2018-10-16 23:54:42 +01:00
|
|
|
/*
|
2020-01-24 10:10:40 +00:00
|
|
|
* Copyright (c) 2018-2020 Atmosphère-NX
|
2018-10-16 23:54:42 +01:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms and conditions of the GNU General Public License,
|
|
|
|
* version 2, as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <dirent.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
#include "utils.h"
|
2019-06-14 14:37:25 +01:00
|
|
|
#include "exocfg.h"
|
2018-10-16 23:54:42 +01:00
|
|
|
#include "se.h"
|
2018-10-17 01:21:08 +01:00
|
|
|
#include "lib/log.h"
|
2018-10-16 23:54:42 +01:00
|
|
|
#include "ips.h"
|
|
|
|
|
|
|
|
/* IPS Patching adapted from Luma3DS (https://github.com/AuroraWright/Luma3DS/blob/master/sysmodules/loader/source/patcher.c) */
|
|
|
|
|
|
|
|
#define IPS_MAGIC "PATCH"
|
|
|
|
#define IPS_TAIL "EOF"
|
|
|
|
|
|
|
|
#define IPS32_MAGIC "IPS32"
|
|
|
|
#define IPS32_TAIL "EEOF"
|
|
|
|
|
2018-11-30 12:10:23 +00:00
|
|
|
#define NOGC_PATCH_DIR "default_nogc"
|
|
|
|
static bool g_enable_nogc_patches = false;
|
|
|
|
|
|
|
|
void kip_patches_set_enable_nogc(void) {
|
|
|
|
g_enable_nogc_patches = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool should_ignore_default_patch(const char *patch_dir) {
|
|
|
|
/* This function will ensure that select default patches only get loaded if enabled. */
|
|
|
|
if (!g_enable_nogc_patches && strcmp(patch_dir, NOGC_PATCH_DIR) == 0) {
|
|
|
|
return true;
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-11-30 12:10:23 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool has_patch(const char *dir, const char *subdir, const void *hash, size_t hash_size) {
|
|
|
|
char path[0x301] = {0};
|
|
|
|
int cur_len = 0;
|
|
|
|
cur_len += snprintf(path + cur_len, sizeof(path) - cur_len, "%s/", dir);
|
|
|
|
if (subdir != NULL) {
|
|
|
|
cur_len += snprintf(path + cur_len, sizeof(path) - cur_len, "%s/", subdir);
|
|
|
|
}
|
|
|
|
for (size_t i = 0; i < hash_size; i++) {
|
|
|
|
cur_len += snprintf(path + cur_len, sizeof(path) - cur_len, "%02X", ((const uint8_t *)hash)[i]);
|
|
|
|
}
|
|
|
|
cur_len += snprintf(path + cur_len, sizeof(path) - cur_len, ".ips");
|
|
|
|
if (cur_len >= sizeof(path)) {
|
|
|
|
return false;
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-11-30 12:10:23 +00:00
|
|
|
FILE *f = fopen(path, "rb");
|
|
|
|
if (f != NULL) {
|
|
|
|
fclose(f);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool has_needed_default_kip_patches(uint64_t title_id, const void *hash, size_t hash_size) {
|
|
|
|
if (title_id == 0x0100000000000000ULL && g_enable_nogc_patches) {
|
|
|
|
return has_patch("atmosphere/kip_patches", NOGC_PATCH_DIR, hash, hash_size);
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-11-30 12:10:23 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
/* Applies an IPS/IPS32 patch to memory, disregarding writes to the first prot_size bytes. */
|
|
|
|
static void apply_ips_patch(uint8_t *mem, size_t mem_size, size_t prot_size, bool is_ips32, FILE *f_ips) {
|
|
|
|
uint8_t buffer[4];
|
|
|
|
while (fread(buffer, is_ips32 ? 4 : 3, 1, f_ips) == 1) {
|
|
|
|
if (is_ips32 && memcmp(buffer, IPS32_TAIL, 4) == 0) {
|
|
|
|
break;
|
|
|
|
} else if (!is_ips32 && memcmp(buffer, IPS_TAIL, 3) == 0) {
|
|
|
|
break;
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
/* Offset of patch. */
|
|
|
|
uint32_t patch_offset;
|
|
|
|
if (is_ips32) {
|
|
|
|
patch_offset = (buffer[0] << 24) | (buffer[1] << 16) | (buffer[2] << 8) | buffer[3];
|
|
|
|
} else {
|
|
|
|
patch_offset = (buffer[0] << 16) | (buffer[1] << 8) | (buffer[2]);
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
/* Size of patch. */
|
|
|
|
if (fread(buffer, 2, 1, f_ips) != 1) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
uint32_t patch_size = (buffer[0] << 8) | (buffer[1]);
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
/* Check for RLE encoding. */
|
|
|
|
if (patch_size == 0) {
|
|
|
|
/* Size of RLE. */
|
|
|
|
if (fread(buffer, 2, 1, f_ips) != 1) {
|
|
|
|
break;
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
uint32_t rle_size = (buffer[0] << 8) | (buffer[1]);
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
/* Value for RLE. */
|
|
|
|
if (fread(buffer, 1, 1, f_ips) != 1) {
|
|
|
|
break;
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
if (patch_offset < prot_size) {
|
|
|
|
if (patch_offset + rle_size > prot_size) {
|
|
|
|
uint32_t diff = prot_size - patch_offset;
|
|
|
|
patch_offset += diff;
|
|
|
|
rle_size -= diff;
|
|
|
|
goto IPS_RLE_PATCH_OFFSET_WITHIN_BOUNDS;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
IPS_RLE_PATCH_OFFSET_WITHIN_BOUNDS:
|
|
|
|
if (patch_offset + rle_size > mem_size) {
|
|
|
|
rle_size = mem_size - patch_offset;
|
|
|
|
}
|
|
|
|
memset(mem + patch_offset, buffer[0], rle_size);
|
|
|
|
}
|
|
|
|
} else {
|
2018-10-17 01:21:08 +01:00
|
|
|
uint32_t read_size;
|
2018-10-16 23:54:42 +01:00
|
|
|
if (patch_offset < prot_size) {
|
|
|
|
if (patch_offset + patch_size > prot_size) {
|
|
|
|
uint32_t diff = prot_size - patch_offset;
|
|
|
|
patch_offset += diff;
|
|
|
|
patch_size -= diff;
|
|
|
|
fseek(f_ips, diff, SEEK_CUR);
|
|
|
|
goto IPS_DATA_PATCH_OFFSET_WITHIN_BOUNDS;
|
|
|
|
} else {
|
|
|
|
fseek(f_ips, patch_size, SEEK_CUR);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
IPS_DATA_PATCH_OFFSET_WITHIN_BOUNDS:
|
2018-10-17 01:21:08 +01:00
|
|
|
read_size = patch_size;
|
2018-10-16 23:54:42 +01:00
|
|
|
if (patch_offset + read_size > mem_size) {
|
|
|
|
read_size = mem_size - patch_offset;
|
|
|
|
}
|
|
|
|
if (fread(mem + patch_offset, read_size, 1, f_ips) != 1) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (patch_size > read_size) {
|
|
|
|
fseek(f_ips, patch_size - read_size, SEEK_CUR);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static inline uint8_t hex_nybble_to_u8(const char nybble) {
|
|
|
|
if ('0' <= nybble && nybble <= '9') {
|
|
|
|
return nybble - '0';
|
|
|
|
} else if ('a' <= nybble && nybble <= 'f') {
|
|
|
|
return nybble - 'a' + 0xa;
|
|
|
|
} else {
|
|
|
|
return nybble - 'A' + 0xA;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool name_matches_hash(const char *name, size_t name_len, const void *hash, size_t hash_size) {
|
|
|
|
/* Validate name is hex build id. */
|
|
|
|
for (unsigned int i = 0; i < name_len - 4; i++) {
|
2019-06-30 18:48:16 +01:00
|
|
|
if (isxdigit((unsigned char)name[i]) == 0) {
|
2018-10-16 23:54:42 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Read hash from name. */
|
|
|
|
uint8_t hash_from_name[0x20] = {0};
|
|
|
|
for (unsigned int name_ofs = 0, id_ofs = 0; name_ofs < name_len - 4; id_ofs++) {
|
|
|
|
hash_from_name[id_ofs] |= hex_nybble_to_u8(name[name_ofs++]) << 4;
|
|
|
|
hash_from_name[id_ofs] |= hex_nybble_to_u8(name[name_ofs++]);
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
return memcmp(hash, hash_from_name, hash_size) == 0;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2018-10-17 01:21:08 +01:00
|
|
|
static bool has_ips_patches(const char *dir, const void *hash, size_t hash_size) {
|
2018-10-16 23:54:42 +01:00
|
|
|
bool any_patches = false;
|
2018-10-17 01:21:08 +01:00
|
|
|
char path[0x301] = {0};
|
|
|
|
snprintf(path, sizeof(path) - 1, "%s", dir);
|
|
|
|
DIR *patches_dir = opendir(path);
|
|
|
|
struct dirent *pdir_ent;
|
|
|
|
if (patches_dir != NULL) {
|
|
|
|
/* Iterate over the patches directory to find patch subdirectories. */
|
|
|
|
while ((pdir_ent = readdir(patches_dir)) != NULL && !any_patches) {
|
|
|
|
if (strcmp(pdir_ent->d_name, ".") == 0 || strcmp(pdir_ent->d_name, "..") == 0) {
|
|
|
|
continue;
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-11-30 12:10:23 +00:00
|
|
|
if (should_ignore_default_patch(pdir_ent->d_name)) {
|
|
|
|
continue;
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-17 01:21:08 +01:00
|
|
|
snprintf(path, sizeof(path) - 1, "%s/%s", dir, pdir_ent->d_name);
|
|
|
|
DIR *patch_dir = opendir(path);
|
|
|
|
struct dirent *ent;
|
|
|
|
if (patch_dir != NULL) {
|
|
|
|
/* Iterate over the patch subdirectory to find .ips patches. */
|
|
|
|
while ((ent = readdir(patch_dir)) != NULL && !any_patches) {
|
|
|
|
if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0) {
|
|
|
|
continue;
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-17 01:21:08 +01:00
|
|
|
size_t name_len = strlen(ent->d_name);
|
|
|
|
if ((4 < name_len && name_len <= 0x44) && ((name_len & 1) == 0) && strcmp(ent->d_name + name_len - 4, ".ips") == 0 && name_matches_hash(ent->d_name, name_len, hash, hash_size)) {
|
|
|
|
snprintf(path, sizeof(path) - 1, "%s/%s/%s", dir, pdir_ent->d_name, ent->d_name);
|
|
|
|
FILE *f_ips = fopen(path, "rb");
|
|
|
|
if (f_ips != NULL) {
|
|
|
|
uint8_t header[5];
|
|
|
|
if (fread(header, 5, 1, f_ips) == 1) {
|
|
|
|
if (memcmp(header, IPS_MAGIC, 5) == 0 || memcmp(header, IPS32_MAGIC, 5) == 0) {
|
|
|
|
any_patches = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fclose(f_ips);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
closedir(patch_dir);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
closedir(patches_dir);
|
|
|
|
}
|
|
|
|
|
|
|
|
return any_patches;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void apply_ips_patches(const char *dir, void *mem, size_t mem_size, size_t prot_size, const void *hash, size_t hash_size) {
|
2018-10-16 23:54:42 +01:00
|
|
|
char path[0x301] = {0};
|
|
|
|
snprintf(path, sizeof(path) - 1, "%s", dir);
|
|
|
|
DIR *patches_dir = opendir(path);
|
|
|
|
struct dirent *pdir_ent;
|
|
|
|
if (patches_dir != NULL) {
|
|
|
|
/* Iterate over the patches directory to find patch subdirectories. */
|
|
|
|
while ((pdir_ent = readdir(patches_dir)) != NULL) {
|
|
|
|
if (strcmp(pdir_ent->d_name, ".") == 0 || strcmp(pdir_ent->d_name, "..") == 0) {
|
|
|
|
continue;
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-11-30 12:10:23 +00:00
|
|
|
if (should_ignore_default_patch(pdir_ent->d_name)) {
|
|
|
|
continue;
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
snprintf(path, sizeof(path) - 1, "%s/%s", dir, pdir_ent->d_name);
|
|
|
|
DIR *patch_dir = opendir(path);
|
|
|
|
struct dirent *ent;
|
|
|
|
if (patch_dir != NULL) {
|
|
|
|
/* Iterate over the patch subdirectory to find .ips patches. */
|
|
|
|
while ((ent = readdir(patch_dir)) != NULL) {
|
|
|
|
if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0) {
|
|
|
|
continue;
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
size_t name_len = strlen(ent->d_name);
|
|
|
|
if ((4 < name_len && name_len <= 0x44) && ((name_len & 1) == 0) && strcmp(ent->d_name + name_len - 4, ".ips") == 0 && name_matches_hash(ent->d_name, name_len, hash, hash_size)) {
|
|
|
|
snprintf(path, sizeof(path) - 1, "%s/%s/%s", dir, pdir_ent->d_name, ent->d_name);
|
|
|
|
FILE *f_ips = fopen(path, "rb");
|
|
|
|
if (f_ips != NULL) {
|
|
|
|
uint8_t header[5];
|
|
|
|
if (fread(header, 5, 1, f_ips) == 1) {
|
|
|
|
if (memcmp(header, IPS_MAGIC, 5) == 0) {
|
|
|
|
apply_ips_patch(mem, mem_size, prot_size, false, f_ips);
|
|
|
|
} else if (memcmp(header, IPS32_MAGIC, 5) == 0) {
|
|
|
|
apply_ips_patch(mem, mem_size, prot_size, true, f_ips);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fclose(f_ips);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
closedir(patch_dir);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
closedir(patches_dir);
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
}
|
2018-10-16 23:54:42 +01:00
|
|
|
|
|
|
|
void apply_kernel_ips_patches(void *kernel, size_t kernel_size) {
|
|
|
|
uint8_t hash[0x20];
|
|
|
|
se_calculate_sha256(hash, kernel, kernel_size);
|
|
|
|
apply_ips_patches("atmosphere/kernel_patches", kernel, kernel_size, 0, hash, sizeof(hash));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void kip1_blz_uncompress(void *hdr_end) {
|
2018-10-17 01:21:08 +01:00
|
|
|
uint8_t *u8_hdr_end = (uint8_t *)hdr_end;
|
|
|
|
uint32_t addl_size = ((u8_hdr_end[-4]) << 0) | ((u8_hdr_end[-3]) << 8) | ((u8_hdr_end[-2]) << 16) | ((u8_hdr_end[-1]) << 24);
|
|
|
|
uint32_t header_size = ((u8_hdr_end[-8]) << 0) | ((u8_hdr_end[-7]) << 8) | ((u8_hdr_end[-6]) << 16) | ((u8_hdr_end[-5]) << 24);
|
|
|
|
uint32_t cmp_and_hdr_size = ((u8_hdr_end[-12]) << 0) | ((u8_hdr_end[-11]) << 8) | ((u8_hdr_end[-10]) << 16) | ((u8_hdr_end[-9]) << 24);
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
unsigned char *cmp_start = (unsigned char *)(((uintptr_t)hdr_end) - cmp_and_hdr_size);
|
|
|
|
uint32_t cmp_ofs = cmp_and_hdr_size - header_size;
|
|
|
|
uint32_t out_ofs = cmp_and_hdr_size + addl_size;
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
while (out_ofs) {
|
|
|
|
unsigned char control = cmp_start[--cmp_ofs];
|
|
|
|
for (unsigned int i = 0; i < 8; i++) {
|
|
|
|
if (control & 0x80) {
|
2019-06-19 07:54:53 +01:00
|
|
|
if (cmp_ofs < 2) {
|
2018-10-16 23:54:42 +01:00
|
|
|
fatal_error("KIP1 decompression out of bounds!\n");
|
|
|
|
}
|
|
|
|
cmp_ofs -= 2;
|
|
|
|
uint16_t seg_val = ((unsigned int)cmp_start[cmp_ofs+1] << 8) | cmp_start[cmp_ofs];
|
|
|
|
uint32_t seg_size = ((seg_val >> 12) & 0xF) + 3;
|
|
|
|
uint32_t seg_ofs = (seg_val & 0x0FFF) + 3;
|
|
|
|
if (out_ofs < seg_size) {
|
|
|
|
/* Kernel restricts segment copy to stay in bounds. */
|
|
|
|
seg_size = out_ofs;
|
|
|
|
}
|
|
|
|
out_ofs -= seg_size;
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
for (unsigned int j = 0; j < seg_size; j++) {
|
|
|
|
cmp_start[out_ofs + j] = cmp_start[out_ofs + j + seg_ofs];
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* Copy directly. */
|
|
|
|
if (cmp_ofs < 1) {
|
|
|
|
fatal_error("KIP1 decompression out of bounds!\n");
|
|
|
|
}
|
|
|
|
cmp_start[--out_ofs] = cmp_start[--cmp_ofs];
|
|
|
|
}
|
|
|
|
control <<= 1;
|
|
|
|
if (out_ofs == 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-14 14:37:25 +01:00
|
|
|
kip1_header_t *kip1_uncompress(kip1_header_t *kip, size_t *size) {
|
2018-10-16 23:54:42 +01:00
|
|
|
kip1_header_t new_header = *kip;
|
|
|
|
for (unsigned int i = 0; i < 3; i++) {
|
|
|
|
new_header.section_headers[i].compressed_size = new_header.section_headers[i].out_size;
|
|
|
|
}
|
|
|
|
new_header.flags &= 0xF8;
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
*size = kip1_get_size_from_header(&new_header);
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
unsigned char *new_kip = calloc(1, *size);
|
|
|
|
if (new_kip == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
*((kip1_header_t *)new_kip) = new_header;
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
size_t new_offset = 0x100;
|
|
|
|
size_t old_offset = 0x100;
|
|
|
|
for (unsigned int i = 0; i < 3; i++) {
|
|
|
|
memcpy(new_kip + new_offset, (unsigned char *)kip + old_offset, kip->section_headers[i].compressed_size);
|
|
|
|
if (kip->flags & (1 << i)) {
|
|
|
|
kip1_blz_uncompress(new_kip + new_offset + kip->section_headers[i].compressed_size);
|
|
|
|
}
|
|
|
|
new_offset += kip->section_headers[i].out_size;
|
|
|
|
old_offset += kip->section_headers[i].compressed_size;
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-16 23:54:42 +01:00
|
|
|
return (kip1_header_t *)new_kip;
|
|
|
|
}
|
|
|
|
|
2019-06-14 14:37:25 +01:00
|
|
|
static const uint8_t g_fs_hashes[FS_VER_MAX][0x8] = {
|
|
|
|
"\xde\x9f\xdd\xa4\x08\x5d\xd5\xfe", /* FS_VER_1_0_0 */
|
|
|
|
|
|
|
|
"\xcd\x7b\xbe\x18\xd6\x13\x0b\x28", /* FS_VER_2_0_0 */
|
|
|
|
"\xe7\x66\x92\xdf\xaa\x04\x20\xe9", /* FS_VER_2_0_0_EXFAT */
|
|
|
|
|
|
|
|
"\x0d\x70\x05\x62\x7b\x07\x76\x7c", /* FS_VER_2_1_0 */
|
|
|
|
"\xdb\xd8\x5f\xca\xcc\x19\x3d\xa8", /* FS_VER_2_1_0_EXFAT */
|
|
|
|
|
|
|
|
"\xa8\x6d\xa5\xe8\x7e\xf1\x09\x7b", /* FS_VER_3_0_0 */
|
|
|
|
"\x98\x1c\x57\xe7\xf0\x2f\x70\xf7", /* FS_VER_3_0_0_EXFAT */
|
|
|
|
|
|
|
|
"\x57\x39\x7c\x06\x3f\x10\xb6\x31", /* FS_VER_3_0_1 */
|
|
|
|
"\x07\x30\x99\xd7\xc6\xad\x7d\x89", /* FS_VER_3_0_1_EXFAT */
|
|
|
|
|
|
|
|
"\x06\xe9\x07\x19\x59\x5a\x01\x0c", /* FS_VER_4_0_0 */
|
|
|
|
"\x54\x9b\x0f\x8d\x6f\x72\xc4\xe9", /* FS_VER_4_0_0_EXFAT */
|
|
|
|
|
|
|
|
"\x80\x96\xaf\x7c\x6a\x35\xaa\x82", /* FS_VER_4_1_0 */
|
|
|
|
"\x02\xd5\xab\xaa\xfd\x20\xc8\xb0", /* FS_VER_4_1_0_EXFAT */
|
|
|
|
|
|
|
|
"\xa6\xf2\x7a\xd9\xac\x7c\x73\xad", /* FS_VER_5_0_0 */
|
|
|
|
"\xce\x3e\xcb\xa2\xf2\xf0\x62\xf5", /* FS_VER_5_0_0_EXFAT */
|
|
|
|
|
|
|
|
"\x76\xf8\x74\x02\xc9\x38\x7c\x0f", /* FS_VER_5_1_0 */
|
|
|
|
"\x10\xb2\xd8\x16\x05\x48\x85\x99", /* FS_VER_5_1_0_EXFAT */
|
|
|
|
|
|
|
|
"\x3a\x57\x4d\x43\x61\x86\x19\x1d", /* FS_VER_6_0_0 */
|
|
|
|
"\x33\x05\x53\xf6\xb5\xfb\x55\xc4", /* FS_VER_6_0_0_EXFAT */
|
|
|
|
|
|
|
|
"\x2A\xDB\xE9\x7E\x9B\x5F\x41\x77", /* FS_VER_7_0_0 */
|
|
|
|
"\x2C\xCE\x65\x9C\xEC\x53\x6A\x8E", /* FS_VER_7_0_0_EXFAT */
|
|
|
|
|
|
|
|
"\xB2\xF5\x17\x6B\x35\x48\x36\x4D", /* FS_VER_8_0_0 */
|
|
|
|
"\xDB\xD9\x41\xC0\xC5\x3C\x52\xCC", /* FS_VER_8_0_0_EXFAT */
|
2019-06-19 07:54:53 +01:00
|
|
|
|
|
|
|
"\x6B\x09\xB6\x7B\x29\xC0\x20\x24", /* FS_VER_8_1_0 */
|
|
|
|
"\xB4\xCA\xE1\xF2\x49\x65\xD9\x2E", /* FS_VER_8_1_0_EXFAT */
|
2019-09-12 09:18:58 +01:00
|
|
|
|
|
|
|
"\x46\x87\x40\x76\x1E\x19\x3E\xB7", /* FS_VER_9_0_0 */
|
|
|
|
"\x7C\x95\x13\x76\xE5\xC1\x2D\xF8", /* FS_VER_9_0_0_EXFAT */
|
2019-12-07 21:44:08 +00:00
|
|
|
|
|
|
|
"\xB5\xE7\xA6\x4C\x6F\x5C\x4F\xE3", /* FS_VER_9_1_0 */
|
|
|
|
"\xF1\x96\xD1\x44\xD0\x44\x45\xB6", /* FS_VER_9_1_0_EXFAT */
|
2019-06-14 14:37:25 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
kip1_header_t *apply_kip_ips_patches(kip1_header_t *kip, size_t kip_size, emummc_fs_ver_t *out_fs_ver) {
|
2018-10-16 23:54:42 +01:00
|
|
|
uint8_t hash[0x20];
|
|
|
|
se_calculate_sha256(hash, kip, kip_size);
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2019-06-14 14:37:25 +01:00
|
|
|
if (kip->title_id == FS_TITLE_ID) {
|
|
|
|
bool found = false;
|
|
|
|
for (size_t i = 0; i < FS_VER_MAX; i++) {
|
|
|
|
if (memcmp(hash, g_fs_hashes[i], 0x8) == 0) {
|
|
|
|
found = true;
|
|
|
|
*out_fs_ver = (emummc_fs_ver_t)i;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!found) {
|
|
|
|
fatal_error("[NXBOOT]: Failed to identify FS version...");
|
|
|
|
}
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-11-30 12:10:23 +00:00
|
|
|
if (!has_needed_default_kip_patches(kip->title_id, hash, sizeof(hash))) {
|
|
|
|
fatal_error("[NXBOOT]: Missing default patch for KIP %08x%08x...\n", (uint32_t)(kip->title_id >> 32), (uint32_t)kip->title_id);
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-17 01:21:08 +01:00
|
|
|
if (!has_ips_patches("atmosphere/kip_patches", hash, sizeof(hash))) {
|
2018-10-16 23:54:42 +01:00
|
|
|
return NULL;
|
|
|
|
}
|
2018-10-17 01:21:08 +01:00
|
|
|
|
|
|
|
print(SCREEN_LOG_LEVEL_MANDATORY, "[NXBOOT]: Patching KIP %08x%08x...\n", (uint32_t)(kip->title_id >> 32), (uint32_t)kip->title_id);
|
2019-06-19 07:54:53 +01:00
|
|
|
|
|
|
|
|
2018-10-17 01:21:08 +01:00
|
|
|
size_t uncompressed_kip_size;
|
|
|
|
kip1_header_t *uncompressed_kip = kip1_uncompress(kip, &uncompressed_kip_size);
|
2019-06-19 07:54:53 +01:00
|
|
|
if (uncompressed_kip == NULL) {
|
2018-10-16 23:54:42 +01:00
|
|
|
return NULL;
|
|
|
|
}
|
2019-06-19 07:54:53 +01:00
|
|
|
|
2018-10-17 01:21:08 +01:00
|
|
|
apply_ips_patches("atmosphere/kip_patches", uncompressed_kip, uncompressed_kip_size, 0x100, hash, sizeof(hash));
|
|
|
|
return uncompressed_kip;
|
2018-10-16 23:54:42 +01:00
|
|
|
}
|