ErenPredator
Centipat
Daha fazla
- Cinsiyet
- Erkek
Yok hocam ne yorması, benzer sorunu ben de yaşadım. Aksine yardımcı olmak için uğraşıyorum daha çok. Failed to send sparse hatası alıyordum gönderirken ancak benim cihaz 9s/qualcomm olduğundan dolayı daha kolay flashlandı.
Yok hocam ne yorması, benzer sorunu ben de yaşadım. Aksine yardımcı olmak için uğraşıyorum daha çok. Failed to send sparse hatası alıyordum gönderirken ancak benim cihaz 9s/qualcomm olduğundan dolayı daha kolay flashlandı.
C:\Users\Konan\Desktop\Telefon#\mtkclient-main>python mtk.py w recovery recovery.img --preloader=preloader_merlin.bin --skip=emi --skipwdtBir dakika yukarıda verdiklerimi denemeden bir şey deneyelim.
python mtk.py w recovery recovery.img --preloader=preloader_merlin.bin --skip=emi --skipwdt
C:\Users\Konan\Desktop\Telefon#\mtkclient-main>python mtk.py w recovery recovery.img --preloader=preloader_merlin.bin --skip=emi --skipwdt
usage: mtk.py w [-h] [--loader LOADER] [--vid VID] [--pid PID]
[--sectorsize SECTORSIZE] [--debugmode]
[--gpt-num-part-entries GPT_NUM_PART_ENTRIES]
[--gpt-part-entry-size GPT_PART_ENTRY_SIZE]
[--gpt-part-entry-start-lba GPT_PART_ENTRY_START_LBA]
[--skip SKIP] [--skipwdt SKIPWDT] [--gpt_file GPT_FILE]
[--wdt WDT] [--mode MODE] [--var1 VAR1]
[--uart_addr UART_ADDR] [--da_addr DA_ADDR]
[--brom_addr BROM_ADDR] [--ptype PTYPE]
[--preloader PRELOADER] [--verifystage2 VERIFYSTAGE2]
[--parttype PARTTYPE] [--filename FILENAME] [--crash CRASH]
[--socid SOCID] [--auth AUTH] [--cert CERT] [--generatekeys]
[--serialport [SERIALPORT]] [--noreconnect] [--stock]
[--uartloglevel UARTLOGLEVEL]
partitionname filename
mtk.py w: error: argument --skipwdt: expected one argument
MTK Flash/Exploit Client Public V2.0.1 (c) B.Kerler 2018-2024
python mtk.py w recovery recovery.img --preloader=preloader_merlin.bin --skip emi --skipwdt 1
Port - device detected
Preloader - CPU: MT6768/MT6769(Helio P65/G85 K68v1)
Preloader - hw version: 0x0.
Preloader - wdt: 0x10007000.
Preloader - uart: 0x11002000.
Preloader - BROM payload addr: 0x100a00.
Preloader - da payload addr: 0x201000.
Preloader - cq_dma addr: 0x10212000.
Preloader - var1: 0x25.
Preloader - hw code: 0x707.
Preloader - target Config: 0xe7.
Preloader - SBC enabled: True.
Preloader - sla enabled: True.
Preloader - daa enabled: True.
Preloader - swjtag enabled: True.
Preloader - epp_param at 0x600 after EMMC_BOOT/SDMMC_BOOT: false.
Preloader - root cert required: False.
Preloader - mem read auth: True.
Preloader - mem write auth: True.
Preloader - CMD 0xC8 blocked: True.
Preloader - get target info.
Preloader - BROM mode detected.
Preloader - hw subcode: 0x8a00.
Preloader - hw ver: 0xca00.
Preloader - SW ver: 0x0.
Preloader - me_ıd: 73E271184327A553A7BaEC785ACB1D4C
Preloader - soc_ıd: 835de6ff0A90CD5246009FCC8ed4D4468B93B334B1E58E02A0AC81ebCA93B01A
Preloader.
Preloader - [LIB]: [33mauth file is required. Use --auth option.[0M
Dahandler - device is protected.
Dahandler - device is in BROM-mode. Bypassing Security.
Pltools - loading payload from MT6768_Payload. Bin, 0x264 bytes.
Exploitation - kamakiri run.
Exploitation - done sending payload...
Pltools - successfully sent payload: C:\Users\Konan\Desktop\Telefon#\mtkclient-main\mtkclient\payloads\mt6768_payload.bin
Port - device detected
Daxflash - uploading xflash stage 1 from mtk_da_v5.bin
Xflashext - patching da1..
MTK - patched "patched loader msg" in preloader.
MTK - patched "hash_check" in preloader.
MTK - patched "patched loader msg" in preloader.
MTK - patched "get_vfy_policy" in preloader.
Xflashext - patching da2..
Xflashext - Security check patched.
Xflashext - da version anti-rollback patched.
Xflashext - SBC patched to be disabled.
Xflashext - register read/write not allowed patched.
Daxflash - successfully uploaded stage 1, jumping.
Preloader - jumping to 0x200000.
Preloader - jumping to 0x200000: ok.
Daxflash - successfully received da Sync.
Daxflash - sending emi data...
Daxflash - DRAM setup passed.
Daxflash - sending emi data succeeded.
Daxflash - uploading stage 2..
Daxflash - upload data was accepted. Jumping to stage 2..
Daxflash.
Daxflash - [LIB]: [31mstage was't executed. Maybe DRAM issue?[0M
Daxflash.
Daxflash - [LIB]: [31merror on booting to da (xflash)[0M
Hocam DRAM issue yazısı dikkatimi çekti ne yapabiliriz?
python mtk.py w recovery recovery.img --preloader=preloader_merlin.bin --skipwdt --da_addr=0x200000 --brom_addr=0x100a00 --mtkclient=old --auth=auth_sv5.auth --skip emi
python mtk.py w recovery recovery.img --preloader=preloader_merlin.bin --skipwdt --da_addr=0x200000 --brom_addr=0x100a00 --mtkclient=old --auth=auth_sv5.auth --skip emi
-- İle BROM arasında boşluk yok dikkat et.
Hocam yani kodlar ayrı ayrımı yoksa birleşik mi?
Attığımı direk kopyala yapıştır yapın.
C:\Users\Konan\Desktop\Telefon#\mtkclient-main>python mtk.py W recovery recovery.img --preloader = preloader_merlin. Bin --skipwdt 1 --da_addr = 0x200000 --brom_addr = 0x100A00 --MTKClient = old --auth = auth_sv5.auth --skip emi.
Usage: mtk.py [-h]
{Script, multi, printgpt, GPT, R, RL, rf, RS, ro, FS, W, wf, wl, WO, E, es, ess, footer, reset, dumpbrom, dumpsram, dumppreloader, payload, crash, brute, gettargetconfig, peek, stage, plstage, logs, meta, da}
...
mtk.py: Error: Unrecognized arguments: --MTKClient = old.
MTK Flash/Exploit Client public v2.0.1 (C) b. Kerler 2018-2024
Not: Skipwdt hata verdi skipwdt 1 yazdim az önceki komutta siz yazmıştınız diye.
python mtk.py w recovery recovery.img --preloader=preloader_merlin.bin --skipwdt 1 --da_addr=0x200000 --brom_addr=0x100a00 --auth=auth_sv5.auth --skip emi
hocam yine bunu yazdı.python mtk.py w recovery recovery.img --preloader=preloader_merlin.bin --skipwdt 1 --da_addr=0x200000 --brom_addr=0x100a00 --auth=auth_sv5.auth --skip emi
Hocam yine bunu yazdı.
Port - device detected
Preloader - CPU: MT6768/MT6769(Helio P65/G85 K68v1)
Preloader - hw version: 0x0.
Preloader - wdt: 0x10007000.
Preloader - uart: 0x11002000.
Preloader - BROM payload addr: 0x100a00.
Preloader - da payload addr: 0x201000.
Preloader - cq_dma addr: 0x10212000.
Preloader - var1: 0x25.
Preloader - hw code: 0x707.
Preloader - target Config: 0xe7.
Preloader - SBC enabled: True.
Preloader - sla enabled: True.
Preloader - daa enabled: True.
Preloader - swjtag enabled: True.
Preloader - epp_param at 0x600 after EMMC_BOOT/SDMMC_BOOT: false.
Preloader - root cert required: False.
Preloader - mem read auth: True.
Preloader - mem write auth: True.
Preloader - CMD 0xC8 blocked: True.
Preloader - get target info.
Preloader - BROM mode detected.
Preloader - hw subcode: 0x8a00.
Preloader - hw ver: 0xca00.
Preloader - SW ver: 0x0.
Preloader - me_ıd: 73E271184327A553A7BaEC785ACB1D4C
Preloader - soc_ıd: 835de6ff0A90CD5246009FCC8ed4D4468B93B334B1E58E02A0AC81ebCA93B01A
Dahandler - device is protected.
Dahandler - device is in BROM-mode. Bypassing Security.
Pltools - loading payload from MT6768_Payload. Bin, 0x264 bytes.
Exploitation - kamakiri run.
Exploitation - done sending payload...
Pltools - successfully sent payload: C:\Users\Konan\Desktop\Telefon#\mtkclient-main\mtkclient\payloads\mt6768_payload.bin
Port - device detected
Daxflash - uploading xflash stage 1 from mtk_da_v5.bin
Xflashext - patching DA1...
MTK - patched "patched loader msg" in preloader.
MTK - patched "hash_check" in preloader.
MTK - patched "patched loader msg" in preloader.
MTK - patched "get_vfy_policy" in preloader.
Xflashext - patching DA2...
Xflashext - Security check patched.
Xflashext - da version anti-rollback patched.
Xflashext - SBC patched to be disabled.
Xflashext - register read/write not allowed patched.
Daxflash - successfully uploaded stage 1, jumping.
Preloader - jumping to 0x200000.
Preloader - jumping to 0x200000: Ok.
Daxflash - successfully received da Sync.
Daxflash - sending emi data...
Daxflash - DRAM setup passed.
Daxflash - sending emi data succeeded.
Daxflash - uploading stage 2..
Daxflash - upload data was accepted. Jumping to stage 2..