1
0
Fork 0
mirror of https://github.com/CTCaer/hekate.git synced 2024-11-10 04:21:45 +00:00
hekate/bootloader/hos/pkg2.h

165 lines
3.8 KiB
C
Raw Normal View History

2018-05-01 06:15:48 +01:00
/*
2018-08-05 12:40:32 +01:00
* Copyright (c) 2018 naehrwert
* Copyright (c) 2018-2023 CTCaer
2018-08-05 12:40:32 +01:00
*
* This program is free software; you can redistribute it and/or modify it
* under the terms and conditions of the GNU General Public License,
* version 2, as published by the Free Software Foundation.
*
* This program is distributed in the hope it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
* more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
2018-05-01 06:15:48 +01:00
#ifndef _PKG2_H_
#define _PKG2_H_
2022-01-15 22:04:34 +00:00
#include <bdk.h>
2018-05-01 06:15:48 +01:00
#define PKG2_MAGIC 0x31324B50
#define PKG2_SEC_BASE 0x80000000
#define PKG2_SEC_KERNEL 0
#define PKG2_SEC_INI1 1
#define INI1_MAGIC 0x31494E49
2023-02-11 21:51:43 +00:00
//! TODO: Update on kernel change if needed.
// Offset of OP + 12 is the INI1 offset. On v2 with dynamic crt0 it's + 16.
#define PKG2_NEWKERN_GET_INI1_HEURISTIC 0xD2800015
#define PKG2_NEWKERN_START 0x800
#define ATM_MESOSPHERE 0x3053534D
extern u32 pkg2_newkern_ini1_info;
extern u32 pkg2_newkern_ini1_start;
extern u32 pkg2_newkern_ini1_end;
2018-05-01 06:15:48 +01:00
2018-07-01 03:03:17 +01:00
typedef struct _kernel_patch_t
{
2024-03-27 08:17:56 +00:00
u32 id;
u32 off;
u32 val;
2018-07-01 03:03:17 +01:00
u32 *ptr;
} kernel_patch_t;
#define KERNEL_PATCHSET_DEF(name, ...) \
kernel_patch_t name[] = { \
__VA_ARGS__, \
2018-07-01 03:03:17 +01:00
{0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, (u32 *)0xFFFFFFFF} \
}
2018-07-01 03:03:17 +01:00
enum
{
// Always applied.
SVC_GENERIC = 0,
// Generic instruction patches.
SVC_VERIFY_DS = 0x10,
DEBUG_MODE_EN = 0x11,
ATM_GEN_PATCH = 0x12,
ATM_SYSM_INCR = ATM_GEN_PATCH,
2018-07-01 03:03:17 +01:00
// >4 bytes patches. Value is a pointer of a u32 array.
ATM_ARR_PATCH = 0x13,
2018-07-01 03:03:17 +01:00
};
2018-05-01 06:15:48 +01:00
typedef struct _pkg2_hdr_t
{
2024-03-27 08:17:56 +00:00
u8 ctr[0x10];
u8 sec_ctr[0x40];
2018-05-01 06:15:48 +01:00
u32 magic;
u32 base;
u32 pad0;
u8 pkg2_ver;
u8 bl_ver;
2018-05-01 06:15:48 +01:00
u16 pad1;
u32 sec_size[4];
u32 sec_off[4];
2024-03-27 08:17:56 +00:00
u8 sec_sha256[0x80];
u8 data[];
2018-05-01 06:15:48 +01:00
} pkg2_hdr_t;
typedef struct _pkg2_ini1_t
{
u32 magic;
u32 size;
u32 num_procs;
u32 pad;
} pkg2_ini1_t;
typedef struct _pkg2_kip1_sec_t
{
u32 offset;
u32 size_decomp;
u32 size_comp;
u32 attrib;
} pkg2_kip1_sec_t;
#define KIP1_NUM_SECTIONS 6
typedef struct _pkg2_kip1_t
{
/* 0x000 */ u32 magic;
2024-03-27 08:17:56 +00:00
/* 0x004*/ u8 name[12];
/* 0x010 */ u64 tid;
/* 0x018 */ u32 proc_cat;
/* 0x01C */ u8 main_thrd_prio;
/* 0x01D */ u8 def_cpu_core;
/* 0x01E */ u8 res;
/* 0x01F */ u8 flags;
/* 0x020 */ pkg2_kip1_sec_t sections[KIP1_NUM_SECTIONS];
/* 0x080 */ u32 caps[0x20];
/* 0x100 */ u8 data[];
2018-05-01 06:15:48 +01:00
} pkg2_kip1_t;
typedef struct _pkg2_kip1_info_t
{
pkg2_kip1_t *kip1;
u32 size;
link_t link;
} pkg2_kip1_info_t;
typedef struct _pkg2_kernel_id_t
{
2019-04-23 16:17:55 +01:00
u8 hash[8];
2018-07-01 03:03:17 +01:00
kernel_patch_t *kernel_patchset;
} pkg2_kernel_id_t;
typedef struct _kip1_patch_t
{
2024-03-27 08:17:56 +00:00
u32 offset; // section+offset of patch to apply.
u32 length; // In bytes, 0 means last patch.
char *src_data; // That must match.
char *dst_data; // That it gets replaced by.
} kip1_patch_t;
typedef struct _kip1_patchset_t
{
2024-03-27 08:17:56 +00:00
char *name; // NULL means end.
kip1_patch_t *patches; // NULL means not necessary.
} kip1_patchset_t;
typedef struct _kip1_id_t
{
2024-03-27 08:17:56 +00:00
const char *name;
2019-04-23 16:17:55 +01:00
u8 hash[8];
2024-03-27 08:17:56 +00:00
kip1_patchset_t *patchset;
} kip1_id_t;
void pkg2_get_newkern_info(u8 *kern_data);
bool pkg2_parse_kips(link_t *info, pkg2_hdr_t *pkg2, bool *new_pkg2);
2019-09-12 21:08:38 +01:00
int pkg2_has_kip(link_t *info, u64 tid);
2018-05-01 06:15:48 +01:00
void pkg2_replace_kip(link_t *info, u64 tid, pkg2_kip1_t *kip1);
void pkg2_add_kip(link_t *info, pkg2_kip1_t *kip1);
void pkg2_merge_kip(link_t *info, pkg2_kip1_t *kip1);
2020-04-30 01:25:22 +01:00
void pkg2_get_ids(kip1_id_t **ids, u32 *entries);
2024-03-27 08:17:56 +00:00
const char *pkg2_patch_kips(link_t *info, char *patch_names);
2018-05-01 06:15:48 +01:00
2019-04-23 16:17:55 +01:00
const pkg2_kernel_id_t *pkg2_identify(u8 *hash);
pkg2_hdr_t *pkg2_decrypt(void *data, u8 kb, bool is_exo);
2022-01-20 11:34:18 +00:00
void pkg2_build_encrypt(void *dst, void *hos_ctxt, link_t *kips_info, bool is_exo);
2018-05-01 06:15:48 +01:00
#endif