enderalse/source/fs.dll/skse64/skse64_steam_loader/main.cpp

108 lines
2.7 KiB
C++
Raw Normal View History

2021-10-06 00:45:46 +00:00
#include "skse64_common/skse_version.h"
#include "skse64_common/Utilities.h"
#include "skse64_common/SafeWrite.h"
#include "skse64_loader_common/IdentifyEXE.h"
#include <shlobj.h>
#include <intrin.h>
#include <string>
IDebugLog gLog;
HANDLE g_dllHandle;
static void OnAttach(void);
static void HookMain(void * retAddr);
static void HookIAT();
BOOL WINAPI DllMain(HANDLE procHandle, DWORD reason, LPVOID reserved)
{
if(reason == DLL_PROCESS_ATTACH)
{
g_dllHandle = procHandle;
OnAttach();
}
return TRUE;
}
static void OnAttach(void)
{
gLog.OpenRelative(CSIDL_MYDOCUMENTS, "\\My Games\\Skyrim Special Edition\\SKSE\\skse64_steam_loader.log");
gLog.SetPrintLevel(IDebugLog::kLevel_Error);
gLog.SetLogLevel(IDebugLog::kLevel_DebugMessage);
FILETIME now;
GetSystemTimeAsFileTime(&now);
_MESSAGE("skse64 loader %08X (steam) %08X%08X %s", PACKED_SKSE_VERSION, now.dwHighDateTime, now.dwLowDateTime, GetOSInfoStr().c_str());
_MESSAGE("loader base addr = %016I64X", g_dllHandle);
_MESSAGE("exe base addr = %016I64X", GetModuleHandle(NULL));
// hook an imported function early so we can inject our code
HookIAT();
}
typedef void (* ___telemetry_main_invoke_trigger)(void * arg);
___telemetry_main_invoke_trigger __telemetry_main_invoke_trigger_Original = NULL;
static void __telemetry_main_invoke_trigger_Hook(void * arg)
{
HookMain(_ReturnAddress());
__telemetry_main_invoke_trigger_Original(arg);
}
static void HookIAT()
{
___telemetry_main_invoke_trigger * iat = (___telemetry_main_invoke_trigger *)GetIATAddr(GetModuleHandle(NULL), "VCRUNTIME140.dll", "__telemetry_main_invoke_trigger");
if(iat)
{
_MESSAGE("found iat at %016I64X", iat);
__telemetry_main_invoke_trigger_Original = *iat;
_MESSAGE("original thunk %016I64X", __telemetry_main_invoke_trigger_Original);
SafeWrite64(uintptr_t(iat), (UInt64)__telemetry_main_invoke_trigger_Hook);
_MESSAGE("patched iat");
}
else
{
_MESSAGE("couldn't find __telemetry_main_invoke_trigger");
}
}
bool hookInstalled = false;
std::string g_dllPath;
static void HookMain(void * retAddr)
{
if(hookInstalled)
return;
else
hookInstalled = true;
_MESSAGE("HookMain: thread = %d retaddr = %016I64X", GetCurrentThreadId(), retAddr);
std::string runtimePath = GetRuntimePath();
_MESSAGE("runtimePath = %s", runtimePath.c_str());
bool isEditor = false;
// check version etc
std::string dllSuffix;
ProcHookInfo procHookInfo;
if(!IdentifyEXE(runtimePath.c_str(), isEditor, &dllSuffix, &procHookInfo))
{
_ERROR("unknown exe");
return;
}
const char * dllPrefix = (isEditor == false) ? "\\skse64_" : "\\skse64_editor_";
g_dllPath = GetRuntimeDirectory() + dllPrefix + dllSuffix + ".dll";
_MESSAGE("dll = %s", g_dllPath.c_str());
LoadLibrary(g_dllPath.c_str());
}