bypass_payloads icon indicating copy to clipboard operation
bypass_payloads copied to clipboard

MT6572, MT6768, MT6785 Issues

Open sarunelis opened this issue 3 years ago • 2 comments

Seems wrong address or different BROM versions: MT6572 int (cmd_handler)() = (void)0x4002f7; >> 0x40C5AF MT6768 int (cmd_handler)() = (void)0xcec5; >> 0xCF15 MT6785 int (cmd_handler)() = (void)0xefd9; >> 0xF029 After these patch all works fine, Tested on Xiaomi phones.

Here is dump of my BROM's: https://drive.google.com/file/d/1dIGr2Ndbzhj_7YpPdHUtzYBzCuwr7FlD/view?usp=sharing

sarunelis avatar Aug 14 '21 16:08 sarunelis

Thanks for the info, I'll take a look

chaosmaster avatar Aug 14 '21 22:08 chaosmaster

Thanks for the report, It is working fine with Kamakiri exploit but not with Kamakiri 2. After patching with suggested values which I think is retrieved from mtkclient config file, everything worked just fine with Kamakiri 2 also.

shadabmozaffar avatar Oct 20 '21 17:10 shadabmozaffar