bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.51k stars 503 forks source link

Samsung a226br no send payload mt6833 #652

Closed Ferxkw closed 1 month ago

Ferxkw commented 1 year ago

Main

Main - [LIB]: ←[95mmtk payload --debugmode←[0m Preloader - Status: Waiting for PreLoader VCOM, please connect mobile usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95m CONFIGURATION 1: 500 mA ================================== bLength : 0x9 (9 bytes) bDescriptorType : 0x2 Configuration wTotalLength : 0x46 (70 bytes) bNumInterfaces : 0x2 bConfigurationValue : 0x1 iConfiguration : 0x3 USB CDC ACM for preloader bmAttributes : 0xc0 Self Powered bMaxPower : 0xfa (500 mA) INTERFACE 1: CDC Data ================================== bLength : 0x9 (9 bytes) bDescriptorType : 0x4 Interface bInterfaceNumber : 0x1 bAlternateSetting : 0x0 bNumEndpoints : 0x2 bInterfaceClass : 0xa CDC Data bInterfaceSubClass : 0x0 bInterfaceProtocol : 0x0 iInterface : 0x4 CDC ACM Data Interface ENDPOINT 0x1: Bulk OUT =============================== bLength : 0x8 (7 bytes) bDescriptorType : 0x5 Endpoint bEndpointAddress : 0x1 OUT bmAttributes : 0x2 Bulk wMaxPacketSize : 0x200 (512 bytes) bInterval : 0x0 ENDPOINT 0x81: Bulk IN =============================== bLength : 0x8 (7 bytes) bDescriptorType : 0x5 Endpoint bEndpointAddress : 0x81 IN bmAttributes : 0x2 Bulk wMaxPacketSize : 0x200 (512 bytes) bInterval : 0x0 INTERFACE 0: CDC Communication ========================= bLength : 0x9 (9 bytes) bDescriptorType : 0x4 Interface bInterfaceNumber : 0x0 bAlternateSetting : 0x0 bNumEndpoints : 0x1 bInterfaceClass : 0x2 CDC Communication bInterfaceSubClass : 0x2 bInterfaceProtocol : 0x1 iInterface : 0x5 CDC ACM Communication Interface ENDPOINT 0x83: Interrupt IN ========================== bLength : 0x8 (7 bytes) bDescriptorType : 0x5 Endpoint bEndpointAddress : 0x83 IN bmAttributes : 0x3 Interrupt wMaxPacketSize : 0x40 (64 bytes) bInterval : 0x10←[0m usb_class usb_class - [LIB]: ←[95mNo kernel driver supported: Operation not supported or unimplemented on this platform←[0m usb_class usb_class - [LIB]: ←[95mNo kernel driver supported: Operation not supported or unimplemented on this platform←[0m Port Port - [LIB]: ←[95m[Errno 10060] Operation timed out←[0m Preloader Preloader - [LIB]: ←[31mStatus: Handshake failed, retrying...←[0m usb_class usb_class - [LIB]: ←[95mOperation not supported or unimplemented on this platform←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m

Ferxkw commented 1 year ago

with bypass_utility

[2023-03-21 20:56:59.284208] Waiting for device [2023-03-21 20:57:09.519363] Found port = COM49

[2023-03-21 20:57:09.837583] Device hw code: 0x989 [2023-03-21 20:57:09.838581] Device hw sub code: 0x8a00 [2023-03-21 20:57:09.838581] Device hw version: 0xca00 [2023-03-21 20:57:09.839586] Device sw version: 0x0 [2023-03-21 20:57:09.839586] Device secure boot: True [2023-03-21 20:57:09.839586] Device serial link authorization: False [2023-03-21 20:57:09.839586] Device download agent authorization: True

[2023-03-21 20:57:09.840580] Found device in preloader mode, trying to crash...

[2023-03-21 20:57:09.841573] status is 7024

[2023-03-21 20:57:09.852602] Waiting for device [2023-03-21 20:57:10.685451] Found port = COM27

[2023-03-21 20:57:10.773477] Device hw code: 0x989 [2023-03-21 20:57:10.774628] Device hw sub code: 0x8a00 [2023-03-21 20:57:10.774628] Device hw version: 0xca00 [2023-03-21 20:57:10.774628] Device sw version: 0x0 [2023-03-21 20:57:10.774628] Device secure boot: True [2023-03-21 20:57:10.775626] Device serial link authorization: False [2023-03-21 20:57:10.775626] Device download agent authorization: True

[2023-03-21 20:57:10.775626] Disabling watchdog timer [2023-03-21 20:57:10.777621] Disabling protection [2023-03-21 20:57:11.821790] Payload did not reply

Ferxkw commented 1 year ago

with Xiaomi Redmi note 8 work perfect.

Preloader - [LIB]: ←[31mStatus: Handshake failed, retrying...←[0m Port - Device detected :) Preloader - CPU: MT6785(Helio G90) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader - HW code: 0x813 Preloader - Target config: 0xe7 Preloader - SBC enabled: True Preloader - SLA enabled: True Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: 598C4D978DAB4E4CC946D6D4F07527A9 Preloader - SOC_ID: F29B84B84760CFAD928914D9F8BBBF9F43E7AADEB905EAAB4AC111E122B7763A DTpro - Loading payload from mt6785_payload.bin, 0x264 bytes DTpro - Authorization / Service Kamakiri - Writing Keys... Kamakiri - Authorizing the device Ok...

github-actions[bot] commented 1 month ago

Stale issue message