GithubHelp home page GithubHelp logo

flash.bin will not flash about mtkclient HOT 12 CLOSED

bkerler avatar bkerler commented on July 17, 2024
flash.bin will not flash

from mtkclient.

Comments (12)

bkerler avatar bkerler commented on July 17, 2024 1

mtkclient doesn't do any unlocking, that's why it doesn't work on critical partitions. Other tools most likely patch gpt/pmt, which resulted in bricking many devices. So, currently no support is planned to write critical partitions right now. Closing this issue.

from mtkclient.

Warlockguitarman avatar Warlockguitarman commented on July 17, 2024

i also read that to erase multiple partitions in one flash you separate them with a ,comma, is that the same for multiple partitions to flash at once since the out folder does not work for write?

from mtkclient.

Warlockguitarman avatar Warlockguitarman commented on July 17, 2024

also the stylo 6 and k51 are mt6765 and 6762 and i believe both brom are 766, i have a lot of data for both of these devices, including full rom dumps and brom dumps with unlocked bootloaders and root

from mtkclient.

Warlockguitarman avatar Warlockguitarman commented on July 17, 2024

stylo6.zip
thats the stylo 6 preloader and brom from unlocked bootloader phone, i need to reunlock a k51 and ill post those files shortly

from mtkclient.

Warlockguitarman avatar Warlockguitarman commented on July 17, 2024

heres the k51
K51unlocked&root.zip

from mtkclient.

Warlockguitarman avatar Warlockguitarman commented on July 17, 2024

All done on the same device LG K51 which is helio p22 mt6762

PS C:\Users\jones\Downloads\bkerler tools\mtkclient-main> python mtk dumppreloader
MTK Flash/Exploit Client V1.42 (c) B.Kerler 2020-2021
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
......Port - Device detected :)
Preloader - CPU: MT6765(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - BROM mode detected.
Preloader - ME_ID: E83ED0241DEEC93B5B8277827713A67F
Preloader - SOC_ID: 107C8F6D96FE26D7F2F56EF4FFE0DB44726F26C238AF480676FA2D89556A93AC
PLTools - Kamakiri2
PLTools - Loading payload from C:\Users\jones\Downloads\bkerler tools\mtkclient-main\mtkclient\config..\payloads\generic_preloader_dump_payload.bin, 0x238 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\jones\Downloads\bkerler tools\mtkclient-main\mtkclient\config..\payloads\generic_preloader_dump_payload.bin
Progress: |██████████████████████████████████████████████████| 100.0% Complete
Main - Preloader dumped as: preloader_muse6762_dh30x_q.bin
PS C:\Users\jones\Downloads\bkerler tools\mtkclient-main> python mtk dumpbrom
MTK Flash/Exploit Client V1.42 (c) B.Kerler 2020-2021
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Preloader
Preloader - [LIB]: ←[31mStatus: Handshake failed, please retry←[0m
..Port - Device detected :)
Preloader - CPU: MT6765(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - BROM mode detected.
Preloader - ME_ID: E83ED0241DEEC93B5B8277827713A67F
Preloader - SOC_ID: 107C8F6D96FE26D7F2F56EF4FFE0DB44726F26C238AF480676FA2D89556A93AC
PLTools - Kamakiri2
PLTools - Loading payload from C:\Users\jones\Downloads\bkerler tools\mtkclient-main\mtkclient\config..\payloads\generic_dump_payload.bin, 0xe4 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\jones\Downloads\bkerler tools\mtkclient-main\mtkclient\config..\payloads\generic_dump_payload.bin
Progress: |██████████████████████████████████████████████████| 100.0% Complete
PLTools - Bootrom dumped as: brom_MT6765_766.bin
PS C:\Users\jones\Downloads\bkerler tools\mtkclient-main> python mtk rl out
MTK Flash/Exploit Client V1.42 (c) B.Kerler 2020-2021
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Preloader
Preloader - [LIB]: ←[31mStatus: Handshake failed, please retry←[0m
Preloader
Preloader - [LIB]: ←[31mStatus: Handshake failed, please retry←[0m
Port - Device detected :)
Preloader - CPU: MT6765(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - BROM mode detected.
Preloader - ME_ID: E83ED0241DEEC93B5B8277827713A67F
Preloader - SOC_ID: 107C8F6D96FE26D7F2F56EF4FFE0DB44726F26C238AF480676FA2D89556A93AC
PLTools - Loading payload from C:\Users\jones\Downloads\bkerler tools\mtkclient-main\mtkclient\config..\payloads\mt6765_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\jones\Downloads\bkerler tools\mtkclient-main\mtkclient\config..\payloads\mt6765_payload.bin
Port - Device detected :)
Main - Device is protected.
Main - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading stage 1...
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
DAXFlash - Successfully received DA sync
DAXFlash - Uploading stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC CID: 90014a68423861503e03006d2cbb97af
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x1000000
DAXFlash - EMMC USER Size: 0x747c00000
DAXFlash - DA-CODE : 0x666D0
Main - Dumping partition boot_para with sector count 2048 as out\boot_para.bin.
Progress: |██████--------------------------------------------| 12.5% Read (Addr 0x20000 of 0x100000) 4.00 MB/sDAXFlash
DAXFlash - [LIB]: ←[31mCouldn't write to out\boot_para.bin. Error: float division by zero←[0m
Main - Dumping partition proinfo with sector count 6144 as out\proinfo.bin.

from mtkclient.

bkerler avatar bkerler commented on July 17, 2024

Hi, the "float division by zero" error is kind of weird. Please try commit d5923b1 to see if this fixes your issue (I've fixed the progress bar).

from mtkclient.

Warlockguitarman avatar Warlockguitarman commented on July 17, 2024

So I need to modify the usblib.py file with what you changed, if I'm able to make this work maybe you will be interested in working with me to create a new bootloader unlocking tool for all mtk devices, I don't have your knowledge but maybe my files can help you, I already have a really good idea on what the program would need to do I just don't know the code to implement my ideas. I'm having major issues getting the stylo6 to connect, I haven't gotten it to connect yet, its a difficult process to get it to connect to the chimera tool. I welcome you to my discord group called The Bootloader Locksmiths as I'm posting my progress and processes and getting some input from a few others on the results.

from mtkclient.

Warlockguitarman avatar Warlockguitarman commented on July 17, 2024

tool no longer works after that change, changing it back, im on windows 10 64 bit

from mtkclient.

58773622 avatar 58773622 commented on July 17, 2024

因此,我需要使用您更改的内容修改 usblib.py 文件,如果我能够完成这项工作,也许您有兴趣与我合作为所有 mtk 设备创建一个新的引导加载程序解锁工具,我没有你的知识,但也许我的文件可以帮助你,我已经对程序需要做什么有了一个很好的想法,我只是不知道实现我的想法的代码。我在连接 stylo6 时遇到了重大问题,我还没有让它连接,让它连接到嵌合体工具是一个困难的过程。欢迎您加入我的 Discord 小组 The Bootloader Locksmiths,因为我正在发布我的进度和流程,并从其他一些人那里获得一些关于结果的意见。

hello,I have MediaTek's mobile phone for testing. I want to join,That's a great idea

from mtkclient.

bkerler avatar bkerler commented on July 17, 2024

tool no longer works after that change, changing it back, im on windows 10 64 bit

What do you mean by that ?
I might add some unlock tools with the next commit maybe

from mtkclient.

Warlockguitarman avatar Warlockguitarman commented on July 17, 2024

It would not read the device at all, I reinstalled it and it worked again but still can't write the full flash or the out folder to a bootloader locked device when the files come from the same device but when the bootloader was unlocked, chimera will do this but no other tool I've tried will

from mtkclient.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.