bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.56k stars 510 forks source link

Error uploading da #303

Closed subzer0-old closed 3 months ago

subzer0-old commented 2 years ago

I´m trying to unlock the bootloader in an nokia 2.4 mt6765. Useing the live distro, this is the mtkclien guy log: [18:10:07]: Status: Waiting for PreLoader VCOM, please connect mobile [18:10:37]: CPU: MT6765/MT8768t(Helio P35/G35) [18:10:37]: HW version: 0x0 [18:10:37]: WDT: 0x10007000 [18:10:37]: Uart: 0x11002000 [18:10:37]: Brom payload addr: 0x100a00 [18:10:37]: DA payload addr: 0x201000 [18:10:37]: CQ_DMA addr: 0x10212000 [18:10:37]: Var1: 0x25 [18:10:37]: Disabling Watchdog... [18:10:37]: HW code: 0x766 [18:10:37]: Target config: 0xe7 [18:10:37]: SBC enabled: True [18:10:37]: SLA enabled: True [18:10:37]: DAA enabled: True [18:10:37]: SWJTAG enabled: True [18:10:37]: EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False [18:10:37]: Root cert required: False [18:10:37]: Mem read auth: True [18:10:37]: Mem write auth: True [18:10:37]: Cmd 0xC8 blocked: True [18:10:37]: Get Target info [18:10:37]: BROM mode detected. [18:10:37]: HW subcode: 0x8a00 [18:10:37]: HW Ver: 0xca00 [18:10:37]: SW Ver: 0x0 [18:10:37]: ME_ID: B1D22B1D8C4FFDC43732DCD707845EF5 [18:10:37]: SOC_ID: 270D9ADB9B7179E182795A214B8A50A76ED00B5B908F84F535189970852725D6 [18:10:39]: Loading payload from mt6765_payload.bin, 0x264 bytes [18:10:39]: Kamakiri / DA Run [18:10:39]: Trying kamakiri2.. [18:10:39]: Done sending payload... [18:10:39]: Successfully sent payload: /opt/mtkclient/mtkclient/payloads/mt6765_payload.bin [18:10:39]: Device is protected. [18:10:39]: Device is in BROM mode. Trying to dump preloader. [18:10:40]: Jumping to 0x200000 [18:10:40]: Jumping to 0x200000: ok. [18:10:51]: Error uploading da

I have a specific da file for this device, but I don´t konw how to use it. default_da.zip