We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
UNLOCK COMMAND:
`C:\mtk2>python mtk da seccfg unlock MTK Flash/Exploit Client V1.53 (c) B.Kerler 2018-2021 Preloader - Status: Waiting for PreLoader VCOM, please connect mobile Port - Hint: Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. Port - Device detected :) Preloader - CPU: MT6765(Helio P35/G35) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0x25 Preloader - Disabling Watchdog... Preloader - HW code: 0x766 Preloader - Target config: 0xe7 Preloader - SBC enabled: True Preloader - SLA enabled: True Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: B4FD7FAA01E367EAF68C1B76393EF17D Preloader - SOC_ID: 08F3DD3663A645FDD0FDEDF058241653134C146F32C21D89993F57619BF27C96 PLTools - Loading payload from mt6765_payload.bin, 0x264 bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Kamakiri - Done sending payload... PLTools - Successfully sent payload: C:\mtk2\mtkclient\payloads\mt6765_payload.bin Port - Device detected :) DA_handler - Device is protected. DA_handler - Device is in BROM mode. Trying to dump preloader. DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - DRAM config needed for : 90014a6843386150 DAXFlash - Sending emi data ... DAXFlash - Sending emi data succeeded. DAXFlash - Uploading stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: hC8aP> DAXFlash - EMMC CID: 90014a68433861503e03485554372661 DAXFlash - EMMC Boot1 Size: 0x400000 DAXFlash - EMMC Boot2 Size: 0x400000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x1000000 DAXFlash - EMMC USER Size: 0xe8f800000 DAXFlash - DA-CODE : 0x666D0 DAXFlash - DA Extensions successfully added Traceback (most recent call last): File "C:\mtk2\mtk", line 1375, in <module> mtk = Main(args).run() File "C:\mtk2\mtk", line 651, in run da_handler.handle_da_cmds(mtk, cmd, args) File "C:\mtk2\mtkclient\Library\mtk_da_cmd.py", line 640, in handle_da_cmds mtk.daloader.seccfg(args.flag) File "C:\mtk2\mtkclient\Library\mtk_daloader.py", line 223, in seccfg return self.xft.seccfg(lockflag) File "C:\mtk2\mtkclient\Library\xflash_ext.py", line 457, in seccfg for rpartition in guid_gpt.partentries: AttributeError: 'NoneType' object has no attribute 'partentries' `
LOCK COMMAND:
`C:\mtk2>python mtk da seccfg lock MTK Flash/Exploit Client V1.53 (c) B.Kerler 2018-2021 Preloader - Status: Waiting for PreLoader VCOM, please connect mobile Port - Hint: Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. Port - Device detected :) Preloader - CPU: MT6765(Helio P35/G35) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0x25 Preloader - Disabling Watchdog... Preloader - HW code: 0x766 Preloader - Target config: 0xe7 Preloader - SBC enabled: True Preloader - SLA enabled: True Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: B4FD7FAA01E367EAF68C1B76393EF17D Preloader - SOC_ID: 08F3DD3663A645FDD0FDEDF058241653134C146F32C21D89993F57619BF27C96 PLTools - Loading payload from mt6765_payload.bin, 0x264 bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Kamakiri - Done sending payload... PLTools - Successfully sent payload: C:\mtk2\mtkclient\payloads\mt6765_payload.bin Port - Device detected :) DA_handler - Device is protected. DA_handler - Device is in BROM mode. Trying to dump preloader. DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - DRAM config needed for : 90014a6843386150 DAXFlash - Sending emi data ... DAXFlash - Sending emi data succeeded. DAXFlash - Uploading stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: hC8aP> DAXFlash - EMMC CID: 90014a68433861503e03485554372661 DAXFlash - EMMC Boot1 Size: 0x400000 DAXFlash - EMMC Boot2 Size: 0x400000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x1000000 DAXFlash - EMMC USER Size: 0xe8f800000 DAXFlash - DA-CODE : 0x666D0 DAXFlash - DA Extensions successfully added Traceback (most recent call last): File "C:\mtk2\mtk", line 1375, in <module> mtk = Main(args).run() File "C:\mtk2\mtk", line 651, in run da_handler.handle_da_cmds(mtk, cmd, args) File "C:\mtk2\mtkclient\Library\mtk_da_cmd.py", line 640, in handle_da_cmds mtk.daloader.seccfg(args.flag) File "C:\mtk2\mtkclient\Library\mtk_daloader.py", line 223, in seccfg return self.xft.seccfg(lockflag) File "C:\mtk2\mtkclient\Library\xflash_ext.py", line 457, in seccfg for rpartition in guid_gpt.partentries: AttributeError: 'NoneType' object has no attribute 'partentries'`
The text was updated successfully, but these errors were encountered:
@ligteltelecom Did you tried mtk xflash seccfg unlock?
Sorry, something went wrong.
it seems it cannot read the gpt table. Did you mess it up ?
Hi bro Problem was solved. GPT Table was corrupted.
Ok, closing this now.
No branches or pull requests
UNLOCK COMMAND:
LOCK COMMAND:
The text was updated successfully, but these errors were encountered: