bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.55k stars 510 forks source link

Stage was't executed. Maybe dram issue ? #816

Closed cetinajero closed 2 months ago

cetinajero commented 11 months ago

Hello,

I'm using the live DVD (v1.57) with a basic python mtk printgpt by putting the device on brom mode.

The device is working fine and I can flash its firmware (including boot and recovery partitions) by using SP Flash Tool so I don't think it has a dram issue.

Any thoughts on how to use this device successfully with mtkclient? I'll happily provide any debug data needed.

Device: ``` DAXFlash - HW-CODE : 0x699 DAXFlash - HWSUB-CODE : 0x8A00 DAXFlash - HW-VERSION : 0xCB00 DAXFlash - SW-VERSION : 0x2 ```
Error: ``` DAXFlash - [LIB]: Stage was't executed. Maybe dram issue ?. DAXFlash - [LIB]: DA Extensions failed to enable ```
Exception: ``` Traceback (most recent call last): File "/opt/mtkclient/mtkclient/Library/mtk_daxflash.py", line 215, in status magic, datatype, length = unpack("
Full backtrace: ``` user@livedvd:/opt/mtkclient$ python mtk printgpt MTK Flash/Exploit Client V1.57 (c) B.Kerler 2018-2022 Preloader - Status: Waiting for PreLoader VCOM, please connect mobile Port - Hint: Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. ........... Port - Device detected :) Preloader - CPU: MT6739/MT6731() Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0xb4 Preloader - Disabling Watchdog... Preloader - HW code: 0x699 Preloader - Target config: 0x0 Preloader - SBC enabled: False Preloader - SLA enabled: False Preloader - DAA enabled: False Preloader - SWJTAG enabled: False Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xcb00 Preloader - SW Ver: 0x2 Preloader - ME_ID: A79E6D4A99ABEDE977CE9898F132C98D Preloader - SOC_ID: 565F3DEC8C8CBBF3199A3FBC921A802A9DA2AF1FAA54B75601BCDC4472BD4EA3 DA_handler - Device is unprotected. DA_handler - Device is in BROM-Mode. Bypassing security. PLTools - Loading payload from mt6739_payload.bin, 0x264 bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Kamakiri - Done sending payload... PLTools - Successfully sent payload: /opt/mtkclient/mtkclient/payloads/mt6739_payload.bin Port - Device detected :) DA_handler DA_handler - [LIB]: Device is in BROM mode. No preloader given, trying to dump preloader from ram. Successfully extracted preloader for this device to: preloader_tvz805.bin DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin xflashext - Patching da2 ... DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - Sending emi data ... DAXFlash - DRAM setup passed. DAXFlash - Sending emi data succeeded. DAXFlash - Uploading stage 2... DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: F5X5CB DAXFlash - EMMC CID: 150100463558354342016c66c02c32d7 DAXFlash - EMMC Boot1 Size: 0x400000 DAXFlash - EMMC Boot2 Size: 0x400000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x80000 DAXFlash - EMMC USER Size: 0xe9000000 DAXFlash - HW-CODE : 0x699 DAXFlash - HWSUB-CODE : 0x8A00 DAXFlash - HW-VERSION : 0xCB00 DAXFlash - SW-VERSION : 0x2 DAXFlash - CHIP-EVOLUTION : 0x0 DAXFlash - DA-VERSION : 1.0 DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash DAXFlash - [LIB]: Stage was't executed. Maybe dram issue ?. DAXFlash DAXFlash - [LIB]: DA Extensions failed to enable Traceback (most recent call last): File "/opt/mtkclient/mtk", line 740, in mtk = Main(args).run() File "/opt/mtkclient/mtkclient/Library/mtk_main.py", line 558, in run da_handler.handle_da_cmds(mtk, cmd, self.args) File "/opt/mtkclient/mtkclient/Library/mtk_da_cmd.py", line 557, in handle_da_cmds data, guid_gpt = mtk.daloader.get_gpt() File "/opt/mtkclient/mtkclient/Library/mtk_daloader.py", line 187, in get_gpt data, guid_gpt = self.da.partition.get_gpt(self.mtk.config.gpt_settings, parttype) File "/opt/mtkclient/mtkclient/Library/partition.py", line 18, in get_gpt data = self.readflash(addr=0, length=2 * self.config.pagesize, filename="", parttype=parttype, display=False) File "/opt/mtkclient/mtkclient/Library/mtk_daxflash.py", line 841, in readflash plen = self.get_packet_length() File "/opt/mtkclient/mtkclient/Library/mtk_daxflash.py", line 761, in get_packet_length resp = self.send_devctrl(self.Cmd.GET_PACKET_LENGTH) File "/opt/mtkclient/mtkclient/Library/mtk_daxflash.py", line 264, in send_devctrl status[0] = self.status() File "/opt/mtkclient/mtkclient/Library/mtk_daxflash.py", line 215, in status magic, datatype, length = unpack(" mtk = Main(args).run() File "/opt/mtkclient/mtkclient/Library/mtk_main.py", line 558, in run da_handler.handle_da_cmds(mtk, cmd, self.args) File "/opt/mtkclient/mtkclient/Library/mtk_da_cmd.py", line 557, in handle_da_cmds data, guid_gpt = mtk.daloader.get_gpt() File "/opt/mtkclient/mtkclient/Library/mtk_daloader.py", line 187, in get_gpt data, guid_gpt = self.da.partition.get_gpt(self.mtk.config.gpt_settings, parttype) File "/opt/mtkclient/mtkclient/Library/partition.py", line 18, in get_gpt data = self.readflash(addr=0, length=2 * self.config.pagesize, filename="", parttype=parttype, display=False) File "/opt/mtkclient/mtkclient/Library/mtk_daxflash.py", line 841, in readflash plen = self.get_packet_length() File "/opt/mtkclient/mtkclient/Library/mtk_daxflash.py", line 761, in get_packet_length resp = self.send_devctrl(self.Cmd.GET_PACKET_LENGTH) File "/opt/mtkclient/mtkclient/Library/mtk_daxflash.py", line 264, in send_devctrl status[0] = self.status() File "/opt/mtkclient/mtkclient/Library/mtk_daxflash.py", line 215, in status magic, datatype, length = unpack("
github-actions[bot] commented 2 months ago

Stale issue message