Update documentation

This commit is contained in:
Nick Chan 2024-04-06 23:24:15 +08:00
parent 3ea406da58
commit c840c226de
3 changed files with 9 additions and 4 deletions

View File

@ -49,6 +49,11 @@ is still triggered.
.Em NOTE:
Many tweak injection packages also provide their own safe mode, p1ctl does not
recognize and cannot control those safe modes.
.It Xo Ar help Op Ar subcommand
.Xc
Prints help text. If
.Ar subcommand
is specified, print help about the subcommand.
.It Xo Ar kbase
.Xc
Print a hexadecimal representation of the kernel base.

View File

@ -6,7 +6,7 @@
.Dt palera1n 1
.Sh NAME
.Nm palera1n
.Nd arm64 iOS/iPadOS/tvOS 15.0-17.4.1, bridgeOS 6.0-8.3 jailbreaking tool
.Nd arm64 iOS/iPadOS/tvOS 15.0-17.5, bridgeOS 5.0-8.3 jailbreaking tool
.Sh SYNOPSIS
.Nm
.Op Fl cCdDEfhIlLnpRsSvV
@ -20,7 +20,7 @@
.Op Fl -force-revert
.Sh DESCRIPTION
.Nm
jailbreaks an iOS/iPadOS/tvOS 15.0-17.4.1, bridgeOS 6.0-8.3 device with an arm64 (arm64e excluded) on iOS 15.0-17.4.1,
jailbreaks an iOS/iPadOS/tvOS 15.0-17.5, bridgeOS 6.0-8.3 device with an arm64 (arm64e excluded) on iOS 15.0-17.5,
utilizing the
.Em checkm8
bootROM exploit.
@ -57,7 +57,7 @@ In the remainder of this document, the term "iOS" and "iPadOS" will be used inte
as the difference is negligible as far as the jailbreak is concerened.
.Pp
.Sh SUPPORTED DEVICES
As described above, arm64 iOS 15.0-17.4.1 devices are supported, here is an explicit
As described above, arm64 iOS 15.0-17.5 devices are supported, here is an explicit
list of supported devicecs:
.Bl -tag -compact

View File

@ -77,7 +77,7 @@ static int usage(int e, char* prog_name)
#endif
"] [-e boot arguments] [-k Pongo image] [-o overlay file] [-r ramdisk file] [-K KPF file] [-i checkra1n file]\n"
"Copyright (C) 2023, palera1n team, All Rights Reserved.\n\n"
"iOS/iPadOS 15.0-17.4.1 arm64 jailbreaking tool\n\n"
"iOS/iPadOS 15.0-17.5 arm64 jailbreaking tool\n\n"
"\t--version\t\t\t\tPrint version\n"
"\t--force-revert\t\t\t\tRemove jailbreak\n"
#ifdef DEV_BUILD