Closed Badel2 closed 6 years ago
Thanks, but I'm pretty sure broken eMMCs don't report their controller model, thus it is pretty useless for bricked devices... I could theoretically write something that will identify the controller of bricked eMMCs as well, but I'm too lazy to do that :)
This exploit only works with emmc chip VTU00M, which is the only one affected by the i9300 brick bug. If your device can boot into android you can check the chip model with
Otherwise here is some example code that searches for the chip name in the device memory, UNTESTED FOR VTU00M but works for my 016G92.
(Add this to sboot_exploit.py, run_shellcode, after "searching for arena pointer")
Of course this check could also be added to the shellcode itself, perhaps to the
mmc_dev_init
function.