Question about EXHEADER

Discussion in '3DS - ROM Hacking, Translations and Utilities' started by MDashK, Oct 16, 2015.

  1. MDashK

    MDashK GBAtemp Regular

    Jul 22, 2011
    Internetus Exploratis
    Just updated the thread.. Ignore initial previous question please, something "slipped" my mind...
    Correct question: Why does my VC MegaDrive/Genesis injected Sonic2EUR games lock at 3DS logo animation screen, or do not boot at all, giving a "an error as occurred" screen, whenever I try to use this EXHEADER?

    I've been using the JAP EXHEADER for the injection, because I can't use this EUR EXHEADER because of this issue.

    Here's the extracted content:

    Extended header:
    Signature:  9E7D432B10A9A06DD8CED332F79F7ECF96A492DBE0E9880C2E9A8393D93CBB10
    NCCH Hdr RSA Modulus:  F71302880F8C75FD19AD58F55670F78DD9A6487BB4CF807A0704832906FDAF27
    Name:  Sonic2
    Flag:  03 [compressed][sd app]
    Remaster version:  0000
    Code text address:  0x00100000
    Code text size:  0x006E6A14
    Code text max pages:  0x000006E7 (0x006E7000)
    Code ro address:  0x007E7000
    Code ro size:  0x002B9E18
    Code ro max pages:  0x000002BA (0x002BA000)
    Code data address:  0x00AA1000
    Code data size:  0x00017288
    Code data max pages:  0x00000018 (0x00018000)
    Code bss size:  0x00272C40
    Code stack size:  0x00040000
    Dependency:  0004013000002402
    Dependency:  0004013000003802
    Dependency:  0004013000001502
    Dependency:  0004013000003402
    Dependency:  0004013000001602
    Dependency:  0004013000002602
    Dependency:  0004013000001702
    Dependency:  0004013000001802
    Dependency:  0004013000002702
    Dependency:  0004013000002802
    Dependency:  0004013000001a02
    Dependency:  0004013000003202
    Dependency:  0004013000001b02
    Dependency:  0004013000001c02
    Dependency:  0004013000001d02
    Dependency:  0004013000002902
    Dependency:  0004013000001e02
    Dependency:  0004013000003302
    Dependency:  0004013000001f02
    Dependency:  0004013000002002
    Dependency:  0004013000002b02
    Dependency:  0004013000003502
    Dependency:  0004013000004002
    Dependency:  0004013000002c02
    Dependency:  0004013000002d02
    Dependency:  0004013000002102
    Dependency:  0004013000003102
    Dependency:  0004013000002202
    Dependency:  0004013020004202
    Dependency:  0004013000003702
    Dependency:  0004013000002e02
    Dependency:  0004013000002302
    Dependency:  0004013000002f02
    Savedata size:  1M
    Jump id:  000400000015ba00
    Program id:  000400000015ba00
    Core version:  0x2
    System mode:  0x0
    Ideal processor:  0
    Affinity mask:  1
    Main thread priority:  48
    Ext savedata id:  0x00000000
    System savedata id 1:  0x00000000
    System savedata id 2:  0x00000000
    OtherUserSaveDataId1:  0x00000
    OtherUserSaveDataId2:  0x00000
    OtherUserSaveDataId3:  0x00000
    Accessible Savedata Ids:
    Other Variation Saves:  Inaccessible
    Access info:  00000000000000
    Other attributes:  00
    Mapping static address: 0x1FF50000 (RW)
    Mapping static address: 0x1FF58000 (RW)
    Mapping static address: 0x1FF70000 (RW)
    Mapping static address: 0x1FF78000 (RW)
    Mapping static address: 0x1F000000 (RO)
    Mapping static address: 0x1F600000 (RO)
    Kernel flags:  
    > Allow debug:  YES
    > Force debug:  NO
    > Allow non-alphanum:  NO
    > Shared page writing: NO
    > Privilege priority:  NO
    > Allow main() args:  NO
    > Shared device mem:  NO
    > Runnable on sleep:  NO
    > Special memory:  NO
    > Memory type:  APPLICATION
    Handle table size:  0x200
    Kernel release version: 2.48
    Allowed systemcalls:  0x01, 0x02, 0x03, 0x06, 0x08, 0x09, 0x0A, 0x0B
      0x0C, 0x0F, 0x11, 0x13, 0x14, 0x15, 0x16, 0x17
      0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F
      0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x27, 0x28
      0x29, 0x2A, 0x2B, 0x2C, 0x2D, 0x2E, 0x2F, 0x30
      0x31, 0x32, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3A
      0x3B, 0x3C, 0x3D
    Allowed interrupts:  none
    ARM9 Desc. version:  0x3
    Mount NAND fs:  NO
    Mount NAND RO write fs: NO
    Mount NAND TWL fs:  NO
    Mount NAND W fs:  NO
    Mount CARD SPI fs:  NO
    Use SDIF3:  NO
    Create seed:  NO
    Use CARD SPI:  NO
    SD Application:  NO
    Use Direct SDMC:  NO
    Service access:  $hioFIO
    Service access:  $hostio0
    Service access:  $hostio1
    Service access:  cfg:u
    Service access:  fs:USER
    Service access:  gsp::Gpu
    Service access:  hid:USER
    Service access:  ndm:u
    Service access:  pxi:dev
    Service access:  APT:A
    Service access:  ac:u
    Service access:  act:u
    Service access:  am:app
    Service access:  boss:U
    Service access:  cam:u
    Service access:  cecd:u
    Service access:  dlp:FKCL
    Service access:  dlp:SRVR
    Service access:  dsp::DSP
    Service access:  frd:u
    Service access:  http:C
    Service access:  ir:USER
    Service access:  ldr:ro
    Service access:  mic:u
    Service access:  news:u
    Service access:  nfc:u
    Service access:  nim:aoc
    Service access:  nwm::UDS
    Service access:  ptm:u
    Service access:  qtm:u
    Service access:  soc:U
    Service access:  ssl:C
    Reslimit category:  00
    100% sure the EXHEADER is decrypted. Why does this happen?
    Last edited by MDashK, Oct 16, 2015
  2. zoogie

    zoogie playing around in the dsiware

    Nov 30, 2014
    Micronesia, Federated States of
    What firmware and system are you using?
  3. MDashK

    MDashK GBAtemp Regular

    Jul 22, 2011
    Internetus Exploratis
    emuNAND with v9 firmware, non linked NANDs. O3DS. Original game works OK with this EXHEADER. Only injected games fail with this EXHEADER.
    Take in mind that when I say "injected" it's simply a ROM swap in the ROMFS filesystem.