taitools/sivahook/dllmain.c

92 lines
1.8 KiB
C
Raw Normal View History

2024-02-11 04:38:24 +00:00
#include <windows.h>
#include "board/io4.h"
#include "hook/process.h"
#include "hooklib/serial.h"
#include "hooklib/spike.h"
#include "gfxhook/gfx.h"
#include "gfxhook/d3d11.h"
#include "sivahook/config.h"
#include "sivahook/siva-dll.h"
#include "sivahook/unity.h"
#include "platform/platform.h"
#include "util/dprintf.h"
static HMODULE siva_hook_mod;
static process_entry_t siva_startup;
static struct siva_hook_config siva_hook_cfg;
/* This hook is based on mu3hook, with leaked sivahook i/o codes. */
static DWORD CALLBACK siva_pre_startup(void)
{
HRESULT hr;
dprintf("--- Begin siva_pre_startup ---\n");
/* Load config */
siva_hook_config_load(&siva_hook_cfg, L".\\taitools.ini");
/* Hook Win32 APIs */
serial_hook_init();
gfx_hook_init(&siva_hook_cfg.gfx);
gfx_d3d11_hook_init(&siva_hook_cfg.gfx, siva_hook_mod);
/* Initialize emulation hooks */
hr = platform_hook_init(
&siva_hook_cfg.platform,
3000,
siva_hook_mod);
if (FAILED(hr)) {
goto fail;
}
hr = siva_dll_init(&siva_hook_cfg.dll, siva_hook_mod);
if (FAILED(hr)) {
goto fail;
}
unity_hook_init();
/* Initialize debug helpers */
spike_hook_init(L".\\taitools.ini");
dprintf("--- End siva_pre_startup ---\n");
/* Jump to EXE start address */
return siva_startup();
fail:
ExitProcess(EXIT_FAILURE);
}
BOOL WINAPI DllMain(HMODULE mod, DWORD cause, void *ctx)
{
HRESULT hr;
if (cause != DLL_PROCESS_ATTACH) {
return TRUE;
}
siva_hook_mod = mod;
hr = process_hijack_startup(siva_pre_startup, &siva_startup);
if (!SUCCEEDED(hr)) {
dprintf("Failed to hijack process startup: %x\n", (int) hr);
}
return SUCCEEDED(hr);
}