octathorp / x04g_tools

Xiaomi Smart Clock - Global variant (X04G) development tools
51 stars 4 forks source link

DeviceClass - [Errno 19] No such device (it may have been disconnected) #2

Open Pegasus143 opened 8 months ago

Pegasus143 commented 8 months ago

Port - Device detected :) DA_handler DA_handler - [LIB]: ←[33mDevice is in BROM mode. No preloader given, trying to dump preloader from ram.←[0m DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin xflashext - Patching da1 ... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "hash_check" in preloader xflashext xflashext - [LIB]: ←[33mError on patching da1 version check...←[0m Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "get_vfy_policy" in preloader xflashext - Patching da2 ... DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - Sending emi data ... DAXFlash - DRAM setup passed. DAXFlash - Sending emi data succeeded. DAXFlash - Uploading stage 2... DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: 004GA0 DAXFlash - EMMC CID: 110100303034474130022227a84039cd DAXFlash - EMMC Boot1 Size: 0x200000 DAXFlash - EMMC Boot2 Size: 0x200000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x80000 DAXFlash - EMMC USER Size: 0xec000000 DAXFlash - HW-CODE : 0x8167 DAXFlash - HWSUB-CODE : 0x8A00 DAXFlash - HW-VERSION : 0xCB00 DAXFlash - SW-VERSION : 0x1 DAXFlash - CHIP-EVOLUTION : 0x0 DAXFlash - DA-VERSION : 1.0 DAXFlash - Reconnecting to stage2 with higher speed DeviceClass - [Errno 19] No such device (it may have been disconnected)

C:\Users\Lenovo\mtkclient>python mtk reset MTK Flash/Exploit Client Public V2.0.0 Beta (c) B.Kerler 2018-2023

DA_handler - Please disconnect, start mtkclient and reconnect.

C:\Users\Lenovo\mtkclient>python mtk reset MTK Flash/Exploit Client Public V2.0.0 Beta (c) B.Kerler 2018-2023

Preloader - Status: Waiting for PreLoader VCOM, please reconnect mobile to brom mode

Port - Hint:

Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. If it is already connected and on, hold power for 10 seconds to reset.

.....Port - Device detected :) Preloader - CPU: MT8167/MT8516/MT8362() Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11005000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212c00 Preloader - Var1: 0xcc Preloader - Disabling Watchdog... Preloader - HW code: 0x8167 Preloader - Target config: 0xe5 Preloader - SBC enabled: True Preloader - SLA enabled: False Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xcb00 Preloader - SW Ver: 0x1 Preloader - ME_ID: 28245C65ADCDAFCC4F5D0E5C2099679E Preloader - SOC_ID: 0000000000000000000000000000000000000000000000000000000000000000 DA_handler - Device is unprotected. DA_handler - Device is in BROM-Mode. Bypassing security. PLTools - Loading payload from mt8167_payload.bin, 0x264 bytes Exploitation - Kamakiri Run Exploitation - Done sending payload... PLTools - Successfully sent payload: C:\Users\Lenovo\mtkclient\mtkclient\payloads\mt8167_payload.bin Port - Device detected :) DA_handler DA_handler - [LIB]: ←[33mDevice is in BROM mode. No preloader given, trying to dump preloader from ram.←[0m DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin xflashext - Patching da1 ... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "hash_check" in preloader xflashext xflashext - [LIB]: ←[33mError on patching da1 version check...←[0m Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "get_vfy_policy" in preloader xflashext - Patching da2 ... DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - Sending emi data ... DAXFlash - DRAM setup passed. DAXFlash - Sending emi data succeeded. DAXFlash - Uploading stage 2... DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: 004GA0 DAXFlash - EMMC CID: 110100303034474130022227a84039cd DAXFlash - EMMC Boot1 Size: 0x200000 DAXFlash - EMMC Boot2 Size: 0x200000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x80000 DAXFlash - EMMC USER Size: 0xec000000 DAXFlash - HW-CODE : 0x8167 DAXFlash - HWSUB-CODE : 0x8A00 DAXFlash - HW-VERSION : 0xCB00 DAXFlash - SW-VERSION : 0x1 DAXFlash - CHIP-EVOLUTION : 0x0 DAXFlash - DA-VERSION : 1.0 DAXFlash - Reconnecting to stage2 with higher speed DeviceClass - [Errno 19] No such device (it may have been disconnected)

gabrl12345678900 commented 8 months ago

Have you tried to use Linux?

Il dom 28 gen 2024, 19:48 Gerald Ortega @.***> ha scritto:

Port - Device detected :) DA_handler DA_handler - [LIB]: ←[33mDevice is in BROM mode. No preloader given, trying to dump preloader from ram.←[0m DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin xflashext - Patching da1 ... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "hash_check" in preloader xflashext xflashext - [LIB]: ←[33mError on patching da1 version check...←[0m Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "get_vfy_policy" in preloader xflashext - Patching da2 ... DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - Sending emi data ... DAXFlash - DRAM setup passed. DAXFlash - Sending emi data succeeded. DAXFlash - Uploading stage 2... DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: 004GA0 DAXFlash - EMMC CID: 110100303034474130022227a84039cd DAXFlash - EMMC Boot1 Size: 0x200000 DAXFlash - EMMC Boot2 Size: 0x200000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x80000 DAXFlash - EMMC USER Size: 0xec000000 DAXFlash - HW-CODE : 0x8167 DAXFlash - HWSUB-CODE : 0x8A00 DAXFlash - HW-VERSION : 0xCB00 DAXFlash - SW-VERSION : 0x1 DAXFlash - CHIP-EVOLUTION : 0x0 DAXFlash - DA-VERSION : 1.0 DAXFlash - Reconnecting to stage2 with higher speed DeviceClass - [Errno 19] No such device (it may have been disconnected)

C:\Users\Lenovo\mtkclient>python mtk reset MTK Flash/Exploit Client Public V2.0.0 Beta (c) B.Kerler 2018-2023

DA_handler - Please disconnect, start mtkclient and reconnect.

C:\Users\Lenovo\mtkclient>python mtk reset MTK Flash/Exploit Client Public V2.0.0 Beta (c) B.Kerler 2018-2023

Preloader - Status: Waiting for PreLoader VCOM, please reconnect mobile to brom mode

Port - Hint:

Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. If it is already connected and on, hold power for 10 seconds to reset.

.....Port - Device detected :) Preloader - CPU: MT8167/MT8516/MT8362() Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11005000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212c00 Preloader - Var1: 0xcc Preloader - Disabling Watchdog... Preloader - HW code: 0x8167 Preloader - Target config: 0xe5 Preloader - SBC enabled: True Preloader - SLA enabled: False Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xcb00 Preloader - SW Ver: 0x1 Preloader - ME_ID: 28245C65ADCDAFCC4F5D0E5C2099679E Preloader - SOC_ID: 0000000000000000000000000000000000000000000000000000000000000000 DA_handler - Device is unprotected. DA_handler - Device is in BROM-Mode. Bypassing security. PLTools - Loading payload from mt8167_payload.bin, 0x264 bytes Exploitation - Kamakiri Run Exploitation - Done sending payload... PLTools - Successfully sent payload: C:\Users\Lenovo\mtkclient\mtkclient\payloads\mt8167_payload.bin Port - Device detected :) DA_handler DA_handler - [LIB]: ←[33mDevice is in BROM mode. No preloader given, trying to dump preloader from ram.←[0m DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin xflashext - Patching da1 ... Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "hash_check" in preloader xflashext xflashext - [LIB]: ←[33mError on patching da1 version check...←[0m Mtk - Patched "Patched loader msg" in preloader Mtk - Patched "get_vfy_policy" in preloader xflashext - Patching da2 ... DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - Sending emi data ... DAXFlash - DRAM setup passed. DAXFlash - Sending emi data succeeded. DAXFlash - Uploading stage 2... DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: 004GA0 DAXFlash - EMMC CID: 110100303034474130022227a84039cd DAXFlash - EMMC Boot1 Size: 0x200000 DAXFlash - EMMC Boot2 Size: 0x200000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x80000 DAXFlash - EMMC USER Size: 0xec000000 DAXFlash - HW-CODE : 0x8167 DAXFlash - HWSUB-CODE : 0x8A00 DAXFlash - HW-VERSION : 0xCB00 DAXFlash - SW-VERSION : 0x1 DAXFlash - CHIP-EVOLUTION : 0x0 DAXFlash - DA-VERSION : 1.0 DAXFlash - Reconnecting to stage2 with higher speed DeviceClass - [Errno 19] No such device (it may have been disconnected)

— Reply to this email directly, view it on GitHub https://github.com/octathorp/x04g_tools/issues/2, or unsubscribe https://github.com/notifications/unsubscribe-auth/AZ355SZBOXQHULI24HA7B2DYQ2MRBAVCNFSM6AAAAABCOL46AGVHI2DSMVQWIX3LMV43ASLTON2WKOZSGEYDIMZQGAZDQNI . You are receiving this because you are subscribed to this thread.Message ID: @.***>

Pegasus143 commented 8 months ago

No, i used windows 11

Pegasus143 commented 8 months ago

Please site any recommendations

gabrl12345678900 commented 8 months ago

I used Lubuntu

Ierlandfan commented 8 months ago

Try power off the device after the error and turn it on,don't restart the program, just the smart clock.

Pegasus143 commented 8 months ago

Try power off the device after the error and turn it on,don't restart the program, just the smart clock.

Also the program quits suddenly after the error

gabrl12345678900 commented 8 months ago

Try with linux, it happened the same thing when i tried

Try power off the device after the error and turn it on,don't restart the program, just the smart clock.

Also the program quits suddenly after the error

yunoa15 commented 5 months ago

add --noreconnect

gabrl12345678900 commented 5 months ago

Try with Linux, it worked for me

Il dom 7 apr 2024, 05:09 yunoa15 @.***> ha scritto:

add --noreconnect

— Reply to this email directly, view it on GitHub https://github.com/octathorp/x04g_tools/issues/2#issuecomment-2041290361, or unsubscribe https://github.com/notifications/unsubscribe-auth/AZ355S657FAKLRULBNJT3FLY4C2FZAVCNFSM6AAAAABCOL46AGVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDANBRGI4TAMZWGE . You are receiving this because you commented.Message ID: @.***>