Page 4 sur 15

Re: I found an exploit in boot1.5 4.4.0.8!

Message non luPosté: 19 Jan 2018, 19:51
de parrotgeek1
critor a écrit:I know. :(
I perfectly understand that's it's going to be hard (and hazardous) to develop a boot loader without an emulator.

To begin with, are you using nspire_emu or firebird ?

nspire_emu, because read breakpoints STILL don't work in 64-bit firebird.
I suppose since the exploit works well I could switch to firebird.

Re: I found an exploit in boot1.5 4.4.0.8!

Message non luPosté: 19 Jan 2018, 21:40
de parrotgeek1
critor a écrit:I don't think it'll work on nspire_emu anyway - something is not implemented if I remember well. Boot1 dumpers don't work on nspire_emu for example.

Maybe it'll work on firebird, but I'm not sure.
It should work on a real calculator.

It works on firebird.

But, when you try to use the read_nand function, boot1 (3.0.0.99) crashes.
@Lionel Debroux

Also I just realized something really dumb I never thought of:

All of the boot1 functions are at different addresses on boot1 4.0 lol

Re: I found an exploit in boot1.5 4.4.0.8!

Message non luPosté: 19 Jan 2018, 21:56
de critor
Yes. If we want a new boot loader working on both HW-W+ and HW<W, we'll have to make it check the Boot1 version.

Re: I found an exploit in boot1.5 4.4.0.8!

Message non luPosté: 19 Jan 2018, 22:00
de parrotgeek1
critor a écrit:Yes. If we want a new boot loader working on both HW-W+ and HW<W, we'll have to make it check the Boot1 version.

and write 2 different screen.c files, one that displays everything sideways. ugh

I wonder if Excale or Vogtinator would help with the nand stuff?

Re: I found an exploit in boot1.5 4.4.0.8!

Message non luPosté: 19 Jan 2018, 22:34
de critor
Let's just make everything use set_pixel(), with 2 cases in set_pixel(). :)

Re: I found an exploit in boot1.5 4.4.0.8!

Message non luPosté: 19 Jan 2018, 22:37
de Lionel Debroux
Lack of testing on real calculators is a bit worrisome ;)

Re: I found an exploit in boot1.5 4.4.0.8!

Message non luPosté: 19 Jan 2018, 22:41
de parrotgeek1
Lionel Debroux a écrit:Lack of testing on real calculators is a bit worrisome ;)

are you saying the exploit doesn't work on real hardware? The ;) makes me think you're hinting at that

Re: I found an exploit in boot1.5 4.4.0.8!

Message non luPosté: 19 Jan 2018, 22:51
de Lionel Debroux
The fact that exploits work on emulators - especially older ones, as you're running mainly nspire_emu for the reason you described above - does in no way warrant that said exploits work on real hardware (let alone that they don't cause issues), indeed...
Heck, even the fact that an exploit doesn't work on an emulator doesn't imply that it doesn't work on real hardware (though clearly, such as situation is unlikely, provided the emulator is accurate enough).

It's been about 16 years since I became aware of emulator glitches (in addition to missing features) on the TI-68k series. Non-existent bits in SR, garbage in - garbage out on the nbcd instruction, and even a simple instruction sequence which produces a different result when run on an emulator which doesn't emulate the 68000's embryonic pipeline - the trio was used as anti-VTI measures (and thereby a weak protection against reverse-engineering by script kiddies) in HW3Patch. TIEmu has none of these three bugs, so HW3Patch works properly, and in the abandoned JS TI-68k emulator, I worked around the third check.

Re: I found an exploit in boot1.5 4.4.0.8!

Message non luPosté: 20 Jan 2018, 00:01
de parrotgeek1
I would use firebird more if it let me launch it from the command line with a boot1/boot2 instead of having to create a new flash image in the GUI every single time. It's really tedious

Re: I found an exploit in boot1.5 4.4.0.8!

Message non luPosté: 20 Jan 2018, 15:04
de critor
Same thing here.
I rarely use firebird, because I'm always dealing with different flash images.