b4029dcd73
Conflicts: source/firm.c source/patches.h
108 lines
2.8 KiB
C
108 lines
2.8 KiB
C
/*
|
|
* patches.c
|
|
*/
|
|
|
|
#include "patches.h"
|
|
#include "memory.h"
|
|
|
|
/**************************************************
|
|
* Patches
|
|
**************************************************/
|
|
|
|
const u32 mpuPatch[3] = {0x00360003, 0x00200603, 0x001C0603};
|
|
|
|
const u16 nandRedir[2] = {0x4C00, 0x47A0},
|
|
sigPatch[2] = {0x2000, 0x4770},
|
|
writeBlock[2] = {0x2000, 0x46C0},
|
|
writeBlockSafe[2] = {0x2400, 0xE01D};
|
|
|
|
const u8 unitInfoPatch = 0xE3;
|
|
|
|
/**************************************************
|
|
* Functions
|
|
**************************************************/
|
|
|
|
u8 *getProc9(u8 *pos, u32 size)
|
|
{
|
|
return memsearch(pos, "ess9", size, 4);
|
|
}
|
|
|
|
void getSigChecks(u8 *pos, u32 size, u32 *off, u32 *off2)
|
|
{
|
|
//Look for signature checks
|
|
const u8 pattern[] = {0xC0, 0x1C, 0x76, 0xE7},
|
|
pattern2[] = {0xB5, 0x22, 0x4D, 0x0C};
|
|
|
|
*off = (u32)memsearch(pos, pattern, size, 4);
|
|
*off2 = (u32)memsearch(pos, pattern2, size, 4) - 1;
|
|
}
|
|
|
|
void *getReboot(u8 *pos, u32 size)
|
|
{
|
|
//Look for FIRM reboot code
|
|
const u8 pattern[] = {0xDE, 0x1F, 0x8D, 0xE2};
|
|
|
|
return memsearch(pos, pattern, size, 4) - 0x10;
|
|
}
|
|
|
|
u32 getfOpen(u8 *proc9Offset, void *rebootOffset)
|
|
{
|
|
//Offset Process9 code gets loaded to in memory (defined in ExHeader)
|
|
u32 p9MemAddr = *(u32 *)(proc9Offset + 0xC);
|
|
|
|
//Process9 code offset (start of NCCH + ExeFS offset + ExeFS header size)
|
|
u32 p9CodeOff = (u32)(proc9Offset - 0x204) + (*(u32 *)(proc9Offset - 0x64) * 0x200) + 0x200;
|
|
|
|
//Firmlaunch function offset - offset in BLX opcode (A4-16 - ARM DDI 0100E) + 1
|
|
return (u32)rebootOffset + 9 - (-((*(u32 *)rebootOffset & 0x00FFFFFF) << 2) & 0xFFFFF) - p9CodeOff + p9MemAddr;
|
|
}
|
|
|
|
u16 *getFirmWrite(u8 *pos, u32 size)
|
|
{
|
|
//Look for FIRM writing code
|
|
u8 *const off = memsearch(pos, "exe:", size, 4);
|
|
const u8 pattern[] = {0x00, 0x28, 0x01, 0xDA};
|
|
|
|
return (u16 *)memsearch(off - 0x100, pattern, 0x100, 4);
|
|
}
|
|
|
|
u16 *getFirmWriteSafe(u8 *pos, u32 size)
|
|
{
|
|
//Look for FIRM writing code
|
|
const u8 pattern[] = {0x04, 0x1E, 0x1D, 0xDB};
|
|
|
|
return (u16 *)memsearch(pos, pattern, size, 4);
|
|
}
|
|
|
|
u8 *getUnitInfoValueSet(u8 *pos, u32 size)
|
|
{
|
|
//Look for UNITINFO value being set
|
|
const u8 pattern[] = {0x01, 0x10, 0xA0, 0x13};
|
|
|
|
return memsearch(pos, pattern, size, 4) + 3;
|
|
}
|
|
|
|
u32 getLoader(u8 *pos, u32 *loaderSize)
|
|
{
|
|
u8 *off = pos;
|
|
u32 size;
|
|
|
|
while(1)
|
|
{
|
|
size = *(u32 *)(off + 0x104) * 0x200;
|
|
if(*(u32 *)(off + 0x200) == 0x64616F6C) break;
|
|
off += size;
|
|
}
|
|
|
|
*loaderSize = size;
|
|
|
|
return (u32)(off - pos);
|
|
}
|
|
|
|
u32* getExceptionVectorsPage(u8 *pos, u32 size)
|
|
{
|
|
const u8 pattern[] = {0x00,0xB0,0x9C,0xE5,0x0A,0xB0,0x0B,0xE0,0x0A,0x00,0x5B,0xE1,0xFB,0xFF,0xFF,0x1A};
|
|
|
|
return (u32 *)(memsearch(pos, pattern, size, 16) - 0x2C);
|
|
}
|