Advertisement
Guest User

Untitled

a guest
Apr 23rd, 2018
89
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.71 KB | None | 0 0
  1. There are 2 installation methods
  2.  
  3. AUTOMATIC via DSIware exploits
  4. simply start unlaunch.dsi and
  5. select Install now in the menu.
  6.  
  7. MANUAL INSTALL via hardmods
  8. locate 520-byte title.tmd file
  9. in the following folder:
  10. title\00030017\484E41xx\content
  11. (the xx varies per region)
  12. append 81400-byte unlaunch.dsi
  13. at the end of the tmd file (tmd
  14. filesize is then 81920 bytes)
  15.  
  16. Both methods are working on all
  17. retail DSi models, regardless
  18. of region or firmware version.
  19. For uninstallation truncate the
  20. tmd file back to 520-byte size.
  21. When installed, unlaunch takes
  22. control almost immediately afterpower-up, before even executing
  23. the boot menu (aka launcher).
  24.  
  25. If SD:\BOOTCODE.DSI exists,
  26. then it will immediately
  27. execute that file with all
  28. access rights, for example,
  29. rename DSLINK.NDS accordingly,
  30. so you can wifi-upload your
  31. game from PC to DSi.
  32.  
  33. Otherwise, if the file doesn't
  34. exist, it will resume normal
  35. booting, with some improvements
  36. -Without Healthsafety+bootmusic
  37. -No Region+RSA+Whitelist checks
  38. -ARM7+9 SCFG_EXT.BIT31 kept set
  39. Even old NDS flash carts will
  40. maintain SCFG_EXT access rights
  41. (but are probably unable to
  42. re-enter DSi touchscreen mode).
  43.  
  44.  
  45. Bootstage 2 is loading the
  46. launcher's TITLE.TMD file to
  47. memory, that's done without any
  48. FILESIZE>LIMIT check (it's only
  49. checking FILESIZE>FILESIZE).
  50.  
  51. That is allowing to load about
  52. 80Kbytes of useful code, and to
  53. overwrite a task switching
  54. structure, causing ARM9 to
  55. execute the loaded code, which
  56. can then tweak ARM7 to execute
  57. custom code by remapping some
  58. portions of shared WRAM.
  59.  
  60. Yup, it's actually that simple.
  61. The bigger problem has been to
  62. find this exploit within the
  63. 400,000 lines of code that
  64. bootstages 2 and 3 consist of.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement