[oppo PDST00 Soc:mt6889] 如何解决PDST00在unlook bootloader时报错 #1233
Unanswered
william-stere
asked this question in
Q&A
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
日志
bypass_utility-v.1.4.2 logs:
[2024-10-01 16:52:12.739564] Waiting for device
[2024-10-01 16:52:28.025096] Found port = COM3
[2024-10-01 16:52:28.049033] Device hw code: 0x816
[2024-10-01 16:52:28.050032] Device hw sub code: 0x8a00
[2024-10-01 16:52:28.051033] Device hw version: 0xcb00
[2024-10-01 16:52:28.052070] Device sw version: 0x1
[2024-10-01 16:52:28.053078] Device secure boot: True
[2024-10-01 16:52:28.054078] Device serial link authorization: False
[2024-10-01 16:52:28.054078] Device download agent authorization: True
[2024-10-01 16:52:28.055078] Disabling watchdog timer
[2024-10-01 16:52:28.056078] Disabling protection
[2024-10-01 16:52:28.093381] Protection disabled
结束
mtkclient-2.0.1.freeze logs:
MTK Flash/Exploit Client Public V2.0.1 (c) B.Kerler 2018-2024
Preloader - Status: Waiting for PreLoader VCOM, please reconnect mobile to brom mode
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
.Port - Device detected :)
Preloader - CPU: MT6885/MT6883/MT6889/MT6880/MT6890(Dimensity 1000L/1000)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0xa
Preloader - Disabling Watchdog...
Preloader - HW code: 0x816
Preloader - Target config: 0xe0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xcb00
Preloader - SW Ver: 0x1
Preloader - ME_ID: 1C6F058661366200D2D594E92BA878C4
Preloader - SOC_ID: F102FB6A15C200B254E41E9F460CB702C12D50ABDE59245C58B0812509D83793
DaHandler - Device is unprotected.
DaHandler - Device is in BROM-Mode. Bypassing security.
PLTools - Loading payload from mt6885_payload.bin, 0x264 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
Exploitation - Error, payload answered instead:
PLTools - Successfully sent payload: E:\Users\陈伟钦\android\mtkclient-2.0.1.freeze\mtkclient-2.0.1.freeze\mtkclient\payloads\mt6885_payload.bin
DaHandler
DaHandler - [LIB]: �[33mDevice is in BROM mode. No preloader given, trying to dump preloader from ram.�[0m
DaHandler
DaHandler - [LIB]: �[31mFailed to dump preloader from ram, provide a valid one via --preloader option�[0m
DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin
XFlashExt - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "hash_check" in preloader
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
XFlashExt - Patching da2 ...
XFlashExt - Security check patched
XFlashExt - DA version anti-rollback patched
XFlashExt - SBC patched to be disabled
XFlashExt - Register read/write not allowed patched
Preloader
Preloader - [LIB]: �[31mError on DA_Send cmd�[0m
DAXFlash
DAXFlash - [LIB]: �[31mError on sending DA.�[0m
结束
Beta Was this translation helpful? Give feedback.
All reactions