mirror of
https://github.com/wiidev/usbloadergx.git
synced 2024-11-29 06:34:17 +01:00
0e5bb13173
*fixed crash when installing on ntfs *fixed a few bugs with language setting for games
409 lines
12 KiB
C
409 lines
12 KiB
C
/*
|
|
* Copyright (C) 2008 Nuke (wiinuke@gmail.com)
|
|
*
|
|
* this file is part of GeckoOS for USB Gecko
|
|
* http://www.usbgecko.com
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
*/
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <gccore.h>
|
|
#include <sys/unistd.h>
|
|
|
|
#include "usbloader/apploader.h"
|
|
#include "patchcode.h"
|
|
#include "settings/SettingsEnums.h"
|
|
#include "FileOperations/fileops.h"
|
|
#include "fst.h"
|
|
|
|
//#include "sd.h"
|
|
//#include "fwrite_patch.h"
|
|
//#include "fwrite_patch_slota.h"
|
|
//#include "main.h"
|
|
|
|
extern const char * CheatFilepath;
|
|
|
|
extern void patchhook(u32 address, u32 len);
|
|
extern void patchhook2(u32 address, u32 len);
|
|
extern void patchhook3(u32 address, u32 len);
|
|
|
|
extern void multidolpatchone(u32 address, u32 len);
|
|
extern void multidolpatchtwo(u32 address, u32 len);
|
|
|
|
extern void regionfreejap(u32 address, u32 len);
|
|
extern void regionfreeusa(u32 address, u32 len);
|
|
extern void regionfreepal(u32 address, u32 len);
|
|
|
|
extern void removehealthcheck(u32 address, u32 len);
|
|
|
|
extern void copyflagcheck1(u32 address, u32 len);
|
|
extern void copyflagcheck2(u32 address, u32 len);
|
|
extern void copyflagcheck3(u32 address, u32 len);
|
|
extern void copyflagcheck4(u32 address, u32 len);
|
|
extern void copyflagcheck5(u32 address, u32 len);
|
|
|
|
extern void patchupdatecheck(u32 address, u32 len);
|
|
|
|
extern void movedvdhooks(u32 address, u32 len);
|
|
|
|
extern void multidolhook(u32 address);
|
|
extern void langvipatch(u32 address, u32 len, u8 langbyte);
|
|
extern void vipatch(u32 address, u32 len);
|
|
|
|
static const u32 multidolpatch1[2] = { 0x3C03FFB4, 0x28004F43 };
|
|
|
|
static const u32 healthcheckhook[2] = { 0x41810010, 0x881D007D };
|
|
|
|
static const u32 updatecheckhook[3] = { 0x80650050, 0x80850054, 0xA0A50058 };
|
|
|
|
static const u32 multidolpatch2[2] = { 0x3F608000, 0x807B0018 };
|
|
|
|
static const u32 recoveryhooks[3] = { 0xA00100AC, 0x5400073E, 0x2C00000F };
|
|
|
|
static const u32 nocopyflag1[3] = { 0x540007FF, 0x4182001C, 0x80630068 };
|
|
|
|
static const u32 nocopyflag2[3] = { 0x540007FF, 0x41820024, 0x387E12E2 };
|
|
|
|
// this one is for the GH3 and VC saves
|
|
//static const u32 nocopyflag3[5] = {
|
|
// 0x2C030000, 0x40820010, 0x88010020, 0x28000002, 0x41820234
|
|
//};
|
|
|
|
static const u32 nocopyflag3[5] = { 0x2C030000, 0x41820200, 0x48000058, 0x38610100 };
|
|
// this removes the display warning for no copy VC and GH3 saves
|
|
static const u32 nocopyflag4[4] = { 0x80010008, 0x2C000000, 0x4182000C, 0x3BE00001 };
|
|
|
|
static const u32 nocopyflag5[3] = { 0x801D0024, 0x540007FF, 0x41820024 };
|
|
|
|
static const u32 movedvdpatch[3] = { 0x2C040000, 0x41820120, 0x3C608109 };
|
|
|
|
static const u32 regionfreehooks[5] = { 0x7C600774, 0x2C000001, 0x41820030, 0x40800010, 0x2C000000 };
|
|
|
|
static const u32 cIOScode[16] = { 0x7f06c378, 0x7f25cb78, 0x387e02c0, 0x4cc63182 };
|
|
|
|
static const u32 cIOSblock[16] = { 0x2C1800F9, 0x40820008, 0x3B000024 };
|
|
|
|
static const u32 fwritepatch[8] = { 0x9421FFD0, 0x7C0802A6, 0x90010034, 0xBF210014, 0x7C9B2378, 0x7CDC3378, 0x7C7A1B78,
|
|
0x7CB92B78 // bushing fwrite
|
|
};
|
|
|
|
static const u32 vipatchcode[3] = { 0x4182000C, 0x4180001C, 0x48000018 };
|
|
|
|
const u32 viwiihooks[4] = { 0x7CE33B78, 0x38870034, 0x38A70038, 0x38C7004C };
|
|
|
|
const u32 kpadhooks[4] = { 0x9A3F005E, 0x38AE0080, 0x389FFFFC, 0x7E0903A6 };
|
|
|
|
const u32 kpadoldhooks[6] = { 0x801D0060, 0x901E0060, 0x801D0064, 0x901E0064, 0x801D0068, 0x901E0068 };
|
|
|
|
const u32 joypadhooks[4] = { 0x3AB50001, 0x3A73000C, 0x2C150004, 0x3B18000C };
|
|
|
|
const u32 gxdrawhooks[4] = { 0x3CA0CC01, 0x38000061, 0x3C804500, 0x98058000 };
|
|
|
|
const u32 gxflushhooks[4] = { 0x90010014, 0x800305FC, 0x2C000000, 0x41820008 };
|
|
|
|
const u32 ossleepthreadhooks[4] = { 0x90A402E0, 0x806502E4, 0x908502E4, 0x2C030000 };
|
|
|
|
const u32 axnextframehooks[4] = { 0x3800000E, 0x7FE3FB78, 0xB0050000, 0x38800080 };
|
|
|
|
const u32 wpadbuttonsdownhooks[4] = { 0x7D6B4A14, 0x816B0010, 0x7D635B78, 0x4E800020 };
|
|
|
|
const u32 wpadbuttonsdown2hooks[4] = { 0x7D6B4A14, 0x800B0010, 0x7C030378, 0x4E800020 };
|
|
|
|
const u32 multidolhooks[4] = { 0x7C0004AC, 0x4C00012C, 0x7FE903A6, 0x4E800420 };
|
|
|
|
const u32 multidolchanhooks[4] = { 0x4200FFF4, 0x48000004, 0x38800000, 0x4E800020 };
|
|
|
|
const u32 langpatch[3] = { 0x7C600775, 0x40820010, 0x38000000 };
|
|
|
|
static const u32 oldpatch002[3] = { 0x2C000000, 0x40820214, 0x3C608000 };
|
|
|
|
static const u32 newpatch002[3] = { 0x2C000000, 0x48000214, 0x3C608000 };
|
|
|
|
//---------------------------------------------------------------------------------
|
|
bool dogamehooks(void *addr, u32 len)
|
|
//---------------------------------------------------------------------------------
|
|
{
|
|
if (!CheatFilepath) return false;
|
|
|
|
//this is temporary since the screen freezes without a file loaded
|
|
char filepath[150];
|
|
char GameId[10];
|
|
memcpy(GameId, (u8 *) 0x80000000, 6);
|
|
GameId[6] = 0;
|
|
sprintf(filepath, "%s%s.gct", CheatFilepath, GameId);
|
|
|
|
if (!CheckFile(filepath)) return false;
|
|
|
|
//TODO for oggzee: when using Ocarina check if a hook as patched
|
|
|
|
hooktype = 1; // TODO for oggzee: Create an option for hooktype
|
|
/*
|
|
0 No Hook
|
|
1 VBI
|
|
2 KPAD read
|
|
3 Joypad Hook
|
|
4 GXDraw Hook
|
|
5 GXFlush Hook
|
|
6 OSSleepThread Hook
|
|
7 AXNextFrame Hook
|
|
*/
|
|
|
|
void *addr_start = addr;
|
|
void *addr_end = addr + len;
|
|
bool hookpatched = false;
|
|
|
|
while (addr_start < addr_end)
|
|
{
|
|
switch (hooktype)
|
|
{
|
|
|
|
case 0x00:
|
|
hookpatched = true;
|
|
break;
|
|
|
|
case 0x01:
|
|
if (memcmp(addr_start, viwiihooks, sizeof(viwiihooks)) == 0)
|
|
{
|
|
patchhook((u32) addr_start, len);
|
|
hookpatched = true;
|
|
}
|
|
if (memcmp(addr_start, multidolhooks, sizeof(multidolhooks)) == 0)
|
|
{
|
|
multidolhook((u32) addr_start + sizeof(multidolhooks) - 4);
|
|
hookpatched = true;
|
|
}
|
|
break;
|
|
|
|
case 0x02:
|
|
|
|
if (memcmp(addr_start, kpadhooks, sizeof(kpadhooks)) == 0)
|
|
{
|
|
patchhook((u32) addr_start, len);
|
|
hookpatched = true;
|
|
}
|
|
|
|
if (memcmp(addr_start, kpadoldhooks, sizeof(kpadoldhooks)) == 0)
|
|
{
|
|
patchhook((u32) addr_start, len);
|
|
hookpatched = true;
|
|
}
|
|
if (memcmp(addr_start, multidolhooks, sizeof(multidolhooks)) == 0)
|
|
{
|
|
multidolhook((u32) addr_start + sizeof(multidolhooks) - 4);
|
|
hookpatched = true;
|
|
}
|
|
break;
|
|
|
|
case 0x03:
|
|
|
|
if (memcmp(addr_start, joypadhooks, sizeof(joypadhooks)) == 0)
|
|
{
|
|
patchhook((u32) addr_start, len);
|
|
hookpatched = true;
|
|
}
|
|
if (memcmp(addr_start, multidolhooks, sizeof(multidolhooks)) == 0)
|
|
{
|
|
multidolhook((u32) addr_start + sizeof(multidolhooks) - 4);
|
|
hookpatched = true;
|
|
}
|
|
break;
|
|
|
|
case 0x04:
|
|
|
|
if (memcmp(addr_start, gxdrawhooks, sizeof(gxdrawhooks)) == 0)
|
|
{
|
|
patchhook((u32) addr_start, len);
|
|
hookpatched = true;
|
|
}
|
|
if (memcmp(addr_start, multidolhooks, sizeof(multidolhooks)) == 0)
|
|
{
|
|
multidolhook((u32) addr_start + sizeof(multidolhooks) - 4);
|
|
hookpatched = true;
|
|
}
|
|
break;
|
|
|
|
case 0x05:
|
|
|
|
if (memcmp(addr_start, gxflushhooks, sizeof(gxflushhooks)) == 0)
|
|
{
|
|
patchhook((u32) addr_start, len);
|
|
hookpatched = true;
|
|
}
|
|
if (memcmp(addr_start, multidolhooks, sizeof(multidolhooks)) == 0)
|
|
{
|
|
multidolhook((u32) addr_start + sizeof(multidolhooks) - 4);
|
|
hookpatched = true;
|
|
}
|
|
break;
|
|
|
|
case 0x06:
|
|
|
|
if (memcmp(addr_start, ossleepthreadhooks, sizeof(ossleepthreadhooks)) == 0)
|
|
{
|
|
patchhook((u32) addr_start, len);
|
|
hookpatched = true;
|
|
}
|
|
if (memcmp(addr_start, multidolhooks, sizeof(multidolhooks)) == 0)
|
|
{
|
|
multidolhook((u32) addr_start + sizeof(multidolhooks) - 4);
|
|
hookpatched = true;
|
|
}
|
|
break;
|
|
|
|
case 0x07:
|
|
|
|
if (memcmp(addr_start, axnextframehooks, sizeof(axnextframehooks)) == 0)
|
|
{
|
|
patchhook((u32) addr_start, len);
|
|
hookpatched = true;
|
|
}
|
|
if (memcmp(addr_start, multidolhooks, sizeof(multidolhooks)) == 0)
|
|
{
|
|
multidolhook((u32) addr_start + sizeof(multidolhooks) - 4);
|
|
hookpatched = true;
|
|
}
|
|
break;
|
|
|
|
case 0x08:
|
|
|
|
//if(memcmp(addr_start, customhook, customhooksize)==0)
|
|
//{
|
|
// patchhook((u32)addr_start, len);
|
|
// hookpatched = true;
|
|
//}
|
|
if (memcmp(addr_start, multidolhooks, sizeof(multidolhooks)) == 0)
|
|
{
|
|
multidolhook((u32) addr_start + sizeof(multidolhooks) - 4);
|
|
hookpatched = true;
|
|
}
|
|
break;
|
|
}
|
|
addr_start += 4;
|
|
}
|
|
return hookpatched;
|
|
}
|
|
|
|
// Not used yet, for patching DOL once loaded into memory and befor execution
|
|
/*
|
|
void patchdol(void *addr, u32 len)
|
|
{
|
|
|
|
void *addr_start = addr;
|
|
void *addr_end = addr+len;
|
|
|
|
while(addr_start < addr_end)
|
|
{
|
|
if(memcmp(addr_start, wpadlibogc, sizeof(wpadlibogc))==0) {
|
|
// printf("\n\n\n");
|
|
// printf("found at address %x\n", addr_start);
|
|
// sleep(10);
|
|
// patchhookdol((u32)addr_start, len);
|
|
patched = 1;
|
|
break;
|
|
}
|
|
addr_start += 4;
|
|
}
|
|
}
|
|
*/
|
|
void langpatcher(void *addr, u32 len, u8 languageChoice)
|
|
{
|
|
u8 ocarinaLangPatchByte = 1;
|
|
switch (languageChoice)
|
|
{
|
|
case JAPANESE:
|
|
ocarinaLangPatchByte = 0x00;
|
|
break;
|
|
case ENGLISH:
|
|
ocarinaLangPatchByte = 0x01;
|
|
break;
|
|
case GERMAN:
|
|
ocarinaLangPatchByte = 0x02;
|
|
break;
|
|
case FRENCH:
|
|
ocarinaLangPatchByte = 0x03;
|
|
break;
|
|
case SPANISH:
|
|
ocarinaLangPatchByte = 0x04;
|
|
break;
|
|
case ITALIAN:
|
|
ocarinaLangPatchByte = 0x05;
|
|
break;
|
|
case DUTCH:
|
|
ocarinaLangPatchByte = 0x06;
|
|
break;
|
|
case S_CHINESE:
|
|
ocarinaLangPatchByte = 0x07;
|
|
break;
|
|
case T_CHINESE:
|
|
ocarinaLangPatchByte = 0x08;
|
|
break;
|
|
case KOREAN:
|
|
ocarinaLangPatchByte = 0x09;
|
|
break;
|
|
default:
|
|
return;
|
|
}
|
|
|
|
u8 * addr_start = addr;
|
|
u8 * addr_end = addr + len;
|
|
|
|
while (addr_start < addr_end)
|
|
{
|
|
|
|
if (memcmp(addr_start, langpatch, sizeof(langpatch)) == 0)
|
|
{
|
|
langvipatch((u32) addr_start, len, ocarinaLangPatchByte);
|
|
}
|
|
addr_start += 4;
|
|
}
|
|
}
|
|
/*
|
|
void patchdebug(void *addr, u32 len)
|
|
{
|
|
|
|
void *addr_start = addr;
|
|
void *addr_end = addr+len;
|
|
|
|
while(addr_start < addr_end)
|
|
{
|
|
|
|
if(memcmp(addr_start, fwritepatch, sizeof(fwritepatch))==0) {
|
|
|
|
memcpy(addr_start,fwrite_patch_bin,fwrite_patch_bin_len);
|
|
// apply patch
|
|
}
|
|
addr_start += 4;
|
|
}
|
|
}
|
|
*/
|
|
void vidolpatcher(void *addr, u32 len)
|
|
{
|
|
|
|
void *addr_start = addr;
|
|
void *addr_end = addr + len;
|
|
|
|
while (addr_start < addr_end)
|
|
{
|
|
if (memcmp(addr_start, vipatchcode, sizeof(vipatchcode)) == 0)
|
|
{
|
|
vipatch((u32) addr_start, len);
|
|
}
|
|
addr_start += 4;
|
|
}
|
|
}
|
|
|