Minor update to exploit code. Need to document it

This commit is contained in:
Eljakim Herrewijnen 2022-11-17 22:59:51 +01:00
parent 926453f0ea
commit cc30c9ca57
3 changed files with 7 additions and 2 deletions

Binary file not shown.

Binary file not shown.

View File

@ -303,14 +303,19 @@ if __name__ == "__main__":
parser = argparse.ArgumentParser() parser = argparse.ArgumentParser()
parser.add_argument("payload", help="Payload to send to the tablet") parser.add_argument("payload", help="Payload to send to the tablet")
parser.add_argument("--ga", help="Prepare for GA", action="store_true") parser.add_argument("--ga", help="Prepare for GA", action="store_true")
parser.add_argument("--ga_arm", help="Prepare for GA", action="store_true")
args = parser.parse_args() args = parser.parse_args()
rcm = TegraRCM() rcm = TegraRCM()
rcm.dev.read_chip_id() rcm.dev.read_chip_id()
if args.ga_arm:
args.ga = True
rcm.send_payload(args.payload, thumb=0)
else:
rcm.send_payload(args.payload) rcm.send_payload(args.payload)
if args.ga: if args.ga:
d = rcm.dev.read(4) d = rcm.dev.read(4)
d2 = rcm.dev.read(0x200) # d2 = rcm.dev.read(0x200)
if d == b"GiAs": if d == b"GiAs":
ok("Device in GA debugger") ok("Device in GA debugger")
else: else: