I'm pretty sure the OP being a troll thing was just speculation started by someone and just got snowballed and that ended up derailing the last thread. Can we PLEASE not derail this one too? It won't help anyone continuing to argue about this!
I've always been on the side of just sitting on the sidelines and seeing if something happens. Some of you are way to invested into the wait game. Ya'll need to calm the **k down. Go outside and play in your front yard or something. There's a world outside of the 3DS ya know.
Firstly, is it possible to use the normal CTR commands while the 3DS is running a launcher from the web exploit? I'm assuming not, so would it be possible to launch another launcher or code.bin that gives the system the bare minimum to execute commands and mount/write to the sd card? I don't want to make a CFW...yet.
Wait, you asking if commands sent to the cartridge slot can be redirected? I assume you are talking about Arm11 related activities. I'm probably not the best person to try and answer this. I would think you just need to gain Arm11 kernel access and recreate the commands. Having Arm11 kernel access means being able to do anything Arm11 is normally allowed to do. (all other things would be Arm9 territory). So if the CTR commands are controlled by Arm11, then yes, I don't see why you can't do this.
As I understand it one of the early stages of the web browser exploit gains Arm11 kernel access. Whether or not the launcher.dat file/external file needed to do that is required, I don't know. I think so, but at that point you already have FS access to the SD card I would assume as how else does gateway load the launcher.dat for the rest of the exploit?
Second, does gateway's exploit run on process9, ARM9, or privileged ARM11? Does it even matter if I'm going to use the exploit to run an application that loads .3DS and .DAT files that will not require special permissions, just read, write, and execute access to the SD card?
I've heard the new exploit (or at least the reverse engineered version of it thanks to yifan_lu) runs on Arm9 kernel and not Process9 and that FS commands are broken. (basically you have to recreate the Arm9 kernel code yourself) So the kernel commands need further documentation? If you can already read/write files via Arm9 code at whatever stage of development this CFW of yours is at, you already are able to do this I assume. But again, I can't answer that.
It was mentioned in that first Arm9 thread soon after Yifan Lu's release of the Arm9 exploit info.
From how things work, Arm11 kernel access occurs first, then Arm9 is hijacked. I would think you set most things up in Arm11 before you go and boot up Arm9 code. (non encryption related stuff anyway. Arm9 access needed once you get the point where you need to alter encryption checks, but you should be aware of this already.
)
I'm not a programmer so I can't really answer this beyond that.
Aside from that I hope someone who knows more on this kinda stuff can answer your question before the trolls flood this thread.