* Bump projects to .net 9 and update nugets * add VersionedSerialization + source generator * migrate versioning to StructVersion class, add handling/detection for 29.2/31.2 * add new struct definitions * rename serialization methods and add BinaryObjectStreamReader for interop * Rework metadata struct loading to use new struct versioning * move 29/31.1/.2 to use tags (-2022,-2023) instead of minor versions * fix metadata usage validity checks * rework code registration offsetting a bit and add second 29/31.1 condition * tweak .1 condition (again) * 29/31.2 was a psyop * also remove 29.2 from the readme * remove loading of packed dlls - this was a very unsafe feature * support auto-recovering type indices from type handles fixes loading of memory-dumped v29+ libraries since those replacee their class indices on load with a pointer to the corresponding type * support loading PEs without an export table * also read UnresolvedVirtualCallCount on regular v31 * Disable plugin loading for now * Overhaul disassembler script + add Binary Ninja target (#12) * Overhaul diassembler scripts: - No longer defines top level functions - Split into three classes: StatusHandler (like before), DisassemblerInterface (for interfacing with the used program API), ScriptContext (for definiting general functions that use the disassembler interface) - Add type annotations to all class methods and remove 2.7 compatibility stuff (Ghidra now supports Python 3 so this is unnecessary anymore) - Disassembler backends are now responsible for launching metadata/script processing, to better support disassembler differences - String handling is back in the base ScriptContext class, disassembler interfaces opt into the fake string segment creation and fall back to the old method if it isn't supported * Add Binary Ninja disassembler script backend This uses the new backend-controlled execution to launch metadata processing on a background thread to keep the ui responsive * make binary ninja script use own _BINARYNINJA_ define and add define helpers to header * Update README to account for new script and binary ninja backend * implement fake string segment functions for binary ninja but don't advertise support * also cache API function types in binary ninja backend * fix ida script and disable folders again * Fix metadata usage issues caused by it being a value type now * make TryMapVATR overrideable and implement it for ELFs * Make field offset reading use TryMapVATR to reduce exceptions * Fix NRE in Assembly ctor on < v24.2 * Update actions workflow to produce cross-platform CLI binaries, update readme to reflect .net 9 changes * workflow: only restore packages for projects that are being built * workflow: tweak caching and fix gui compilation * workflow: remove double .zip in CLI artifact name * 29/31.2 don't actually exist, this logic is not needed
114 lines
4.2 KiB
C#
114 lines
4.2 KiB
C#
/*
|
|
Copyright 2017-2019 Katy Coe - http://www.djkaty.com - https://github.com/djkaty
|
|
|
|
All rights reserved.
|
|
*/
|
|
|
|
using Il2CppInspector.Next;
|
|
using System;
|
|
using System.Linq;
|
|
|
|
namespace Il2CppInspector
|
|
{
|
|
internal class Il2CppBinaryX86 : Il2CppBinary
|
|
{
|
|
public Il2CppBinaryX86(IFileFormatStream stream, EventHandler<string> statusCallback = null) : base(stream, statusCallback) { }
|
|
|
|
public Il2CppBinaryX86(IFileFormatStream stream, uint codeRegistration, uint metadataRegistration, EventHandler<string> statusCallback = null)
|
|
: base(stream, codeRegistration, metadataRegistration, statusCallback) { }
|
|
|
|
protected override (ulong, ulong) ConsiderCode(IFileFormatStream image, uint loc) {
|
|
ulong metadata, code;
|
|
long pCgr;
|
|
|
|
// x86
|
|
// Assembly bytes to search for at start of each function
|
|
var bytes = new byte[] {0x6A, 0x00, 0x6A, 0x00, 0x68};
|
|
image.Position = loc;
|
|
var buff = image.ReadBytes(5);
|
|
if (bytes.SequenceEqual(buff)) {
|
|
// Next 4 bytes are the function pointer being pushed onto the stack
|
|
pCgr = image.ReadUInt32();
|
|
|
|
// Start of next instruction
|
|
if (image.ReadByte() != 0xB9)
|
|
return (0, 0);
|
|
|
|
// Jump to Il2CppCodegenRegistration
|
|
if(image.Version < MetadataVersions.V210) {
|
|
image.Position = image.MapVATR((ulong)pCgr + 1);
|
|
metadata = image.ReadUInt32();
|
|
image.Position = image.MapVATR((ulong)pCgr + 6);
|
|
code = image.ReadUInt32();
|
|
} else {
|
|
image.Position = image.MapVATR((ulong)pCgr + 6);
|
|
metadata = image.ReadUInt32();
|
|
image.Position = image.MapVATR((ulong)pCgr + 11);
|
|
code = image.ReadUInt32();
|
|
}
|
|
return (code, metadata);
|
|
}
|
|
|
|
// x86 based on ELF PLT
|
|
if (image is IElfReader elf) {
|
|
var plt = elf.GetPLTAddress();
|
|
|
|
// push ebp; mov ebp, esp; push ebx; and esp, 0FFFFFFF0h; sub esp, 20h; call $+5; pop ebx
|
|
bytes = new byte[]
|
|
{0x55, 0x89, 0xE5, 0x53, 0x83, 0xE4, 0xF0, 0x83, 0xEC, 0x20, 0xE8, 0x00, 0x00, 0x00, 0x00, 0x5B};
|
|
image.Position = loc;
|
|
buff = image.ReadBytes(16);
|
|
if (!bytes.SequenceEqual(buff))
|
|
return (0, 0);
|
|
|
|
// lea eax, (pCgr - offset)[ebx] (Position + 6 is the opcode lea eax; Position + 8 is the operand)
|
|
image.Position += 6;
|
|
|
|
// Ensure it's lea eax, #address
|
|
if (image.ReadUInt16() != 0x838D)
|
|
return (0, 0);
|
|
|
|
try {
|
|
pCgr = image.MapVATR(image.ReadUInt32() + plt);
|
|
}
|
|
// Could not find a mapping in the section table
|
|
catch (InvalidOperationException) {
|
|
return (0, 0);
|
|
}
|
|
|
|
// Extract Metadata pointer
|
|
// An 0x838D opcode indicates LEA (no indirection)
|
|
image.Position = pCgr + 0x20;
|
|
var opcode = image.ReadUInt16();
|
|
metadata = image.ReadUInt32() + plt;
|
|
|
|
// An 8x838B opcode indicates MOV (pointer indirection)
|
|
if (opcode == 0x838B) {
|
|
image.Position = image.MapVATR(metadata);
|
|
metadata = image.ReadUInt32();
|
|
}
|
|
|
|
if (opcode != 0x838B && opcode != 0x838D)
|
|
return (0, 0);
|
|
|
|
// Repeat the same logic for extracting the Code pointer
|
|
image.Position = pCgr + 0x2A;
|
|
opcode = image.ReadUInt16();
|
|
code = image.ReadUInt32() + plt;
|
|
|
|
if (opcode == 0x838B) {
|
|
image.Position = image.MapVATR(code);
|
|
code = image.ReadUInt32();
|
|
}
|
|
|
|
if (opcode != 0x838B && opcode != 0x838D)
|
|
return (0, 0);
|
|
|
|
return (code, metadata);
|
|
}
|
|
|
|
return (0, 0);
|
|
}
|
|
}
|
|
}
|