Xiaomi Mi play açılmıyor

ErenPredator

Centipat
Katılım
3 Ağustos 2024
Mesajlar
378
Çözümler
3
Yer
Mars
Daha fazla  
Cinsiyet
Erkek
Selam. Ben telefonu şarja taktım 1 saat sonra geldiğimde telefon çalışıyordu 20 dakika normal kullandıktan sonra dondu ve kapandı tekrar açmaya çalıştığımda telefon açılmıyordu. Telefonun aşağısında mavi LED ışık var o telefonun Power tuşuna basılı tutunca o 2 kez yanıp sönüyor. Ekran bozuk olma ihtimali az ekran bozuk olsa telefon açılır ama hiç açılmıyor. BROM moda gire biliyorum MTKClient ile boot image ve recovery image atmaya çalışınca stage 1 de duruyor.
.Port - Device detected :)
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
DaHandler - Device is protected.
DaHandler - Device is in BROM-Mode. Bypassing security.
PLTools - Loading payload from mt6765_payload.bin, 0x264 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
PLTools - Successfully sent payload: C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\payloads\mt6765_payload.bin
Port - Device detected :)
DaHandler
DaHandler - [LIB]: [33mDevice is in BROM mode. No preloader given, trying to dump preloader from ram.[0m
DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin
XFlashExt - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "hash_check" in preloader
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
XFlashExt - Patching da2 ...
XFlashExt - Security check patched
XFlashExt - DA version anti-rollback patched
XFlashExt - SBC patched to be disabled
XFlashExt - Register read/write not allowed patched
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash
DAXFlash - [LIB]: [31mxread error: unpack requires a buffer of 12 bytes[0m
DAXFlash
DAXFlash - [LIB]: [31mError jumping to DA: -1[0m
SP Flash Tool çalışmıyor status_err gibi hatalar veriyor.
Telefon: Mi Play (lotus) M1901F9E

@Eminss0 hocam size ihtiyacım var yine :D

 
Selam. Ben telefonu şarja taktım 1 saat sonra geldiğimde telefon çalışıyordu 20 dakika normal kullandıktan sonra dondu ve kapandı tekrar açmaya çalıştığımda telefon açılmıyordu. Telefonun aşağısında mavi LED ışık var o telefonun Power tuşuna basılı tutunca o 2 kez yanıp sönüyor. Ekran bozuk olma ihtimali az ekran bozuk olsa telefon açılır ama hiç açılmıyor. BROM moda gire biliyorum MTKClient ile boot image ve recovery image atmaya çalışınca stage 1 de duruyor.
Port - device detected :)
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - hw version: 0x0.
Preloader - wdt: 0x10007000.
Preloader - uart: 0x11002000.
Preloader - BROM payload addr: 0x100a00.
Preloader - da payload addr: 0x201000.
Preloader - cq_dma addr: 0x10212000.
Preloader - var1: 0x25.
Preloader - disabling watchdog...
Preloader - hw code: 0x766.
Preloader - target Config: 0xe7.
Preloader - SBC enabled: True.
Preloader - sla enabled: True.
Preloader - daa enabled: True.
Preloader - swjtag enabled: True.
Preloader - epp_param at 0x600 after EMMC_BOOT/SDMMC_BOOT: false.
Preloader - root cert required: False.
Preloader - mem read auth: True.
Preloader - mem write auth: True.
Preloader - CMD 0xC8 blocked: True.
Preloader - get target info.
Preloader - BROM mode detected.
Preloader - hw subcode: 0x8a00.
Preloader - hw ver: 0xca00.
Preloader - SW ver: 0x0.
Preloader - me_ıd: F3D012B452E31E4755D3e9B0597BE178
Preloader - soc_ıd: F14488D6aaBF0716AF303FC73FE81668C9F9ffbf4e3F6C0634A0FF4499E5bfcf
Preloader.
Preloader - [LIB]: [33mauth file is required. Use --auth option.[0M
Dahandler - device is protected.
Dahandler - device is in BROM-mode. Bypassing Security.
Pltools - loading payload from MT6765_Payload. Bin, 0x264 bytes.
Exploitation - kamakiri run.
Exploitation - done sending payload...
Pltools - successfully sent payload: C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\payloads\mt6765_payload.bin
Port - device detected :)
Dahandler.
Dahandler - [LIB]: [33mdevice is in BROM mode. No preloader given, trying to dump preloader from RAM.[0M
Daxflash - uploading xflash stage 1 from mtk_da_v5.bin
Xflashext - patching DA1...
MTK - patched "patched loader msg" in preloader.
MTK - patched "hash_check" in preloader.
MTK - patched "patched loader msg" in preloader.
MTK - patched "get_vfy_policy" in preloader.
Xflashext - patching DA2...
Xflashext - Security check patched.
Xflashext - da version anti-rollback patched.
Xflashext - SBC patched to be disabled.
Xflashext - register read/write not allowed patched.
Daxflash - successfully uploaded stage 1, jumping.
Preloader - jumping to 0x200000.
Preloader - jumping to 0x200000: Ok.
Daxflash.
Daxflash - [LIB]: [31mxread error: Unpack requires a buffer of 12 bytes[0M
Daxflash.
Daxflash - [LIB]: [31mError jumping to DA: -1[0m
SP Flash Tool çalışmıyor status_err gibi hatalar veriyor.
Telefon: Mi play (lotus) M1901F9E.

@Eminss0 hocam size ihtiyacım var yine :D


Hangi Da'yı (download agent) kullanıyorsunuz yeniden? Ayrıca sürücüler kurulu mu, mevcut kablonuzda bir sorun var mı?

Selam. Ben telefonu şarja taktım 1 saat sonra geldiğimde telefon çalışıyordu 20 dakika normal kullandıktan sonra dondu ve kapandı tekrar açmaya çalıştığımda telefon açılmıyordu. Telefonun aşağısında mavi LED ışık var o telefonun Power tuşuna basılı tutunca o 2 kez yanıp sönüyor. Ekran bozuk olma ihtimali az ekran bozuk olsa telefon açılır ama hiç açılmıyor. BROM moda gire biliyorum MTKClient ile boot image ve recovery image atmaya çalışınca stage 1 de duruyor.
Port - device detected :)
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - hw version: 0x0.
Preloader - wdt: 0x10007000.
Preloader - uart: 0x11002000.
Preloader - BROM payload addr: 0x100a00.
Preloader - da payload addr: 0x201000.
Preloader - cq_dma addr: 0x10212000.
Preloader - var1: 0x25.
Preloader - disabling watchdog...
Preloader - hw code: 0x766.
Preloader - target Config: 0xe7.
Preloader - SBC enabled: True.
Preloader - sla enabled: True.
Preloader - daa enabled: True.
Preloader - swjtag enabled: True.
Preloader - epp_param at 0x600 after EMMC_BOOT/SDMMC_BOOT: false.
Preloader - root cert required: False.
Preloader - mem read auth: True.
Preloader - mem write auth: True.
Preloader - CMD 0xC8 blocked: True.
Preloader - get target info.
Preloader - BROM mode detected.
Preloader - hw subcode: 0x8a00.
Preloader - hw ver: 0xca00.
Preloader - SW ver: 0x0.
Preloader - me_ıd: F3D012B452E31E4755D3e9B0597BE178
Preloader - soc_ıd: F14488D6aaBF0716AF303FC73FE81668C9F9ffbf4e3F6C0634A0FF4499E5bfcf
Preloader.
Preloader - [LIB]: [33mauth file is required. Use --auth option.[0M
Dahandler - device is protected.
Dahandler - device is in BROM-mode. Bypassing Security.
Pltools - loading payload from MT6765_Payload. Bin, 0x264 bytes.
Exploitation - kamakiri run.
Exploitation - done sending payload...
Pltools - successfully sent payload: C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\payloads\mt6765_payload.bin
Port - device detected :)
Dahandler.
Dahandler - [LIB]: [33mdevice is in BROM mode. No preloader given, trying to dump preloader from RAM.[0M
Daxflash - uploading xflash stage 1 from mtk_da_v5.bin
Xflashext - patching DA1...
MTK - patched "patched loader msg" in preloader.
MTK - patched "hash_check" in preloader.
MTK - patched "patched loader msg" in preloader.
MTK - patched "get_vfy_policy" in preloader.
Xflashext - patching DA2...
Xflashext - Security check patched.
Xflashext - da version anti-rollback patched.
Xflashext - SBC patched to be disabled.
Xflashext - register read/write not allowed patched.
Daxflash - successfully uploaded stage 1, jumping.
Preloader - jumping to 0x200000.
Preloader - jumping to 0x200000: Ok.
Daxflash.
Daxflash - [LIB]: [31mxread error: Unpack requires a buffer of 12 bytes[0M
Daxflash.
Daxflash - [LIB]: [31mError jumping to DA: -1[0m
SP Flash Tool çalışmıyor status_err gibi hatalar veriyor.
Telefon: Mi play (lotus) M1901F9E.

@Eminss0 hocam size ihtiyacım var yine :D


py -3 mtk.py dumppreloader --ptype=kamakiri --filename=current_preloader.bin

bu komut ile şu anki preloaderin dumpunu alın, daha sonrasında stock ROM indirip bana geri dönüş yapın.
 
Son düzenleme:
Hangi Da'yı (download agent) kullanıyorsunuz yeniden? Ayrıca sürücüler kurulu mu, mevcut kablonuzda bir sorun var mı?



py -3 mtk.py dumppreloader --ptype=kamakiri --filename=current_preloader.bin

bu komut ile şu anki preloaderin dumpunu alın, daha sonrasında stock ROM indirip bana geri dönüş yapın.
DA olarak MT6765 kullanıyorum. Stock ROM var
Preloader
Preloader - [LIB]: [31mStatus: Handshake failed, retrying...[0m
Preloader
Preloader - [LIB]: [31mStatus: Handshake failed, retrying...[0m
Port - Device detected :)
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
PLTools - Kamakiri / DA Run
PLTools - Loading payload from generic_preloader_dump_payload.bin, 0x250 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
DeviceClass - USBError(5, 'Input/Output Error')
Exploitation - Error, payload answered instead:
PLTools
PLTools - [LIB]: [31mError on sending payload: C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\payloads\generic_preloader_dump_payload.bin[0m
Traceback (most recent call last):
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1021, in <module>
main()
~~~~^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1017, in main
mtk = Main(args).run(parser)
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\mtk_main.py", line 461, in run
data, filename = plt.run_dump_preloader(self.args.ptype)
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 158, in run_dump_preloader
if self.runpayload(filename=pfilename, ack=0xC1C2C3C4, offset=0):
~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 104, in runpayload
self.error(f"Error, payload answered instead: {hexlify(response_ack).decode('utf-8')}")
~~~~~~~^^^^^^^^^^^^^^
TypeError: a bytes-like object is required, not 'NoneType'
Ne yapmalıyım?
 
DA olarak MT6765 kullanıyorum. Stock ROM var
Preloader
Preloader - [LIB]: [31mStatus: Handshake failed, retrying...[0m
Preloader
Preloader - [LIB]: [31mStatus: Handshake failed, retrying...[0m
Port - Device detected :)
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
PLTools - Kamakiri / DA Run
PLTools - Loading payload from generic_preloader_dump_payload.bin, 0x250 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
DeviceClass - USBError(5, 'Input/Output Error')
Exploitation - Error, payload answered instead:
PLTools
PLTools - [LIB]: [31mError on sending payload: C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\payloads\generic_preloader_dump_payload.bin[0m
Traceback (most recent call last):
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1021, in <module>
main()
~~~~^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1017, in main
mtk = Main(args).run(parser)
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\mtk_main.py", line 461, in run
data, filename = plt.run_dump_preloader(self.args.ptype)
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 158, in run_dump_preloader
if self.runpayload(filename=pfilename, ack=0xC1C2C3C4, offset=0):
~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 104, in runpayload
self.error(f"Error, payload answered instead: {hexlify(response_ack).decode('utf-8')}")
~~~~~~~^^^^^^^^^^^^^^
TypeError: a bytes-like object is required, not 'NoneType'
Ne yapmalıyım?
DA olarak V6 kullanın. Size daha önce iletmiştim.

py -3 mtk.py dumppreloader --ptype=kamakiri --filename=current_preloader.bin

py -3 mtk.py dumppreloader --ptype=kamakiri2 --filename=current_preloader_k2.bin

py -3 mtk.py dumppreloader --ptype=amonet --filename=current_preloader_amonet.bin

py -3 mtk.py dumppreloader --ptype=hashimoto --filename=current_preloader_hashi.bin

Hepsini tek tek çalıştırıp toplu olarak tüm logları atın.
 
DA olarak V6 kullanın. Size daha önce iletmiştim.

py -3 mtk.py dumppreloader --ptype=kamakiri --filename=current_preloader.bin

py -3 mtk.py dumppreloader --ptype=kamakiri2 --filename=current_preloader_k2.bin

py -3 mtk.py dumppreloader --ptype=amonet --filename=current_preloader_amonet.bin

py -3 mtk.py dumppreloader --ptype=hashimoto --filename=current_preloader_hashi.bin

Hepsini tek tek çalıştırıp toplu olarak tüm logları atın.
Bilgisayara format attığım için V6 elimde değil şu an.
Port - Device detected :)
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
PLTools - Kamakiri / DA Run
PLTools - Loading payload from generic_preloader_dump_payload.bin, 0x250 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
DeviceClass - USBError(5, 'Input/Output Error')
Exploitation - Error, payload answered instead:
PLTools
PLTools - [LIB]: [31mError on sending payload: C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\payloads\generic_preloader_dump_payload.bin[0m
Traceback (most recent call last):
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1021, in <module>
main()
~~~~^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1017, in main
mtk = Main(args).run(parser)
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\mtk_main.py", line 461, in run
data, filename = plt.run_dump_preloader(self.args.ptype)
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 158, in run_dump_preloader
if self.runpayload(filename=pfilename, ack=0xC1C2C3C4, offset=0):
~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 104, in runpayload
self.error(f"Error, payload answered instead: {hexlify(response_ack).decode('utf-8')}")
~~~~~~~^^^^^^^^^^^^^^
TypeError: a bytes-like object is required, not 'NoneType'

Port - Device detected :)
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
PLTools - Kamakiri / DA Run
PLTools - Loading payload from generic_preloader_dump_payload.bin, 0x250 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
PLTools - Successfully sent payload: C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\payloads\generic_preloader_dump_payload.bin
Progress: |██████████████████████████████████████████████████| 100.0% Complete
Main - Preloader dumped as: preloader_lotus.bin

Port - Device detected :)
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
HwCrypto - GCPU Init Crypto Engine
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c0c, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c10, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c14, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c18, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c1c, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c20, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c24, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c28, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c2c, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c48, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c58, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c68, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mUnknown: 0x1d08[0m
Traceback (most recent call last):
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1021, in <module>
main()
~~~~^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1017, in main
mtk = Main(args).run(parser)
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\mtk_main.py", line 461, in run
data, filename = plt.run_dump_preloader(self.args.ptype)
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 165, in run_dump_preloader
if self.exploit.dump_brom(filename):
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\Exploit\amonet.py", line 124, in dump_brom
self.hwcrypto.disable_range_blacklist(btype, self.mtk)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\Hardware\hwcrypto.py", line 129, in disable_range_blacklist
self.gcpu.acquire()
~~~~~~~~~~~~~~~~~^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\Hardware\hwcrypto_gcpu.py", line 311, in acquire
self.reg.GCPU_REG_CTL &= 0xFFFFFFF0
TypeError: unsupported operand type(s) for &=: 'list' and 'int'
Port - Device detected :)
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
HwCrypto - Disable Caches
Traceback (most recent call last):
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1021, in <module>
main()
~~~~^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1017, in main
mtk = Main(args).run(parser)
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\mtk_main.py", line 461, in run
data, filename = plt.run_dump_preloader(self.args.ptype)
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 165, in run_dump_preloader
if self.exploit.dump_brom(filename):
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\Exploit\hashimoto.py", line 93, in dump_brom
self.hwcrypto.disable_range_blacklist(btype, self.mtk)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\Hardware\hwcrypto.py", line 138, in disable_range_blacklist
refreshcache(b"\xB1")
~~~~~~~~~~~~^^^^^^^^^
TypeError: 'Mtk' object is not callable
Bende olan MtkClient Bozuk galiba.
 
DA olarak MT6765 kullanıyorum. Stock ROM var
Preloader
Preloader - [LIB]: [31mStatus: Handshake failed, retrying...[0m
Preloader
Preloader - [LIB]: [31mStatus: Handshake failed, retrying...[0m
Port - Device detected :)
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
PLTools - Kamakiri / DA Run
PLTools - Loading payload from generic_preloader_dump_payload.bin, 0x250 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
DeviceClass - USBError(5, 'Input/Output Error')
Exploitation - Error, payload answered instead:
PLTools
PLTools - [LIB]: [31mError on sending payload: C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\payloads\generic_preloader_dump_payload.bin[0m
Traceback (most recent call last):
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1021, in <module>
main()
~~~~^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1017, in main
mtk = Main(args).run(parser)
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\mtk_main.py", line 461, in run
data, filename = plt.run_dump_preloader(self.args.ptype)
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 158, in run_dump_preloader
if self.runpayload(filename=pfilename, ack=0xC1C2C3C4, offset=0):
~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 104, in runpayload
self.error(f"Error, payload answered instead: {hexlify(response_ack).decode('utf-8')}")
~~~~~~~^^^^^^^^^^^^^^
TypeError: a bytes-like object is required, not 'NoneType'
Ne yapmalıyım?
Bunu deneyin:

MTKClient Githubunda V6'yı bulabilirsiniz.
python mtk w recovery recovery.img --preloader=preloader.bin --da=MTK_DA_V6.bin --auth=auth_sv5.auth
python mtk w boot boot.img --preloader=preloader.bin --da=MTK_DA_V6.bin --auth=auth_sv5.auth
 
Bunu deneyin:

MTKClient GitHub'unda v6'yı bulabilirsiniz.
python mtk w recovery recovery.img --preloader=preloader.bin --da=MTK_DA_V6.bin --auth=auth_sv5.auth
python mtk w boot boot.img --preloader=preloader.bin --da=MTK_DA_V6.bin --auth=auth_sv5.auth

Aynı hata devam ediyor
Not: USB değiştirdim ama yine aynı. Galiba telefonu artık geri dönderemeyeceğiz. Redmi Note 9 için yaptığımız kodu yazdığımda da aynı hatayı veriyor.
 
Aynı hata devam ediyor.
Not: USB değiştirdim ama yine aynı. Galiba telefonu artık geri dönderemeyeceğiz. Redmi Note 9 için yaptığımız kodu yazdığımda da aynı hatayı veriyor.

Bu sorun donanım kaynaklı olabilir, servise göstermeyi düşündünüz mü hiç?
 

Technopat Haberler

Geri
Yukarı