Advertisement
Guest User

patch4.txt

a guest
Jun 18th, 2012
131
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.35 KB | None | 0 0
  1. # BD Region A (US/JP)
  2. # Patches marked with (*1) seem to be unstable. Thanks to drizztbsd and
  3. # RandomUse.
  4. # PL3:
  5. ef48: payload.bin # this is not neccesary,
  6. # just the first QWORD of the payload
  7. # Change region to US... Thanks ps3mrenigma
  8. # Syscall preamble
  9. F380: F821FF51 # stdu %sp, -0xB0(%sp)
  10. F384: 7C0802A6 # mflr %r0
  11. F388: FBC100A0 # std %r30, 0xA0(%sp)
  12. F38C: FBE100A8 # std %r31, 0xA8(%sp)
  13. F390: FBA10098 # std %r29, 0×98(%sp)
  14. F394: F80100C0 # std %r0, 0xC0(%sp)
  15. # capture 0x19004 if not jump to original syscall
  16. F398: 3FE00001 # lis %r31, 1
  17. F39C: 63FF9004 # ori %r31, %r31, 0×9004
  18. F3A0: 7C1F1800 # cmpw %r31, %r3
  19. F3A4: 4082003C # bne _orig_syscall
  20. # Force US - Retail
  21. F3A8: 3BC00084 # li %r30, 0×84
  22. F3AC: 3BA00001 # li %r29, 1
  23. F3B0: 9BA40001 # stb %r29, 1(%r4)
  24. F3B4: 9BC40003 # stb %r30, 3(%r4)
  25. F3B8: 9BA40005 # stb %r29, 5(%r4)
  26. F3BC: 9BA40007 # stb %r29, 7(%r4)
  27. F3C0: 38600000 # li %r3, 0
  28. # Restore STACK
  29. F3C4: E80100C0 # ld %r0, 0xC0(%sp)
  30. F3C8: EBA10098 # ld %r29, 0×98(%sp)
  31. F3CC: EBE100A8 # ld %r31, 0xA8(%sp)
  32. F3D0: EBC100A0 # ld %r30, 0xA0(%sp)
  33. F3D4: 7C0803A6 # mtlr %r0
  34. F3D8: 382100B0 # addi %sp, %sp, 0xB0
  35. F3DC: 4E800020 # blr
  36. F3E0: 4823ED28 # b syscall0x363
  37. 31EB1C: 0000F380 #syscall 0x363 descriptor
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement