From 45a8099c5100cba8eb1f79f6a98f9d8d4646bb46 Mon Sep 17 00:00:00 2001 From: lifehackerhansol Date: Wed, 15 Feb 2023 16:44:20 -0800 Subject: [PATCH] Commonize Fredtool CFW check --- _pages/en_US/bannerbomb3-fredtool-(twn).txt | 8 +------- _pages/en_US/include/cfw-check-fredtool.txt | 10 ++++++++++ _pages/en_US/installing-boot9strap-(fredtool).txt | 11 +---------- 3 files changed, 12 insertions(+), 17 deletions(-) create mode 100644 _pages/en_US/include/cfw-check-fredtool.txt diff --git a/_pages/en_US/bannerbomb3-fredtool-(twn).txt b/_pages/en_US/bannerbomb3-fredtool-(twn).txt index fb18a7a3fc..56851ccd48 100644 --- a/_pages/en_US/bannerbomb3-fredtool-(twn).txt +++ b/_pages/en_US/bannerbomb3-fredtool-(twn).txt @@ -24,13 +24,7 @@ These instructions are for Taiwanese consoles ONLY (as indicated by a T at the e #### Section I - CFW Check -1. Power off your device -1. Hold the (Select) button -1. Power on your device while still holding the (Select) button -1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide - -If you see a configuration menu, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. -{: .notice--danger} +{% include_relative include/cfw-check-fredtool.txt %} #### Section II - Prep Work diff --git a/_pages/en_US/include/cfw-check-fredtool.txt b/_pages/en_US/include/cfw-check-fredtool.txt new file mode 100644 index 0000000000..b1e84c88e8 --- /dev/null +++ b/_pages/en_US/include/cfw-check-fredtool.txt @@ -0,0 +1,10 @@ +As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). + +1. Power off your device +1. Hold the (Select) button +1. Power on your device while still holding the (Select) button +1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide +1. Power off your device + +If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. +{: .notice--danger} diff --git a/_pages/en_US/installing-boot9strap-(fredtool).txt b/_pages/en_US/installing-boot9strap-(fredtool).txt index 8da22f54a0..06aacd128a 100644 --- a/_pages/en_US/installing-boot9strap-(fredtool).txt +++ b/_pages/en_US/installing-boot9strap-(fredtool).txt @@ -24,17 +24,8 @@ This is a currently working implementation of the "FIRM partitions known-plainte #### Section I - CFW Check -As an additional safety measure, we will perform an additional check for custom firmware. This is because using this method when custom firmware is already installed has a risk of bricking the console (rendering it unusable without recovery methods like [ntrboot](ntrboot)). +{% include_relative include/cfw-check-fredtool.txt %} -1. Power off your device -1. Hold the (Select) button -1. Power on your device while still holding the (Select) button -1. If the check was successful, you will boot to the HOME Menu and you may proceed with this guide -1. Power off your device - -If you see a configuration menu or the console immediately powers off, you already have CFW, and continuing with these instructions may BRICK your device! Follow [Checking for CFW](checking-for-cfw) to upgrade your existing CFW. -{: .notice--danger} - #### Section II - BannerBomb3 In this section, you will trigger the BannerBomb3 exploit using the DSiWare Management menu and copy the resulting file dump to your computer so that you can use it on the next section.