bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.64k stars 522 forks source link

metamode FASTBOOT does not work on LG K40 #395

Closed benthetechguy closed 1 month ago

benthetechguy commented 2 years ago

My LG K40 works perfectly with mtkclient if I use the latest release (1.52), but if I use the current main branch it gets stuck failing all the handshakes.

bkerler commented 2 years ago

Do you use linux or windows ? Which os do you use ?

benthetechguy commented 2 years ago

Arch Linux

bkerler commented 2 years ago

Can you retry the last commit ?

benthetechguy commented 2 years ago

Nothing changed, but then I realized I forgot to blacklist the qcaux module (this was not a requirement for the latest release). However, there's a new problem. I have tried mtk payload --metamode FASTBOOT to get into fastboot (this was my motivation to use the main branch in the first place as the latest release doesn't have this feature), but after sending the Kamakiri payload it finds the device and nothing else happens from there. The device proceeds to boot as if mtk wasn't running at all. Here's the full log:

MTK Flash/Exploit Client V1.57 (c) B.Kerler 2018-2022

Preloader - Status: Waiting for PreLoader VCOM, please connect mobile

Port - Hint:

Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.

..........Port - Device detected :)
Preloader -     CPU:            MT6765/MT8768t(Helio P35/G35)
Preloader -     HW version:     0x0
Preloader -     WDT:            0x10007000
Preloader -     Uart:           0x11002000
Preloader -     Brom payload addr:  0x100a00
Preloader -     DA payload addr:    0x201000
Preloader -     CQ_DMA addr:        0x10212000
Preloader -     Var1:           0x25
Preloader - Disabling Watchdog...
Preloader - HW code:            0x766
Preloader - Target config:      0x5
Preloader -     SBC enabled:        True
Preloader -     SLA enabled:        False
Preloader -     DAA enabled:        True
Preloader -     SWJTAG enabled:     True
Preloader -     EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:  False
Preloader -     Root cert required: False
Preloader -     Mem read auth:      False
Preloader -     Mem write auth:     False
Preloader -     Cmd 0xC8 blocked:   False
Preloader - Get Target info
Preloader -     HW subcode:     0x8a00
Preloader -     HW Ver:         0xca00
Preloader -     SW Ver:         0x0
Mtk - We're not in bootrom, trying to crash da...
PLTools - Crashing da...
Preloader
Preloader - [LIB]: upload_data failed with error: DAA_SIG_VERIFY_FAILED (0x7024)
Preloader
Preloader - [LIB]: Error on uploading da data
Preloader - Jumping to 0x0
DeviceClass - USBError(19, 'No such device (it may have been disconnected)')
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
DeviceClass
DeviceClass - [LIB]: Couldn't get device configuration.
Port - Device detected :)
Preloader -     CPU:            MT6765/MT8768t(Helio P35/G35)
Preloader -     HW version:     0x0
Preloader -     WDT:            0x10007000
Preloader -     Uart:           0x11002000
Preloader -     Brom payload addr:  0x100a00
Preloader -     DA payload addr:    0x201000
Preloader -     CQ_DMA addr:        0x10212000
Preloader -     Var1:           0x25
Preloader - Disabling Watchdog...
Preloader - HW code:            0x766
Preloader - Target config:      0xe5
Preloader -     SBC enabled:        True
Preloader -     SLA enabled:        False
Preloader -     DAA enabled:        True
Preloader -     SWJTAG enabled:     True
Preloader -     EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:  False
Preloader -     Root cert required: False
Preloader -     Mem read auth:      True
Preloader -     Mem write auth:     True
Preloader -     Cmd 0xC8 blocked:   True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader -     HW subcode:     0x8a00
Preloader -     HW Ver:         0xca00
Preloader -     SW Ver:         0x0
Preloader - ME_ID:          D3717CD8B3714B248BCBDD8E2B74165C
Preloader - SOC_ID:         0669B334CD3FF5383B3806E23B900EAAFFF8730F356B38C64F9010043D85E200
PLTools - Loading payload from mt6765_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: /usr/lib/python3.10/site-packages/mtkclient/payloads/mt6765_payload.bin
Port - Device detected :)

Other commands such as mtk printgpt or mtk r boot,vbmeta boot.img,vbmeta.img work just fine.

bkerler commented 2 years ago

yes, metamode needs to be improved. glad to hear qcaux caused the issue and you were able to fix the main part.

github-actions[bot] commented 1 month ago

Stale issue message