Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Error when using the script on MT-6739 #49

Open
AL3X-69 opened this issue Aug 22, 2021 · 1 comment
Open

Error when using the script on MT-6739 #49

AL3X-69 opened this issue Aug 22, 2021 · 1 comment

Comments

@AL3X-69
Copy link

AL3X-69 commented Aug 22, 2021

Hi, When i'm running the script with python main.py and plugging-in my phone (an Honor 7S), i'm getting this error

NotImplementedError: Operation not supported or unimplemented on this platform

Complete stack trace:

[2021-08-22 21:25:46.383137] Waiting for device
[2021-08-22 21:25:50.948190] Found port = COM8

[2021-08-22 21:25:51.007191] Device hw code: 0x699
[2021-08-22 21:25:51.007191] Device hw sub code: 0x8a00
[2021-08-22 21:25:51.008193] Device hw version: 0xcb00
[2021-08-22 21:25:51.009193] Device sw version: 0x2
[2021-08-22 21:25:51.009193] Device secure boot: True
[2021-08-22 21:25:51.010193] Device serial link authorization: True
[2021-08-22 21:25:51.010193] Device download agent authorization: False

[2021-08-22 21:25:51.011192] Disabling watchdog timer
[2021-08-22 21:25:51.012193] Disabling protection
Traceback (most recent call last):
  File "C:\Users\alex6\Downloads\bypass\main.py", line 213, in <module>
    main()
  File "C:\Users\alex6\Downloads\bypass\main.py", line 58, in main
    result = exploit(device, config.watchdog_address, config.payload_address, config.var_0, config.var_1, payload)
  File "C:\Users\alex6\Downloads\bypass\src\exploit.py", line 41, in exploit
    udev.ctrl_transfer(0xA1, 0, 0, var_1, 0)
  File "C:\Users\alex6\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\core.py", line 1071, in ctrl_transfer
    self._ctx.managed_open()
  File "C:\Users\alex6\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\core.py", line 113, in wrapper
    return f(self, *args, **kwargs)
  File "C:\Users\alex6\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\core.py", line 131, in managed_open
    self.handle = self.backend.open_device(self.dev)
  File "C:\Users\alex6\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\backend\libusb1.py", line 804, in open_device
    return _DeviceHandle(dev)
  File "C:\Users\alex6\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\backend\libusb1.py", line 652, in __init__
    _check(_lib.libusb_open(self.devid, byref(self.handle)))
  File "C:\Users\alex6\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\backend\libusb1.py", line 600, in _check
    raise NotImplementedError(_strerror(ret))
NotImplementedError: Operation not supported or unimplemented on this platform

Thanks

@xmusjackson
Copy link

xmusjackson commented Nov 8, 2021

I'm having the same issue. Alcatel 3T8 2019, bootloader unlocked

[2021-11-08 16:36:47.178997] Waiting for device
[2021-11-08 16:37:02.344777] Found port = COM6

[2021-11-08 16:37:02.370058] Device hw code: 0x699
[2021-11-08 16:37:02.370058] Device hw sub code: 0x8a00
[2021-11-08 16:37:02.370058] Device hw version: 0xcb00
[2021-11-08 16:37:02.370058] Device sw version: 0x2
[2021-11-08 16:37:02.370058] Device secure boot: True
[2021-11-08 16:37:02.370058] Device serial link authorization: True
[2021-11-08 16:37:02.370058] Device download agent authorization: True

[2021-11-08 16:37:02.370058] Disabling watchdog timer
[2021-11-08 16:37:02.370058] Disabling protection
Traceback (most recent call last):
  File "C:\Users\Christian\Downloads\bypass_utility-v.1.4.2\bypass_utility-v.1.4.2\main.py", line 213, in <module>
    main()
  File "C:\Users\Christian\Downloads\bypass_utility-v.1.4.2\bypass_utility-v.1.4.2\main.py", line 58, in main
    result = exploit(device, config.watchdog_address, config.payload_address, config.var_0, config.var_1, payload)
  File "C:\Users\Christian\Downloads\bypass_utility-v.1.4.2\bypass_utility-v.1.4.2\src\exploit.py", line 41, in exploit
    udev.ctrl_transfer(0xA1, 0, 0, var_1, 0)
  File "C:\Users\Christian\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\core.py", line 1071, in ctrl_transfer
    self._ctx.managed_open()
  File "C:\Users\Christian\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\core.py", line 113, in wrapper
    return f(self, *args, **kwargs)
  File "C:\Users\Christian\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\core.py", line 131, in managed_open
    self.handle = self.backend.open_device(self.dev)
  File "C:\Users\Christian\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\backend\libusb1.py", line 804, in open_device
    return _DeviceHandle(dev)
  File "C:\Users\Christian\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\backend\libusb1.py", line 652, in __init__
    _check(_lib.libusb_open(self.devid, byref(self.handle)))
  File "C:\Users\Christian\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\backend\libusb1.py", line 600, in _check
    raise NotImplementedError(_strerror(ret))
NotImplementedError: Operation not supported or unimplemented on this platform

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants