<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.3dbrew.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Irocktolive7</id>
	<title>3dbrew - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.3dbrew.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Irocktolive7"/>
	<link rel="alternate" type="text/html" href="https://www.3dbrew.org/wiki/Special:Contributions/Irocktolive7"/>
	<updated>2026-04-14T19:49:26Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>https://www.3dbrew.org/w/index.php?title=3DS_System_Flaws&amp;diff=10407</id>
		<title>3DS System Flaws</title>
		<link rel="alternate" type="text/html" href="https://www.3dbrew.org/w/index.php?title=3DS_System_Flaws&amp;diff=10407"/>
		<updated>2014-11-03T04:05:34Z</updated>

		<summary type="html">&lt;p&gt;Irocktolive7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Exploits are used to execute unofficial code (homebrew) on the Nintendo 3DS. This page is a list of known 3DS-mode exploits.&lt;br /&gt;
&lt;br /&gt;
==List of 3DS exploits==&lt;br /&gt;
&lt;br /&gt;
==Current Efforts==&lt;br /&gt;
There are people working on finding exploits and documenting the 3DS. Here&#039;s a list of some current efforts being made to make homebrew on the 3DS possible:&lt;br /&gt;
&lt;br /&gt;
* Smealum has a working exploit up to newest system version and has shown what seems to be viable proof that this is real. He says that he will be releasing the exploit when he believes all of the bundled software (HBC and others) are relatively bug free. In other words NO ETA.&lt;br /&gt;
&lt;br /&gt;
==Stale / Rejected Efforts==&lt;br /&gt;
* Neimod has been working on a RAM dumping setup for a little while now. He&#039;s desoldered the 3DS&#039;s RAM chip and hooked it and the RAM pinouts on the 3DS&#039;s PCB up to a custom RAM dumping setup. Recent photos show that the setup is working quite well, with the 3DS successfully booting up. Pictures of neimod&#039;s work can be found on [http://www.flickr.com/photos/neimod/ his Flickr stream].&lt;br /&gt;
&lt;br /&gt;
      Neimod&#039;s flickr stream is now private and his work is considered stale &lt;br /&gt;
&lt;br /&gt;
* Govanify has released CFW and CIA installers along with some other interesting stuff (and illegal stuff) most of which were created by others and stolen&lt;br /&gt;
&lt;br /&gt;
== Fixed vulnerabilities ==&lt;br /&gt;
* The following was fixed with [[7.0.0-13]], see here for [[7.0.0-13|details]]. Too long or corrupted strings (01Ah  2   Nickname length in characters     050h  2   Message length in characters) in the NVRAM DS user settings cause (System Settings-&amp;gt;Other Settings-&amp;gt;Profile-&amp;gt;Nintendo DS Profile) to crash in 3DS-mode due to a stack-smash. The DSi is not vulnerable to this, DSi launcher(menu) and DSi System Settings will reset the NVRAM user-settings if the length field values are too long(same result as when the CRCs are invalid).&lt;br /&gt;
&lt;br /&gt;
==Failed attempts==&lt;br /&gt;
Here are listed all attempts at exploiting 3DS software that have failed so far.&lt;br /&gt;
&lt;br /&gt;
* Pushmo (3DSWare), QR codes: level name is properly limited to 16 characters, game doesn&#039;t crash with a longer name. The only possible crashes are triggered by out-of-bounds values, these crashes are caused by the application attempting to load a ptr from a buffer located at NULL.&lt;br /&gt;
* Pyramids (3DSWare), QR codes: no strings. Only crashes are from out-of-bounds values (like background ID) and are not exploitable.&lt;br /&gt;
* 3DS browser, 2^32 characters long string: this is similar to the vuln fixed [http://git.chromium.org/gitweb/?p=external/Webkit.git;a=commitdiff;h=ec471f16fbd1f879cb631f9b022fd16acd75f4d4 here], concat-large-strings-crash2.html triggers a crash which is about the same as the one triggered by a 2^32 string. Most of the time this vuln will cause a memory page permissions fault, since the webkit code attempts to copy the string text data to the output buffer located in read-only [[CRO0|CRO]] heap memory. The only difference between a crash triggered by a 2^32 string and the concat-large-strings-crash2.html crash is that the former copies the string data using the original string length(like 1 text character for &amp;quot;x&amp;quot;, 4 for &amp;quot;xxxx&amp;quot;) while the latter attempts to copy &amp;gt;12MB. In some &#039;&#039;very&#039;&#039; rare cases a thread separate from the string data-copy thread will crash, this might be exploitable however this is useless since it rarely crashes this way.&lt;br /&gt;
&lt;br /&gt;
==Tips and info==&lt;br /&gt;
The 3DS uses the XN feature of the ARM processor, and only apps that have the necessary permissions in their headers can set memory to be executable. This means that although a usable buffer overflow exploit would still be useful, it would not go the entire way towards allowing code to be run in an easy/practical fashion (ie an actual homebrew launcher) - for that, an exploit in the system is required. A buffer overflow exploit does, however, provide enough wriggle room through the use of return-oriented programming to potentially trigger a system exploit.&lt;br /&gt;
&lt;br /&gt;
SD card [[extdata]] and SD savegames can be attacked, for consoles where the console-unique [[Nand/private/movable.sed|movable.sed]] was dumped.&lt;br /&gt;
&lt;br /&gt;
Note that the publicly-available &amp;lt;v5.0 total-control exploits are [[FIRM|Process9]] exploits, not &amp;quot;kernel exploits&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==System flaws==&lt;br /&gt;
=== ARM11 kernel ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!  Summary&lt;br /&gt;
!  Description&lt;br /&gt;
!  Fixed in system version&lt;br /&gt;
|-&lt;br /&gt;
|  [[SVC]] table too small&lt;br /&gt;
|  The table of function pointers for SVC&#039;s only contains entries up to 0x7D, but the biggest allowed SVC for the table is 0x7F. Thus, executing svc7E or svc7F would make the SVC-handler read after the buffer, and interpret some ARM instructions as function pointers.&lt;br /&gt;
&lt;br /&gt;
However this would require patching the kernel .text or modifying SVC-access-control. Even if you could get these to execute, they would still jump to memory that isn&#039;t mapped as executable.&lt;br /&gt;
|  None&lt;br /&gt;
|-&lt;br /&gt;
|  [[SVC|svcBackdoor (0x7B)]]&lt;br /&gt;
|  This backdoor allows executing SVC-mode code at the user-specified code-address. This is used by Process9, using this on the ARM11(with NATIVE_FIRM) requires patching the kernel .text or modifying SVC-access-control.&lt;br /&gt;
|  None&lt;br /&gt;
|-&lt;br /&gt;
| [[Memory_layout#ARM11_Detailed_virtual_memory_map|0xEFF00000]] / 0xDFF00000 ARM11 kernel virtual-memory&lt;br /&gt;
| The ARM11 kernel-mode 0xEFF00000/0xDFF00000 virtual-memory(size 0x100000) is mapped to phys-mem 0x1FF00000(entire DSP-mem + entire AXIWRAM), with permissions RW-. This is used during ARM11 kernel startup, this never seems to be used after that however.&lt;br /&gt;
| None&lt;br /&gt;
|-&lt;br /&gt;
| [[SVC|svcStartInterProcessDma]]&lt;br /&gt;
| For svcStartInterProcessDma, the kernel code had the following flaws:&lt;br /&gt;
&lt;br /&gt;
* Originally the ARM11-kernel read the input DmaConfig structure directly in kernel-mode(ldr(b/h) instructions), without checking whether the DmaConfig address is readable under userland. This was fixed by copying that structure to the SVC-mode stack, using the ldrbt instruction.&lt;br /&gt;
&lt;br /&gt;
* Integer overflows for srcaddr+size and dstaddr+size are now checked(with [[6.0.0-11]]), which were not checked before.&lt;br /&gt;
&lt;br /&gt;
* The kernel now also checks whether the srcaddr/dstaddr(+size) is within userland memory(0x20000000), the kernel now(with [[6.0.0-11]]) returns an error when the address is beyond userland memory. Using an address &amp;gt;=0x20000000 would result in the kernel reading from the process L1 MMU table, beyond the memory allocated for that MMU table(for vaddr-&amp;gt;physaddr conversion). &lt;br /&gt;
| [[6.0.0-11]]&lt;br /&gt;
|-&lt;br /&gt;
| [[SVC|svcControlMemory]] Parameter checks&lt;br /&gt;
| For svcControlMemory the parameter check had these two flaws:&lt;br /&gt;
&lt;br /&gt;
* The allowed range for addr0, addr1, size parameters depends on which MemoryOperation is being specified. The limitation for GSP heap was only checked if op=(u32)0x10003. By setting a random bit in op that has no meaning (like bit17?), op would instead be (u32)0x30003, and the range-check would be less strict and not accurate. However, the kernel doesn&#039;t actually use the input address for LINEAR memory-mapping at all besides the range-checks, so this isn&#039;t actually useful. This was fixed in the kernel by just checking for the LINEAR bit, instead of comparing the entire MemoryOperation value with 0x10003.&lt;br /&gt;
&lt;br /&gt;
* Integer overflows on (addr0+size) are now checked that previously weren&#039;t(this also applies to most other address checks elsewhere in the kernel).&lt;br /&gt;
&lt;br /&gt;
| [[5.0.0-11]]&lt;br /&gt;
|-&lt;br /&gt;
| [[RPC_Command_Structure|Command]] request/response buffer overflow&lt;br /&gt;
| Originally the kernel did not check the word-values from the command-header. Starting with [[5.0.0-11]], the kernel will trigger a kernelpanic() when the total word-size of the entire command(including the cmd-header) is larger than 0x40-words(0x100-bytes). This allows overwriting threadlocalstorage+0x180 in the destination thread, however since the data written there would be translate parameters(such as header-words + buffer addresses), exploiting this would likely be very difficult if possible at all.&lt;br /&gt;
&lt;br /&gt;
If the two words at threadlocalstorage+0x180 could be overwritten with controlled data this way, one could then use a command with a buffer-header of &amp;lt;nowiki&amp;gt;((size&amp;lt;&amp;lt;14) | 2)&amp;lt;/nowiki&amp;gt; to write arbitrary memory to any RW userland memory in the destination process.&lt;br /&gt;
| [[5.0.0-11]]&lt;br /&gt;
|-&lt;br /&gt;
| [[SVC|SVC stack allocation overflows]]&lt;br /&gt;
| &lt;br /&gt;
* Syscalls that allocate a variable-length array on stack, only checked bit31 before multiplying by 4/16 (when calculating how much memory to allocate). If a large integer was passed as input to one of these syscalls, an integer overflow would occur, and too little memory would have been allocated on stack resulting in a buffer overrun. &lt;br /&gt;
* The alignment (size+7)&amp;amp;~7 calucation before allocation was not checked for integer overflow.&lt;br /&gt;
&lt;br /&gt;
This might allow for ARM11 kernel code-execution.&lt;br /&gt;
&lt;br /&gt;
(Applies to svcSetResourceLimitValues, svcGetThreadList, svcGetProcessList, svcReplyAndReceive, svcWaitSynchronizationN.)&lt;br /&gt;
| [[5.0.0-11]]&lt;br /&gt;
|-&lt;br /&gt;
| [[SVC|svcControlMemory]] MemoryOperation MAP memory-permissions&lt;br /&gt;
| svcControlMemory with MemoryOperation=MAP allows mapping the already-mapped process virtual-mem at addr1, to addr0. The lowest address permitted for addr1 is 0x00100000. Originally the ARM11 kernel didn&#039;t check memory permissions for addr1. Therefore .text as addr1 could be mapped elsewhere as RW- memory, which allowed ARM11 userland code-execution.&lt;br /&gt;
| [[4.1.0-8]]&lt;br /&gt;
|-&lt;br /&gt;
| [[RPC_Command_Structure|Command]] input/output buffer permissions&lt;br /&gt;
| Originally the ARM11 kernel didn&#039;t check memory permissions for the input/output buffers for commands. Starting with [[4.0.0-7]] the ARM11 kernel will trigger a kernelpanic() if the input/output buffers don&#039;t have the required memory permissions. For example, this allowed a FSUSER file-read to .text, which therefore allowed ARM11-userland code execution.&lt;br /&gt;
| [[4.0.0-7]]&lt;br /&gt;
|-&lt;br /&gt;
| [[SVC|svcReadProcessMemory/svcWriteProcessMemory memory]] permissions&lt;br /&gt;
| Originally the kernel only checked the first page(0x1000-bytes) of the src/dst buffers, for svcReadProcessMemory and svcWriteProcessMemory. There is no known retail processes which have access to these SVCs.&lt;br /&gt;
| [[4.0.0-7]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== FIRM ARM11 modules ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!  Summary&lt;br /&gt;
!  Description&lt;br /&gt;
!  Fixed in system version&lt;br /&gt;
|-&lt;br /&gt;
| [[Services|&amp;quot;srv:pm&amp;quot;]] process registration&lt;br /&gt;
| Originally any process had access to the port &amp;quot;srv:pm&amp;quot;. The PID&#039;s used for the (un)registration commands are not checked either. This allowed any process to re-register itself with &amp;quot;srv:pm&amp;quot;, and therefore allowed the process to give itself access to any service, bypassing the exheader service-access-control list.&lt;br /&gt;
&lt;br /&gt;
This was fixed in [[7.0.0-13]]: starting with [[7.0.0-13]] &amp;quot;srv:pm&amp;quot; is now a service instead of a globally accessible port. Only processes with PID&#039;s less than 6 (in other words: fs, ldr, sm, pm, pxi modules) have access to it. With [[7.0.0-13]] there can only be one session for &amp;quot;srv:pm&amp;quot; open at a time(this is used by pm module), svcBreak will be executed if more sessions are opened by the processes which can access this.&lt;br /&gt;
&lt;br /&gt;
This flaw was needed for exploiting the &amp;lt;=v4.x Process9 PXI vulnerabilities from ARM11 userland ROP, since most applications don&#039;t have access to those service(s).&lt;br /&gt;
| [[7.0.0-13]]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Irocktolive7</name></author>
	</entry>
	<entry>
		<id>https://www.3dbrew.org/w/index.php?title=3DS_System_Flaws&amp;diff=10406</id>
		<title>3DS System Flaws</title>
		<link rel="alternate" type="text/html" href="https://www.3dbrew.org/w/index.php?title=3DS_System_Flaws&amp;diff=10406"/>
		<updated>2014-11-03T04:05:18Z</updated>

		<summary type="html">&lt;p&gt;Irocktolive7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Exploits are used to execute unofficial code (homebrew) on the Nintendo 3DS. This page is a list of known 3DS-mode exploits.&lt;br /&gt;
&lt;br /&gt;
==List of 3DS exploits==&lt;br /&gt;
&lt;br /&gt;
==Current Efforts==&lt;br /&gt;
There are people working on finding exploits and documenting the 3DS. Here&#039;s a list of some current efforts being made to make homebrew on the 3DS possible:&lt;br /&gt;
&lt;br /&gt;
* Smealum has a working exploit up to newest system version and has shown what seems to be viable proof that this is real. He says that he will be releasing the exploit when he believes all of the bundled software (HBC and others) are relatively bug free. In other words NO ETA.&lt;br /&gt;
&lt;br /&gt;
==Stale / Rejected Efforts==&lt;br /&gt;
* Neimod has been working on a RAM dumping setup for a little while now. He&#039;s desoldered the 3DS&#039;s RAM chip and hooked it and the RAM pinouts on the 3DS&#039;s PCB up to a custom RAM dumping setup. Recent photos show that the setup is working quite well, with the 3DS successfully booting up. Pictures of neimod&#039;s work can be found on [http://www.flickr.com/photos/neimod/ his Flickr stream].&lt;br /&gt;
&lt;br /&gt;
     * Neimod&#039;s flickr stream is now private and his work is considered stale &lt;br /&gt;
&lt;br /&gt;
* Govanify has released CFW and CIA installers along with some other interesting stuff (and illegal stuff) most of which were created by others and stolen&lt;br /&gt;
&lt;br /&gt;
== Fixed vulnerabilities ==&lt;br /&gt;
* The following was fixed with [[7.0.0-13]], see here for [[7.0.0-13|details]]. Too long or corrupted strings (01Ah  2   Nickname length in characters     050h  2   Message length in characters) in the NVRAM DS user settings cause (System Settings-&amp;gt;Other Settings-&amp;gt;Profile-&amp;gt;Nintendo DS Profile) to crash in 3DS-mode due to a stack-smash. The DSi is not vulnerable to this, DSi launcher(menu) and DSi System Settings will reset the NVRAM user-settings if the length field values are too long(same result as when the CRCs are invalid).&lt;br /&gt;
&lt;br /&gt;
==Failed attempts==&lt;br /&gt;
Here are listed all attempts at exploiting 3DS software that have failed so far.&lt;br /&gt;
&lt;br /&gt;
* Pushmo (3DSWare), QR codes: level name is properly limited to 16 characters, game doesn&#039;t crash with a longer name. The only possible crashes are triggered by out-of-bounds values, these crashes are caused by the application attempting to load a ptr from a buffer located at NULL.&lt;br /&gt;
* Pyramids (3DSWare), QR codes: no strings. Only crashes are from out-of-bounds values (like background ID) and are not exploitable.&lt;br /&gt;
* 3DS browser, 2^32 characters long string: this is similar to the vuln fixed [http://git.chromium.org/gitweb/?p=external/Webkit.git;a=commitdiff;h=ec471f16fbd1f879cb631f9b022fd16acd75f4d4 here], concat-large-strings-crash2.html triggers a crash which is about the same as the one triggered by a 2^32 string. Most of the time this vuln will cause a memory page permissions fault, since the webkit code attempts to copy the string text data to the output buffer located in read-only [[CRO0|CRO]] heap memory. The only difference between a crash triggered by a 2^32 string and the concat-large-strings-crash2.html crash is that the former copies the string data using the original string length(like 1 text character for &amp;quot;x&amp;quot;, 4 for &amp;quot;xxxx&amp;quot;) while the latter attempts to copy &amp;gt;12MB. In some &#039;&#039;very&#039;&#039; rare cases a thread separate from the string data-copy thread will crash, this might be exploitable however this is useless since it rarely crashes this way.&lt;br /&gt;
&lt;br /&gt;
==Tips and info==&lt;br /&gt;
The 3DS uses the XN feature of the ARM processor, and only apps that have the necessary permissions in their headers can set memory to be executable. This means that although a usable buffer overflow exploit would still be useful, it would not go the entire way towards allowing code to be run in an easy/practical fashion (ie an actual homebrew launcher) - for that, an exploit in the system is required. A buffer overflow exploit does, however, provide enough wriggle room through the use of return-oriented programming to potentially trigger a system exploit.&lt;br /&gt;
&lt;br /&gt;
SD card [[extdata]] and SD savegames can be attacked, for consoles where the console-unique [[Nand/private/movable.sed|movable.sed]] was dumped.&lt;br /&gt;
&lt;br /&gt;
Note that the publicly-available &amp;lt;v5.0 total-control exploits are [[FIRM|Process9]] exploits, not &amp;quot;kernel exploits&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==System flaws==&lt;br /&gt;
=== ARM11 kernel ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!  Summary&lt;br /&gt;
!  Description&lt;br /&gt;
!  Fixed in system version&lt;br /&gt;
|-&lt;br /&gt;
|  [[SVC]] table too small&lt;br /&gt;
|  The table of function pointers for SVC&#039;s only contains entries up to 0x7D, but the biggest allowed SVC for the table is 0x7F. Thus, executing svc7E or svc7F would make the SVC-handler read after the buffer, and interpret some ARM instructions as function pointers.&lt;br /&gt;
&lt;br /&gt;
However this would require patching the kernel .text or modifying SVC-access-control. Even if you could get these to execute, they would still jump to memory that isn&#039;t mapped as executable.&lt;br /&gt;
|  None&lt;br /&gt;
|-&lt;br /&gt;
|  [[SVC|svcBackdoor (0x7B)]]&lt;br /&gt;
|  This backdoor allows executing SVC-mode code at the user-specified code-address. This is used by Process9, using this on the ARM11(with NATIVE_FIRM) requires patching the kernel .text or modifying SVC-access-control.&lt;br /&gt;
|  None&lt;br /&gt;
|-&lt;br /&gt;
| [[Memory_layout#ARM11_Detailed_virtual_memory_map|0xEFF00000]] / 0xDFF00000 ARM11 kernel virtual-memory&lt;br /&gt;
| The ARM11 kernel-mode 0xEFF00000/0xDFF00000 virtual-memory(size 0x100000) is mapped to phys-mem 0x1FF00000(entire DSP-mem + entire AXIWRAM), with permissions RW-. This is used during ARM11 kernel startup, this never seems to be used after that however.&lt;br /&gt;
| None&lt;br /&gt;
|-&lt;br /&gt;
| [[SVC|svcStartInterProcessDma]]&lt;br /&gt;
| For svcStartInterProcessDma, the kernel code had the following flaws:&lt;br /&gt;
&lt;br /&gt;
* Originally the ARM11-kernel read the input DmaConfig structure directly in kernel-mode(ldr(b/h) instructions), without checking whether the DmaConfig address is readable under userland. This was fixed by copying that structure to the SVC-mode stack, using the ldrbt instruction.&lt;br /&gt;
&lt;br /&gt;
* Integer overflows for srcaddr+size and dstaddr+size are now checked(with [[6.0.0-11]]), which were not checked before.&lt;br /&gt;
&lt;br /&gt;
* The kernel now also checks whether the srcaddr/dstaddr(+size) is within userland memory(0x20000000), the kernel now(with [[6.0.0-11]]) returns an error when the address is beyond userland memory. Using an address &amp;gt;=0x20000000 would result in the kernel reading from the process L1 MMU table, beyond the memory allocated for that MMU table(for vaddr-&amp;gt;physaddr conversion). &lt;br /&gt;
| [[6.0.0-11]]&lt;br /&gt;
|-&lt;br /&gt;
| [[SVC|svcControlMemory]] Parameter checks&lt;br /&gt;
| For svcControlMemory the parameter check had these two flaws:&lt;br /&gt;
&lt;br /&gt;
* The allowed range for addr0, addr1, size parameters depends on which MemoryOperation is being specified. The limitation for GSP heap was only checked if op=(u32)0x10003. By setting a random bit in op that has no meaning (like bit17?), op would instead be (u32)0x30003, and the range-check would be less strict and not accurate. However, the kernel doesn&#039;t actually use the input address for LINEAR memory-mapping at all besides the range-checks, so this isn&#039;t actually useful. This was fixed in the kernel by just checking for the LINEAR bit, instead of comparing the entire MemoryOperation value with 0x10003.&lt;br /&gt;
&lt;br /&gt;
* Integer overflows on (addr0+size) are now checked that previously weren&#039;t(this also applies to most other address checks elsewhere in the kernel).&lt;br /&gt;
&lt;br /&gt;
| [[5.0.0-11]]&lt;br /&gt;
|-&lt;br /&gt;
| [[RPC_Command_Structure|Command]] request/response buffer overflow&lt;br /&gt;
| Originally the kernel did not check the word-values from the command-header. Starting with [[5.0.0-11]], the kernel will trigger a kernelpanic() when the total word-size of the entire command(including the cmd-header) is larger than 0x40-words(0x100-bytes). This allows overwriting threadlocalstorage+0x180 in the destination thread, however since the data written there would be translate parameters(such as header-words + buffer addresses), exploiting this would likely be very difficult if possible at all.&lt;br /&gt;
&lt;br /&gt;
If the two words at threadlocalstorage+0x180 could be overwritten with controlled data this way, one could then use a command with a buffer-header of &amp;lt;nowiki&amp;gt;((size&amp;lt;&amp;lt;14) | 2)&amp;lt;/nowiki&amp;gt; to write arbitrary memory to any RW userland memory in the destination process.&lt;br /&gt;
| [[5.0.0-11]]&lt;br /&gt;
|-&lt;br /&gt;
| [[SVC|SVC stack allocation overflows]]&lt;br /&gt;
| &lt;br /&gt;
* Syscalls that allocate a variable-length array on stack, only checked bit31 before multiplying by 4/16 (when calculating how much memory to allocate). If a large integer was passed as input to one of these syscalls, an integer overflow would occur, and too little memory would have been allocated on stack resulting in a buffer overrun. &lt;br /&gt;
* The alignment (size+7)&amp;amp;~7 calucation before allocation was not checked for integer overflow.&lt;br /&gt;
&lt;br /&gt;
This might allow for ARM11 kernel code-execution.&lt;br /&gt;
&lt;br /&gt;
(Applies to svcSetResourceLimitValues, svcGetThreadList, svcGetProcessList, svcReplyAndReceive, svcWaitSynchronizationN.)&lt;br /&gt;
| [[5.0.0-11]]&lt;br /&gt;
|-&lt;br /&gt;
| [[SVC|svcControlMemory]] MemoryOperation MAP memory-permissions&lt;br /&gt;
| svcControlMemory with MemoryOperation=MAP allows mapping the already-mapped process virtual-mem at addr1, to addr0. The lowest address permitted for addr1 is 0x00100000. Originally the ARM11 kernel didn&#039;t check memory permissions for addr1. Therefore .text as addr1 could be mapped elsewhere as RW- memory, which allowed ARM11 userland code-execution.&lt;br /&gt;
| [[4.1.0-8]]&lt;br /&gt;
|-&lt;br /&gt;
| [[RPC_Command_Structure|Command]] input/output buffer permissions&lt;br /&gt;
| Originally the ARM11 kernel didn&#039;t check memory permissions for the input/output buffers for commands. Starting with [[4.0.0-7]] the ARM11 kernel will trigger a kernelpanic() if the input/output buffers don&#039;t have the required memory permissions. For example, this allowed a FSUSER file-read to .text, which therefore allowed ARM11-userland code execution.&lt;br /&gt;
| [[4.0.0-7]]&lt;br /&gt;
|-&lt;br /&gt;
| [[SVC|svcReadProcessMemory/svcWriteProcessMemory memory]] permissions&lt;br /&gt;
| Originally the kernel only checked the first page(0x1000-bytes) of the src/dst buffers, for svcReadProcessMemory and svcWriteProcessMemory. There is no known retail processes which have access to these SVCs.&lt;br /&gt;
| [[4.0.0-7]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== FIRM ARM11 modules ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!  Summary&lt;br /&gt;
!  Description&lt;br /&gt;
!  Fixed in system version&lt;br /&gt;
|-&lt;br /&gt;
| [[Services|&amp;quot;srv:pm&amp;quot;]] process registration&lt;br /&gt;
| Originally any process had access to the port &amp;quot;srv:pm&amp;quot;. The PID&#039;s used for the (un)registration commands are not checked either. This allowed any process to re-register itself with &amp;quot;srv:pm&amp;quot;, and therefore allowed the process to give itself access to any service, bypassing the exheader service-access-control list.&lt;br /&gt;
&lt;br /&gt;
This was fixed in [[7.0.0-13]]: starting with [[7.0.0-13]] &amp;quot;srv:pm&amp;quot; is now a service instead of a globally accessible port. Only processes with PID&#039;s less than 6 (in other words: fs, ldr, sm, pm, pxi modules) have access to it. With [[7.0.0-13]] there can only be one session for &amp;quot;srv:pm&amp;quot; open at a time(this is used by pm module), svcBreak will be executed if more sessions are opened by the processes which can access this.&lt;br /&gt;
&lt;br /&gt;
This flaw was needed for exploiting the &amp;lt;=v4.x Process9 PXI vulnerabilities from ARM11 userland ROP, since most applications don&#039;t have access to those service(s).&lt;br /&gt;
| [[7.0.0-13]]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Irocktolive7</name></author>
	</entry>
	<entry>
		<id>https://www.3dbrew.org/w/index.php?title=Main_Page/Navigation&amp;diff=10405</id>
		<title>Main Page/Navigation</title>
		<link rel="alternate" type="text/html" href="https://www.3dbrew.org/w/index.php?title=Main_Page/Navigation&amp;diff=10405"/>
		<updated>2014-11-03T03:56:19Z</updated>

		<summary type="html">&lt;p&gt;Irocktolive7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Main page box|Navigation|Main Page/Navigation}}&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: -.3em -1em -1em -1em;&amp;quot;&amp;gt;&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; bgcolor=&amp;quot;#fff&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2px&amp;quot; cellspacing=&amp;quot;2px&amp;quot; style=&amp;quot;margin:auto;&amp;quot;&lt;br /&gt;
|- align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#e7eef6&amp;quot;&lt;br /&gt;
! width=&amp;quot;25%&amp;quot; | &#039;&#039;&#039;General&#039;&#039;&#039;&lt;br /&gt;
! width=&amp;quot;25%&amp;quot; | &#039;&#039;&#039;3DS hardware&#039;&#039;&#039;&lt;br /&gt;
! width=&amp;quot;50%&amp;quot; colspan=&amp;quot;2&amp;quot; | &#039;&#039;&#039;3DS software&#039;&#039;&#039;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot; style=&amp;quot;background: #F5FAFF;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
*[[Glossary]]&lt;br /&gt;
*[[FAQ]]&lt;br /&gt;
*[[Friend code]]&lt;br /&gt;
*[[Games]]&lt;br /&gt;
*[[Serials]]&lt;br /&gt;
*[[:Category:PC utilities|PC Utilities]]&lt;br /&gt;
*[[Homebrew Applications]]&lt;br /&gt;
*[[3DS System Flaws]]&lt;br /&gt;
|&lt;br /&gt;
*[[Hardware]]&lt;br /&gt;
*[[Peripherals]]&lt;br /&gt;
*[[Gamecards]]&lt;br /&gt;
*[[Video Capture]]&lt;br /&gt;
|&lt;br /&gt;
*[[Nintendo Software]]&lt;br /&gt;
*[[3DS Development Unit Software]]&lt;br /&gt;
*[[Memory layout]] &lt;br /&gt;
*[[Services API]]&lt;br /&gt;
*[[SVC|List of systemcalls]] &lt;br /&gt;
*[[IO|List of IO registers]] &lt;br /&gt;
*[[:Category:Kernel_objects|Kernel objects]]&lt;br /&gt;
*[[3DS System Flaws]]&lt;br /&gt;
|&lt;br /&gt;
*[[:Category:File_formats|File Formats]] ([[NCSD|CCI]]/[[NCCH#CXI|CXI]]/[[CIA]])&lt;br /&gt;
*[[Title list]]&lt;br /&gt;
*[[Title metadata]]&lt;br /&gt;
*[[Update Data]]&lt;br /&gt;
*[[SD Filesystem]]&lt;br /&gt;
*[[Flash Filesystem]]&lt;br /&gt;
*[[Bootloader]]&lt;br /&gt;
*[[Savegames]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
{{box-footer-empty}}&lt;/div&gt;</summary>
		<author><name>Irocktolive7</name></author>
	</entry>
	<entry>
		<id>https://www.3dbrew.org/w/index.php?title=Main_Page/OtherSites&amp;diff=8349</id>
		<title>Main Page/OtherSites</title>
		<link rel="alternate" type="text/html" href="https://www.3dbrew.org/w/index.php?title=Main_Page/OtherSites&amp;diff=8349"/>
		<updated>2013-12-30T02:05:51Z</updated>

		<summary type="html">&lt;p&gt;Irocktolive7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Main page box|Other Nintendo Homebrew Sites|:OtherSites}}&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: -.3em -1em -1em -1em;&amp;quot;&amp;gt;&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; bgcolor=&amp;quot;#fff&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2px&amp;quot; cellspacing=&amp;quot;2px&amp;quot; style=&amp;quot;margin:auto;&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;background: #F5FAFF;&amp;quot;&lt;br /&gt;
| DSiBrew [http://dsibrew.org] WiiBrew [http://wiibrew.org] WiiUBrew [http://wiiubrew.org] GBAtemp [http://gbatemp.net] FileTrip [http://filetrip.net]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
{{box-footer-empty}}&lt;/div&gt;</summary>
		<author><name>Irocktolive7</name></author>
	</entry>
	<entry>
		<id>https://www.3dbrew.org/w/index.php?title=Main_Page/OtherSites&amp;diff=8348</id>
		<title>Main Page/OtherSites</title>
		<link rel="alternate" type="text/html" href="https://www.3dbrew.org/w/index.php?title=Main_Page/OtherSites&amp;diff=8348"/>
		<updated>2013-12-30T00:46:16Z</updated>

		<summary type="html">&lt;p&gt;Irocktolive7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Main page box|Other Nintendo Homebrew Sites|:OtherSites}}&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin: -.3em -1em -1em -1em;&amp;quot;&amp;gt;&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; bgcolor=&amp;quot;#fff&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2px&amp;quot; cellspacing=&amp;quot;2px&amp;quot; style=&amp;quot;margin:auto;&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;background: #F5FAFF;&amp;quot;&lt;br /&gt;
| DSiBrew [http://dsibrew.org] WiiBrew [http://wiibrew.org] WiiUBrew [http://wiiubrew.org]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
{{box-footer-empty}}&lt;/div&gt;</summary>
		<author><name>Irocktolive7</name></author>
	</entry>
	<entry>
		<id>https://www.3dbrew.org/w/index.php?title=Main_Page/OtherSites&amp;diff=8347</id>
		<title>Main Page/OtherSites</title>
		<link rel="alternate" type="text/html" href="https://www.3dbrew.org/w/index.php?title=Main_Page/OtherSites&amp;diff=8347"/>
		<updated>2013-12-30T00:41:40Z</updated>

		<summary type="html">&lt;p&gt;Irocktolive7: Created page with &amp;quot;[[http://google.com] test]&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://google.com] test]&lt;/div&gt;</summary>
		<author><name>Irocktolive7</name></author>
	</entry>
	<entry>
		<id>https://www.3dbrew.org/w/index.php?title=Main_Page&amp;diff=8346</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.3dbrew.org/w/index.php?title=Main_Page&amp;diff=8346"/>
		<updated>2013-12-30T00:40:24Z</updated>

		<summary type="html">&lt;p&gt;Irocktolive7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Main Page/Header}}&lt;br /&gt;
{{:Main Page/Welcome}}&lt;br /&gt;
{{:Main Page/OtherSites}}&lt;br /&gt;
{{:Main Page/Current events}}&lt;br /&gt;
{{:Main Page/Navigation}}&lt;br /&gt;
__NOTOC____NOEDITSECTION__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Language_selection}}&lt;/div&gt;</summary>
		<author><name>Irocktolive7</name></author>
	</entry>
	<entry>
		<id>https://www.3dbrew.org/w/index.php?title=Main_Page/Other_Sites&amp;diff=8345</id>
		<title>Main Page/Other Sites</title>
		<link rel="alternate" type="text/html" href="https://www.3dbrew.org/w/index.php?title=Main_Page/Other_Sites&amp;diff=8345"/>
		<updated>2013-12-30T00:40:04Z</updated>

		<summary type="html">&lt;p&gt;Irocktolive7: Created page with &amp;quot;! width=&amp;quot;25%&amp;quot;| &amp;#039;&amp;#039;&amp;#039;DS Brew?&amp;#039;&amp;#039;&amp;#039;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;! width=&amp;quot;25%&amp;quot;| &#039;&#039;&#039;DS Brew?&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Irocktolive7</name></author>
	</entry>
	<entry>
		<id>https://www.3dbrew.org/w/index.php?title=Main_Page&amp;diff=8344</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.3dbrew.org/w/index.php?title=Main_Page&amp;diff=8344"/>
		<updated>2013-12-30T00:38:08Z</updated>

		<summary type="html">&lt;p&gt;Irocktolive7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Main Page/Header}}&lt;br /&gt;
{{:Main Page/Welcome}}&lt;br /&gt;
{{:Main Page/Other Sites}}&lt;br /&gt;
{{:Main Page/Current events}}&lt;br /&gt;
{{:Main Page/Navigation}}&lt;br /&gt;
__NOTOC____NOEDITSECTION__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Language_selection}}&lt;/div&gt;</summary>
		<author><name>Irocktolive7</name></author>
	</entry>
	<entry>
		<id>https://www.3dbrew.org/w/index.php?title=3dbrew:Community_portal&amp;diff=8343</id>
		<title>3dbrew:Community portal</title>
		<link rel="alternate" type="text/html" href="https://www.3dbrew.org/w/index.php?title=3dbrew:Community_portal&amp;diff=8343"/>
		<updated>2013-12-30T00:29:45Z</updated>

		<summary type="html">&lt;p&gt;Irocktolive7: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Theme ==&lt;br /&gt;
&lt;br /&gt;
How about we change the default theme to &#039;Vector&#039; to match the Wii and WiiU brew sites? --[[User:Elisherer|Elisherer]] 08:51, 11 December 2012 (CET)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Translations==&lt;br /&gt;
To whoever translates this days.. &lt;br /&gt;
*  I recommend you wouldn&#039;t waste your time on translating pages which aren&#039;t finished (i.e. [[Savegames]])&lt;br /&gt;
*  Do not translate database pages like [[Title list]] or [[Friend code]] these pages are updated regulary.&lt;br /&gt;
*  This Wiki doesn&#039;t have a localization plug-in I would recommend waiting until it does..&lt;br /&gt;
--[[User:Elisherer|Elisherer]] 11:06, 15 March 2012 (CET)&lt;br /&gt;
: Okay, I see...--[[User:Wangxuan8331800|Wangxuan8331800]] 12:46, 16 March 2012 (CET)&lt;br /&gt;
&lt;br /&gt;
Humm...&lt;br /&gt;
&lt;br /&gt;
I think we create the other domains for those languages.--Matyapiro3118:24, 19 March 2012 (CET)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Forum?==&lt;br /&gt;
A forum will be created when it becomes necessary, for e.g. actual discussion about homebrew development. Currently homebrew is not possible, so a forum is not needed yet. --[[User:Neimod|Neimod]] 01:05, 29 February 2012 (CET)&lt;br /&gt;
&lt;br /&gt;
==weird communication==&lt;br /&gt;
Hello all, I found some weird UDP communication coming from the 3ds to the internet (japan). Connection is made towards IP 203.180.85.77, 202.232.239.25,  and contains a string.&lt;br /&gt;
String starts with afa1, then the number 1,4 or 6, then comes either a short or long string (can contain 00) and it ends with a 2-byte counter (b3 in my case). It seems to be repeated, but I cant reproduce it as of now. It happened after I tried to update the 3ds, but it could be related to video/spotpass (suggestions?)&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
af a1 44 00 00 00 00 00 00 00 00 b3&lt;br /&gt;
&lt;br /&gt;
Any suggestions/ideas what it could be? --[[User:Mr seeker|Mr seeker]] 20:26, 8 December 2011 (CET)&lt;br /&gt;
  &lt;br /&gt;
==3ds dev unit==&lt;br /&gt;
Hey,Xcution,don&#039;t you release helloworld.cia?--Matyapiro31 15:40, 1 December 2011 (CET)&lt;br /&gt;
&lt;br /&gt;
==Homebrew install idea?==&lt;br /&gt;
Could it be installed in a way similar to Smash Bros. Brawl? Where you go to a webpage with a 3D image to download (like on 3ds.to) but when you load it in Camera/Swapnote it triggers? Or with the new Save Backup feature they just added? Sorry if this is the wrong place to suggest ideas... [[User:Jariesuicune|Jarieスイクン]] 18:22, 28 June 2013 (CEST)&lt;br /&gt;
:It is good place to post idea, that&#039;s all good as well. however since there is few that can reverse those ARM executables, we don&#039;t have ones alike yellow that can do such a job. even grabbed the power of 4.5.x we don&#039;t have people that can work on analysis on those app - we don&#039;t have enough ones to see into the implementation of system modules yet. So that is a pity we can only think and suggest, or go to learn reverse engineering and ARM disassembly first. BTW that site seems down (to me), also i don&#039;t think they would enable such a method. you can contact them on irc when you got something you think that is very interesting or would easily happen.--[[User:Syphurith|Syphurith]] 05:31, 29 June 2013 (CEST)&lt;br /&gt;
&lt;br /&gt;
==DSiBrew==&lt;br /&gt;
Can one of the devs on DSIBREW lock the crucial pages. I (Dsihaxx) have been going around correcting them with the latest backups on the wayback machine however random people keep changing it to either advertisements or gibberish. Thx.&lt;/div&gt;</summary>
		<author><name>Irocktolive7</name></author>
	</entry>
</feed>