bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.56k stars 510 forks source link

DAconfig - [LIB]: ←[31mPreloader : Loader/Preloader/preloader_t99653.bin doesn't exist. Aborting.←[0m #641

Closed mvikrant97 closed 1 month ago

mvikrant97 commented 1 year ago

E:\mtkclient-main\mtkclient-main>python mtk rf flash.bin --preloader=Loader/Preloader/preloader_t99653.bin MTK Flash/Exploit Client V1.6.1 (c) B.Kerler 2018-2023

Preloader - Status: Waiting for PreLoader VCOM, please connect mobile

Port - Hint:

Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. If it is already connected and on, hold power for 10 seconds to reset.

Port - Device detected :) Preloader - CPU: MT6765/MT8768t(Helio P35/G35) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0x25 Preloader - Disabling Watchdog... Preloader - HW code: 0x766 Preloader - Target config: 0xe7 Preloader - SBC enabled: True Preloader - SLA enabled: True Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: 623F0978A376F955ADF6EE5EFF65FB2B Preloader - SOC_ID: B060757968F8F97A81BC4D368B2FCEA44932B871B50C89EBAFA0539AED6E9E4B PLTools - Loading payload from mt6765_payload.bin, 0x264 bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Kamakiri - Done sending payload... PLTools - Successfully sent payload: E:\mtkclient-main\mtkclient-main\mtkclient\payloads\mt6765_payload.bin Port - Device detected :) DA_handler - Device is protected. DA_handler - Device is in BROM mode. Trying to dump preloader. DAconfig DAconfig - [LIB]: ←[31mPreloader : Loader/Preloader/preloader_t99653.bin doesn't exist. Aborting.←[0m

E:\mtkclient-main\mtkclient-main>

bkerler commented 1 year ago

That means for some reason, the dumped preloader couldn't be written (read-only ?)

mvikrant97 commented 1 year ago

No it is not read only but I made a full format using SP flash tool and now there is no preloader in the phone.

But I'm not even able to re write the preloader so that I can flash the device.

miracule commented 1 year ago

I am having the same issue. Please have you found a solution?

github-actions[bot] commented 2 months ago

Stale issue message