···5151* [TEIR1plus2's Xbox-Reversing](https://github.com/TEIR1plus2/Xbox-Reversing)
5252* [ihatecompvir's x360-hv-notes](https://github.com/ihatecompvir/x360-hv-notes)
5353* [Grimdoomer's Xbox 360 hypervisor article](https://icode4.coffee/?p=1047)
5454+* [Byrom's Xbox_360_Research](https://github.com/Byrom90/Xbox_360_Research)
54555556I likely wouldn't know nearly as much as I do if not for all the great open source
5657projects detailing how parts of this system work, and all the people behind them.
57585858-And an extra shoutout to the #coding-corner channel in the
5959+And an extra shoutout to folks from the #coding-corner channel in the
5960[Xbox 360 Hub](https://xbox360hub.com/) Discord.
60616162## Removal Requests
+18-12
homebrew/xebuild/freeboot-like_patches.md
···11**Emma's Xbox 360 Research Notes - Homebrew - xeBuild**
2233-Updated 11th March 2025.
33+Updated 15th March 2025.
4455Incomplete stub page.
66···18181919All offsets for this are for the latest released hypervisor/kernel, 17559.
20202121+Some information here was referenced from
2222+[Byrom's research](https://github.com/Byrom90/Xbox_360_Research) as well as the
2323+[RGLoader patchset](https://github.com/RGLoader/RGLoader-Patches). Thank you!
2424+2125## Hypervisor
22262327### Initialisation Patch
···2731Replaces a call to one of the startup functions with a branch to some shellcode
2832at `0xB510`. (See below for more)
29333030-### 0xF0 data clear
3434+### Devkit XEX AES key
31353236`0xF0` = `00000000 00000000 00000000 00000000`
33373434-No idea.
3838+Stores the devkit XEX AES key here for later use.
35393640### Memory Protection Patch
3741···7882Removes a check in HvxLoadImageData after a call to XeCryptMemDiff on a SHA-1
7983hash of an XEX's memory page(?).
80848181-### Unknown HvxResolveImports patches
8585+### HvxResolveImports revision check patches
82868387`0x2AA80` = `60000000`
84888589`0x2AA8C` = `60000000`
86908787-Patches two checks in HvxResolveImports. No idea what they do yet.
9191+Patches two checks in HvxResolveImports to bypass STATUS_REVISION_MISMATCH.
88928993### Initialisation and syscall 0 shellcode.
9094···144148the keyvault. The latter of these patches forces a value at 0x74 to always be 1.
145149(TODO: Look into what this actually is doing.)
146150147147-### Patch Media ID check?
151151+### Patch XGD2/DVD Media ID check
148152149153`0x24D58` = `38600001 4E800020`
150154151155Replaces a function that is called by HvxImageTransformImageKey and
152152-HvxCreateImageMapping to always return 1. Seems to be related to the DVD auth
153153-media ID.
156156+HvxCreateImageMapping related to XGD2 Media ID to always return 1.
154157155158### Patch FCRT hash check
156159157160`0x264F0` = `38600001`
158161159159-Replaces a branch to a hash checking function (?) within a HvxDvdAuthFcrt
160160-subroutine to always return true.
162162+Replaces a branch to a PKCS#1 verification within a HvxDvdAuthFcrt subroutine to
163163+always return true.
161164162165### XEX key derivation patch shellcode
163166164167`0x29B08` = shellcode
165168166166-TODO. Looks to be to allow devkit XEXs to decrypt.
169169+TODO. Looks to be to allow devkit XEXs to decrypt, if the XEX signature check
170170+fails it will attempt to decrypt it with the devkit XEX2 AES key stored at 0xF0
171171+by one of the patches above.
167172168173### HvxImageTransformImageKey protected flag check patch
169174···182187183188`0x2CDD8` = `60000000`
184189185185-Removes a keys flags check during HvxCreateImageMapping.
190190+Removes a keys flags check during HvxCreateImageMapping. Possibly region
191191+related?
186192187193### HvxExpansionInstall signature/encryption patches
188194
+2-2
official-software/kernel/memory_map.md
···11**Emma's Xbox 360 Research Notes - Kernel**
2233-Updated 27th January 2024.
33+Updated 15th March 2025.
4455# Memory Map
66···6363| `0x8D000000` | TODO | Title encrypted allocations | TODO |
6464| `0x8E000000` | 0x20000 | Certificate revocation list (CRL) | `0x01EF0000` |
6565| `0x8E030000` | 0x10000 | Hypervisor data mirror (flags, etc) | `0x01F10000` |
6666-| `0x8E050000` | 0x10000 | XEX2 header copies(?) | `0x01F20000` |
6666+| `0x8E050000` | 0x10000 | XEX2 headers | `0x01F20000` |
67676868XEX2 images loaded into this space should have a base address between
6969`0x80400000 - 0x8C000000`. (TODO: check hard limits)