Çözüldü GM 20 Pro Stock ROM "Storage type mismatch" hatası verip yüklenmiyor

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

Üzüntü

Hectopat
Katılım
18 Şubat 2021
Mesajlar
1.670
Makaleler
5
Çözümler
26
Bir GM 20 Pro telefonunu kurtarmaya çalışıyorum. Her şey cihaza bir GSI yüklemeye çalışmamla başladı. Elimde bu telefondan iki tane var, birincisi GSI yüklemeye çalışırken bozduğum telefon, ikincisi ise sağlam.
  • İlk yaptığım şey geliştirici seçeneklerinden USB hata ayıklama ve OEM kilit açma seçeneklerini etkinleştirmek oldu. Ardından telefonu bootloader'a yeniden başlattım, önyükleyici kilidini açtım.
  • Sonra fastboot reboot fastboot ile cihazı fastbootd moduna aldım.
  • Android Generic System Image yayınları sayfasından aosp_arm64-exp-UP1A.231005.007-10754064-68dd726a.zip dosyasını indirdim. Aşağıdaki komutları çalıştırdım.
  • Kod:
    fastboot --disable-verity --disable-verification flash vbmeta vbmeta.img
    fastboot erase system
    fastboot flash system system.img
    fastboot -w
  • Cihaz bootloop'a girince SELinux'dan kaynaklandığını düşündüm. Buradan Permissiver indiridim.
  • Cihazı recovery modda başlattım. Ne yazık ki adb device unauthorized hatası verdi. Ben de stock ROM'un yolu göründü diye düşündüm. Aşağıdaki stock ROM'u yüklemeye çalıştım.
  • SP Flash Tool aşağıdaki gibi bir hata verdi.
    1711276569667.png
  • Ben de mtkclient ile dosyaları teker teker flashlamaya çalıştım. Girdiğim komut şuna benziyordu.
    Kod:
    ./mtk wf boot.img,vbmeta.img,vbmeta_system.img,vbmeta_vendor.img...
    Fakat kafam yarılmayasıca, bu bütün dosyaları tek bir sektöre olduğu gibi yazdığını hiç düşünmedim. Böylelikle bölümlendirme tablosunun da içine etmiş olduk. Telefon BROM moddan çıkmaz, hiç tepki vermez oldu.
  • Daha sonra sağlam telefondan ./mtk rl out ile donanım yazılımını çekmeye başlamıştım ki babam telefonunu istedi. Mecburen çıkarıp vermek zorunda kaldım. Dosyalar kısmen de gelmişti. "Hiç olmazsa bölümlendirme tablosunu düzeltirim" diyerek ./mtk wl out ile yazdırdım. Bölümlendirme tablosu kurtuldu fakat, telefondan hala çıt yok.
  • İndirdiğim stock ROM'u bölümlere ./mtk w boot boot.img... teker teker yazdırdım, fakat değişen bir şey olmadı. Bölümlendirme tablosu düzeldi ya, belki SP Flash Tool çalışır dedim, ama araç "bana ıslak odunla sabahtan akşama kadar dövme tekniği uygula" dercesine bir hata verdi.
    1711276420759.png
 
Son düzenleme:
Dft Pro ile yedek alınmış başka bir konu var buraya bakabilirsin.
 
Çözüm
1711277598618.png

Daha fazla şey ekleyecektim, ama böyle bir hata aldım.

Garip bulgular:
Artık preloader'ı belirtmeden de MTKClient'de hiçbir işlem yapamaz hale geldim.
Kod:
nese@lenovo-z500:~/İndirilenler/GM 20 Pro/mtkclient$ ./mtk printgpt
MTK Flash/Exploit Client Public V2.0.0 Beta (c) B.Kerler 2018-2023

Preloader - Status: Waiting for PreLoader VCOM, please reconnect mobile to brom mode

Port - Hint:

Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.


...........

.Port - Device detected :)
Preloader -     CPU:            MT6771/MT8385/MT8183/MT8666(Helio P60/P70/G80)
Preloader -     HW version:        0x0
Preloader -     WDT:            0x10007000
Preloader -     Uart:            0x11002000
Preloader -     Brom payload addr:    0x100a00
Preloader -     DA payload addr:    0x201000
Preloader -     CQ_DMA addr:        0x10212000
Preloader -     Var1:            0xa
Preloader - Disabling Watchdog...
Preloader - HW code:            0x788
Preloader - Target config:        0x0
Preloader -     SBC enabled:        False
Preloader -     SLA enabled:        False
Preloader -     DAA enabled:        False
Preloader -     SWJTAG enabled:        False
Preloader -     EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:    False
Preloader -     Root cert required:    False
Preloader -     Mem read auth:        False
Preloader -     Mem write auth:        False
Preloader -     Cmd 0xC8 blocked:    False
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader -     HW subcode:        0x8a00
Preloader -     HW Ver:            0xca00
Preloader -     SW Ver:            0x0
Preloader - ME_ID:            71E10C5393F14AABD4F37A446728EE4B
Preloader - SOC_ID:            8D8A64BF8B6DBFAFB43C7C3CEA82061BF8FC81C7BC3DBA0454BA136671E58321
DA_handler - Device is unprotected.
DA_handler - Device is in BROM-Mode. Bypassing security.
PLTools - Loading payload from mt6771_payload.bin, 0x264 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
PLTools - Successfully sent payload: /home/nese/İndirilenler/GM 20 Pro/mtkclient/mtkclient/payloads/mt6771_payload.bin
Port - Device detected :)
DA_handler
DA_handler - [LIB]: Device is in BROM mode. No preloader given, trying to dump preloader from ram.
DA_handler
DA_handler - [LIB]: Failed to dump preloader from ram, provide a valid one via --preloader option
DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "hash_check" in preloader
xflashext
xflashext - [LIB]: Error on patching da1 version check...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
xflashext - DA version anti-rollback patched
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID:       MT128GASAO4U21
DAXFlash - UFS MID:      0x2c
DAXFlash - UFS CID:      2c014d54313238474153414f34553231
DAXFlash - UFS FWVer:    30313031
DAXFlash - UFS Serial:   202020200000000000000000
DAXFlash - UFS LU0 Size: 0x1dcb000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DRAM config needed for : 2c014d54313238474153414f34553231
DAXFlash - No preloader given. Searching for preloader
DAXFlash - Sending emi data ...
DAXFlash - Emi data NOT accepted ...
DAXFlash - Sending emi data ...
DAXFlash - Emi data NOT accepted ...
DAXFlash - Sending emi data ...
...
MTKClient'in daha önce çektiği preloader'ı belirttiğimde komut çalıştırılıyor.
Kod:
nese@lenovo-z500:~/İndirilenler/GM 20 Pro/mtkclient$ ./mtk printgpt --preloader preloader_k71v1_64_bsp.bin
MTK Flash/Exploit Client Public V2.0.0 Beta (c) B.Kerler 2018-2023

Preloader - Status: Waiting for PreLoader VCOM, please reconnect mobile to brom mode

Port - Hint:

Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.


...........

..Port - Device detected :)
Preloader -     CPU:            MT6771/MT8385/MT8183/MT8666(Helio P60/P70/G80)
Preloader -     HW version:        0x0
Preloader -     WDT:            0x10007000
Preloader -     Uart:            0x11002000
Preloader -     Brom payload addr:    0x100a00
Preloader -     DA payload addr:    0x201000
Preloader -     CQ_DMA addr:        0x10212000
Preloader -     Var1:            0xa
Preloader - Disabling Watchdog...
Preloader - HW code:            0x788
Preloader - Target config:        0x0
Preloader -     SBC enabled:        False
Preloader -     SLA enabled:        False
Preloader -     DAA enabled:        False
Preloader -     SWJTAG enabled:        False
Preloader -     EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:    False
Preloader -     Root cert required:    False
Preloader -     Mem read auth:        False
Preloader -     Mem write auth:        False
Preloader -     Cmd 0xC8 blocked:    False
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader -     HW subcode:        0x8a00
Preloader -     HW Ver:            0xca00
Preloader -     SW Ver:            0x0
Preloader - ME_ID:            71E10C5393F14AABD4F37A446728EE4B
Preloader - SOC_ID:            8D8A64BF8B6DBFAFB43C7C3CEA82061BF8FC81C7BC3DBA0454BA136671E58321
DA_handler - Device is unprotected.
DA_handler - Device is in BROM-Mode. Bypassing security.
PLTools - Loading payload from mt6771_payload.bin, 0x264 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
PLTools - Successfully sent payload: /home/nese/İndirilenler/GM 20 Pro/mtkclient/mtkclient/payloads/mt6771_payload.bin
Port - Device detected :)
DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "hash_check" in preloader
xflashext
xflashext - [LIB]: Error on patching da1 version check...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
xflashext - DA version anti-rollback patched
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - Sending emi data ...
DAXFlash - DRAM setup passed.
DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID:       MT128GASAO4U21
DAXFlash - UFS MID:      0x2c
DAXFlash - UFS CID:      2c014d54313238474153414f34553231
DAXFlash - UFS FWVer:    30313031
DAXFlash - UFS Serial:   202020200000000000000000
DAXFlash - UFS LU0 Size: 0x1dcb000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - HW-CODE         : 0x788
DAXFlash - HWSUB-CODE      : 0x8A00
DAXFlash - HW-VERSION      : 0xCA00
DAXFlash - SW-VERSION      : 0x0
DAXFlash - CHIP-EVOLUTION  : 0x0
DAXFlash - DA-VERSION      : 1.0
DAXFlash - Extensions were accepted. Jumping to extensions...
DAXFlash - DA Extensions successfully added

GPT Table:
-------------
proinfo:             Offset 0x0000000000008000, Length 0x0000000000300000, Flags 0x00000000, UUID f57ad330-39c2-4488-b09b-00cb43c9ccd4, Type EFI_BASIC_DATA
boot_para:           Offset 0x0000000000308000, Length 0x0000000000100000, Flags 0x00000000, UUID fe686d97-3544-4a41-21be-167e25b61b6f, Type EFI_BASIC_DATA
recovery:            Offset 0x0000000000408000, Length 0x0000000002000000, Flags 0x00000000, UUID 1cb143a8-b1a8-4b57-51b2-945c5119e8fe, Type EFI_BASIC_DATA
para:                Offset 0x0000000002408000, Length 0x0000000000080000, Flags 0x00000000, UUID 3b9e343b-cdc8-4d7f-a69f-b6812e50ab62, Type EFI_BASIC_DATA
expdb:               Offset 0x0000000002488000, Length 0x0000000001400000, Flags 0x00000000, UUID 5f6a2c79-6617-4b85-02ac-c2975a14d2d7, Type EFI_BASIC_DATA
frp:                 Offset 0x0000000003888000, Length 0x0000000000100000, Flags 0x00000000, UUID 4ae2050b-5db5-4ff7-d3aa-5730534be63d, Type EFI_BASIC_DATA
vbmeta:              Offset 0x0000000003988000, Length 0x0000000000800000, Flags 0x00000000, UUID 1f9b0939-e16b-4bc9-bca5-dc2ee969d801, Type EFI_BASIC_DATA
vbmeta_system:       Offset 0x0000000004188000, Length 0x0000000000800000, Flags 0x00000000, UUID d722c721-0dee-4cb8-838a-2c63cd1393c7, Type EFI_BASIC_DATA
vbmeta_vendor:       Offset 0x0000000004988000, Length 0x0000000000800000, Flags 0x00000000, UUID e02179a8-ceb5-48a9-3188-4f1c9c5a8695, Type EFI_BASIC_DATA
nvcfg:               Offset 0x0000000005188000, Length 0x0000000002000000, Flags 0x00000000, UUID 84b09a81-fad2-41ac-0e89-407c24975e74, Type EFI_BASIC_DATA
nvdata:              Offset 0x0000000007188000, Length 0x0000000004000000, Flags 0x00000000, UUID e8f0a5ef-8d1b-42ea-2a9c-835cd77de363, Type EFI_BASIC_DATA
md_udc:              Offset 0x000000000b188000, Length 0x000000000169a000, Flags 0x00000000, UUID d5f0e175-a6e1-4db7-c094-f82ad032950b, Type EFI_BASIC_DATA
metadata:            Offset 0x000000000c822000, Length 0x0000000002000000, Flags 0x00000000, UUID 1d9056e1-e139-4fca-0b8c-b75fd74d81c6, Type EFI_BASIC_DATA
protect1:            Offset 0x000000000e822000, Length 0x0000000000800000, Flags 0x00000000, UUID 7792210b-b6a8-45d5-91ad-3361ed14c608, Type EFI_BASIC_DATA
protect2:            Offset 0x000000000f022000, Length 0x0000000000fde000, Flags 0x00000000, UUID 138a6db9-1032-451d-e991-0fa38ff94fbb, Type EFI_BASIC_DATA
seccfg:              Offset 0x0000000010000000, Length 0x0000000000800000, Flags 0x00000000, UUID 756d934c-50e3-4c91-46af-02d824169ca7, Type EFI_BASIC_DATA
persist:             Offset 0x0000000010800000, Length 0x0000000003000000, Flags 0x00000000, UUID a3f3c267-5521-42dd-24a7-3bdec20c7c6f, Type EFI_BASIC_DATA
sec1:                Offset 0x0000000013800000, Length 0x0000000000200000, Flags 0x00000000, UUID 8c68cd2a-ccc9-4c5d-578b-34ae9b2dd481, Type EFI_BASIC_DATA
md1img:              Offset 0x0000000013a00000, Length 0x0000000006400000, Flags 0x00000000, UUID 6a5cebf8-54a7-4b89-1d8d-c5eb140b095b, Type EFI_BASIC_DATA
spmfw:               Offset 0x0000000019e00000, Length 0x0000000000100000, Flags 0x00000000, UUID a0d65bf8-e8de-4107-3494-1d318c843d37, Type EFI_BASIC_DATA
scp1:                Offset 0x0000000019f00000, Length 0x0000000000600000, Flags 0x00000004, UUID 46f0c0bb-f227-4eb6-2fb8-66408e13e36d, Type EFI_BASIC_DATA
scp2:                Offset 0x000000001a500000, Length 0x0000000000600000, Flags 0x00000000, UUID fbc2c131-6392-4217-1eb5-548a6edb03d0, Type EFI_BASIC_DATA
sspm_1:              Offset 0x000000001ab00000, Length 0x0000000000100000, Flags 0x00000004, UUID e195a981-e285-4734-2580-ec323e9589d9, Type EFI_BASIC_DATA
sspm_2:              Offset 0x000000001ac00000, Length 0x0000000000100000, Flags 0x00000000, UUID e29052f8-5d3a-4e97-b5ad-5f312ce6610a, Type EFI_BASIC_DATA
cam_vpu1:            Offset 0x000000001ad00000, Length 0x0000000000f00000, Flags 0x00000000, UUID 9c3cabd7-a35d-4b45-578c-b80775426b35, Type EFI_BASIC_DATA
cam_vpu2:            Offset 0x000000001bc00000, Length 0x0000000000f00000, Flags 0x00000000, UUID e7099731-95a6-45a6-e5a1-1b6aba032cf1, Type EFI_BASIC_DATA
cam_vpu3:            Offset 0x000000001cb00000, Length 0x0000000000f00000, Flags 0x00000000, UUID 8273e1ab-846f-4468-99b9-ee2ea8e50a16, Type EFI_BASIC_DATA
gz1:                 Offset 0x000000001da00000, Length 0x0000000001000000, Flags 0x00000000, UUID d26472f1-9ebc-421d-14ba-311296457c90, Type EFI_BASIC_DATA
gz2:                 Offset 0x000000001ea00000, Length 0x0000000001000000, Flags 0x00000000, UUID b72ccbe9-2055-46f4-67a1-4a069c201738, Type EFI_BASIC_DATA
nvram:               Offset 0x000000001fa00000, Length 0x0000000004000000, Flags 0x00000000, UUID 9c1520f3-c2c5-4b89-4282-fe4c61208a9e, Type EFI_BASIC_DATA
lk:                  Offset 0x0000000023a00000, Length 0x0000000000100000, Flags 0x00000004, UUID 902d5f3f-434a-4de7-8889-321e88c9b8aa, Type EFI_BASIC_DATA
lk2:                 Offset 0x0000000023b00000, Length 0x0000000000100000, Flags 0x00000000, UUID bece74c8-d8e2-4863-fe9b-5b0b66bb920f, Type EFI_BASIC_DATA
boot:                Offset 0x0000000023c00000, Length 0x0000000002000000, Flags 0x00000000, UUID ff1342cf-b7be-44d5-5ea2-a435addd2702, Type EFI_BASIC_DATA
logo:                Offset 0x0000000025c00000, Length 0x0000000000800000, Flags 0x00000000, UUID a4da8f1b-fe07-433b-cb95-84a5f23e477b, Type EFI_BASIC_DATA
dtbo:                Offset 0x0000000026400000, Length 0x0000000000800000, Flags 0x00000000, UUID c2635e15-61aa-454e-409c-ebe1bdf19b9b, Type EFI_BASIC_DATA
tee1:                Offset 0x0000000026c00000, Length 0x0000000000500000, Flags 0x00000004, UUID 4d2d1290-36a3-4f5d-b4af-319f8ab6dcd8, Type EFI_BASIC_DATA
tee2:                Offset 0x0000000027100000, Length 0x0000000000700000, Flags 0x00000000, UUID fdce12f0-a7eb-40f7-5083-960972e6cb57, Type EFI_BASIC_DATA
super:               Offset 0x0000000027800000, Length 0x0000000100000000, Flags 0x00000000, UUID 0fbbafa2-4aa9-4490-8389-5329328505fd, Type EFI_BASIC_DATA
cache:               Offset 0x0000000127800000, Length 0x000000001b000000, Flags 0x00000000, UUID a76e4b2f-31cb-40ba-6a82-c0cb0b73c856, Type EFI_BASIC_DATA
userdata:            Offset 0x0000000142800000, Length 0x0000001c844f8000, Flags 0x00000000, UUID f54ac030-7004-4d02-8194-bbf982036807, Type EFI_BASIC_DATA
otp:                 Offset 0x0000001dc6cf8000, Length 0x0000000002b00000, Flags 0x00000000, UUID c4c310e2-4a7e-77d3-1848-61e2d8bb5e86, Type EFI_BASIC_DATA
flashinfo:           Offset 0x0000001dc97f8000, Length 0x0000000001000000, Flags 0x00000000, UUID 3734710f-0f13-1ab9-4c73-12a08ec50837, Type EFI_BASIC_DATA

Total disk size:0x0000001dca819000, sectors:0x0000000001dca819

Dft Pro ile yedek alınmış başka bir konu var buraya bakabilirsin.
Kod:
nese@lenovo-z500:~/İndirilenler/GM 20 Pro/mtkclient$ ./mtk wl ../dft/ --preloader preloader_k71v1_64_bsp.bin 
...
AXFlash - Extensions were accepted. Jumping to extensions...
DAXFlash - DA Extensions successfully added
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x4000 of 0x4000, ) 2.04 MB/s27 MB/s
Wrote ../dft/vbmeta_system.img to sector 16776 with sector count 2048.
DA_handler
DA_handler - [LIB]: Error: Couldn't detect partition: partition_table2
, skipping
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x800 of 0x800, ) 1.92 MB/s
Wrote ../dft/lk2.img to sector 146176 with sector count 256.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0xA000 of 0xA000, ) 1.96 MB/s94 MB/s
Wrote ../dft/expdb.img to sector 9352 with sector count 5120.
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x10000 of 0x10000, ) 2.10 MB/s9 MB/s
Wrote ../dft/boot.img to sector 146432 with sector count 8192.
DA_handler
DA_handler - [LIB]: Error: Couldn't detect partition: preloader2
, skipping
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x800 of 0x800, ) 1.91 MB/s
Wrote ../dft/lk.img to sector 145920 with sector count 256.
Progress: |█████████████████---------------------------------| 34.4% Write (Sector 0x2C1000 of 0x800000, 15m:36s left) 2.25 MB/s
SP Flash Tool çalışmadığıdan dolayı malum, MTKClient ile yazdırıyorum. Fakat bazı bölümleri bulamadığını söylüyor. İşlem tamamlandıktan sonra durumu bildireceğim.

preloader, partition_table, preloader2 ve partition_table'ın bulunamadığına dair hata aldım.

Düzenleme 3: GM logosunu görebiliyorum artık, fakat "Red State"de kaldı. Telefon hiçbir şekilde açılmıyor.
 
Son düzenleme:

Geri
Yukarı