Bricked Nokia TA-1188
Bricked Nokia TA-1188
Quote:# python3 ./main.py
[2022-10-09 23:10:29.137308] Waiting for device
[2022-10-09 23:10:41.969952] Found device = 0e8d:2000
[2022-10-09 23:10:42.052289] Device hw code: 0x717
[2022-10-09 23:10:42.052480] Device hw sub code: 0x8a00
[2022-10-09 23:10:42.052636] Device hw version: 0xca01
[2022-10-09 23:10:42.052768] Device sw version: 0x200
[2022-10-09 23:10:42.052899] Device secure boot: True
[2022-10-09 23:10:42.053028] Device serial link authorization: False
[2022-10-09 23:10:42.053154] Device download agent authorization: False
[2022-10-09 23:10:42.053287] Found device in preloader mode, trying to crash...
[2022-10-09 23:10:42.054264] status is 7024
[2022-10-09 23:10:43.976736] Waiting for device
[2022-10-09 23:10:43.977879] Found device = 0e8d:0003
[2022-10-09 23:10:44.056015] Device hw code: 0x717
[2022-10-09 23:10:44.056196] Device hw sub code: 0x8a00
[2022-10-09 23:10:44.056302] Device hw version: 0xca01
[2022-10-09 23:10:44.056400] Device sw version: 0x200
[2022-10-09 23:10:44.056497] Device secure boot: True
[2022-10-09 23:10:44.056627] Device serial link authorization: False
[2022-10-09 23:10:44.056734] Device download agent authorization: False
[2022-10-09 23:10:44.056846] Disabling watchdog timer
[2022-10-09 23:10:44.057470] Insecure device, sending payload using send_da
[2022-10-09 23:10:44.096292] Found send_dword, dumping bootrom to bootrom_717.bin
Quote:$ mtk reset
MTK Flash/Exploit Client V1.6.0 © B.Kerler 2018-2022
DAXFlash - HW-CODE : 0x717
DAXFlash - HWSUB-CODE : 0x8A00
DAXFlash - HW-VERSION : 0xCA01
DAXFlash - SW-VERSION : 0x200
DAXFlash - CHIP-EVOLUTION : 0x0
DAXFlash - DA-VERSION : 1.0
DeviceClass - [Errno 2] Entity not found
Reset command was sent. Disconnect usb cable to power off.
(10-10-2022, 11:18 AM)qla I've been looking for help on the Internet and I don't know how I couldn't see this forum.Refer to https://www.hovatek.com/blog/my-experien...-5g-china/
I use Linux.
My problem: - bricked Nokia TA-1188
I try to upload new rom to my Nokia TA-1188 via SP_Flash_Tool-5.1916_Linux.
firmware: https://drive.google.com/uc?id=1ORCq7T2H...t=download
I want get STOCK firmware via https://www.hovatek.com/forum/thread-26928.html but I don't have password and login
Now telephone is locked and nothing can be done.
Fastboot mode cannot be enabled and the phone cannot be turned on.
After how SP flash tool show error - I try unlock tel.
- https://www.hovatek.com/forum/thread-808.html
- https://www.hovatek.com/forum/thread-286.html
- via Bypas utility:
Quote:# python3 ./main.py
[2022-10-09 23:10:29.137308] Waiting for device
[2022-10-09 23:10:41.969952] Found device = 0e8d:2000
[2022-10-09 23:10:42.052289] Device hw code: 0x717
[2022-10-09 23:10:42.052480] Device hw sub code: 0x8a00
[2022-10-09 23:10:42.052636] Device hw version: 0xca01
[2022-10-09 23:10:42.052768] Device sw version: 0x200
[2022-10-09 23:10:42.052899] Device secure boot: True
[2022-10-09 23:10:42.053028] Device serial link authorization: False
[2022-10-09 23:10:42.053154] Device download agent authorization: False
[2022-10-09 23:10:42.053287] Found device in preloader mode, trying to crash...
[2022-10-09 23:10:42.054264] status is 7024
[2022-10-09 23:10:43.976736] Waiting for device
[2022-10-09 23:10:43.977879] Found device = 0e8d:0003
[2022-10-09 23:10:44.056015] Device hw code: 0x717
[2022-10-09 23:10:44.056196] Device hw sub code: 0x8a00
[2022-10-09 23:10:44.056302] Device hw version: 0xca01
[2022-10-09 23:10:44.056400] Device sw version: 0x200
[2022-10-09 23:10:44.056497] Device secure boot: True
[2022-10-09 23:10:44.056627] Device serial link authorization: False
[2022-10-09 23:10:44.056734] Device download agent authorization: False
[2022-10-09 23:10:44.056846] Disabling watchdog timer
[2022-10-09 23:10:44.057470] Insecure device, sending payload using send_da
[2022-10-09 23:10:44.096292] Found send_dword, dumping bootrom to bootrom_717.bin
Still error - look pic up
and:
Quote:$ mtk reset
MTK Flash/Exploit Client V1.6.0 © B.Kerler 2018-2022
DAXFlash - HW-CODE : 0x717
DAXFlash - HWSUB-CODE : 0x8A00
DAXFlash - HW-VERSION : 0xCA01
DAXFlash - SW-VERSION : 0x200
DAXFlash - CHIP-EVOLUTION : 0x0
DAXFlash - DA-VERSION : 1.0
DeviceClass - [Errno 2] Entity not found
Reset command was sent. Disconnect usb cable to power off.
Still error - look pic up - and the phone cannot be turned on.
Any help please - how to unbrick my phone - PLEASE
Quote:Refer to https://www.hovatek.com/blog/my-experien...-5g-china/
# mtk da seccfg unlock
MTK Flash/Exploit Client V1.6.0 (c) B.Kerler 2018-2022
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
.......Port - Device detected :)
Preloader - CPU: MT6761/MT6762/MT3369/MT8766B(Helio A20/P22/A22/A25/G25)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x717
Preloader - Target config: 0xe1
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca01
Preloader - SW Ver: 0x200
Preloader - ME_ID: AC46FAA180A9A5A6287F0FECCD90DE31
Preloader - SOC_ID: 635F9A58573CA11F8D9C1B3E046B66827EF7555A2A3F9019409449C6B957C6F6
DA_handler - Device is unprotected.
DA_handler - Device is in BROM-Mode. Bypassing security.
PLTools - Loading payload from mt6761_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: /usr/local/lib/python3.10/site-packages/mtkclient-1.6.0-py3.10.egg/mtkclient/payloads/mt6761_payload.bin
Port - Device detected :)
DA_handler
DA_handler - [LIB]: Device is in BROM mode. No preloader given, trying to dump preloader from ram.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
xflashext
xflashext - [LIB]: Error on patching da1 version check...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - DRAM config needed for : 7001005442323831
DAXFlash - Sending emi data ...
DAXFlash - DRAM setup passed.
DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: TB2816
DAXFlash - EMMC CID: 70010054423238313620195a833a563f
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x400000
DAXFlash - EMMC USER Size: 0x3a8000000
DAXFlash - HW-CODE : 0x717
DAXFlash - HWSUB-CODE : 0x8A00using preloader file
DAXFlash - HW-VERSION : 0xCA01
DAXFlash - SW-VERSION : 0x200
DAXFlash - CHIP-EVOLUTION : 0x0
DAXFlash - DA-VERSION : 1.0
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - DA Extensions successfully added
DA_handler
DA_handler - [LIB]: Unknown seccfg partition header. Aborting unlock.
# mtk da seccfg unlock --preloader="/home/TA-1188/Nokia 2.2 TA-1188 Firmware [MT6761]/preloader_wasp.bin"
MTK Flash/Exploit Client V1.6.0 (c) B.Kerler 2018-2022
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
..........
Port - Device detected :)
Preloader - CPU: MT6761/MT6762/MT3369/MT8766B(Helio A20/P22/A22/A25/G25)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x717
Preloader - Target config: 0xe1
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca01
Preloader - SW Ver: 0x200
Preloader - ME_ID: AC46FAA180A9A5A6287F0FECCD90DE31
Preloader - SOC_ID: 635F9A58573CA11F8D9C1B3E046B66827EF7555A2A3F9019409449C6B957C6F6
DA_handler - Device is unprotected.
DA_handler - Device is in BROM-Mode. Bypassing security.
PLTools - Loading payload from mt6761_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: /usr/local/lib/python3.10/site-packages/mtkclient-1.6.0-py3.10.egg/mtkclient/payloads/mt6761_payload.bin
Port - Device detected :)
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
xflashext
xflashext - [LIB]: Error on patching da1 version check...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - DRAM config needed for : 7001005442323831
DAXFlash - Sending emi data ...
DAXFlash - DRAM setup passed.
DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: TB2816
DAXFlash - EMMC CID: 70010054423238313620195a833a563f
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x400000
DAXFlash - EMMC USER Size: 0x3a8000000
DAXFlash - HW-CODE : 0x717
DAXFlash - HWSUB-CODE : 0x8A00
DAXFlash - HW-VERSION : 0xCA01
DAXFlash - SW-VERSION : 0x200
DAXFlash - CHIP-EVOLUTION : 0x0
DAXFlash - DA-VERSION : 1.0
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - DA Extensions successfully added
DA_handler
DA_handler - [LIB]: Unknown seccfg partition header. Aborting unlock.
# mtk payload
MTK Flash/Exploit Client V1.6.0 (c) B.Kerler 2018-2022
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Preloader
Preloader - [LIB]: Status: Handshake failed, retrying...
Preloader
Preloader - [LIB]: Status: Handshake failed, retrying...
Preloader
Preloader - [LIB]: Status: Handshake failed, retrying...
Preloader
Preloader - [LIB]: Status: Handshake failed, retrying...
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
Port - Device detected :)
Preloader - CPU: MT6761/MT6762/MT3369/MT8766B(Helio A20/P22/A22/A25/G25)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x717
Preloader - Target config: 0xe1
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca01
Preloader - SW Ver: 0x200
Preloader - ME_ID: AC46FAA180A9A5A6287F0FECCD90DE31
Preloader - SOC_ID: 635F9A58573CA11F8D9C1B3E046B66827EF7555A2A3F9019409449C6B957C6F6
PLTools - Loading payload from mt6761_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: /usr/local/lib/python3.10/site-packages/mtkclient-1.6.0-py3.10.egg/mtkclient/payloads/mt6761_payload.bin
sysname:Linux
nodename:localhost.localdomain
release:5.19.12-pclos1
version:#1 SMP PREEMPT_DYNAMIC Wed Sep 28 12:14:22 CDT 2022
machine:x86_64
domainame:(none)
cur_kernel_version = 5.19.12
QObject::moveToThread: Cannot move objects with a parent
support_dl_cert_to_storage: 0
Application asked to unregister timer 0xc00001b which is not registered in this thread. Fix application.
Connecting to BROM...
Scanning USB port...
Search usb, timeout set as 3600000 ms
add@/devices/pci0000:00/0000:00:14.0/usb3/3-1
add@/devices/pci0000:00/0000:00:14.0/usb3/3-1/3-1:1.1
add@/devices/pci0000:00/0000:00:14.0/usb3/3-1/3-1:1.0
bind@/devices/pci0000:00/0000:00:14.0/usb3/3-1/3-1:1.1
add@/devices/pci0000:00/0000:00:14.0/usb3/3-1/3-1:1.0/tty/ttyACM0
vid is 0e8d
device vid = 0e8d
pid is 2000
device pid = 2000
com portName is: /dev/ttyACM0
Total wait time = -1665492150.000000
USB port is obtained. path name(/dev/ttyACM0), port name(/dev/ttyACM0)
USB port detected: /dev/ttyACM0
BROM connected
Downloading & Connecting to DA...
connect DA end stage: 2, enable DRAM in 1st DA: 0
Failed to Connect DA: STATUS_BROM_CMD_SEND_DA_FAIL(-1073348605)
Disconnect!
BROM Exception! ( ERROR : STATUS_BROM_CMD_SEND_DA_FAIL (-1073348605) , MSP ERROE CODE : 0x00.
[HINT]:
)((ConnectDA,../../../flashtool/Conn/Connection.cpp,147))
Connecting to BROM...
Scanning USB port...
Search usb, timeout set as 3600000 ms
remove@/devices/pci0000:00/0000:00:14.0/usb3/3-1/3-1:1.0/tty/ttyACM0
open VID device failed!
unbind@/devices/pci0000:00/0000:00:14.0/usb3/3-1/3-1:1.1
unbind@/devices/pci0000:00/0000:00:14.0/usb3/3-1/3-1:1.0
remove@/devices/pci0000:00/0000:00:14.0/usb3/3-1/3-1:1.0
remove@/devices/pci0000:00/0000:00:14.0/usb3/3-1/3-1:1.1
unbind@/devices/pci0000:00/0000:00:14.0/usb3/3-1
remove@/devices/pci0000:00/0000:00:14.0/usb3/3-1
Connecting to BROM...
Scanning USB port...
Search usb, timeout set as 3600000 ms
add@/devices/pci0000:00/0000:00:14.0/usb3/3-1
add@/devices/pci0000:00/0000:00:14.0/usb3/3-1/3-1:1.0-1073348605
add@/devices/pci0000:00/0000:00:14.0/usb3/3-1/3-1:1.0/tty/ttyACM0
vid is 0e8d
device vid = 0e8d
pid is 0003
device pid = 0003
com portName is: /dev/ttyACM0
Total wait time = -1665492185.000000
USB port is obtained. path name(/dev/ttyACM0), port name(/dev/ttyACM0)
USB port detected: /dev/ttyACM0
BROM connected
Downloading & Connecting to DA...
connect DA end stage: 2, enable DRAM in 1st DA: 0
Warning: not valid DA SLA version, skip DA SLA flow.
DA Connected
executing DADownloadAll...
Stage:
[0] WRITE TO PARTITION [ preloader ]
Stage:
[4] WRITE TO PARTITION [ custom_a ]
Download failed.
Disconnect!
BROM Exception! ( ERROR : STATUS_SEC_IMG_TYPE_MISMATCH (-1073610710) , MSP ERROE CODE : 0x00.
[HINT]:
Verified boot is enabled.
Please download signed image(custom_a-verified.img) or disable verified boot.)((exec,../../../flashtool/Cmd/DADownloadAll.cpp,84))
comboTimeout index(3) saved.
Logger deinited.
# mtk reset
MTK Flash/Exploit Client V1.6.0 (c) B.Kerler 2018-2022
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
......Port - Device detected :)
Preloader - CPU: MT6761/MT6762/MT3369/MT8766B(Helio A20/P22/A22/A25/G25)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x717
Preloader - Target config: 0xe1
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
...........
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca01
Preloader - SW Ver: 0x200
Preloader - ME_ID: AC46FAA180A9A5A6287F0FECCD90DE31
Preloader - SOC_ID: 635F9A58573CA11F8D9C1B3E046B66827EF7555A2A3F9019409449C6B957C6F6
DA_handler - Device is unprotected.
DA_handler - Device is in BROM-Mode. Bypassing security.
PLTools - Loading payload from mt6761_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: /usr/local/lib/python3.10/site-packages/mtkclient-1.6.0-py3.10.egg/mtkclient/payloads/mt6761_payload.bin
Port - Device detected :)
DA_handler
DA_handler - [LIB]: Device is in BROM mode. No preloader given, trying to dump preloader from ram.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
xflashext
xflashext - [LIB]: Error on patching da1 version check...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - DRAM config needed for : 7001005442323831
DAXFlash - Sending emi data ...
DAXFlash - DRAM setup passed.
DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: TB2816
DAXFlash - EMMC CID: 70010054423238313620195a833a563f
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x400000
DAXFlash - EMMC USER Size: 0x3a8000000
DAXFlash - HW-CODE : 0x717
DAXFlash - HWSUB-CODE : 0x8A00
DAXFlash - HW-VERSION : 0xCA01
DAXFlash - SW-VERSION : 0x200
DAXFlash - CHIP-EVOLUTION : 0x0
DAXFlash - DA-VERSION : 1.0
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - DA Extensions successfully added
DeviceClass - [Errno 2] Entity not found
Reset command was sent. Disconnect usb cable to power off.
(11-10-2022, 02:32 PM)qla ..
The nokia still is bricked - I need any assistance further
py -3 mtk payload
(12-10-2022, 11:22 PM)maxpayne Ensure you're running python 3.9 then run
share the log of the response
Quote:Python 3.10.6 (main, Aug 11 2022, 11:29:38) [GCC 12.1.0] on linux
mtk payload
MTK Flash/Exploit Client V1.6.0 (c) B.Kerler 2018-2022
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Hint:
Power off the phone before connecting.mtk rl /media/win_c/adb/all_partytion/
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
...........
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
..Port - Device detected :)
Preloader - CPU: MT6761/MT6762/MT3369/MT8766B(Helio A20/P22/A22/A25/G25)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000mtk rl /media/win_c/adb/all_partytion/
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x717
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca01
Preloader - SW Ver: 0x200
Preloader - ME_ID: AC46FAA180A9A5A6287F0FECCD90DE31
Preloader - SOC_ID: 635F9A58573CA11F8D9C1B3E046B66827EF7555A2A3F9019409449C6B957C6F6
PLTools - Loading payload from mt6761_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: /usr/local/lib/python3.10/site-packages/mtkclient-1.6.0-py3.10.egg/mtkclient/payloads/mt6761_payload.bin
Quote:don't try to unlock bootloader anymore
mtk w preloader,custom_a,elabel_a,logo,md1img_a,spmfw_a,scp_a,sspm_a,lk_a,boot_a,dtbo_a,tee_a,vendor_a,system_a,vbmeta_a,custom_b,elabel_b,md1img_b,spmfw_b,scp_b,sspm_b,lk_b,boot_b,dtbo_b,tee_b,vendor_b,system_b,vbmeta_b,userdata preloader_wasp.bin,custom.img,elabel.img,logo.bin,md1img.img,spmfw.img,scp.img,sspm.img,lk.img,boot.img,dtbo.img,tee.img,vendor.img,system.img,vbmeta.img,custom.img,elabel.img,md1img.img,spmfw.img,scp.img,sspm.img,lk.img,boot.img,dtbo.img,tee.img,vendor.img,system.img,vbmeta.img,userdata.img
MTK Flash/Exploit Client V1.6.0 (c) B.Kerler 2018-2022
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
...........
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
...........
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
...........
Port - Device detected :)
Preloader - CPU: MT6761/MT6762/MT3369/MT8766B(Helio A20/P22/A22/A25/G25)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x717
Preloader - Target config: 0xe1
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca01
Preloader - SW Ver: 0x200
Preloader - ME_ID: AC46FAA180A9A5A6287F0FECCD90DE31
Preloader - SOC_ID: 635F9A58573CA11F8D9C1B3E046B66827EF7555A2A3F9019409449C6B957C6F6
DA_handler - Device is unprotected.
DA_handler - Device is in BROM-Mode. Bypassing security.
PLTools - Loading payload from mt6761_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: /usr/local/lib/python3.10/site-packages/mtkclient-1.6.0-py3.10.egg/mtkclient/payloads/mt6761_payload.bin
Port - Device detected :)
DA_handler
DA_handler - [LIB]: Device is in BROM mode. No preloader given, trying to dump preloader from ram.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
xflashext
xflashext - [LIB]: Error on patching da1 version check...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - DRAM config needed for : 7001005442323831
DAXFlash - Sending emi data ...
DAXFlash - DRAM setup passed.
DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: TB2816
DAXFlash - EMMC CID: 70010054423238313620195a833a563f
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x400000
DAXFlash - EMMC USER Size: 0x3a8000000
DAXFlash - HW-CODE : 0x717
DAXFlash - HWSUB-CODE : 0x8A00
DAXFlash - HW-VERSION : 0xCA01
DAXFlash - SW-VERSION : 0x200
DAXFlash - CHIP-EVOLUTION : 0x0
DAXFlash - DA-VERSION : 1.0
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - DA Extensions successfully added
DA_handler
DA_handler - [LIB]: Error: Couldn't detect partition: preloader
Available partitions:
DA_handler - boot_para
DA_handler - para
DA_handler - custom_a
DA_handler - elabel_a
DA_handler - private
DA_handler - expdb
DA_handler - frp
DA_handler - nvcfg
DA_handler - nvdata
DA_handler - metadata
DA_handler - protect1
DA_handler - protect2
DA_handler - seccfg
DA_handler - sec1
DA_handler - proinfo
DA_handler - nvram
DA_handler - logo
DA_handler - md1img_a
DA_handler - spmfw_a
DA_handler - scp_a
DA_handler - sspm_a
DA_handler - gz_a
DA_handler - lk_a
DA_handler - boot_a
DA_handler - dtbo_a
DA_handler - tee_a
DA_handler - vendor_a
DA_handler - system_a
DA_handler - vbmeta_a
DA_handler - custom_b
DA_handler - elabel_b
DA_handler - md1img_b
DA_handler - spmfw_b
DA_handler - scp_b
DA_handler - sspm_b
DA_handler - gz_b
DA_handler - lk_b
DA_handler - boot_b
DA_handler - dtbo_b
DA_handler - tee_b
DA_handler - vendor_b
DA_handler - system_b
DA_handler - vbmeta_b
DA_handler - userdata
DA_handler - otp
DA_handler - flashinfo
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x19000 of 0x19000, ) 7.28 MB/s50 MB/s
Wrote custom.img to sector 3136 with sector count 102400.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x2800 of 0x2800, ) 6.25 MB/s
Wrote elabel.img to sector 105536 with sector count 10240.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x35B of 0x35B, ) 5.81 MB/s
Wrote logo.bin to sector 616448 with sector count 22528.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x32000 of 0x32000, ) 7.08 MB/s85 MB/s
Wrote md1img.img to sector 638976 with sector count 204800.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x800 of 0x800, ) 6.90 MB/s
Wrote spmfw.img to sector 843776 with sector count 2048.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x800 of 0x800, ) 6.52 MB/s
Wrote scp.img to sector 845824 with sector count 2048.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x800 of 0x800, ) 6.07 MB/s
Wrote sspm.img to sector 847872 with sector count 2048.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x800 of 0x800, ) 6.78 MB/s
Wrote lk.img to sector 882688 with sector count 2048.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x10000 of 0x10000, ) 6.82 MB/s7 MB/s
Wrote boot.img to sector 884736 with sector count 65536.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x4000 of 0x4000, ) 6.74 MB/s
Wrote dtbo.img to sector 950272 with sector count 16384.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x4000 of 0x4000, ) 6.80 MB/s
Wrote tee.img to sector 966656 with sector count 16384.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x180000 of 0x180000, ) 7.09 MB/s26 MB/sB/s
Wrote vendor.img to sector 983040 with sector count 1572864.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x600000 of 0x600000, ) 3.20 MB/s83 MB/sMB/s
Wrote system.img to sector 2555904 with sector count 6291456.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x4000 of 0x4000, ) 6.60 MB/s
Wrote vbmeta.img to sector 8847360 with sector count 16384.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x19000 of 0x19000, ) 6.88 MB/s07 MB/s
Wrote custom.img to sector 8863744 with sector count 102400.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x2800 of 0x2800, ) 6.84 MB/s
Wrote elabel.img to sector 8966144 with sector count 12288.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x32000 of 0x32000, ) 7.02 MB/s20 MB/s
Wrote md1img.img to sector 8978432 with sector count 204800.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x800 of 0x800, ) 7.02 MB/s
Wrote spmfw.img to sector 9183232 with sector count 2048.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x800 of 0x800, ) 6.84 MB/s
Wrote scp.img to sector 9185280 with sector count 2048.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x800 of 0x800, ) 6.35 MB/s
Wrote sspm.img to sector 9187328 with sector count 2048.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x800 of 0x800, ) 0.91 MB/s
Wrote lk.img to sector 9222144 with sector count 2048.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x10000 of 0x10000, ) 7.58 MB/s9 MB/s
Wrote boot.img to sector 9224192 with sector count 65536.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x4000 of 0x4000, ) 7.22 MB/s
Wrote dtbo.img to sector 9289728 with sector count 16384.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x4000 of 0x4000, ) 1.99 MB/s
Wrote tee.img to sector 9306112 with sector count 16384.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x180000 of 0x180000, ) 2.07 MB/s91 MB/sB/s
Wrote vendor.img to sector 9322496 with sector count 1572864.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x600000 of 0x600000, ) 7.64 MB/s07 MB/sMB/s
Wrote system.img to sector 10895360 with sector count 6291456.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x4000 of 0x4000, ) 7.40 MB/s
Wrote vbmeta.img to sector 17186816 with sector count 16384.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x34F2C of 0x34F2C, ) 6.76 MB/s57 MB/s
Wrote userdata.img to sector 17203200 with sector count 13346783.
[root@localhost Nokia 2.2 TA-1188 Firmware [MT6761]]# mtk reset
MTK Flash/Exploit Client V1.6.0 (c) B.Kerler 2018-2022
DAXFlash - HW-CODE : 0x717
DAXFlash - HWSUB-CODE : 0x8A00
DAXFlash - HW-VERSION : 0xCA01
DAXFlash - SW-VERSION : 0x200
DAXFlash - CHIP-EVOLUTION : 0x0
DAXFlash - DA-VERSION : 1.0
DeviceClass - [Errno 2] Entity not found
Reset command was sent. Disconnect usb cable to power off.
Quote:Red state
Your device has failed veryfication and may not work properly.
Please download boot image with correct signature or disable verified boot.
Your device will reboot in 5 seconds.
Quote:image_wasp_ppr1.180610.011_all.zip
rom.json
Quote:Bus 003 Device 018: ID 0e8d:201c MediaTek Inc. Android
Couldn't open device, some information will be missing
Device Descriptor:
bLength 18
bDescriptorType 1
bcdUSB 2.00
bDeviceClass 0 (Defined at Interface level)
bDeviceSubClass 0
bDeviceProtocol 0
bMaxPacketSize0 64
idVendor 0x0e8d MediaTek Inc.
idProduct 0x201c
bcdDevice 1.00
iManufacturer 1 MediaTek
iProduct 2 Android
iSerial 3 0123456789ABCDEF
bNumConfigurations 1
Configuration Descriptor:
bLength 9
bDescriptorType 2
wTotalLength 0x0020
bNumInterfaces 1
bConfigurationValue 1
iConfiguration 0
bmAttributes 0x80
(Bus Powered)
MaxPower 256mA
Interface Descriptor:
bLength 9
bDescriptorType 4
bInterfaceNumber 0
bAlternateSetting 0
bNumEndpoints 2
bInterfaceClass 255 Vendor Specific Class
bInterfaceSubClass 66
bInterfaceProtocol 3
iInterface 4
Endpoint Descriptor:
bLength 7
bDescriptorType 5
bEndpointAddress 0x01 EP 1 OUT
bmAttributes 2
Transfer Type Bulk
Synch Type None
Usage Type Data
wMaxPacketSize 0x0200 1x 512 bytes
bInterval 0
Endpoint Descriptor:
bLength 7
bDescriptorType 5
bEndpointAddress 0x81 EP 1 IN
bmAttributes 2
Transfer Type BulkMediaTek
Synch Type None
Usage Type Data
wMaxPacketSize 0x0200 1x 512 bytes
bInterval 1
Quote:[ 3982.338229] usb 3-1: USB disconnect, device number 28
Bus 003 Device 025: ID 0e8d:20ff MediaTek Inc.
Quote:[ 3148.886287] cdc_acm 3-1:1.1: Zero length descriptor references
[ 3148.886295] cdc_acm: probe of 3-1:1.1 failed with error -22
[ 3148.966493] cdc_acm 3-1:1.0: ttyACM0: USB ACM device
[ 3151.534544] usb 3-1: USB disconnect, device number 24
[ 3164.052649] usb 3-1: new high-speed USB device number 25 using xhci_hcd
[ 3164.179091] usb 3-1: New USB device found, idVendor=0e8d, idProduct=20ff, bcdDevice= 2.23
[ 3164.179094] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 3164.179096] usb 3-1: SerialNumber: 0123456789ABCDEF
[ 3164.180622] hid-generic 0003:0E8D:20FF.0008: No inputs registered, leaving
[ 3164.180691] hid-generic 0003:0E8D:20FF.0008: hidraw2: USB HID v1.01 Device [HID 0e8d:20ff] on usb-0000:00:14.0-1/input0
Quote:[ 1663.310701] usb 3-6: new high-speed USB device number 13 using xhci_hcd
[ 1663.436818] usb 3-6: New USB device found, idVendor=0e8d, idProduct=0003, bcdDevice= 1.00
[ 1663.436829] usb 3-6: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[ 1663.439605] cdc_acm 3-6:1.0: ttyACM0: USB ACM device
[ 1668.029688] usb 3-6: USB disconnect, device number 13
[ 1668.992687] usb 3-6: new high-speed USB device number 14 using xhci_hcd
[ 1669.119477] usb 3-6: New USB device found, idVendor=0e8d, idProduct=2000, bcdDevice= 1.00
[ 1669.119487] usb 3-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[ 1669.119492] usb 3-6: Product: MT65xx Preloader
[ 1669.119495] usb 3-6: Manufacturer: MediaTek
Quote:[ 3472.954656] usb 3-1: new high-speed USB device number 27 using xhci_hcd
[ 3473.081458] usb 3-1: New USB device found, idVendor=0e8d, idProduct=2000, bcdDevice= 1.00
[ 3473.081470] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[ 3473.081476] usb 3-1: Product: MT65xx Preloader
[ 3473.081480] usb 3-1: Manufacturer: MediaTek
[ 3473.104394] cdc_acm 3-1:1.1: Zero length descriptor references
[ 3473.104401] cdc_acm: probe of 3-1:1.1 failed with error -22
[ 3473.184652] cdc_acm 3-1:1.0: ttyACM0: USB ACM device
[ 3475.753022] usb 3-1: USB disconnect, device number 27
[ 3488.365700] usb 3-1: new high-speed USB device number 28 using xhci_hcd
[ 3488.492126] usb 3-1: New USB device found, idVendor=0e8d, idProduct=20ff, bcdDevice= 2.23
[ 3488.492137] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 3488.492142] usb 3-1: SerialNumber: 0123456789ABCDEF
[ 3488.494459] hid-generic 0003:0E8D:20FF.0009: No inputs registered, leaving
[ 3488.494498] hid-generic 0003:0E8D:20FF.0009: hidraw2: USB HID v1.01 Device [HID 0e8d:20ff] on usb-0000:00:14.0-1/input0
# mtk da seccfg unlock
MTK Flash/Exploit Client V1.6.0 (c) B.Kerler 2018-2022
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
...........
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
........Port - Device detected :)
Preloader - CPU: MT6761/MT6762/MT3369/MT8766B(Helio A20/P22/A22/A25/G25)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x717
Preloader - Target config: 0xe1
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca01
Preloader - SW Ver: 0x200
Preloader - ME_ID: AC46FAA180A9A5A6287F0FECCD90DE31
Preloader - SOC_ID: 635F9A58573CA11F8D9C1B3E046B66827EF7555A2A3F9019409449C6B957C6F6
DA_handler - Device is unprotected.
DA_handler - Device is in BROM-Mode. Bypassing security.
PLTools - Loading payload from mt6761_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: /usr/local/lib/python3.10/site-packages/mtkclient-1.6.0-py3.10.egg/mtkclient/payloads/mt6761_payload.bin
Port - Device detected :)
DA_handler
DA_handler - [LIB]: Device is in BROM mode. No preloader given, trying to dump preloader from ram.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
xflashext
xflashext - [LIB]: Error on patching da1 version check...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - DRAM config needed for : 7001005442323831
DAXFlash - Sending emi data ...
DAXFlash - DRAM setup passed.
DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: TB2816
DAXFlash - EMMC CID: 70010054423238313620195a833a563f
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x400000
DAXFlash - EMMC USER Size: 0x3a8000000
DAXFlash - HW-CODE : 0x717
DAXFlash - HWSUB-CODE : 0x8A00
DAXFlash - HW-VERSION : 0xCA01
DAXFlash - SW-VERSION : 0x200
DAXFlash - CHIP-EVOLUTION : 0x0
DAXFlash - DA-VERSION : 1.0
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - DA Extensions successfully added
sej - HACC init
sej - HACC run
sej - HACC terminate
sej - HACC init
sej - HACC run
sej - HACC terminate
sej - HACC init
sej - HACC run
sej - HACC terminate
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x1 of 0x1, ) 0.01 MB/s
DA_handler - Successfully wrote seccfg.
Quote:dm-verity error
Android systeme on you deviceis corupted.
Device will boot in 5s
Quote:Orange state
Your device has ben unlocked and can't be trust.
Your device will boot in 5s
fastboot devices
fastboot reboot recovery
(17-10-2022, 10:36 AM)qla Ha!.
Fastboot mode works!
I tried command
as normal userCode:fastboot devices
![]()
but as root I can see the phone! and work![]()
Code:fastboot reboot recovery
I doit nothing with phone.
What I must doit to run the phone normally?.
Now I have stuck on boot logo.
any help - please?
Quote:@maxpayne
Do a factory reset
Quote: image_wasp_ppr1.180610.011_all.zip
rom.json