@@ -33,68 +33,6 @@ extern "C"
33
33
int __sys_is_development_mode ();
34
34
}
35
35
36
- #pragma region Testing code
37
- // void dump_self_to_client(int client)
38
- // {
39
- // int ret;
40
- // uint64_t size;
41
- // int write_ret;
42
- // void *libkernel_data;
43
-
44
- // // Try to decrypt libkernel
45
- // ret = decrypt_self("/system/common/lib/libkernel.sprx", &libkernel_data, &size);
46
- // SOCK_LOG("[+] decrypt test: 0x%x (%p, size = 0x%lx)\n", ret, libkernel_data, size);
47
-
48
- // write_ret = write(client, libkernel_data, size);
49
- // if (write_ret < 0)
50
- // return;
51
- // SOCK_LOG("[+] wrote 0x%x bytes\n", write_ret);
52
-
53
- // close(client);
54
- // SOCK_LOG("[+] Done\n");
55
- // }
56
-
57
- // int run_dump_server(int port)
58
- // {
59
- // int s;
60
- // int client;
61
- // struct sockaddr_in sockaddr;
62
-
63
- // s = socket(AF_INET, SOCK_STREAM, 0);
64
- // bzero(&sockaddr, sizeof(sockaddr));
65
-
66
- // sockaddr.sin_family = AF_INET;
67
- // sockaddr.sin_port = htons(port);
68
- // sockaddr.sin_addr.s_addr = INADDR_ANY;
69
-
70
- // if (bind(s, (const struct sockaddr *) &sockaddr, sizeof(sockaddr)) < 0) {
71
- // SOCK_LOG("[!] failed to bind server\n");
72
- // return -1;
73
- // }
74
-
75
- // if (listen(s, 5) < 0) {
76
- // SOCK_LOG("[!] failed to listen on server\n");
77
- // return -1;
78
- // }
79
-
80
- // SOCK_LOG("[SRV] dump server is now running (port: %d)...\n", port);
81
-
82
- // // Accept clients
83
- // for (;;) {
84
- // client = accept(s, 0, 0);
85
- // SOCK_LOG("[SRV] accepted a client = %d\n", client);
86
-
87
- // if (client > 0) {
88
- // //dump_kernel_to_client(client);
89
- // dump_self_to_client(client);
90
- // }
91
- // }
92
-
93
- // return 0;
94
- // }
95
-
96
- #pragma endregion
97
-
98
36
void dump_kernel_to_client (int client)
99
37
{
100
38
int write_ret;
@@ -135,8 +73,8 @@ void dump_kernel_to_client(int client)
135
73
int main ()
136
74
{
137
75
int ret;
138
- int debug_sock = -1 ;
139
- struct sockaddr_in addr;
76
+ int debug_sock = -1 ;
77
+ struct sockaddr_in addr;
140
78
uint64_t kernel_pmap;
141
79
uint64_t pte_addr;
142
80
uint64_t pde_addr;
@@ -146,26 +84,26 @@ int main()
146
84
// Set shellcore auth ID
147
85
kernel_set_ucred_authid (getpid (), 0x4800000000000007 );
148
86
149
- // Open a debug socket if enabled
150
- if (PC_DEBUG_ENABLED) {
151
- debug_sock = socket (AF_INET, SOCK_STREAM, 0 );
152
- if (debug_sock < 0 ) {
153
- return 0xDEAD0001 ;
154
- }
87
+ // Open a debug socket if enabled
88
+ if (PC_DEBUG_ENABLED) {
89
+ debug_sock = socket (AF_INET, SOCK_STREAM, 0 );
90
+ if (debug_sock < 0 ) {
91
+ return 0xDEAD0001 ;
92
+ }
155
93
156
- inet_pton (AF_INET, PC_DEBUG_IP, &addr.sin_addr );
157
- addr.sin_family = AF_INET;
158
- addr.sin_len = sizeof (addr);
159
- addr.sin_port = htons (PC_DEBUG_PORT);
94
+ inet_pton (AF_INET, PC_DEBUG_IP, &addr.sin_addr );
95
+ addr.sin_family = AF_INET;
96
+ addr.sin_len = sizeof (addr);
97
+ addr.sin_port = htons (PC_DEBUG_PORT);
160
98
161
- ret = connect (debug_sock, (const struct sockaddr *) &addr, sizeof (addr));
162
- if (ret < 0 ) {
163
- return 0xDEAD0002 ;
164
- }
99
+ ret = connect (debug_sock, (const struct sockaddr *) &addr, sizeof (addr));
100
+ if (ret < 0 ) {
101
+ return 0xDEAD0002 ;
102
+ }
165
103
166
- SOCK_LOG (" [!] debug socket connected\n " );
104
+ SOCK_LOG (" [!] debug socket connected\n " );
167
105
g_debug_sock = debug_sock;
168
- }
106
+ }
169
107
170
108
// Jailbreak
171
109
kernel_set_proc_rootdir (getpid (), kernel_get_root_vnode ());
@@ -239,10 +177,7 @@ int main()
239
177
240
178
SOCK_LOG (" [+] Aft. hook is_development_mode = 0x%x\n " , __sys_is_development_mode ());
241
179
242
- ret = sceKernelLoadStartModule ((char *) " /data/libExample.prx" , 0 , NULL , 0 , NULL , NULL );
243
- SOCK_LOG (" [+] load fself: 0x%x\n " , ret);
244
-
245
- // run_self_server(9005);
180
+ run_self_server (9004 );
246
181
// run_dump_server(9003);
247
182
reset_mirrors ();
248
183
return 0 ;
0 commit comments