MTK-bypass / bypass_utility

MIT License
460 stars 114 forks source link

main.py exits with "Found send_dword, dumping bootrom to bootrom_788.bin" #35

Closed tehbra1n closed 3 years ago

tehbra1n commented 3 years ago

device: Unihertz Jelly 2 cpu: MT6771

Device is bootlooping, as it loops it reveals the PreLoader VCOM port (COM4) for about 2s then the Mediatek USB Port (COM3) for about 2s, then repeats. Below is the output from main.py.

I'm not sure if I'm not timing running the script correctly or if I'm missing something else.

[2021-05-10 10:34:38.066595] Waiting for device
[2021-05-10 10:34:43.900307] Found port = COM4

[2021-05-10 10:34:44.201610] Device hw code: 0x788
[2021-05-10 10:34:44.204604] Device hw sub code: 0x8a00
[2021-05-10 10:34:44.214576] Device hw version: 0xca00
[2021-05-10 10:34:44.215573] Device sw version: 0x0
[2021-05-10 10:34:44.216572] Device secure boot: False
[2021-05-10 10:34:44.219570] Device serial link authorization: False
[2021-05-10 10:34:44.221557] Device download agent authorization: False

[2021-05-10 10:34:44.228539] Found device in preloader mode, trying to crash...

[2021-05-10 10:34:44.255468] Waiting for device
[2021-05-10 10:34:45.559325] Found port = COM3

[2021-05-10 10:34:45.623156] Device hw code: 0x788
[2021-05-10 10:34:45.627145] Device hw sub code: 0x8a00
[2021-05-10 10:34:45.637120] Device hw version: 0xca00
[2021-05-10 10:34:45.639114] Device sw version: 0x0
[2021-05-10 10:34:45.650090] Device secure boot: False
[2021-05-10 10:34:45.651082] Device serial link authorization: False
[2021-05-10 10:34:45.652080] Device download agent authorization: False

[2021-05-10 10:34:45.653077] Disabling watchdog timer
[2021-05-10 10:34:45.657066] Insecure device, sending payload using send_da
[2021-05-10 10:34:45.698954] Found send_dword, dumping bootrom to bootrom_788.bin
chaosmaster commented 3 years ago

[2021-05-10 10:34:45.657066] Insecure device, sending payload using send_da The device is already insecure, there's no need for bypass.

tehbra1n commented 3 years ago

[2021-05-10 10:34:45.657066] Insecure device, sending payload using send_da The device is already insecure, there's no need for bypass.

Roger that. FWIW I was trying the exploit to get around always getting a DA ERROR running the SP TOOL under Windows 10. I resolved this by running the Linux SP TOOL from a bootable thumb drive on the same laptop that I was trying to get it to work under Windows 10 on. No idea on this one but using fireiso-2.0.0, downloading the tool and firmware after booting and running the tool worked the first time.