Cube-World-Mod-Launcher/CubeModLoader/main.cpp

245 lines
7.2 KiB
C++
Raw Normal View History

#include "main.h"
2019-09-13 08:41:28 +08:00
#include <iostream>
#include <windows.h>
#include <vector>
2019-09-15 03:24:12 +08:00
#include "DLL.h"
#include "crc.h"
#include "mutex.h"
2019-09-15 03:24:12 +08:00
2019-10-06 03:59:20 +08:00
#define MOD_MAJOR_VERSION 4
2019-10-16 06:19:06 +08:00
#define MOD_MINOR_VERSION 2
2019-09-15 03:24:12 +08:00
#define CUBE_VERSION "1.0.0-1"
#define CUBE_PACKED_CRC 0xC7682619
#define CUBE_UNPACKED_CRC 0xBA092543
#define MODLOADER_NAME "CubeModLoader"
2019-09-15 03:24:12 +08:00
2019-09-13 08:41:28 +08:00
using namespace std;
2019-10-25 06:07:08 +08:00
global void* base; // Module base
global vector <DLL*> modDLLs; // Every mod we've loaded
global HMODULE hSelf; // A handle to ourself, to prevent being unloaded
global void** initterm_eReference; // A pointer-pointer to a function which is run extremely soon after starting, or after being unpacked
GETTER_VAR(void*, initterm_e); // A pointer to that function
2019-09-15 03:24:12 +08:00
2019-10-06 03:59:20 +08:00
#include "callbacks/ChatHandler.h"
#include "callbacks/P2PRequestHandler.h"
2019-10-13 13:30:52 +08:00
#include "callbacks/CheckInventoryFullHandler.h"
2019-09-15 03:24:12 +08:00
void SetupHandlers() {
2019-09-22 01:12:00 +08:00
SetupChatHandler();
2019-10-06 03:59:20 +08:00
SetupP2PRequestHandler();
2019-10-13 13:30:52 +08:00
SetupCheckInventoryFullHandler();
2019-09-15 03:24:12 +08:00
}
2019-09-13 08:41:28 +08:00
// Handles injecting callbacks and the mods
bool already_loaded_mods = false;
mutex already_loaded_mods_mtx;
2019-10-25 06:07:08 +08:00
extern "C" void StartMods() {
char msg[256] = {0};
already_loaded_mods_mtx.lock();
// Don't allow this to run more than once
if (already_loaded_mods) {
already_loaded_mods_mtx.unlock();
return;
}
already_loaded_mods = true;
already_loaded_mods_mtx.unlock();
SetupHandlers();
//Find mods
HANDLE hFind;
WIN32_FIND_DATA data;
CreateDirectory("Mods", NULL);
hFind = FindFirstFile("Mods\\*.dll", &data);
if (hFind != INVALID_HANDLE_VALUE) {
do {
// We should be loaded into the application's address space, so we can just LoadLibraryA
DLL* dll = new DLL(string("Mods\\") + data.cFileName);
dll->Load();
printf("Loaded %s\n", dll->fileName.c_str());
modDLLs.push_back(dll);
} while (FindNextFile(hFind, &data));
FindClose(hFind);
}
2019-09-13 08:41:28 +08:00
// Find all the functions the mods may export
for (DLL* dll: modDLLs) {
MUST_IMPORT(dll, ModMajorVersion);
MUST_IMPORT(dll, ModMinorVersion);
MUST_IMPORT(dll, ModPreInitialize);
IMPORT(dll, ModInitialize);
IMPORT(dll, HandleChat);
IMPORT(dll, HandleP2PRequest);
IMPORT(dll, HandleCheckInventoryFull);
}
2019-09-15 03:24:12 +08:00
// Ensure version compatibility
2019-10-25 06:58:10 +08:00
for (DLL* dll : modDLLs) {
int majorVersion = ((int(*)())dll->ModMajorVersion)();
int minorVersion = ((int(*)())dll->ModMinorVersion)();
if (majorVersion != MOD_MAJOR_VERSION) {
sprintf(msg, "%s has major version %d but requires %d.\n", dll->fileName.c_str(), majorVersion, MOD_MAJOR_VERSION);
Popup("Error", msg);
exit(1);
if (minorVersion > MOD_MINOR_VERSION) {
sprintf(msg, "%s has minor version %d but requires %d or lower.\n", dll->fileName.c_str(), minorVersion, MOD_MINOR_VERSION);
Popup("Error", msg);
exit(1);
}
}
}
// Run Initialization routines on all mods
for (DLL* dll: modDLLs) {
2019-10-25 06:58:10 +08:00
((void(*)())dll->ModPreInitialize)();
}
2019-09-15 07:59:24 +08:00
2019-10-25 06:58:10 +08:00
for (DLL* dll: modDLLs) {
if (dll->ModInitialize) {
((void(*)())dll->ModInitialize)();
2019-09-13 08:41:28 +08:00
}
}
2019-10-25 06:58:10 +08:00
if (hSelf) PrintLoadedMods();
return;
}
2019-10-25 06:07:08 +08:00
void ASMStartMods() {
asm(".intel_syntax \n"
PUSH_ALL
PREPARE_STACK
// Initialize mods and callbacks
2019-10-25 06:07:08 +08:00
"call StartMods \n"
RESTORE_STACK
POP_ALL
// Run initterm_e properly this time.
2019-10-25 06:07:08 +08:00
DEREF_JMP(initterm_e)
);
}
void PatchFreeImage(){
// Patch FreeImage, because Windows 8 and higher do not work properly with it.
DWORD oldProtect;
2019-10-25 06:07:08 +08:00
void* patchaddr = Offset(GetModuleHandleA("FreeImage.dll"), 0x1E8C4E);
VirtualProtect((LPVOID)patchaddr, 9, PAGE_EXECUTE_READWRITE, &oldProtect);
memset(patchaddr, 0x90, 9);
VirtualProtect((LPVOID)patchaddr, 9, oldProtect, &oldProtect);
2019-10-25 06:07:08 +08:00
patchaddr = Offset(patchaddr, 0x14);
VirtualProtect((LPVOID)patchaddr, 14, PAGE_EXECUTE_READWRITE, &oldProtect);
memset(patchaddr, 0x90, 14);
VirtualProtect((LPVOID)patchaddr, 14, oldProtect, &oldProtect);
}
void PatchInitterm_ePtr() {
// Get ** to initterm_e
2019-10-25 06:07:08 +08:00
initterm_eReference = (void**)(Offset(base, 0x42CBD8));
initterm_e = *initterm_eReference;
DWORD oldProtect;
VirtualProtect((LPVOID)initterm_eReference, 8, PAGE_EXECUTE_READWRITE, &oldProtect);
*initterm_eReference = (void*)&ASMStartMods;
VirtualProtect((LPVOID)initterm_eReference, 8, oldProtect, &oldProtect);
}
void Popup(const char* title, const char* msg ) {
MessageBoxA(0, msg, title, MB_OK | MB_ICONINFORMATION);
}
void PrintLoadedMods() {
std::string mods("Mods Loaded:\n");
for (DLL* dll : modDLLs) {
mods += dll->fileName;
mods += "\n";
}
Popup("Loaded Mods", mods.c_str());
}
void WriteFarJMP(void* source, void* destination) {
DWORD dwOldProtection;
VirtualProtect(source, 14, PAGE_EXECUTE_READWRITE, &dwOldProtection);
char* location = (char*)source;
// Far jump
*((UINT16*)&location[0]) = 0x25FF;
// mode
*((UINT32*)&location[2]) = 0x00000000;
*((UINT64*)&location[6]) = (UINT64)destination;
VirtualProtect(location, 14, dwOldProtection, &dwOldProtection);
}
2019-10-25 06:07:08 +08:00
void* Offset(void* x1, uint64_t x2) {
return (void*)((char*)x1 + x2);
}
bool already_initialized = false;
mutex already_initialized_mtx;
extern "C" __declspec(dllexport) BOOL APIENTRY DllMain(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID lpvReserved) {
switch (fdwReason) {
case DLL_PROCESS_ATTACH:
already_initialized_mtx.lock();
if (already_initialized) {
already_initialized_mtx.unlock();
2019-10-16 05:49:30 +08:00
return true;
}
already_initialized = true;
already_initialized_mtx.unlock();
base = GetModuleHandle(NULL);
char msg[256] = {0};
// This serves to prevent ourself from being unloaded, if we are a .fip
hSelf = LoadLibrary(MODLOADER_NAME ".fip");
// The user could also inject this as a DLL, so if we can't find our .fip, we were probably launched with a launcher.
// Therefore, we don't need to prompt the user.
if (hSelf) {
if (MessageBoxA(NULL, "Would you like to run with mods?", "Cube World Mod Loader", MB_YESNO) != IDYES) {
PatchFreeImage();
return true;
}
}
base = GetModuleHandle(NULL);
// Figure out where the executable is and verify its checksum
char cubePath[_MAX_PATH+1];
GetModuleFileName(NULL, cubePath, _MAX_PATH);
uint32_t checksum = crc32_file(cubePath);
if (checksum == CUBE_PACKED_CRC || checksum == CUBE_UNPACKED_CRC) {
// Patch some code to run StartMods. This method makes it work with AND without SteamStub.
PatchInitterm_ePtr();
} else {
sprintf(msg, "%s does not seem to be version %s. CRC %08X", cubePath, CUBE_VERSION, checksum);
Popup("Error", msg);
PatchFreeImage();
return true;
}
2019-09-15 03:24:12 +08:00
Sleep(250);
PatchFreeImage();
2019-09-13 08:41:28 +08:00
}
return true;
}