MTK-bypass / bypass_utility

MIT License
488 stars 118 forks source link

RuntimeError: status is 1d1a #82

Open RizwanShaikh46 opened 2 years ago

RizwanShaikh46 commented 2 years ago

// This is the error log

PS D:\A to Z mastery\bypass_utility-master> python main.py [2022-05-31 18:57:40.003579] Waiting for device [2022-05-31 18:57:48.599056] Found device = 0e8d:0003

[2022-05-31 18:57:49.470948] Device hw code: 0x766 [2022-05-31 18:57:49.513426] Device hw sub code: 0x8a00 [2022-05-31 18:57:49.569042] Device hw version: 0xca00 [2022-05-31 18:57:49.605020] Device sw version: 0x0 [2022-05-31 18:57:49.674981] Device secure boot: True [2022-05-31 18:57:49.751000] Device serial link authorization: True [2022-05-31 18:57:49.793968] Device download agent authorization: True

[2022-05-31 18:57:49.843940] Disabling watchdog timer [2022-05-31 18:57:50.003847] Disabling protection Traceback (most recent call last): File "D:\A to Z mastery\bypass_utility-master\main.py", line 237, in main() File "D:\A to Z mastery\bypass_utility-master\main.py", line 78, in main result = exploit(device, config, payload, arguments) File "D:\A to Z mastery\bypass_utility-master\src\exploit.py", line 77, in exploit ptr_send = from_bytes(da_read(config.ptr_usbdl, 4), 4, '<') + 8; File "D:\A to Z mastery\bypass_utility-master\src\exploit.py", line 11, in da_read return da_read_write(0, address, length, None, check_result) File "D:\A to Z mastery\bypass_utility-master\src\exploit.py", line 36, in da_read_write return device.cmd_da(direction, address - 0x40, length, data, check_result) File "D:\A to Z mastery\bypass_utility-master\src\device.py", line 330, in cmd_da raise RuntimeError("status is {}".format(status.hex())) RuntimeError: status is 1d1a PS D:\A to Z mastery\bypass_utility-master>