mirror of
https://github.com/xivdev/Penumbra.git
synced 2025-12-12 18:27:24 +01:00
181 lines
7 KiB
C#
181 lines
7 KiB
C#
using Dalamud.Hooking;
|
|
using Iced.Intel;
|
|
using Penumbra.String.Classes;
|
|
|
|
namespace Penumbra.Interop.Hooks.ResourceLoading;
|
|
|
|
public sealed class PapRewriter(PapRewriter.PapResourceHandlerPrototype papResourceHandler) : IDisposable
|
|
{
|
|
public unsafe delegate int PapResourceHandlerPrototype(void* self, byte* path, int length);
|
|
|
|
private PeSigScanner Scanner { get; } = new();
|
|
private Dictionary<IntPtr, AsmHook> Hooks { get; }= [];
|
|
private List<IntPtr> NativeAllocList { get; } = [];
|
|
private PapResourceHandlerPrototype PapResourceHandler { get; } = papResourceHandler;
|
|
|
|
public void Rewrite(string sig)
|
|
{
|
|
if (!Scanner.TryScanText(sig, out var addr))
|
|
{
|
|
throw new Exception($"Sig is fucked: {sig}");
|
|
}
|
|
|
|
var funcInstructions = Scanner.GetFunctionInstructions(addr).ToList();
|
|
|
|
var hookPoints = ScanPapHookPoints(funcInstructions).ToList();
|
|
|
|
foreach (var hookPoint in hookPoints)
|
|
{
|
|
var stackAccesses = ScanStackAccesses(funcInstructions, hookPoint).ToList();
|
|
|
|
var stringLoc = NativeAlloc(Utf8GamePath.MaxGamePathLength);
|
|
|
|
{
|
|
// We'll need to grab our true hook point; the location where we can change the path at our leisure.
|
|
// This is going to be the first call instruction after our 'hookPoint', so, we'll find that.
|
|
// Pretty scuffed, this might need a refactoring at some point.
|
|
// We're doing it by skipping to our hookPoint's address in the list of instructions inside the function; then getting next CALL
|
|
var detourPoint = funcInstructions.Skip(
|
|
funcInstructions.FindIndex(instr => instr.IP == hookPoint.IP) + 1
|
|
).First(instr => instr.Mnemonic == Mnemonic.Call);
|
|
|
|
// We'll also remove all the 'hookPoints' from 'stackAccesses'.
|
|
// We're handling the char *path redirection here, so we don't want this to hit the later code
|
|
foreach (var hp in hookPoints)
|
|
{
|
|
stackAccesses.RemoveAll(instr => instr.IP == hp.IP);
|
|
}
|
|
|
|
var pDetour = Marshal.GetFunctionPointerForDelegate(PapResourceHandler);
|
|
var targetRegister = hookPoint.Op0Register.ToString().ToLower();
|
|
var hookAddr = new IntPtr((long)detourPoint.IP);
|
|
|
|
var caveLoc = NativeAlloc(16);
|
|
var hook = new AsmHook(
|
|
hookAddr,
|
|
[
|
|
"use64",
|
|
$"mov {targetRegister}, 0x{stringLoc:x8}", // Move our char *path into the relevant register (rdx)
|
|
|
|
// After this asm stub, we have a call to Crc32(); since r9 is a volatile, unused register, we can use it ourselves
|
|
// We're essentially storing the original 2 arguments ('this', 'path'), in case they get mangled in our call
|
|
// We technically don't need to save rdx ('path'), since it'll be stringLoc, but eh
|
|
$"mov r9, 0x{caveLoc:x8}",
|
|
"mov [r9], rcx",
|
|
"mov [r9+0x8], rdx",
|
|
|
|
// We can use 'rax' here too since it's also volatile, and it'll be overwritten by Crc32()'s return anyway
|
|
$"mov rax, 0x{pDetour:x8}", // Get a pointer to our detour in place
|
|
"call rax", // Call detour
|
|
|
|
// Do the reverse process and retrieve the stored stuff
|
|
$"mov r9, 0x{caveLoc:x8}",
|
|
"mov rcx, [r9]",
|
|
"mov rdx, [r9+0x8]",
|
|
|
|
// Plop 'rax' (our return value, the path size) into r8, so it's the third argument for the subsequent Crc32() call
|
|
"mov r8, rax",
|
|
], "Pap Redirection"
|
|
);
|
|
|
|
Hooks.Add(hookAddr, hook);
|
|
hook.Enable();
|
|
}
|
|
|
|
// Now we're adjusting every single reference to the stack allocated 'path' to our substantially bigger 'stringLoc'
|
|
foreach (var stackAccess in stackAccesses)
|
|
{
|
|
var hookAddr = new IntPtr((long)stackAccess.IP + stackAccess.Length);
|
|
|
|
if (Hooks.ContainsKey(hookAddr))
|
|
{
|
|
// Hook already exists, means there's reuse of the same stack address across 2 GetResourceAsync; just skip
|
|
continue;
|
|
}
|
|
|
|
var targetRegister = stackAccess.Op0Register.ToString().ToLower();
|
|
var hook = new AsmHook(
|
|
hookAddr,
|
|
[
|
|
"use64",
|
|
$"mov {targetRegister}, 0x{stringLoc:x8}",
|
|
], "Pap Stack Accesses"
|
|
);
|
|
|
|
Hooks.Add(hookAddr, hook);
|
|
hook.Enable();
|
|
}
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
private static IEnumerable<Instruction> ScanStackAccesses(IEnumerable<Instruction> instructions, Instruction hookPoint)
|
|
{
|
|
return instructions.Where(instr =>
|
|
instr.Code == hookPoint.Code
|
|
&& instr.Op0Kind == hookPoint.Op0Kind
|
|
&& instr.Op1Kind == hookPoint.Op1Kind
|
|
&& instr.MemoryBase == hookPoint.MemoryBase
|
|
&& instr.MemoryDisplacement64 == hookPoint.MemoryDisplacement64)
|
|
.GroupBy(instr => instr.IP)
|
|
.Select(grp => grp.First());
|
|
}
|
|
|
|
// This is utterly fucked and hardcoded, but, again, it works
|
|
// Might be a neat idea for a more versatile kind of signature though
|
|
private static IEnumerable<Instruction> ScanPapHookPoints(List<Instruction> funcInstructions)
|
|
{
|
|
for (var i = 0; i < funcInstructions.Count - 8; i++)
|
|
{
|
|
if (funcInstructions[i .. (i + 8)] is
|
|
[
|
|
{Code : Code.Lea_r64_m},
|
|
{Code : Code.Lea_r64_m},
|
|
{Mnemonic: Mnemonic.Call},
|
|
{Code : Code.Lea_r64_m},
|
|
{Mnemonic: Mnemonic.Call},
|
|
{Code : Code.Lea_r64_m},
|
|
..,
|
|
]
|
|
)
|
|
{
|
|
yield return funcInstructions[i];
|
|
}
|
|
}
|
|
}
|
|
|
|
private unsafe IntPtr NativeAlloc(nuint size)
|
|
{
|
|
var caveLoc = new IntPtr(NativeMemory.Alloc(size));
|
|
NativeAllocList.Add(caveLoc);
|
|
|
|
return caveLoc;
|
|
}
|
|
|
|
private static unsafe void NativeFree(IntPtr mem)
|
|
{
|
|
NativeMemory.Free(mem.ToPointer());
|
|
}
|
|
|
|
public void Dispose()
|
|
{
|
|
Scanner.Dispose();
|
|
|
|
foreach (var hook in Hooks.Values)
|
|
{
|
|
hook.Disable();
|
|
hook.Dispose();
|
|
}
|
|
|
|
Hooks.Clear();
|
|
|
|
foreach (var mem in NativeAllocList)
|
|
{
|
|
NativeFree(mem);
|
|
}
|
|
|
|
NativeAllocList.Clear();
|
|
}
|
|
}
|