-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tegra X1 (Pixel C "dragon") debrick? #7
Comments
the original fusee-gelee was tailored to tegra x1. the one from jevinskie included here as a git submodule is tailored towards tegra30. the payload here (uart_payload.c) will ONLY work on tegra30. it was originally written for x1 by ktemkin though, see https://github.com/tofurky/tegra30_debrick/blob/master/payload/ipatch_rcm_sample.c https://github.com/tofurky/tegra30_debrick/blob/master/payload/t210.h for the unmodified code. you can probably take the missing macros (since i don't have a copy of registers.h) from uart_payload.c i am not sure what or any equivalent there is to nvflash for the x1 - nvflash from this repo is ancient (2013). sorry i can't be of more help, i do not have experience with any other tegra chips. maybe there's some stuff on xda developers or similar? |
Thank you for the info. Yes, seems nvflash does not work with X1 (see https://github.com/NVIDIA/tegrarcm) but still I don't understand how to put Pixel C on RCM mode as described for the original work. Is it simply the equivalent of fasboot mode? I will ask directly to the author... |
Good Morning,
From the command line:
reboot forced-recovery
should put it into RCM mode.
…On Fri, Jan 14, 2022 at 3:34 AM Samuel ***@***.***> wrote:
Thank you for the info.
No unfortunately I found nothing on XDA.
Yes, seems nvflash
<https://http.download.nvidia.com/tegra-public-appnotes/flashing-tools.html>
does not work with X1 (see https://github.com/NVIDIA/tegrarcm) but still
I don't understand how to put Pixel C on RCM mode as described on original
work by jevinskie. Is simply the equivalent of fasboot mode? I will try
again...
—
Reply to this email directly, view it on GitHub
<#7 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAFWB7I7GN4ANXARMWWDF7LUV7NZHANCNFSM5L3MVEWQ>
.
Triage notifications on the go with GitHub Mobile for iOS
<https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675>
or Android
<https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub>.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
|
Thank you for the tip, unfortunately
|
No, it would have to be an adb shell command. |
Very interesting: that's exactly the meaning of shofel2 exploit, right? |
Hello, I think this blog might be suitable for you. https://yifan.lu/2022/06/17/unbricking-shield-tv-2015-with-a-bootrom-exploit/ |
Do you think in principle could work also for Tegra X1?
The text was updated successfully, but these errors were encountered: