bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.56k stars 510 forks source link

Need reconnect after payload #300

Closed samuel1003 closed 3 months ago

samuel1003 commented 2 years ago

Is good to know MTK Client CMD Project still alive, most of us preffer this than GUI. Anyway in older version no need to reconnect device after payload, now is requiered. By the way hope you find a way to fix also for other functions than payload. I am still forced to use older version just becouse of this issue, but i can see many bugs fixed in newest one. Thanks again for your good job, small donation sent. Keep it up.

Here an example in newest version:

run.exe mtk payload MTK Flash/Exploit Client V1.55 (c) B.Kerler 2018-2022

Preloader - Status: Waiting for PreLoader VCOM, please connect mobile Port - Device detected :) Preloader - CPU: MT6833(Dimensity 700 5G k6833) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0x73 Preloader - Disabling Watchdog... Preloader - HW code: 0x989 Preloader - Target config: 0x0 Preloader - SBC enabled: False Preloader - SLA enabled: False Preloader - DAA enabled: False Preloader - SWJTAG enabled: False Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: DBA402A64BD6020BB4A88AEB6A9001D3 Preloader - SOC_ID: D180C5683F0A8AF9D8EF7D5A8ADAC9D503A7490492C74022B091E1AFD3C5D819 PLTools - Loading payload from mt6833_payload.bin, 0x264 bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Kamakiri - Done sending payload... PLTools - Successfully sent payload: C:\Users\samuel\Desktop\mtkclient-main_3\mtkclient-main\mtkclient\payloads\mt6833_payload.bin

run.exe mtk r boot boot.img MTK Flash/Exploit Client V1.55 (c) B.Kerler 2018-2022

DA_handler - Please disconnect, start mtkclient and reconnect.

bkerler commented 2 years ago

Don't use payload, that's only needed if you intend to use sp flash tools or something like that. Use mtk r boot boot.img instead directly, it will do all the work needed.

samuel1003 commented 2 years ago

Don't use payload, that's only needed if you intend to use sp flash tools or something like that. Use mtk r boot boot.img instead directly, it will do all the work needed.

Your tool helps me in a small tool I have, i use payload to read phone info. Since in your newest version even for payload requiere to reconnect device, that is why I need to keep using older version but with older bugs. 🥲

If you could fix problem of disconnect phone after each command would be gread, same as you doing for GUI. For GUI we can do everything without disconnect phone, but I am unable to implement in my app.