bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.73k stars 529 forks source link

The device automatically restarts in Preloader mode, which prevents the boot partition from being read. #1298

Open CMLNT opened 2 days ago

CMLNT commented 2 days ago

......Port - Device detected :) Preloader - CPU: MT6983(Dimensity 9000/9000+) Preloader - HW version: 0x0 Preloader - WDT: 0x1c007000 Preloader - Uart: 0x11001000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader - HW code: 0x907 Preloader - Target config: 0x0 Preloader - SBC enabled: False Preloader - SLA enabled: False Preloader - DAA enabled: False Preloader - SWJTAG enabled: False Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca01 Preloader - SW Ver: 0x1 Preloader - ME_ID: 21EC1E7F1C84206831FCDA241BF7776C Preloader - SOC_ID: 52EEE02F02DD29BC5005402B36A4C8F234F2C8D4973729DBE1EF03EA0E787089 DaHandler - Device is unprotected. DaHandler - Device is in Preloader-Mode. DAXML - Uploading xflash stage 1 from MTK_DA_V6.bin XmlFlashExt - Patching da2 ... XmlFlashExt XmlFlashExt - [LIB]: Write not allowed not patched. XmlFlashExt XmlFlashExt - [LIB]: Hash binding not patched. DAXML - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x1000000 Preloader - Jumping to 0x1000000: ok. DAXML - Stage 1 successfully loaded. DAXML - Uploading stage 2... Progress: |██████████| 100.0% Written (0x2D1/0x2D1, ) 0.26 MB/s DeviceClass - USBError(5, 'Input/Output Error') DeviceClass DeviceClass - [LIB]: Device disconnected

In the normal boot state, it automatically enters Preloader mode for 1 second and then proceeds to boot up normally.