bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.7k stars 528 forks source link

Generic MT8168 Tablet #850

Closed Learm88 closed 4 months ago

Learm88 commented 11 months ago

Cannot get past this. Any ideas? Thanks

Preloader - CPU: MT8168() Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader - HW code: 0x8168 Preloader - Target config: 0xe1 Preloader - SBC enabled: True Preloader - SLA enabled: False Preloader - DAA enabled: False Preloader - SWJTAG enabled: False Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca01 Preloader - SW Ver: 0x100 Preloader - ME_ID: 485E65D1172B17628AFF6D7FC197525E DA_handler - Device is unprotected. DA_handler - Device is in BROM-Mode. Bypassing security. PLTools - Loading payload from generic_patcher_payload.bin, 0x56c bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Traceback (most recent call last): File "C:\Users\User\Downloads\MTKClient GUI 2.0\mtkclient\mtk", line 698, in mtk = Main(args).run() File "C:\Users\User\Downloads\MTKClient GUI 2.0\mtkclient\mtkclient\Library\mtk_main.py", line 518, in run mtk = da_handler.configure_da(mtk, preloader) File "C:\Users\User\Downloads\MTKClient GUI 2.0\mtkclient\mtkclient\Library\mtk_da_cmd.py", line 101, in configure_da mtk = mtk.bypass_security() # Needed for dumping preloader File "C:\Users\User\Downloads\MTKClient GUI 2.0\mtkclient\mtkclient\Library\mtk.py", line 146, in bypass_security if plt.runpayload(filename=self.config.payloadfile): File "C:\Users\User\Downloads\MTKClient GUI 2.0\mtkclient\mtkclient\Library\pltools.py", line 100, in runpayload if self.kama.payload(payload, addr, True, exploittype): File "C:\Users\User\Downloads\MTKClient GUI 2.0\mtkclient\mtkclient\Library\kamakiri.py", line 138, in payload if self.exploit2(payload, addr): File "C:\Users\User\Downloads\MTKClient GUI 2.0\mtkclient\mtkclient\Library\kamakiri.py", line 116, in exploit2 ptr_send = unpack("<I", self.da_read(self.mtk.config.chipconfig.send_ptr[0][1], 4))[0] + 8 TypeError: 'NoneType' object is not subscriptable

github-actions[bot] commented 4 months ago

Stale issue message