bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.63k stars 522 forks source link

Version MT8168 #837

Closed Theromazn closed 3 months ago

Theromazn commented 11 months ago

does it work for MT8168 version? Because I'm waiting for a connection and I want to know

Theromazn commented 11 months ago

IMG_4056 It's loading and nothing happens, is this how it should be? does not support the version or am I doing something wrong?

Theromazn commented 11 months ago

Sorry, I accidentally closed the topic, the problem is not solved

Theromazn commented 11 months ago

Doesn't work, I tried two commands

python mtk printgpt --ptype=kamakiri

Preloader - SOC_ID: 0000000000000000000000000000000000000000000000000000000000000000 PLTools - Loading payload from mt8168_payload.bin, 0x258 bytes Exploitation - Kamakiri Run Exploitation - Done sending payload... DeviceClass - USBError(5, 'Input/Output Error') Exploitation - Error, payload answered instead: PLTools - Successfully sent payload: C:\Users\rsase\Downloads\mtkclient-main\mtkclient-main\mtkclient\payloads\mt8168_payload.bin DA_handler - Device is protected. DA_handler - Device is in BROM mode. Trying to dump preloader. DeviceClass - USBError(5, 'Input/Output Error') DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2228.bin xflashext - Patching da1 ... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "hash_check" in preloader xflashext xflashext - [LIB]: ←[33mError on patching da1 version check...←[0m Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "get_vfy_policy" in preloader xflashext - Patching da2 ... DeviceClass - USBError(5, 'Input/Output Error') Preloader Preloader - [LIB]: ←[31mError on DA_Send cmd←[0m DAXFlash DAXFlash - [LIB]: ←[31mError on sending DA.←[0m

python mtk printgpt

Preloader - SOC_ID: 0000000000000000000000000000000000000000000000000000000000000000 PLTools - Loading payload from mt8168_payload.bin, 0x258 bytes Exploitation - Kamakiri Run Traceback (most recent call last): File "C:\Users\rsase\Downloads\mtkclient-main\mtkclient-main\mtk", line 855, in mtk = Main(args).run(parser) ^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\rsase\Downloads\mtkclient-main\mtkclient-main\mtkclient\Library\mtk_main.py", line 603, in run self.cmd_payload(mtk=mtk, payloadfile=payloadfile) File "C:\Users\rsase\Downloads\mtkclient-main\mtkclient-main\mtkclient\Library\mtk_main.py", line 664, in cmd_payload plt.runpayload(filename=payloadfile) File "C:\Users\rsase\Downloads\mtkclient-main\mtkclient-main\mtkclient\Library\pltools.py", line 79, in runpayload ack = self.exploit.runpayload(payload, ack, addr, dontack) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\rsase\Downloads\mtkclient-main\mtkclient-main\mtkclient\Library\Exploit\kamakiri2.py", line 204, in runpayload if self.da_payload(payload, addr, True): ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\rsase\Downloads\mtkclient-main\mtkclient-main\mtkclient\Library\exploit_handler.py", line 80, in da_payload if self.exploit(payload, addr): ^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\rsase\Downloads\mtkclient-main\mtkclient-main\mtkclient\Library\Exploit\kamakiri2.py", line 66, in exploit self.da_write(payloadaddr, len(payload), payload) File "C:\Users\rsase\Downloads\mtkclient-main\mtkclient-main\mtkclient\Library\exploit_handler.py", line 65, in da_write return self.da_read_write(address, length, data, check_result) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\rsase\Downloads\mtkclient-main\mtkclient-main\mtkclient\Library\Exploit\kamakiri2.py", line 55, in da_read_write return self.mtk.preloader.brom_register_access(address - 0x40, length, data, check_result) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\rsase\Downloads\mtkclient-main\mtkclient-main\mtkclient\Library\mtk_preloader.py", line 636, in brom_register_access raise RuntimeError("Kamakiri2 failed, cache issue :(") RuntimeError: Kamakiri2 failed, cache issue :(

Theromazn commented 11 months ago

Хуйня ебаная не работает

bkerler commented 10 months ago

The kamakiri exploit doesn't work with mt8168. Currently, only mt8168 via preloader (non-secure) is supported.

ChickenKilla commented 10 months ago

The kamakiri exploit doesn't work with mt8168. Currently, only mt8168 via preloader (non-secure) is supported.

Is there a way to get mtk client working with 8168? I am attempting to dump partition backup of onn7 tablet with this SOC. I am hitting the runtime error, cash problem, kamakiri issue. Is there a work around for this somewhere? A kernel patch or something maybe? Any help would be appreciated

easleycorey commented 9 months ago

The kamakiri exploit doesn't work with mt8168. Currently, only mt8168 via preloader (non-secure) is supported.

Is there a way to get mtk client working with 8168? I am attempting to dump partition backup of onn7 tablet with this SOC. I am hitting the runtime error, cash problem, kamakiri issue. Is there a work around for this somewhere? A kernel patch or something maybe? Any help would be appreciated

Use the prebuilt or your own linux , making a backup works there besides the userdata. Also have you tired unlocking the bootloader via fastboot yet?

ChickenKilla commented 9 months ago

Yes the bootloader is unlocked. I just haven't been able to pull position backup with mtk client. I keep getting that error. Can I run Linux on Windows PC? I'm assuming I can install that?

ChickenKilla commented 9 months ago

*partition

easleycorey commented 9 months ago

https://www.androidfilehost.com/?fid=15664248565197184488

Download this iso

use rufus to put it to a flash drive https://github.com/pbatard/rufus/releases/download/v4.3/rufus-4.3.exe

Boot to it, yes almost all windows pc can do it

Have another flash drive to save the image too

ChickenKilla commented 9 months ago

Sweet. Thank you so much. I'll give this a shot this weekend when I got some time. I really appreciate that.

github-actions[bot] commented 3 months ago

Stale issue message