#include "dedicated/dedicated.h" #include "plugins/pluginmanager.h" #include #include #include #include #include #include #include #include namespace fs = std::filesystem; AUTOHOOK_INIT() // called from the ON_DLL_LOAD macros __dllLoadCallback::__dllLoadCallback( eDllLoadCallbackSide side, const std::string dllName, DllLoadCallbackFuncType callback, std::string uniqueStr, std::string reliesOn) { // parse reliesOn array from string std::vector reliesOnArray; if (reliesOn.length() && reliesOn[0] != '(') { reliesOnArray.push_back(reliesOn); } else { // follows the format (tag, tag, tag) std::string sCurrentTag; for (int i = 1; i < reliesOn.length(); i++) { if (!isspace(reliesOn[i])) { if (reliesOn[i] == ',' || reliesOn[i] == ')') { reliesOnArray.push_back(sCurrentTag); sCurrentTag = ""; } else sCurrentTag += reliesOn[i]; } } } switch (side) { case eDllLoadCallbackSide::UNSIDED: { AddDllLoadCallback(dllName, callback, uniqueStr, reliesOnArray); break; } case eDllLoadCallbackSide::CLIENT: { AddDllLoadCallbackForClient(dllName, callback, uniqueStr, reliesOnArray); break; } case eDllLoadCallbackSide::DEDICATED_SERVER: { AddDllLoadCallbackForDedicatedServer(dllName, callback, uniqueStr, reliesOnArray); break; } } } void __fileAutohook::Dispatch() { for (__autovar* var : vars) var->Dispatch(); for (__autohook* hook : hooks) hook->Dispatch(); } void __fileAutohook::DispatchForModule(const char* pModuleName) { const size_t iModuleNameLen = strlen(pModuleName); for (__autohook* hook : hooks) if ((hook->iAddressResolutionMode == __autohook::OFFSET_STRING && !strncmp(pModuleName, hook->pAddrString, iModuleNameLen)) || (hook->iAddressResolutionMode == __autohook::PROCADDRESS && !strcmp(pModuleName, hook->pModuleName))) hook->Dispatch(); } ManualHook::ManualHook(const char* funcName, LPVOID func) : svFuncName(funcName) , pHookFunc(func) , ppOrigFunc(nullptr) { } ManualHook::ManualHook(const char* funcName, LPVOID* orig, LPVOID func) : svFuncName(funcName) , pHookFunc(func) , ppOrigFunc(orig) { } bool ManualHook::Dispatch(LPVOID addr, LPVOID* orig) { if (orig) ppOrigFunc = orig; if (!addr) spdlog::error("Address for hook {} is invalid", svFuncName); else if (MH_CreateHook(addr, pHookFunc, ppOrigFunc) == MH_OK) { if (MH_EnableHook(addr) == MH_OK) { spdlog::info("Enabling hook {}", svFuncName); return true; } else spdlog::error("MH_EnableHook failed for function {}", svFuncName); } else spdlog::error("MH_CreateHook failed for function {}", svFuncName); return false; } uintptr_t ParseDLLOffsetString(const char* pAddrString) { // in the format server.dll + 0xDEADBEEF int iDllNameEnd = 0; for (; !isspace(pAddrString[iDllNameEnd]) && pAddrString[iDllNameEnd] != '+'; iDllNameEnd++) ; char* pModuleName = new char[iDllNameEnd + 1]; memcpy(pModuleName, pAddrString, iDllNameEnd); pModuleName[iDllNameEnd] = '\0'; // get the module address const HMODULE pModuleAddr = GetModuleHandleA(pModuleName); if (!pModuleAddr) return 0; // get the offset string uintptr_t iOffset = 0; int iOffsetBegin = iDllNameEnd; size_t iOffsetEnd = strlen(pAddrString); // seek until we hit the start of the number offset for (; !(pAddrString[iOffsetBegin] >= '0' && pAddrString[iOffsetBegin] <= '9') && pAddrString[iOffsetBegin]; iOffsetBegin++) ; bool bIsHex = pAddrString[iOffsetBegin] == '0' && (pAddrString[iOffsetBegin + 1] == 'X' || pAddrString[iOffsetBegin + 1] == 'x'); if (bIsHex) iOffset = std::stoi(pAddrString + iOffsetBegin + 2, 0, 16); else iOffset = std::stoi(pAddrString + iOffsetBegin); return ((uintptr_t)pModuleAddr + iOffset); } // dll load callback stuff // this allows for code to register callbacks to be run as soon as a dll is loaded, mainly to allow for patches to be made on dll load struct DllLoadCallback { std::string dll; DllLoadCallbackFuncType callback; std::string tag; std::vector reliesOn; bool called; }; // HACK: declaring and initialising this vector at file scope crashes on debug builds due to static initialisation order // using a static var like this ensures that the vector is initialised lazily when it's used std::vector& GetDllLoadCallbacks() { static std::vector vec = std::vector(); return vec; } void AddDllLoadCallback(std::string dll, DllLoadCallbackFuncType callback, std::string tag, std::vector reliesOn) { DllLoadCallback& callbackStruct = GetDllLoadCallbacks().emplace_back(); callbackStruct.dll = dll; callbackStruct.callback = callback; callbackStruct.tag = tag; callbackStruct.reliesOn = reliesOn; callbackStruct.called = false; } void AddDllLoadCallbackForDedicatedServer( std::string dll, DllLoadCallbackFuncType callback, std::string tag, std::vector reliesOn) { if (!IsDedicatedServer()) return; AddDllLoadCallback(dll, callback, tag, reliesOn); } void AddDllLoadCallbackForClient(std::string dll, DllLoadCallbackFuncType callback, std::string tag, std::vector reliesOn) { if (IsDedicatedServer()) return; AddDllLoadCallback(dll, callback, tag, reliesOn); } void MakeHook(LPVOID pTarget, LPVOID pDetour, void* ppOriginal, const char* pFuncName) { char* pStrippedFuncName = (char*)pFuncName; // strip & char from funcname if (*pStrippedFuncName == '&') pStrippedFuncName++; if (MH_CreateHook(pTarget, pDetour, (LPVOID*)ppOriginal) == MH_OK) { if (MH_EnableHook(pTarget) == MH_OK) spdlog::info("Enabling hook {}", pStrippedFuncName); else spdlog::error("MH_EnableHook failed for function {}", pStrippedFuncName); } else spdlog::error("MH_CreateHook failed for function {}", pStrippedFuncName); } AUTOHOOK_ABSOLUTEADDR(_GetCommandLineA, (LPVOID)GetCommandLineA, LPSTR, WINAPI, ()) { static char* cmdlineModified; static char* cmdlineOrg; if (cmdlineOrg == nullptr || cmdlineModified == nullptr) { cmdlineOrg = _GetCommandLineA(); bool isDedi = strstr(cmdlineOrg, "-dedicated"); // well, this one has to be a real argument bool ignoreStartupArgs = strstr(cmdlineOrg, "-nostartupargs"); std::string args; std::ifstream cmdlineArgFile; // it looks like CommandLine() prioritizes parameters apprearing first, so we want the real commandline to take priority // not to mention that cmdlineOrg starts with the EXE path args.append(cmdlineOrg); args.append(" "); // append those from the file if (!ignoreStartupArgs) { cmdlineArgFile = std::ifstream(!isDedi ? "ns_startup_args.txt" : "ns_startup_args_dedi.txt"); if (cmdlineArgFile) { std::stringstream argBuffer; argBuffer << cmdlineArgFile.rdbuf(); cmdlineArgFile.close(); // if some other command line option includes "-northstar" in the future then you have to refactor this check to check with // both either space after or ending with if (!isDedi && argBuffer.str().find("-northstar") != std::string::npos) MessageBoxA( NULL, "The \"-northstar\" command line option is NOT supposed to go into ns_startup_args.txt file!\n\nThis option is " "supposed to go into Origin/Steam game launch options, and then you are supposed to launch the original " "Titanfall2.exe " "rather than NorthstarLauncher.exe to make use of it.", "Northstar Warning", MB_ICONWARNING); args.append(argBuffer.str()); } } auto len = args.length(); cmdlineModified = new char[len + 1]; if (!cmdlineModified) { spdlog::error("malloc failed for command line"); return cmdlineOrg; } memcpy(cmdlineModified, args.c_str(), len + 1); } return cmdlineModified; } std::vector calledTags; void CallLoadLibraryACallbacks(LPCSTR lpLibFileName, HMODULE moduleAddress) { CModule cModule(moduleAddress); while (true) { bool bDoneCalling = true; for (auto& callbackStruct : GetDllLoadCallbacks()) { if (!callbackStruct.called && fs::path(lpLibFileName).filename() == fs::path(callbackStruct.dll).filename()) { bool bShouldContinue = false; if (!callbackStruct.reliesOn.empty()) { for (std::string tag : callbackStruct.reliesOn) { if (std::find(calledTags.begin(), calledTags.end(), tag) == calledTags.end()) { bDoneCalling = false; bShouldContinue = true; break; } } } if (bShouldContinue) continue; callbackStruct.callback(moduleAddress); calledTags.push_back(callbackStruct.tag); callbackStruct.called = true; } } if (bDoneCalling) break; } } void CallLoadLibraryWCallbacks(LPCWSTR lpLibFileName, HMODULE moduleAddress) { while (true) { bool bDoneCalling = true; for (auto& callbackStruct : GetDllLoadCallbacks()) { if (!callbackStruct.called && fs::path(lpLibFileName).filename() == fs::path(callbackStruct.dll).filename()) { bool bShouldContinue = false; if (!callbackStruct.reliesOn.empty()) { for (std::string tag : callbackStruct.reliesOn) { if (std::find(calledTags.begin(), calledTags.end(), tag) == calledTags.end()) { bDoneCalling = false; bShouldContinue = true; break; } } } if (bShouldContinue) continue; callbackStruct.callback(moduleAddress); calledTags.push_back(callbackStruct.tag); callbackStruct.called = true; } } if (bDoneCalling) break; } } void CallAllPendingDLLLoadCallbacks() { HMODULE hMods[1024]; HANDLE hProcess = GetCurrentProcess(); DWORD cbNeeded; unsigned int i; // Get a list of all the modules in this process. if (EnumProcessModules(hProcess, hMods, sizeof(hMods), &cbNeeded)) { for (i = 0; i < (cbNeeded / sizeof(HMODULE)); i++) { wchar_t szModName[MAX_PATH]; // Get the full path to the module's file. if (GetModuleFileNameExW(hProcess, hMods[i], szModName, sizeof(szModName) / sizeof(TCHAR))) { CallLoadLibraryWCallbacks(szModName, hMods[i]); } } } } void HookSys_Init() { if (MH_Initialize() != MH_OK) { spdlog::error("MH_Initialize (minhook initialization) failed"); } // todo: remove remaining instances of autohook in this file AUTOHOOK_DISPATCH() }