Update the ios_call to singal the IOS to move on after doing the kernel exploit

This commit is contained in:
Maschell 2019-11-18 11:37:24 +01:00
parent b971891f28
commit d8ee5c553b

View File

@ -23,12 +23,13 @@ void OSRestartGame(int,char**);
int main(int argc, char **argv) {
WHBLogUdpInit();
if(CheckKernelExploit()) {
// When the kernel exploit is set up successfully, we signal the rpx redirecting to move on.
// When the kernel exploit is set up successfully, we signal the ios to move on.
int mcpFd = IOS_Open("/dev/mcp", (IOSOpenMode)0);
if(mcpFd >= 0) {
int in = 0xFD;//IPC_CUSTOM_MEN_RPX_HOOK_COMPLETED;
int out = 0;
const char * path = "done";
IOS_Ioctl(mcpFd, 100, (void*)path, strlen(path), &out, sizeof(out));
IOS_Ioctl(mcpFd, 100, &in, sizeof(in), &out, sizeof(out));
IOS_Close(mcpFd);
}
}