1 # Copyright 2011 roto <roto@mozy.org>
2 # This code is licensed to you under the terms of the GNU GPL, version 2;
3 # see file COPYING or http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt
9 .long 0x00000001, 0x00000000, 0x00000000, 0x00000000
10 .long 0x00000000, 0x00000013, 0x0000000d, 0x00000000
11 .long 0x00000002, 0x00000000, 0x000007db, 0x00000000
12 .long 0x00000001, 0x0000029e, 0x0000019d, 0x00050000
13 .long 0x01010008, 0x060a0100, 0x00000001, 0x00000000
14 .long 0x00000000, 0x00000000, 0x00000000, 0x00000000
17 .fill 0xF60 - (. - 0b)
20 # This is necessary for the 2nd exploit (first release) of LSW
24 .fill 0x7860 - (. - 0b)
26 # Insert rest of the save
30 .long 0x11111111, 0x11111111, 0x11111111, 0x11111111
31 .long 0x11111111, 0x11111111, 0x11111111, 0x11111111
32 .long 0x11111111, 0x11111111, 0x11111111, 0x11111111
33 .long 0x11111111, 0x11111111, 0x11111111, 0x11111111
34 .long 0x11111111, 0x11111111, 0x11111111, 0x11111111
35 .long 0x11111111, 0x11111111, 0x11111111, 0x11111111
36 .long 0x11111111, 0x11111111, 0x11111111, 0x11111111
37 .long 0x11111111, 0x11111111, 0x11111111, 0x11111111
40 # Depending on the version we jump now to exploit.s or to "exploit2v:"
41 .long 0x11111111, bptr, 0x11111111, 0x11111111
43 .fill 0x10000 - (. - 0b)