Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MSET9: Fresh Edition #38

Merged
merged 31 commits into from
Aug 11, 2024
Merged

MSET9: Fresh Edition #38

merged 31 commits into from
Aug 11, 2024

Conversation

Naim2000
Copy link
Contributor

@Naim2000 Naim2000 commented Jun 16, 2024

Generate fresh files in the hacked ID1 Instead of copying them from the original ID1. Should work about 100% more of the time
TODO: A good way to separate removing the trigger file and the hacked ID1 as a whole. I think i just had an idea with that haxStates line i left commented out Did that

@Naim2000 Naim2000 marked this pull request as draft June 16, 2024 19:49
@Naim2000
Copy link
Contributor Author

Naim2000 commented Jun 17, 2024

New MSET9 guide layout

Section I - Prep work

  • Extract files to SD
  • Run MSET9 script and create MSET9 ID1

Section II - Creating required files

  • Power on console with SD card inserted
  • Launch Mii maker and exit it
  • Go to System Settings and reset software management info
  • Check the MSET9 script again and make sure it's ready to inject

Section III - MSET9

  • Carefully navigate to Extra Data
  • Inject trigger file
  • Put SD card back in console

Section IV - Installing boot9strap
{{}}

Section V - Removing MSET9

  • Remove trigger file (return to section III if injection was not successful)
  • Remove MSET9 ID1

Poor MSET9 play store is getting left out

@Naim2000
Copy link
Contributor Author

Naim2000 commented Jun 21, 2024

TODO:

  • sd root magic for macOS (haven't verified if it works yet)

@Naim2000 Naim2000 marked this pull request as ready for review June 21, 2024 03:47
@Naim2000 Naim2000 changed the title Generate fresh files in the hacked ID1 MSET9: Fresh Edition Jun 24, 2024
@irowiki
Copy link
Contributor

irowiki commented Jun 25, 2024

Working on the guide component of this now.

prinfo("Visual guide: https://3ds.hacks.guide/images/screenshots/database-reset.jpg")
exitOnEnter()
if osver == "Linux": # ...
print("(on Linux, things like to not go right - please ensure that your SD card is mounted with the 'utf8' option.)")
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Second line of information can help a person, my linux mounted automatically utf-8 but that may be of my system locale pt_PT.UTF-8, otherwise can tell the user to mount again with the argument utf8, utf8=1, utf8=yes or utf8=true and uni_xlate argument must not be set, iocharset=utf8 also discouraged for vfat.
Using mount -o remount,utf8 does not fully give intended result for vfat remount as utf8!
We can also test if we are likely ready for utf-8, open() with wb will fail with OSError exception over errno 22 with characters invalid for vfat if it isn't mounted with utf-8, something we can test in try and except block, OSError exception has the attribute .errno with the integer to check.

@luigoalma luigoalma merged commit 9914bd2 into zoogie:main Aug 11, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants