bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.71k stars 528 forks source link

[LIB]: Failed to dump partition T-Mobile REVVL V+ 5G Chipset MT6833 #812

Closed Destreza777 closed 1 year ago

Destreza777 commented 1 year ago

Errors when running python3 mtk rl --skip userdata "C:\Users\%USERNAME%\Downloads\Firmware Backup Files"

..........Port - Device detected :) Preloader - CPU: MT6833(Dimensity 700 5G k6833) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0x73 Preloader - Disabling Watchdog... Preloader - HW code: 0x989 Preloader - Target config: 0xe7 Preloader - SBC enabled: True Preloader - SLA enabled: True Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: D0721858010812D45B1C011EECB1B630 Preloader - SOC_ID: 171F6341D058124D5138DD30128E1E4EA2F62D79A68AABA6B21D433BB424BBD7 PLTools - Loading payload from mt6833_payload.bin, 0x264 bytes Exploitation - Kamakiri Run Exploitation - Done sending payload... PLTools - Successfully sent payload: C:\Users\jesse\Downloads\mtkclient-main\mtkclient\payloads\mt6833_payload.bin Port - Device detected :) DA_handler - Device is protected. DA_handler - Device is in BROM mode. Trying to dump preloader. DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2228.bin xflashext - Patching da1 ... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "hash_check" in preloader xflashext xflashext - [LIB]: Error on patching da1 version check... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "get_vfy_policy" in preloader xflashext - Patching da2 ... DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - Sending emi data ... DAXFlash - DRAM setup passed. DAXFlash - Sending emi data succeeded. DAXFlash - Uploading stage 2... DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: DP6DAB DAXFlash - EMMC CID: 15010044503644414202941fce76681b DAXFlash - EMMC Boot1 Size: 0x400000 DAXFlash - EMMC Boot2 Size: 0x400000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x1000000 DAXFlash - EMMC USER Size: 0xe8f800000 DAXFlash - HW-CODE : 0x989 DAXFlash - HWSUB-CODE : 0x8A00 DAXFlash - HW-VERSION : 0xCA00 DAXFlash - SW-VERSION : 0x0 DAXFlash - CHIP-EVOLUTION : 0x1 DAXFlash - DA-VERSION : 1.0 DAXFlash - Extensions were accepted. Jumping to extensions... DAXFlash - DA Extensions successfully added DA_handler - Dumping partition misc with sector count 1024 as C:\Users\jesse\Downloads\Firmware Backup Files\misc.bin. Progress: |██████████████████████████████████████████████████| 100.0% Read (Sector 0x400 of 0x400, ) 16.01 MB/s DA_handler DA_handler - [LIB]: Failed to dump partition misc as C:\Users\jesse\Downloads\Firmware Backup Files\misc.bin. DA_handler - Dumping partition para with sector count 1024 as C:\Users\jesse\Downloads\Firmware Backup Files\para.bin. Progress: |██████████████████████████████████████████████████| 100.0% Read (Sector 0x400 of 0x400, ) 17.10 MB/s DA_handler DA_handler - [LIB]: Failed to dump partition para as C:\Users\jesse\Downloads\Firmware Backup Files\para.bin. DA_handler - Dumping partition expdb with sector count 81920 as C:\Users\jesse\Downloads\Firmware Backup Files\expdb.bin.

I also get errors when trying to run python3 mtk r misc ..\misc.bin

........Port - Device detected :) Preloader - CPU: MT6833(Dimensity 700 5G k6833) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0x73 Preloader - Disabling Watchdog... Preloader - HW code: 0x989 Preloader - Target config: 0xe7 Preloader - SBC enabled: True Preloader - SLA enabled: True Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: D0721858010812D45B1C011EECB1B630 Preloader - SOC_ID: 171F6341D058124D5138DD30128E1E4EA2F62D79A68AABA6B21D433BB424BBD7 PLTools - Loading payload from mt6833_payload.bin, 0x264 bytes Exploitation - Kamakiri Run Exploitation - Done sending payload... PLTools - Successfully sent payload: C:\Users\jesse\Downloads\mtkclient-main\mtkclient\payloads\mt6833_payload.bin Port - Device detected :) DA_handler - Device is protected. DA_handler - Device is in BROM mode. Trying to dump preloader. DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2228.bin xflashext - Patching da1 ... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "hash_check" in preloader xflashext xflashext - [LIB]: Error on patching da1 version check... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "get_vfy_policy" in preloader xflashext - Patching da2 ... DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - Sending emi data ... DAXFlash - DRAM setup passed. DAXFlash - Sending emi data succeeded. DAXFlash - Uploading stage 2... DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: DP6DAB DAXFlash - EMMC CID: 15010044503644414202941fce76681b DAXFlash - EMMC Boot1 Size: 0x400000 DAXFlash - EMMC Boot2 Size: 0x400000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x1000000 DAXFlash - EMMC USER Size: 0xe8f800000 DAXFlash - HW-CODE : 0x989 DAXFlash - HWSUB-CODE : 0x8A00 DAXFlash - HW-VERSION : 0xCA00 DAXFlash - SW-VERSION : 0x0 DAXFlash - CHIP-EVOLUTION : 0x1 DAXFlash - DA-VERSION : 1.0 DAXFlash - Extensions were accepted. Jumping to extensions... DAXFlash - DA Extensions successfully added DA_handler - Requesting available partitions .... DA_handler - Dumping partition "misc" Progress: |██████████████████████████████████████████████████| 100.0% Read (Sector 0x400 of 0x400, ) 0.00 MB/s DA_handler - Failed to dump sector 64 with sector count 1024 as ..\misc.bin.

I don't get these errors in older versions of MTKClient, also, it seems that it is actually dumping the partitions but for some reason it errors when it completes.

Destreza777 commented 1 year ago

I was able to resolve the issue by reinstalling Windows, I had too many drivers conflicting with eachother from messing around to much.