Re-added reboot patch on A9LH, optimizations
O3DS and N3DS now share the same emuNAND patch, shorter patching patterns, patched_firmware does not keep garbage from larger loaded FIRMs, flags can be empty files
This commit is contained in:
@@ -23,8 +23,8 @@ void getEmunandSect(u32 *off, u32 *head){
|
||||
|
||||
void getSDMMC(void *pos, u32 *off, u32 size){
|
||||
//Look for struct code
|
||||
unsigned char pattern[] = {0x01, 0x21, 0x20, 0x18, 0x20};
|
||||
*off = (u32)memsearch(pos, pattern, size, 5);
|
||||
unsigned char pattern[] = {0x21, 0x20, 0x18, 0x20};
|
||||
*off = (u32)memsearch(pos, pattern, size, 4) - 1;
|
||||
|
||||
//Get DCD values
|
||||
unsigned char buf[4];
|
||||
@@ -42,15 +42,15 @@ void getSDMMC(void *pos, u32 *off, u32 size){
|
||||
|
||||
void getEmuRW(void *pos, u32 size, u32 *readOff, u32 *writeOff){
|
||||
//Look for read/write code
|
||||
unsigned char pattern[] = {0x04, 0x00, 0x0D, 0x00, 0x17, 0x00, 0x1E, 0x00, 0xC8, 0x05};
|
||||
unsigned char pattern[] = {0x1E, 0x00, 0xC8, 0x05};
|
||||
|
||||
*writeOff = (u32)memsearch(pos, pattern, size, 10);
|
||||
*readOff = (u32)memsearch((void *)(*writeOff - 0x1000), pattern, 0x1000, 10);
|
||||
*writeOff = (u32)memsearch(pos, pattern, size, 4) - 6;
|
||||
*readOff = (u32)memsearch((void *)(*writeOff - 0x1000), pattern, 0x1000, 4) - 6;
|
||||
}
|
||||
|
||||
void getMPU(void *pos, u32 *off, u32 size){
|
||||
//Look for MPU pattern
|
||||
unsigned char pattern[] = {0x03, 0x00, 0x24, 0x00, 0x00};
|
||||
unsigned char pattern[] = {0x03, 0x00, 0x24, 0x00};
|
||||
|
||||
*off = (u32)memsearch(pos, pattern, size, 5);
|
||||
*off = (u32)memsearch(pos, pattern, size, 4);
|
||||
}
|
||||
@@ -28,10 +28,10 @@ u8 loadFirm(u8 a9lhBoot){
|
||||
//Get pressed buttons
|
||||
pressed = HID_PAD;
|
||||
//Determine if A9LH is installed
|
||||
if(a9lhBoot || fileSize("/rei/installeda9lh")){
|
||||
if(a9lhBoot || fileExists("/rei/installeda9lh")){
|
||||
a9lhSetup = 1;
|
||||
//Check flag for > 9.2 SysNAND
|
||||
if(fileSize("/rei/updatedsysnand")) updatedSys = 1;
|
||||
if(fileExists("/rei/updatedsysnand")) updatedSys = 1;
|
||||
}
|
||||
|
||||
section = firmLocation->section;
|
||||
@@ -39,7 +39,7 @@ u8 loadFirm(u8 a9lhBoot){
|
||||
/* If L and R are pressed on a 9.0/2 SysNAND, or L on an updated
|
||||
SysNAND, boot 9.0 FIRM */
|
||||
if((!updatedSys & ((pressed & BUTTON_L1R1) == BUTTON_L1R1)) |
|
||||
(updatedSys & (pressed == BUTTON_L1))) mode = 0;
|
||||
(updatedSys & (pressed & BUTTON_L1))) mode = 0;
|
||||
|
||||
//If not using an A9LH setup, do so by decrypting FIRM0
|
||||
if(!a9lhSetup && !mode){
|
||||
@@ -77,15 +77,14 @@ u8 loadEmu(void){
|
||||
|
||||
//Read emunand code from SD
|
||||
char path[] = "/rei/emunand/emunand.bin";
|
||||
char path2[] = "/rei/emunand/emunand90.bin";
|
||||
char *pathPtr = ((!mode) & console) ? path2 : path;
|
||||
u32 size = fileSize(pathPtr);
|
||||
u32 size = fileSize(path);
|
||||
if (!size) return 1;
|
||||
if(!console | !mode) nandRedir[5] = 0xA4;
|
||||
//Find offset for emuNAND code from the offset in nandRedir
|
||||
u8 *emuCodeTmp = &nandRedir[4];
|
||||
emuCodeOffset = *(u32*)emuCodeTmp - (u32)section[2].address +
|
||||
section[2].offset + (u32)firmLocation;
|
||||
fileRead((u8*)emuCodeOffset, pathPtr, size);
|
||||
fileRead((u8*)emuCodeOffset, path, size);
|
||||
|
||||
//Find and patch emunand related offsets
|
||||
u32 *pos_sdmmc = memsearch((u32*)emuCodeOffset, "SDMC", size, 4);
|
||||
@@ -98,6 +97,11 @@ u8 loadEmu(void){
|
||||
*pos_sdmmc = sdmmcOffset;
|
||||
*pos_offset = emuOffset;
|
||||
*pos_header = emuHeader;
|
||||
//Patch emuNAND code in memory for O3DS and 9.0 N3DS
|
||||
if(!console | !mode){
|
||||
u32 *pos_instr = memsearch((u32*)emuCodeOffset, "\xA6\x01\x08\x30", size, 4);
|
||||
memcpy((u8*)pos_instr, emuInstr, sizeof(emuInstr));
|
||||
}
|
||||
|
||||
//Add emunand hooks
|
||||
memcpy((u8*)emuRead, nandRedir, sizeof(nandRedir));
|
||||
@@ -114,8 +118,8 @@ u8 patchFirm(void){
|
||||
|
||||
/* If L is pressed on a 9.0/9.2 SysNAND, or L+R on a > 9.2 SysNAND,
|
||||
or the 9.0 FIRM is loaded on a > 9.2 SysNAND, boot emuNAND */
|
||||
if((updatedSys & (!mode | (pressed == BUTTON_L1R1))) |
|
||||
((!updatedSys) & mode & !(pressed & BUTTON_L1))){
|
||||
if((updatedSys & ((!mode) | (((pressed & BUTTON_L1R1) == BUTTON_L1R1) &
|
||||
(pressed != SAFEMODE)))) | ((!updatedSys) & mode & !(pressed & BUTTON_L1))){
|
||||
if (loadEmu()) return 1;
|
||||
}
|
||||
else if (a9lhSetup){
|
||||
@@ -133,18 +137,20 @@ u8 patchFirm(void){
|
||||
memcpy((u8*)sigOffset, sigPat1, sizeof(sigPat1));
|
||||
memcpy((u8*)sigOffset2, sigPat2, sizeof(sigPat2));
|
||||
|
||||
//Apply FIRM reboot patch. Not needed with A9LH and N3DS
|
||||
if(!console && !a9lhSetup && mode &&
|
||||
((fileSize("/rei/reversereboot") > 0) == (pressed & BUTTON_A))){
|
||||
//Apply FIRM reboot patch. Not needed on N3DS
|
||||
if((!console) & mode & (pressed != SAFEMODE) &
|
||||
!(fileExists("/rei/reversereboot") ^ (pressed & BUTTON_A))){
|
||||
u32 rebootOffset = 0,
|
||||
rebootOffset2 = 0;
|
||||
|
||||
//Read reboot code from SD and write patched FIRM path in memory
|
||||
char path[] = "/rei/reboot/reboot1.bin";
|
||||
u32 size = fileSize(path);
|
||||
char path2[] = "/rei/reboot/reboot190.bin";
|
||||
char *pathPtr = mode ? path : path2;
|
||||
u32 size = fileSize(pathPtr);
|
||||
if (!size) return 1;
|
||||
getReboot(firmLocation, firmSize, &rebootOffset, &rebootOffset2);
|
||||
fileRead((u8*)rebootOffset, path, size);
|
||||
fileRead((u8*)rebootOffset, pathPtr, size);
|
||||
memcpy((u8*)rebootOffset + size, L"sdmc:", 10);
|
||||
memcpy((u8*)rebootOffset + size + 10, L"" PATCHED_FIRM_PATH, sizeof(PATCHED_FIRM_PATH) * 2);
|
||||
path[18] = '2';
|
||||
|
||||
@@ -13,6 +13,7 @@
|
||||
#define BUTTON_L1R1 (3 << 8)
|
||||
#define BUTTON_L1 (1 << 9)
|
||||
#define BUTTON_A 1
|
||||
#define SAFEMODE (BUTTON_L1R1 | BUTTON_A | (1 << 6))
|
||||
#define PATCHED_FIRM_PATH "/rei/patched_firmware.bin"
|
||||
|
||||
u8 loadFirm(u8 a9lh);
|
||||
|
||||
11
source/fs.c
11
source/fs.c
@@ -63,6 +63,7 @@ int fileWrite(const u8 *buffer, const char *path, u32 size){
|
||||
FIL fp;
|
||||
unsigned int br = 0;
|
||||
|
||||
f_unlink(path);
|
||||
if(f_open(&fp, path, FA_WRITE | FA_OPEN_ALWAYS) == FR_OK){
|
||||
fr = f_write(&fp, buffer, size, &br);
|
||||
f_close(&fp);
|
||||
@@ -83,4 +84,14 @@ int fileSize(const char* path){
|
||||
error:
|
||||
f_close(&fp);
|
||||
return size;
|
||||
}
|
||||
|
||||
int fileExists(const char* path){
|
||||
FRESULT fr;
|
||||
FIL fp;
|
||||
int exists = 1;
|
||||
fr = f_open(&fp, path, FA_READ);
|
||||
if (fr != FR_OK)exists = 0;
|
||||
f_close(&fp);
|
||||
return exists;
|
||||
}
|
||||
@@ -13,5 +13,6 @@ int fileReadOffset(u8 *dest, const char *path, u32 size, u32 offset);
|
||||
int fileRead(u8 *dest, const char *path, u32 size);
|
||||
int fileWrite(const u8 *buffer, const char *path, u32 size);
|
||||
int fileSize(const char* path);
|
||||
int fileExists(const char* path);
|
||||
|
||||
#endif
|
||||
|
||||
@@ -28,6 +28,7 @@ u8 nandRedir[0x08] = {0x00, 0x4C, 0xA0, 0x47, 0xC0, 0xA5, 0x01, 0x08}; //Bran
|
||||
u8 sigPat1[2] = {0x00, 0x20};
|
||||
u8 sigPat2[4] = {0x00, 0x20, 0x70, 0x47};
|
||||
u8 FIRMblock[4] = {0x00, 0x20, 0xC0, 0x46};
|
||||
u8 emuInstr[5] = {0xA5, 0x01, 0x08, 0x30, 0xA5};
|
||||
|
||||
/**************************************************
|
||||
* Functions
|
||||
@@ -36,10 +37,10 @@ u8 FIRMblock[4] = {0x00, 0x20, 0xC0, 0x46};
|
||||
void getSignatures(void *pos, u32 size, u32 *off, u32 *off2){
|
||||
//Look for signature checks
|
||||
unsigned char pattern[] = {0xC0, 0x1C, 0x76, 0xE7};
|
||||
unsigned char pattern2[] = {0x70, 0xB5, 0x22, 0x4D, 0x0C};
|
||||
unsigned char pattern2[] = {0xB5, 0x22, 0x4D, 0x0C};
|
||||
|
||||
*off = (u32)memsearch(pos, pattern, size, 4);
|
||||
*off2 = (u32)memsearch(pos, pattern2, size, 5);
|
||||
*off2 = (u32)memsearch(pos, pattern2, size, 4) - 1;
|
||||
}
|
||||
|
||||
void getReboot(void *pos, u32 size, u32 *off, u32 *off2){
|
||||
@@ -53,7 +54,7 @@ void getReboot(void *pos, u32 size, u32 *off, u32 *off2){
|
||||
|
||||
void getFIRMWrite(void *pos, u32 size, u32 *off){
|
||||
//Look for FIRM writing code
|
||||
void *firmwrite = memsearch(pos, "exe:/", size, 5);
|
||||
void *firmwrite = memsearch(pos, "exe:", size, 4);
|
||||
unsigned char pattern[] = {0x00, 0x28, 0x01, 0xDA};
|
||||
|
||||
*off = (u32)memsearch(firmwrite - 0x100, pattern, 0x100, 4);
|
||||
|
||||
@@ -16,6 +16,7 @@ u8 nandRedir[0x08];
|
||||
u8 sigPat1[2];
|
||||
u8 sigPat2[4];
|
||||
u8 FIRMblock[4];
|
||||
u8 emuInstr[5];
|
||||
|
||||
/**************************************************
|
||||
* Functions
|
||||
|
||||
Reference in New Issue
Block a user