bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.58k stars 516 forks source link

Samsung M32 5G Error reading gpt, please read whole flash ? #926

Closed inj30ct closed 3 months ago

inj30ct commented 7 months ago

Hello, On MT6853 Samsung M32 5G after all the partitions were deleted It throws this error

`MTK Flash/Exploit Client Public V2.0.0 Beta (c) B.Kerler 2018-2023

Preloader - Status: Waiting for PreLoader VCOM, please reconnect mobile to brom mode

Port - Hint:

Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. If it is already connected and on, hold power for 10 seconds to reset.

....Port - Device detected :) Preloader - CPU: MT6853(Dimensity 720 5G) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader - HW code: 0x996 Preloader - Target config: 0xe5 Preloader - SBC enabled: True Preloader - SLA enabled: False Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: 16BDE3040DE83F6BDAB1D15225DFF5F5 Preloader - SOC_ID: F8CC1CAC2B24E06373DD6AEE7519F11BD848BD29ED4ED32D9BC7547DE436D580 DA_handler - Device is unprotected. DA_handler - Device is in BROM-Mode. Bypassing security. PLTools - Loading payload from mt6853_payload.bin, 0x264 bytes Exploitation - Kamakiri Run Exploitation - Done sending payload... PLTools - Successfully sent payload: C:\Users\Administrator\Desktop\mtkclient-18947b7d6f5f06511b54f427e72333c2e4a8df7e\mtkclient\payloads\mt6853_payload.bin Port - Device detected :) DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin xflashext - Patching da1 ... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "hash_check" in preloader xflashext xflashext - [LIB]: Error on patching da1 version check... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "get_vfy_policy" in preloader xflashext - Patching da2 ... xflashext - DA version anti-rollback patched DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - Sending emi data ... DAXFlash - DRAM setup passed. DAXFlash - Sending emi data succeeded. DAXFlash - Uploading stage 2... DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - UFS Blocksize:0x1000 DAXFlash - UFS ID: KM2V8001CM-B70 DAXFlash - UFS MID: 0xce DAXFlash - UFS CID: ce014b4d325638303031434d2d423730 DAXFlash - UFS FWVer: 30303033 DAXFlash - UFS Serial: 464431303030300000000000 DAXFlash - UFS LU0 Size: 0x1dcb000000 DAXFlash - UFS LU1 Size: 0x400000 DAXFlash - UFS LU2 Size: 0x400000 DAXFlash - HW-CODE : 0x996 DAXFlash - HWSUB-CODE : 0x8A00 DAXFlash - HW-VERSION : 0xCA00 DAXFlash - SW-VERSION : 0x0 DAXFlash - CHIP-EVOLUTION : 0x1 DAXFlash - DA-VERSION : 1.0 DAXFlash - Extensions were accepted. Jumping to extensions... DAXFlash - DA Extensions successfully added DA_handler DA_handler - [LIB]: Error reading gpt, please read whole flash using "mtk rf flash.bin".`

Do you think my phone is dead forever ?

ghost commented 7 months ago

If you hosed your partition table and didn't take a back-up of the partitions in question including the GPT table itself you very well may be SOL my friend

EDIT: Yep your GPT is gone. If you didn't take a backup your probably SOL

ghost commented 7 months ago

Unless you know someone with the same device that would be willing to provide a dump of their flash to restore yours it's as good as a paperweight

github-actions[bot] commented 3 months ago

Stale issue message