Don't worry, Lilith, that's how research works
. And yes, GM9 actually uses the size info from the header (like everything else), and tries to dump everything. I don't even know how to get the raw card size.
@Kazuma77 - the most recent commit has something for you. WOudl be nice if you could test and check if it works as expected. EDIT: But also test the test build I uploaded in my last post.
Thanks, I'll check them out shortly. I have the latest commit building right now. I actually asked about the "find" thing on behalf of
@TheCyberQuake because he said the change broke his script for dumping "dspfirm.cdc" by causing it to pick the wrong file from MSET. But I'll check it all the same. I've had a look at doing something similar myself, but having looked at multiple firmware versions, well, the lower one isn't always the right one in all cases, so, I'm thinking it's probably best to stick with the Home Menu, since it only has one .app file. However, it seems like either approach would be version-specific without a way to search for the byte pattern. I'm not even sure I want to release my project here given how much I would have to remove from it, and I just include the file in my current full release, but, I'm still interested from a technical aspect. Though that's probably just scratching the surface of what search and replace would make possible. Still, don't worry about it if it's too much work. It's not like there's anything I actually need it for at this time.
Also, I think what nl255 meant was a way to generate the key file from B9S, which could then be used with other devices you're looking to mod via other entry points like Safehax (if you don't have access to NTRBootHax).
EDIT1: The uploaded 1.3.6 file unfortunately did not fix the screen init issue with OldLoader. I'll have the results for the "find" modifications soon.
EDIT2: Well, "find -f" always gives an error with the latest commit for some reason. Though I do like how it's showing the lines now, so that you can see exactly which one it's failing at in red. That makes troubleshooting easier.
@d0k3 Since if statements are going to be added would it be possible to add a function to detect if gm9 was booted via ntrboot (apparently Luma can detect the ntrboot environment) so that sufficiently dangerous scripts could either refuse to run or give their own extra warning unless they are being run via ntrboot? Also, would it be possible to create aeskeydb.bin without needing other keyfiles or anything other than gm9 itself (plus the right script) now that we have b9s?
I don't see why this is needed, considering there are already warnings. Furthermore, the NTRBoot environment isn't specifically required for any script to function properly. As long as it can find the keys, GM9 can even install A9LH from regular *hax exploits like Safehax. Disabling scripts from running in other environments would be limiting people's options needlessly. There's no reason to force someone on 11.3 or lower to buy a DS flash cart. I get the whole added brick insurance thing, but should that not be a reason to decrease the warnings if it's detected? If the screen turning red isn't enough to convince people to read it first, I don't know what is.
Also, most of us are careful enough to add checks for things like sufficient keys being present to perform a task. For example, installing A9LH or restoring an N3DS to retail both need access to a decrypted secret sector. A "find S:/sector0x96.bin NULL" will shut down a script immediately if the keys needed to decrypt it aren't present. And if you don't at least have the keys to decrypt the firms, nothing can happen anyway. So as long as people using other exploits download from someone that includes safety checks and tests thoroughly before releasing, they won't have a problem. Not that many people support other exploits, but my single card installer tries to be all-inclusive.
And most of the "dangerous" ones should not be something you're looking at every day. Any same card install script worth running is going to use it's last line to delete itself. And any swap card script should be using a separate folder for the files to be transferred to the target card (you copy it back to 0:/ to transfer it's contents to the root), and therefore never even get transferred to the RAM drive, much less the target card.