nccgroup / depthcharge

A U-Boot hacking toolkit for security researchers and tinkerers
https://depthcharge.readthedocs.io
BSD 3-Clause "New" or "Revised" License
258 stars 14 forks source link

md Read Failures on U-Boot 2012.10 #91

Closed jynik closed 2 years ago

jynik commented 2 years ago

Looks like the regex in memcmds.py is expecting 16 characters in the ASCII text portion of the hex dump output. (I believe newer versions pad up to a consistent line length)

    depthcharge.operation.OperationFailed:
        Failed to parse line: bff64d92: f7ff ffd5    ....
jynik commented 2 years ago

Resolved by a8aa306