Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MTK unlock and lock failed #186

Closed
ligteltelecom opened this issue Dec 8, 2021 · 4 comments
Closed

MTK unlock and lock failed #186

ligteltelecom opened this issue Dec 8, 2021 · 4 comments

Comments

@ligteltelecom
Copy link
Contributor

ligteltelecom commented Dec 8, 2021

UNLOCK COMMAND:

`C:\mtk2>python mtk da seccfg unlock
MTK Flash/Exploit Client V1.53 (c) B.Kerler 2018-2021

Preloader - Status: Waiting for PreLoader VCOM, please connect mobile

Port - Hint:

Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.


Port - Device detected :)
Preloader -     CPU:                    MT6765(Helio P35/G35)
Preloader -     HW version:             0x0
Preloader -     WDT:                    0x10007000
Preloader -     Uart:                   0x11002000
Preloader -     Brom payload addr:      0x100a00
Preloader -     DA payload addr:        0x201000
Preloader -     CQ_DMA addr:            0x10212000
Preloader -     Var1:                   0x25
Preloader - Disabling Watchdog...
Preloader - HW code:                    0x766
Preloader - Target config:              0xe7
Preloader -     SBC enabled:            True
Preloader -     SLA enabled:            True
Preloader -     DAA enabled:            True
Preloader -     SWJTAG enabled:         True
Preloader -     EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:  False
Preloader -     Root cert required:     False
Preloader -     Mem read auth:          True
Preloader -     Mem write auth:         True
Preloader -     Cmd 0xC8 blocked:       True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader -     HW subcode:             0x8a00
Preloader -     HW Ver:                 0xca00
Preloader -     SW Ver:                 0x0
Preloader - ME_ID:                      B4FD7FAA01E367EAF68C1B76393EF17D
Preloader - SOC_ID:                     08F3DD3663A645FDD0FDEDF058241653134C146F32C21D89993F57619BF27C96
PLTools - Loading payload from mt6765_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\mtk2\mtkclient\payloads\mt6765_payload.bin
Port - Device detected :)
DA_handler - Device is protected.
DA_handler - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - DRAM config needed for : 90014a6843386150
DAXFlash - Sending emi data ...
DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer:      0x0
DAXFlash - EMMC ID:         hC8aP>
DAXFlash - EMMC CID:        90014a68433861503e03485554372661
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size:   0x0
DAXFlash - EMMC GP2 Size:   0x0
DAXFlash - EMMC GP3 Size:   0x0
DAXFlash - EMMC GP4 Size:   0x0
DAXFlash - EMMC RPMB Size:  0x1000000
DAXFlash - EMMC USER Size:  0xe8f800000
DAXFlash - DA-CODE      : 0x666D0
DAXFlash - DA Extensions successfully added
Traceback (most recent call last):
  File "C:\mtk2\mtk", line 1375, in <module>
    mtk = Main(args).run()
  File "C:\mtk2\mtk", line 651, in run
    da_handler.handle_da_cmds(mtk, cmd, args)
  File "C:\mtk2\mtkclient\Library\mtk_da_cmd.py", line 640, in handle_da_cmds
    mtk.daloader.seccfg(args.flag)
  File "C:\mtk2\mtkclient\Library\mtk_daloader.py", line 223, in seccfg
    return self.xft.seccfg(lockflag)
  File "C:\mtk2\mtkclient\Library\xflash_ext.py", line 457, in seccfg
    for rpartition in guid_gpt.partentries:
AttributeError: 'NoneType' object has no attribute 'partentries'
`

LOCK COMMAND:

`C:\mtk2>python mtk da seccfg lock
MTK Flash/Exploit Client V1.53 (c) B.Kerler 2018-2021

Preloader - Status: Waiting for PreLoader VCOM, please connect mobile

Port - Hint:

Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.


Port - Device detected :)
Preloader -     CPU:                    MT6765(Helio P35/G35)
Preloader -     HW version:             0x0
Preloader -     WDT:                    0x10007000
Preloader -     Uart:                   0x11002000
Preloader -     Brom payload addr:      0x100a00
Preloader -     DA payload addr:        0x201000
Preloader -     CQ_DMA addr:            0x10212000
Preloader -     Var1:                   0x25
Preloader - Disabling Watchdog...
Preloader - HW code:                    0x766
Preloader - Target config:              0xe7
Preloader -     SBC enabled:            True
Preloader -     SLA enabled:            True
Preloader -     DAA enabled:            True
Preloader -     SWJTAG enabled:         True
Preloader -     EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:  False
Preloader -     Root cert required:     False
Preloader -     Mem read auth:          True
Preloader -     Mem write auth:         True
Preloader -     Cmd 0xC8 blocked:       True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader -     HW subcode:             0x8a00
Preloader -     HW Ver:                 0xca00
Preloader -     SW Ver:                 0x0
Preloader - ME_ID:                      B4FD7FAA01E367EAF68C1B76393EF17D
Preloader - SOC_ID:                     08F3DD3663A645FDD0FDEDF058241653134C146F32C21D89993F57619BF27C96
PLTools - Loading payload from mt6765_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\mtk2\mtkclient\payloads\mt6765_payload.bin
Port - Device detected :)
DA_handler - Device is protected.
DA_handler - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - DRAM config needed for : 90014a6843386150
DAXFlash - Sending emi data ...
DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer:      0x0
DAXFlash - EMMC ID:         hC8aP>
DAXFlash - EMMC CID:        90014a68433861503e03485554372661
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size:   0x0
DAXFlash - EMMC GP2 Size:   0x0
DAXFlash - EMMC GP3 Size:   0x0
DAXFlash - EMMC GP4 Size:   0x0
DAXFlash - EMMC RPMB Size:  0x1000000
DAXFlash - EMMC USER Size:  0xe8f800000
DAXFlash - DA-CODE      : 0x666D0
DAXFlash - DA Extensions successfully added
Traceback (most recent call last):
  File "C:\mtk2\mtk", line 1375, in <module>
    mtk = Main(args).run()
  File "C:\mtk2\mtk", line 651, in run
    da_handler.handle_da_cmds(mtk, cmd, args)
  File "C:\mtk2\mtkclient\Library\mtk_da_cmd.py", line 640, in handle_da_cmds
    mtk.daloader.seccfg(args.flag)
  File "C:\mtk2\mtkclient\Library\mtk_daloader.py", line 223, in seccfg
    return self.xft.seccfg(lockflag)
  File "C:\mtk2\mtkclient\Library\xflash_ext.py", line 457, in seccfg
    for rpartition in guid_gpt.partentries:
AttributeError: 'NoneType' object has no attribute 'partentries'`
@zeugensativas
Copy link

@ligteltelecom
Did you tried mtk xflash seccfg unlock?

@bkerler
Copy link
Owner

bkerler commented Dec 9, 2021

it seems it cannot read the gpt table. Did you mess it up ?

@ligteltelecom
Copy link
Contributor Author

it seems it cannot read the gpt table. Did you mess it up ?

Hi bro
Problem was solved. GPT Table was corrupted.

@bkerler
Copy link
Owner

bkerler commented Dec 9, 2021

Ok, closing this now.

@bkerler bkerler closed this as completed Dec 9, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants