segatools2/mu3hook/dllmain.c

71 lines
1.4 KiB
C
Raw Normal View History

2019-08-30 23:06:32 +00:00
#include <windows.h>
#include "board/io4.h"
#include "board/sg-reader.h"
#include "board/vfd.h"
#include "hook/process.h"
#include "hooklib/serial.h"
#include "hooklib/spike.h"
#include "mu3hook/config.h"
#include "mu3hook/io4.h"
#include "platform/platform.h"
#include "util/dprintf.h"
static HMODULE mu3_hook_mod;
static process_entry_t mu3_startup;
static struct mu3_hook_config mu3_hook_cfg;
static DWORD CALLBACK mu3_pre_startup(void)
{
dprintf("--- Begin mu3_pre_startup ---\n");
/* Load config */
mu3_hook_config_load(&mu3_hook_cfg, L".\\segatools.ini");
/* Hook Win32 APIs */
serial_hook_init();
/* Initialize emulation hooks */
platform_hook_init_alls(&mu3_hook_cfg.alls, "SDDT", "AAV2", mu3_hook_mod);
sg_reader_hook_init(&mu3_hook_cfg.aime, 1);
vfd_hook_init(2);
mu3_io4_hook_init();
/* Initialize debug helpers */
spike_hook_init("mu3spike.txt");
dprintf("--- End mu3_pre_startup ---\n");
/* Jump to EXE start address */
return mu3_startup();
}
BOOL WINAPI DllMain(HMODULE mod, DWORD cause, void *ctx)
{
HRESULT hr;
if (cause != DLL_PROCESS_ATTACH) {
return TRUE;
}
mu3_hook_mod = mod;
hr = process_hijack_startup(mu3_pre_startup, &mu3_startup);
if (!SUCCEEDED(hr)) {
dprintf("Failed to hijack process startup: %x\n", (int) hr);
}
return SUCCEEDED(hr);
}