bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.56k stars 510 forks source link

I would like to try and help get/supply info needed for moto edge (2023) #958

Closed DarkenLX closed 5 months ago

DarkenLX commented 5 months ago

Hi i don't know if there's support or not for the Motorola edge (2023) but i currently have one with an unlocked bootloader.. and i would like to try and supply or even somewhat help trying to give any information that might help get the ball rolling a little towards support. So far the common information i have CPU: MTK Dimensity 7030 OS Android 13 Bootloader: Unlocked Fastboot: supported and available (Note) there's also some weird Fastboot mode that shows "Fastbootd" on the screen but doesn't respond to most commands except "fastboot devices" so not sure what it's for it seems only accessible if you enable adb/usb debugging and issue "adb reboot fastboot" as normal fastboot is power+volume -

I have attempted to connect to mtkclient via my Ubuntu 22.04 machine the program will notice the phone is connected but theres some log output i will have to grab because nothing besides mtkclient recognizing the phone and i assume connecting to it works.. i was hoping maybe the developer might be able to tell me if theres anything else besides the logs i could supply to get support going for this device?

DarkenLX commented 5 months ago

debug log output: Preloader - [LIB]: Status: Handshake failed, retrying... Preloader - CPU: () Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x200000 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader Preloader - [LIB]: Error on da_write32, addr 0x10007000, CRYPTO_DEINIT_FAIL (0x1001) Preloader Preloader - [LIB]: Received wrong SetReg_DisableWatchDogTimer response Preloader - HW code: 0x1007 Preloader - Target config: 0x5 Preloader - SBC enabled: True Preloader - SLA enabled: False Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca01 Preloader - SW Ver: 0x0 Preloader - ME_ID: CB8E76CFB29A3F9FC2728B992D4C5EC8 [21:42:21]: Device detected :) [21:42:21]: Loading payload from generic_patcher_payload.bin, 0x538 bytes [21:42:21]: Kamakiri Run [21:42:21]: Error on sending payload. [21:42:21]: Successfully sent payload: /home/louis/mtkclient/mtkclient/payloads/generic_patcher_payload.bin