Update README
This commit is contained in:
parent
fb0520b608
commit
4e87677885
1 changed files with 13 additions and 2 deletions
15
README.md
15
README.md
|
@ -1,5 +1,16 @@
|
|||
# nativelauncher
|
||||
Old ACL bypass taken from XIVQuickLauncher
|
||||
|
||||
Full credit goes to the XIVQuickLauncher team, this is their old ACL bypass before it was rewritten in C#, but
|
||||
it still works!
|
||||
|
||||
If you plan on using this on Linux or macOS, don't fear as I graciously built an [EXE for you](https://github.com/redstrate/nativelauncher/releases/latest). Right now they are built with VS2020 if that means anything to you.
|
||||
|
||||
## What is this?
|
||||
This is a workaround used by Dalamud to implement a specific ACL bypass to allow them to freely read/write memory, or something? Currently, this is written in nice-looking C# but this was unusable for [xivlauncher](https://github.com/redstrate/xivlauncher) because I was using C++, but lo and behold they were actually using _this_ before!
|
||||
|
||||
The usage is extremely useful if you want to use this in your own launcher or game projects:
|
||||
|
||||
* The first argument is the executable (usually ffxiv_dx11.exe)
|
||||
* The rest of the arguments is passed as-is to your chosen executable
|
||||
* If this is done successfully, it will spit out a PID of the new process for you to use. If it fails, it'll tell you why.
|
||||
|
||||
I've been testing this under latest Wine Staging (as of writing, 6.22) and the process still works out-of-the box.
|
||||
|
|
Reference in a new issue