From 49cf5f93a0d6a1fa2784774e5fc8a4ce70a7284b Mon Sep 17 00:00:00 2001 From: Greg V Date: Wed, 23 May 2018 13:57:42 +0300 Subject: [PATCH] Support FreeBSD via macOS backend FreeBSD has a custom implementation of libusb, no limitations, so it just worked. --- README.md | 2 +- fusee-launcher.py | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 58b464a..0b7b4ad 100644 --- a/README.md +++ b/README.md @@ -39,7 +39,7 @@ The vulnerability is documented in the 'report' subfolder; more details and guides are to follow! Stay tuned... ### Use Instructions -The main launcher is "fusee-launcher.py". Windows, Linux, and macOS are all natively supported! Instructions for Windows specifically can be found on the [wiki](https://github.com/reswitched/fusee-launcher/wiki/Instructions-(Windows)). +The main launcher is "fusee-launcher.py". Windows, Linux, macOS and FreeBSD are all natively supported! Instructions for Windows specifically can be found on the [wiki](https://github.com/reswitched/fusee-launcher/wiki/Instructions-(Windows)). With a Tegra device in RCM and connected via USB, invoke the launcher with the desired payload as an argument, e.g. `./fusee-launcher.py payload.bin`. Linux systems currently require either that the Tegra device be connected to an XHCI controller (used with blue USB 3 ports) or that the user has patched their EHCI driver. diff --git a/fusee-launcher.py b/fusee-launcher.py index 4b07c70..7af510f 100755 --- a/fusee-launcher.py +++ b/fusee-launcher.py @@ -141,11 +141,11 @@ class MacOSBackend(HaxBackend): Simple vulnerability trigger for macOS: we simply ask libusb to issue the broken control request, and it'll do it for us. :) - We also support platforms with a hacked libusb. + We also support platforms with a hacked libusb and FreeBSD. """ BACKEND_NAME = "macOS" - SUPPORTED_SYSTEMS = ['Darwin', 'libusbhax', 'macos'] + SUPPORTED_SYSTEMS = ['Darwin', 'libusbhax', 'macos', 'FreeBSD'] def trigger_vulnerability(self, length):