aboutsummaryrefslogtreecommitdiff
path: root/taihen-user.c
diff options
context:
space:
mode:
Diffstat (limited to 'taihen-user.c')
-rw-r--r--taihen-user.c26
1 files changed, 13 insertions, 13 deletions
diff --git a/taihen-user.c b/taihen-user.c
index 03ad105..a1acf65 100644
--- a/taihen-user.c
+++ b/taihen-user.c
@@ -382,7 +382,7 @@ SceUID taiLoadKernelModule(const char *path, int flags, void *opt) {
int state;
pid = sceKernelGetProcessId();
- if (sceSblACMgrIsShell(0)) {
+ if (sceSblACMgrIsSystemProgram(0)) {
if (opt == NULL) {
if (sceKernelStrncpyUserToKernel(k_path, (uintptr_t)path, MAX_NAME_LEN) < MAX_NAME_LEN) {
state = shift_tpidruro();
@@ -427,7 +427,7 @@ int taiStartKernelModuleForUser(SceUID modid, tai_module_args_t *args, void *opt
int state;
pid = sceKernelGetProcessId();
- if (sceSblACMgrIsShell(0)) {
+ if (sceSblACMgrIsSystemProgram(0)) {
kargs.size = 0;
sceKernelMemcpyUserToKernel(&kargs, (uintptr_t)args, sizeof(kargs));
if (kargs.size == sizeof(kargs)) {
@@ -481,7 +481,7 @@ SceUID taiLoadStartKernelModuleForUser(const char *path, tai_module_args_t *args
int state;
pid = sceKernelGetProcessId();
- if (sceSblACMgrIsShell(0)) {
+ if (sceSblACMgrIsSystemProgram(0)) {
kargs.size = 0;
sceKernelMemcpyUserToKernel(&kargs, (uintptr_t)args, sizeof(kargs));
if (kargs.size == sizeof(kargs)) {
@@ -533,7 +533,7 @@ SceUID taiLoadStartModuleForPidForUser(const char *path, tai_module_args_t *args
int state;
- if (sceSblACMgrIsShell(0)) {
+ if (sceSblACMgrIsSystemProgram(0)) {
kargs.size = 0;
sceKernelMemcpyUserToKernel(&kargs, (uintptr_t)args, sizeof(kargs));
if (kargs.size == sizeof(kargs)) {
@@ -588,7 +588,7 @@ int taiStopKernelModuleForUser(SceUID modid, tai_module_args_t *args, void *opt,
int state;
pid = sceKernelGetProcessId();
- if (sceSblACMgrIsShell(0)) {
+ if (sceSblACMgrIsSystemProgram(0)) {
kargs.size = 0;
sceKernelMemcpyUserToKernel(&kargs, (uintptr_t)args, sizeof(kargs));
if (kargs.size == sizeof(kargs)) {
@@ -642,7 +642,7 @@ int taiUnloadKernelModule(SceUID modid, int flags, void *opt) {
int state;
pid = sceKernelGetProcessId();
- if (sceSblACMgrIsShell(0)) {
+ if (sceSblACMgrIsSystemProgram(0)) {
if (opt == NULL) {
kid = sceKernelKernelUidForUserUid(pid, modid);
if (kid >= 0) {
@@ -687,7 +687,7 @@ int taiStopUnloadKernelModuleForUser(SceUID modid, tai_module_args_t *args, void
int state;
pid = sceKernelGetProcessId();
- if (sceSblACMgrIsShell(0)) {
+ if (sceSblACMgrIsSystemProgram(0)) {
kargs.size = 0;
sceKernelMemcpyUserToKernel(&kargs, (uintptr_t)args, sizeof(kargs));
if (kargs.size == sizeof(kargs)) {
@@ -744,7 +744,7 @@ int taiStopModuleForPidForUser(SceUID modid, tai_module_args_t *args, void *opt,
SceUID kid;
int state;
- if (sceSblACMgrIsShell(0)) {
+ if (sceSblACMgrIsSystemProgram(0)) {
kargs.size = 0;
sceKernelMemcpyUserToKernel(&kargs, (uintptr_t)args, sizeof(kargs));
if (kargs.size == sizeof(kargs)) {
@@ -796,7 +796,7 @@ int taiUnloadModuleForPid(SceUID pid, SceUID modid, int flags, void *opt) {
int ret;
int state;
- if (sceSblACMgrIsShell(0)) {
+ if (sceSblACMgrIsSystemProgram(0)) {
if (opt == NULL) {
kid = sceKernelKernelUidForUserUid(pid, modid);
if (kid >= 0) {
@@ -839,7 +839,7 @@ int taiStopUnloadModuleForPidForUser(SceUID modid, tai_module_args_t *args, void
SceUID kid;
int state;
- if (sceSblACMgrIsShell(0)) {
+ if (sceSblACMgrIsSystemProgram(0)) {
kargs.size = 0;
sceKernelMemcpyUserToKernel(&kargs, (uintptr_t)args, sizeof(kargs));
if (kargs.size == sizeof(kargs)) {
@@ -917,7 +917,7 @@ int taiGetModuleExportFunc(const char *modname, uint32_t libnid, uint32_t funcni
int taiMemcpyUserToKernel(void *kernel_dst, const void *user_src, size_t len) {
int ret;
- if (sceSblACMgrIsShell(0)) {
+ if (sceSblACMgrIsSystemProgram(0)) {
ret = 0;
} else {
ret = TAI_ERROR_NOT_ALLOWED;
@@ -946,7 +946,7 @@ int taiMemcpyUserToKernel(void *kernel_dst, const void *user_src, size_t len) {
int taiMemcpyKernelToUser(void *user_dst, const void *kernel_src, size_t len) {
int ret;
- if (sceSblACMgrIsShell(0)) {
+ if (sceSblACMgrIsSystemProgram(0)) {
ret = 0;
} else {
ret = TAI_ERROR_NOT_ALLOWED;
@@ -970,7 +970,7 @@ int taiMemcpyKernelToUser(void *user_dst, const void *kernel_src, size_t len) {
int taiReloadConfig(void) {
int ret;
- if (sceSblACMgrIsShell(0)) {
+ if (sceSblACMgrIsSystemProgram(0)) {
ret = taiReloadConfigForKernel(0, 0);
} else {
ret = TAI_ERROR_NOT_ALLOWED;