MTK-bypass / bypass_utility

MIT License
460 stars 114 forks source link

hi, friend, why do I get status is 1d1a running main.py, please help #44

Open George-Guo-tech opened 2 years ago

George-Guo-tech commented 2 years ago

Disabling protection Traceback (most recent call last): File "./main.py", line 234, in main() File "./main.py", line 75, in main result = exploit(device, config, payload, arguments) File "C:\Users\Administrator\Desktop\bypass_utility-master\src\exploit.py", line 77, in exploit ptr_send = from_bytes(da_read(config.ptr_usbdl, 4), 4, '<') + 8; File "C:\Users\Administrator\Desktop\bypass_utility-master\src\exploit.py", line 11, in da_read return da_read_write(0, address, length, None, check_result) File "C:\Users\Administrator\Desktop\bypass_utility-master\src\exploit.py", line 36, in da_read_write return device.cmd_da(direction, address - 0x40, length, data, check_result) File "C:\Users\Administrator\Desktop\bypass_utility-master\src\device.py", line 322, in cmd_da raise RuntimeError("status is {}".format(status.hex())) RuntimeError: status is 1d1a

chaosmaster commented 2 years ago

Please provide the full log! What device is this? Did you install UsbDk?

jlacodev commented 2 years ago

Hi, I have same issue with Redmi9

[root@fireiso /tmp/t/bypass_utility-master]# ./main.py
[2022-04-22 14:04:49.833157] Waiting for device
[2022-04-22 14:04:54.767871] Found device = 0e8d:0003

[2022-04-22 14:04:55.070209] Device hw code: 0x707
[2022-04-22 14:04:55.070665] Device hw sub code: 0x8a00
[2022-04-22 14:04:55.071136] Device hw version: 0xca00
[2022-04-22 14:04:55.071299] Device sw version: 0x0
[2022-04-22 14:04:55.071462] Device secure boot: True
[2022-04-22 14:04:55.071605] Device serial link authorization: True
[2022-04-22 14:04:55.071751] Device download agent authorization: True

[2022-04-22 14:04:55.071944] Disabling watchdog timer
[2022-04-22 14:04:55.095433] Disabling protection
Traceback (most recent call last):
  File "/tmp/t/bypass_utility-master/./main.py", line 237, in <module>
    main()
  File "/tmp/t/bypass_utility-master/./main.py", line 78, in main
    result = exploit(device, config, payload, arguments)
  File "/tmp/t/bypass_utility-master/src/exploit.py", line 77, in exploit
    ptr_send = from_bytes(da_read(config.ptr_usbdl, 4), 4, '<') + 8;
  File "/tmp/t/bypass_utility-master/src/exploit.py", line 11, in da_read
    return da_read_write(0, address, length, None, check_result)
  File "/tmp/t/bypass_utility-master/src/exploit.py", line 36, in da_read_write
    return device.cmd_da(direction, address - 0x40, length, data, check_result)
  File "/tmp/t/bypass_utility-master/src/device.py", line 330, in cmd_da
    raise RuntimeError("status is {}".format(status.hex()))
RuntimeError: status is 1d1a
[root@fireiso /tmp/t/bypass_utility-master]#
RizwanShaikh46 commented 2 years ago

PS D:\A to Z mastery\bypass_utility-master> python main.py [2022-05-31 18:57:40.003579] Waiting for device [2022-05-31 18:57:48.599056] Found device = 0e8d:0003

[2022-05-31 18:57:49.470948] Device hw code: 0x766 [2022-05-31 18:57:49.513426] Device hw sub code: 0x8a00 [2022-05-31 18:57:49.569042] Device hw version: 0xca00 [2022-05-31 18:57:49.605020] Device sw version: 0x0 [2022-05-31 18:57:49.674981] Device secure boot: True [2022-05-31 18:57:49.751000] Device serial link authorization: True [2022-05-31 18:57:49.793968] Device download agent authorization: True

[2022-05-31 18:57:49.843940] Disabling watchdog timer [2022-05-31 18:57:50.003847] Disabling protection Traceback (most recent call last): File "D:\A to Z mastery\bypass_utility-master\main.py", line 237, in main() File "D:\A to Z mastery\bypass_utility-master\main.py", line 78, in main result = exploit(device, config, payload, arguments) File "D:\A to Z mastery\bypass_utility-master\src\exploit.py", line 77, in exploit ptr_send = from_bytes(da_read(config.ptr_usbdl, 4), 4, '<') + 8; File "D:\A to Z mastery\bypass_utility-master\src\exploit.py", line 11, in da_read return da_read_write(0, address, length, None, check_result) File "D:\A to Z mastery\bypass_utility-master\src\exploit.py", line 36, in da_read_write return device.cmd_da(direction, address - 0x40, length, data, check_result) File "D:\A to Z mastery\bypass_utility-master\src\device.py", line 330, in cmd_da raise RuntimeError("status is {}".format(status.hex())) RuntimeError: status is 1d1a PS D:\A to Z mastery\bypass_utility-master> //this is the error log