108 lines
2.7 KiB
C++
108 lines
2.7 KiB
C++
|
#include "skse64_common/skse_version.h"
|
||
|
#include "skse64_common/Utilities.h"
|
||
|
#include "skse64_common/SafeWrite.h"
|
||
|
#include "skse64_loader_common/IdentifyEXE.h"
|
||
|
#include <shlobj.h>
|
||
|
#include <intrin.h>
|
||
|
#include <string>
|
||
|
|
||
|
IDebugLog gLog;
|
||
|
HANDLE g_dllHandle;
|
||
|
|
||
|
static void OnAttach(void);
|
||
|
static void HookMain(void * retAddr);
|
||
|
static void HookIAT();
|
||
|
|
||
|
BOOL WINAPI DllMain(HANDLE procHandle, DWORD reason, LPVOID reserved)
|
||
|
{
|
||
|
if(reason == DLL_PROCESS_ATTACH)
|
||
|
{
|
||
|
g_dllHandle = procHandle;
|
||
|
|
||
|
OnAttach();
|
||
|
}
|
||
|
|
||
|
return TRUE;
|
||
|
}
|
||
|
|
||
|
static void OnAttach(void)
|
||
|
{
|
||
|
gLog.OpenRelative(CSIDL_MYDOCUMENTS, "\\My Games\\Skyrim Special Edition\\SKSE\\skse64_steam_loader.log");
|
||
|
gLog.SetPrintLevel(IDebugLog::kLevel_Error);
|
||
|
gLog.SetLogLevel(IDebugLog::kLevel_DebugMessage);
|
||
|
|
||
|
FILETIME now;
|
||
|
GetSystemTimeAsFileTime(&now);
|
||
|
|
||
|
_MESSAGE("skse64 loader %08X (steam) %08X%08X %s", PACKED_SKSE_VERSION, now.dwHighDateTime, now.dwLowDateTime, GetOSInfoStr().c_str());
|
||
|
_MESSAGE("loader base addr = %016I64X", g_dllHandle);
|
||
|
_MESSAGE("exe base addr = %016I64X", GetModuleHandle(NULL));
|
||
|
|
||
|
// hook an imported function early so we can inject our code
|
||
|
HookIAT();
|
||
|
}
|
||
|
|
||
|
typedef void (* ___telemetry_main_invoke_trigger)(void * arg);
|
||
|
___telemetry_main_invoke_trigger __telemetry_main_invoke_trigger_Original = NULL;
|
||
|
|
||
|
static void __telemetry_main_invoke_trigger_Hook(void * arg)
|
||
|
{
|
||
|
HookMain(_ReturnAddress());
|
||
|
|
||
|
__telemetry_main_invoke_trigger_Original(arg);
|
||
|
}
|
||
|
|
||
|
static void HookIAT()
|
||
|
{
|
||
|
___telemetry_main_invoke_trigger * iat = (___telemetry_main_invoke_trigger *)GetIATAddr(GetModuleHandle(NULL), "VCRUNTIME140.dll", "__telemetry_main_invoke_trigger");
|
||
|
if(iat)
|
||
|
{
|
||
|
_MESSAGE("found iat at %016I64X", iat);
|
||
|
|
||
|
__telemetry_main_invoke_trigger_Original = *iat;
|
||
|
_MESSAGE("original thunk %016I64X", __telemetry_main_invoke_trigger_Original);
|
||
|
|
||
|
SafeWrite64(uintptr_t(iat), (UInt64)__telemetry_main_invoke_trigger_Hook);
|
||
|
_MESSAGE("patched iat");
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
_MESSAGE("couldn't find __telemetry_main_invoke_trigger");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
bool hookInstalled = false;
|
||
|
std::string g_dllPath;
|
||
|
|
||
|
static void HookMain(void * retAddr)
|
||
|
{
|
||
|
if(hookInstalled)
|
||
|
return;
|
||
|
else
|
||
|
hookInstalled = true;
|
||
|
|
||
|
_MESSAGE("HookMain: thread = %d retaddr = %016I64X", GetCurrentThreadId(), retAddr);
|
||
|
|
||
|
std::string runtimePath = GetRuntimePath();
|
||
|
_MESSAGE("runtimePath = %s", runtimePath.c_str());
|
||
|
|
||
|
bool isEditor = false;
|
||
|
|
||
|
// check version etc
|
||
|
std::string dllSuffix;
|
||
|
ProcHookInfo procHookInfo;
|
||
|
|
||
|
if(!IdentifyEXE(runtimePath.c_str(), isEditor, &dllSuffix, &procHookInfo))
|
||
|
{
|
||
|
_ERROR("unknown exe");
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
const char * dllPrefix = (isEditor == false) ? "\\skse64_" : "\\skse64_editor_";
|
||
|
|
||
|
g_dllPath = GetRuntimeDirectory() + dllPrefix + dllSuffix + ".dll";
|
||
|
_MESSAGE("dll = %s", g_dllPath.c_str());
|
||
|
|
||
|
LoadLibrary(g_dllPath.c_str());
|
||
|
}
|