Hacking Stupid question, casper argv

mauifrog

DA KINE WiiHacker
OP
Member
Joined
Jan 21, 2010
Messages
1,587
Trophies
0
Website
Visit site
XP
392
Country
United States
v0.2
  • a few changes suggested by tueidj
  • accept parameters via argv. supported are:
    • "--iosV=" specify ios version. 8-bit dec number is allowed.
    • "--iosR=" pass an ios revision to set for loaded module. 16-bit dec or hex with the prefix "0x" is allowed
    • "--app=" specify a file to be read from the SD card. it should start with "sd:/".
    • "--geckoChannel=" load from USB gecko flash. this is the gecko slot to use: 0 or 1.
    • "--geckoOffset=" offset in the usb gecko flash to read the binary. format is the same as the twilight hack a u32 is read from that offset which is the size, and the rest of the data follows. 32-bit numbers in dec, or hex with a 0x prefix are allowed.
  • If loading the SD path fails, then try to load from USB gecko flash at 0x20000 in slot 1 then slot 0
  • default to passing IOS 254 v0xff01 to module so if it loading is ceilingcat, it will skip the autoboot
Here's a few examples of the args in action:


# use all default settings:
wiiload ./casper.elf

# use armboot.bin from the bootmii folder:
wiiload ./casper.elf --app=sd:/bootmii/armboot.bin

# read from USB gecko flash in slot 1 from offset 0x30000 and set flags as IOS12 v13398
wiiload ./casper.elf --iosV=12 --iosR=0x3456 --geckoChannel=1 --geckoOffset=0x30000
Can anyone tell me what the argv. parameter file should be named?​
or they only work with loading from wiiload?​
 

PsyBlade

Snake Charmer
Member
Joined
Jul 30, 2009
Messages
2,204
Trophies
0
Location
Sol III
XP
458
Country
Gambia, The
In general arguments are not read from a file but from the command invocation.
I don't think I really understand the question. Please rephrase.

edit: do you mean meta.xml?
 

SifJar

Not a pirate
Member
Joined
Apr 4, 2009
Messages
6,022
Trophies
0
Website
Visit site
XP
1,175
Country
but if it's being launched from an exploit, it loads casper from the root of the sd card (ie. without meta.xml)
Well in that instance if you want arguments you will need to either modify the exploit or write an in between loader to in turn load casper with the relevant arguments.
 

SifJar

Not a pirate
Member
Joined
Apr 4, 2009
Messages
6,022
Trophies
0
Website
Visit site
XP
1,175
Country
a plain ol' forwarder dol that accepts meta.xml arguments should work right?

so exploit --> SD:\boot.dol forwarder dol --> FAT:\apps\Casper (with meta.xml arguments if any)
no idea, never used such a thing.

but if you mean what I think you do, that is what is pretty much what I meant anyway.
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    rvtr @ rvtr: Spam bots again.