EDX */ *x++= 0x66; *x++ = 0xea; /* jmp KERNEL32_CS:kernel32fun */ *(DWORD*)x=0;x+=4;/* FIXME: _what_ function does it call? */ *(WORD*)x=cs;x+=2; IP_reg(context) = LOWORD(EAX_reg(context)); CS_reg(context) = HIWORD(EAX_reg(context)); } #endif return; }