Esempio n. 1
0
int sys8_mamba(void)
{
    if(sys8_disable_all) return -1;

    lv2syscall4(SYSCALL_MAMBA, SYSCALL8_OPCODE_GET_MAMBA, 0ULL, 0ULL, 0ULL);
    return_to_user_prog(uint64_t);
}
Esempio n. 2
0
static u64 syscall_40(u64 cmd, u64 arg)
{
    lv2syscall2(40, cmd, arg);

    return_to_user_prog(u64);
    
}
Esempio n. 3
0
int sys8_mamba_version(uint16_t *version)
{
    if(sys8_disable_all) return -1;

    lv2syscall4(SYSCALL_MAMBA, SYSCALL8_OPCODE_GET_VERSION2, (uint64_t)(uint32_t)version, 0ULL, 0ULL);
    return_to_user_prog(uint64_t);
}
u32 reboot_sys(string reboottype)
{
	uint16_t op;

	if (reboottype=="soft") op=0x200;
	else op=0x1200;
	lv2syscall4(379,op,0,0,0);
	return_to_user_prog(u32);
}
Esempio n. 5
0
static uint64_t syscall_sk1e(register uint64_t cmd, register uint64_t param1, register  uint64_t param2, register  uint64_t param3)
{
    if(sys8_disable_all) return -1ULL;

#ifdef WITH_SYS8ASM
    __asm__ volatile ("li      11, 0x8\n\t" "sc\n\t":"=r" (cmd), "=r"(param1), "=r"(param2), "=r"(param3)
                      :"r"(cmd), "r"(param1), "r"(param2), "r"(param3)
                      :"%r0", "%r12", "%lr", "%ctr", "%xer", "%cr0", "%cr1", "%cr5", "%cr6", "%cr7", "memory");
    return cmd;
#else
    lv2syscall4(SYSCALL_SK1E, cmd, param1, param2, param3);
    return_to_user_prog(uint64_t);
#endif
}
Esempio n. 6
0
uint64_t peekq(uint64_t addr)
{
    system_call_1(6, addr);
    return_to_user_prog(uint64_t);
}
Esempio n. 7
0
static u64 lv2peek(u64 addr) 
{ 
    lv2syscall1(6, (u64) addr);
    return_to_user_prog(u64);

}
s32 lv2_get_target_type(uint64_t *type)
{
	lv2syscall1(985, (uint64_t) type);
	return_to_user_prog(s32);
}
s32 sysFsUnmount(const char* PATH_TO_UNMOUNT)
{
	lv2syscall1(838, (u64)PATH_TO_UNMOUNT);
	return_to_user_prog(s32);
}
Esempio n. 10
0
s32 encrypt_with_portability (int mode, char *iv, char *data) {
  lv2syscall5 (862, 0x200C, mode, (u64)iv, (u64)data, 0);
  return_to_user_prog(s32);
}
s32 lv2_get_platform_info(struct platform_info *info)
{
	lv2syscall1(387, (uint64_t) info);
	return_to_user_prog(s32);
}
Esempio n. 12
0
u64 lv2poke(u64 addr, u64 value) 
{ 
    lv2syscall2(7, (u64) addr, (u64) value); 
    return_to_user_prog(u64);
}
Esempio n. 13
0
s32 get_ps_id (CellSsOpenPSID *v) {
  lv2syscall1 (872, (u64)v);
  return_to_user_prog(s32);
}
Esempio n. 14
0
s32 encrypt (int mode, char *iv, char *data) {
  lv2syscall5 (862, 0x200A, mode, (u64)iv, (u64)data, 0);
  return_to_user_prog(s32);
}
Esempio n. 15
0
static u64 lv1poke(u64 addr, u64 value)
{
    lv2syscall2(9, (u64) addr, (u64) value);
    return_to_user_prog(u64);
}
s32 sysFsMount(const char* MOUNT_POINT, const char* TYPE_OF_FILESYSTEM, const char* PATH_TO_MOUNT, int IF_READ_ONLY)
{
	lv2syscall8(837, (u64)MOUNT_POINT, (u64)TYPE_OF_FILESYSTEM, (u64)PATH_TO_MOUNT, 0, IF_READ_ONLY, 0, 0, 0);
	return_to_user_prog(s32);
}
Esempio n. 17
0
static u64 peekq(u64 addr)
{
    lv2syscall1(6, addr);
    return_to_user_prog(u64);
}
Esempio n. 18
0
s32 get_device_id (char *v) {
  lv2syscall2 (867, 0x19003, (u64)v);
  return_to_user_prog(s32);
}