MTK-bypass / bypass_utility

MIT License
460 stars 114 forks source link

Payload did not reply #31

Closed hadesome1 closed 3 years ago

hadesome1 commented 3 years ago

@chaosmaster @bkerler my mtk question is like this issues https://github.com/MTK-bypass/bypass_utility/issues/25

i have changed device.py in line126 and line 132,replace them with: assert from_bytes(self.dev.read(2), 2) <= 0xff

i use test mode to dump bootrom

PS D:\Mtk\ByPass\bypass_utility-master> py -3 main.py -t -v CC [2021-04-27 18:32:11.095373] Waiting for device [2021-04-27 18:32:15.311557] Found port = COM10 [2021-04-27 18:32:15.351974] Device hw code: 0x8167 [2021-04-27 18:32:15.354967] Device hw sub code: 0x8a00 [2021-04-27 18:32:15.355964] Device hw version: 0xcb00 [2021-04-27 18:32:15.356962] Device sw version: 0x1 [2021-04-27 18:32:15.357959] Device secure boot: True [2021-04-27 18:32:15.357959] Device serial link authorization: False [2021-04-27 18:32:15.358956] Device download agent authorization: True [2021-04-27 18:32:15.359953] Disabling watchdog timer [2021-04-27 18:32:15.360950] Disabling protection [2021-04-27 18:32:15.429767] Found send_dword, dumping bootrom to bootrom_8167.bin

use the payload and var value make by @bkerler,get this error:

D:\Mtk\ByPass\bypass_utility-master> py -3 main.py [2021-04-27 18:35:50.567474] Waiting for device [2021-04-27 18:35:55.670430] Found port = COM10 [2021-04-27 18:35:55.722294] Device hw code: 0x8167 [2021-04-27 18:35:55.725285] Device hw sub code: 0x8a00 [2021-04-27 18:35:55.727279] Device hw version: 0xcb00 [2021-04-27 18:35:55.728277] Device sw version: 0x1 [2021-04-27 18:35:55.729274] Device secure boot: True [2021-04-27 18:35:55.730271] Device serial link authorization: False [2021-04-27 18:35:55.734260] Device download agent authorization: True [2021-04-27 18:35:55.737252] Disabling watchdog timer [2021-04-27 18:35:55.740246] Disabling protection [2021-04-27 18:36:11.886113] Payload did not reply

i have uploaded the log and bootrom dump here https://drive.google.com/drive/folders/12sI7XFmPlmzPRPV8pIudXdUKor-g-gdR

can someone help me make the right payload and right var value please? Thanks!