bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.56k stars 510 forks source link

PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Traceback (most recent call last): #638

Closed v1st3rr closed 3 months ago

v1st3rr commented 1 year ago

HELP WHAT TO DO? MTK Flash/Exploit Client V1.6.1 (c) B.Kerler 2018-2023

Preloader - Status: Waiting for PreLoader VCOM, please connect mobile

Port - Hint:

Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. If it is already connected and on, hold power for 10 seconds to reset.

Port - Device detected :) Preloader - CPU: MT6895(Dimensity 8100) Preloader - HW version: 0x0 Preloader - WDT: 0x1c007000 Preloader - Uart: 0x11001000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader - HW code: 0x1172 Preloader - Target config: 0xe7 Preloader - SBC enabled: True Preloader - SLA enabled: True Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: A8AFA8F4901D324AD1F616AE58E9AC5D PLTools - Loading payload from generic_patcher_payload.bin, 0x56c bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Traceback (most recent call last): File "C:\Users\jurry\AppData\Local\Programs\Python\Python311\mtk", line 814, in mtk = Main(args).run(parser) File "C:\Users\jurry\AppData\Local\Programs\Python\Python311\mtkclient\Library\mtk_main.py", line 615, in run mtk = da_handler.configure_da(mtk, preloader) File "C:\Users\jurry\AppData\Local\Programs\Python\Python311\mtkclient\Library\mtk_da_cmd.py", line 87, in configure_da mtk = mtk.bypass_security() File "C:\Users\jurry\AppData\Local\Programs\Python\Python311\mtkclient\Library\mtk_class.py", line 155, in bypass_security if plt.runpayload(filename=self.config.payloadfile): File "C:\Users\jurry\AppData\Local\Programs\Python\Python311\mtkclient\Library\pltools.py", line 102, in runpayload if self.kama.payload(payload, addr, True, exploittype): File "C:\Users\jurry\AppData\Local\Programs\Python\Python311\mtkclient\Library\kamakiri.py", line 139, in payload if self.exploit2(payload, addr): File "C:\Users\jurry\AppData\Local\Programs\Python\Python311\mtkclient\Library\kamakiri.py", line 117, in exploit2 ptr_send = unpack("<I", self.da_read(self.mtk.config.chipconfig.send_ptr[0][1], 4))[0] + 8 TypeError: 'NoneType' object is not subscriptable

v1st3rr commented 1 year ago

@bkerler help please

bkerler commented 1 year ago

Kamakiri won't work for this chipset as it's patched.

v1st3rr commented 1 year ago

@bkerler And will never work?

bkerler commented 1 year ago

At least not until there is a new boot rom exploit.

v1st3rr commented 1 year ago

At least not until there is a new boot rom exploit.

@bkerler and how long is it approx?

bkerler commented 1 year ago

I'm not doing any mtk research atm and I don't plan to do it

v1st3rr commented 1 year ago

I'm not doing any mtk research atm and I don't plan to do it

Is there any way to skip 168 hours?

Yervant7 commented 1 year ago

I'm not doing any mtk research atm and I don't plan to do it

brother when possible please do this, we are waiting for the payload for mt6895 for months, this is disturbing the development of mods, thanks.

hopez13 commented 11 months ago

duplicate of #758