Comments (12)
mtkclient doesn't do any unlocking, that's why it doesn't work on critical partitions. Other tools most likely patch gpt/pmt, which resulted in bricking many devices. So, currently no support is planned to write critical partitions right now. Closing this issue.
from mtkclient.
i also read that to erase multiple partitions in one flash you separate them with a ,comma, is that the same for multiple partitions to flash at once since the out folder does not work for write?
from mtkclient.
also the stylo 6 and k51 are mt6765 and 6762 and i believe both brom are 766, i have a lot of data for both of these devices, including full rom dumps and brom dumps with unlocked bootloaders and root
from mtkclient.
stylo6.zip
thats the stylo 6 preloader and brom from unlocked bootloader phone, i need to reunlock a k51 and ill post those files shortly
from mtkclient.
heres the k51
K51unlocked&root.zip
from mtkclient.
All done on the same device LG K51 which is helio p22 mt6762
PS C:\Users\jones\Downloads\bkerler tools\mtkclient-main> python mtk dumppreloader
MTK Flash/Exploit Client V1.42 (c) B.Kerler 2020-2021
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
......Port - Device detected :)
Preloader - CPU: MT6765(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - BROM mode detected.
Preloader - ME_ID: E83ED0241DEEC93B5B8277827713A67F
Preloader - SOC_ID: 107C8F6D96FE26D7F2F56EF4FFE0DB44726F26C238AF480676FA2D89556A93AC
PLTools - Kamakiri2
PLTools - Loading payload from C:\Users\jones\Downloads\bkerler tools\mtkclient-main\mtkclient\config..\payloads\generic_preloader_dump_payload.bin, 0x238 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\jones\Downloads\bkerler tools\mtkclient-main\mtkclient\config..\payloads\generic_preloader_dump_payload.bin
Progress: |██████████████████████████████████████████████████| 100.0% Complete
Main - Preloader dumped as: preloader_muse6762_dh30x_q.bin
PS C:\Users\jones\Downloads\bkerler tools\mtkclient-main> python mtk dumpbrom
MTK Flash/Exploit Client V1.42 (c) B.Kerler 2020-2021
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Preloader
Preloader - [LIB]: ←[31mStatus: Handshake failed, please retry←[0m
..Port - Device detected :)
Preloader - CPU: MT6765(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - BROM mode detected.
Preloader - ME_ID: E83ED0241DEEC93B5B8277827713A67F
Preloader - SOC_ID: 107C8F6D96FE26D7F2F56EF4FFE0DB44726F26C238AF480676FA2D89556A93AC
PLTools - Kamakiri2
PLTools - Loading payload from C:\Users\jones\Downloads\bkerler tools\mtkclient-main\mtkclient\config..\payloads\generic_dump_payload.bin, 0xe4 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\jones\Downloads\bkerler tools\mtkclient-main\mtkclient\config..\payloads\generic_dump_payload.bin
Progress: |██████████████████████████████████████████████████| 100.0% Complete
PLTools - Bootrom dumped as: brom_MT6765_766.bin
PS C:\Users\jones\Downloads\bkerler tools\mtkclient-main> python mtk rl out
MTK Flash/Exploit Client V1.42 (c) B.Kerler 2020-2021
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Preloader
Preloader - [LIB]: ←[31mStatus: Handshake failed, please retry←[0m
Preloader
Preloader - [LIB]: ←[31mStatus: Handshake failed, please retry←[0m
Port - Device detected :)
Preloader - CPU: MT6765(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - BROM mode detected.
Preloader - ME_ID: E83ED0241DEEC93B5B8277827713A67F
Preloader - SOC_ID: 107C8F6D96FE26D7F2F56EF4FFE0DB44726F26C238AF480676FA2D89556A93AC
PLTools - Loading payload from C:\Users\jones\Downloads\bkerler tools\mtkclient-main\mtkclient\config..\payloads\mt6765_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\jones\Downloads\bkerler tools\mtkclient-main\mtkclient\config..\payloads\mt6765_payload.bin
Port - Device detected :)
Main - Device is protected.
Main - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading stage 1...
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
DAXFlash - Successfully received DA sync
DAXFlash - Uploading stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC CID: 90014a68423861503e03006d2cbb97af
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x1000000
DAXFlash - EMMC USER Size: 0x747c00000
DAXFlash - DA-CODE : 0x666D0
Main - Dumping partition boot_para with sector count 2048 as out\boot_para.bin.
Progress: |██████--------------------------------------------| 12.5% Read (Addr 0x20000 of 0x100000) 4.00 MB/sDAXFlash
DAXFlash - [LIB]: ←[31mCouldn't write to out\boot_para.bin. Error: float division by zero←[0m
Main - Dumping partition proinfo with sector count 6144 as out\proinfo.bin.
from mtkclient.
Hi, the "float division by zero" error is kind of weird. Please try commit d5923b1 to see if this fixes your issue (I've fixed the progress bar).
from mtkclient.
So I need to modify the usblib.py file with what you changed, if I'm able to make this work maybe you will be interested in working with me to create a new bootloader unlocking tool for all mtk devices, I don't have your knowledge but maybe my files can help you, I already have a really good idea on what the program would need to do I just don't know the code to implement my ideas. I'm having major issues getting the stylo6 to connect, I haven't gotten it to connect yet, its a difficult process to get it to connect to the chimera tool. I welcome you to my discord group called The Bootloader Locksmiths as I'm posting my progress and processes and getting some input from a few others on the results.
from mtkclient.
tool no longer works after that change, changing it back, im on windows 10 64 bit
from mtkclient.
因此,我需要使用您更改的内容修改 usblib.py 文件,如果我能够完成这项工作,也许您有兴趣与我合作为所有 mtk 设备创建一个新的引导加载程序解锁工具,我没有你的知识,但也许我的文件可以帮助你,我已经对程序需要做什么有了一个很好的想法,我只是不知道实现我的想法的代码。我在连接 stylo6 时遇到了重大问题,我还没有让它连接,让它连接到嵌合体工具是一个困难的过程。欢迎您加入我的 Discord 小组 The Bootloader Locksmiths,因为我正在发布我的进度和流程,并从其他一些人那里获得一些关于结果的意见。
hello,I have MediaTek's mobile phone for testing. I want to join,That's a great idea
from mtkclient.
tool no longer works after that change, changing it back, im on windows 10 64 bit
What do you mean by that ?
I might add some unlock tools with the next commit maybe
from mtkclient.
It would not read the device at all, I reinstalled it and it worked again but still can't write the full flash or the out folder to a bootloader locked device when the files come from the same device but when the bootloader was unlocked, chimera will do this but no other tool I've tried will
from mtkclient.
Related Issues (20)
- No valid Live Iso Mirrors HOT 2
- MT6789 stuck on Jumping to 0x200000 HOT 6
- MTKClient log stuck at "None" HOT 1
- Please support for new cpu (mtk6080) HOT 5
- Unbrick Redmi Note 13 Pro+ 5G HOT 2
- Request to add support for Linux-arm64 HOT 7
- [MT6797] Latest mtkclient cannot dump preloader, but the old version can HOT 6
- Cannot send DA on Redmi Note 13 [MT6833], though connected HOT 6
- [MT6797] Failed to reconnect to stage2
- libfuse python library never installs HOT 3
- crash on windows 11 HOT 1
- Cannot unlock bootloader on xiaomi devices. Chipset Dimensity 1080 HOT 2
- Handshake failed on MT6768, Tecno Camon 20
- Device wouldn't connect (MT6227)
- python mtk plstage --preloader=preloader_patched.bin ........... Port - Device detected  lpayload... PLTools - Successfully sent payload: C:\Users\ADMINPC\Desktop\amazonHD\mtkclient\mtkclient\payloads\mt6771_payload.bin Main - Connected to device, loading Main - Using custom preloader : preloader_patched.bin Traceback (most recent call last): File "C:\Users\ADMINPC\Desktop\amazonHD\mtkclient\mtk", line 943, in <module> mtk = Main(args).run(parser) ^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\ADMINPC\Desktop\amazonHD\mtkclient\mtkclient\Library\mtk_main.py", line 512, in run mtk.preloader.setreg_disablewatchdogtimer(mtk.config.hwcode) TypeError: Preloader.setreg_disablewatchdogtimer() missing 1 required positional argument: 'hwver' C:\Users\ADMINPC\Desktop\amazonHD\mtkclient> HOT 3
- Xiaomi RPMB Unable to write or erase
- Download MediaTek DA File for all models (all versions) HOT 1
- I would like to know why it changed back from #1021? It makes my device error again HOT 1
- TCL30XL - DAA_SIG_VERIFY_FAILED Unable to upload DA HOT 3
- [MT6895(Dimensity 8100)] No valid da loader found HOT 9
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from mtkclient.