Добрый день! Случайно прои установке прошивки через MiFlashPro забыл снять галочку lock, прошивка не стала, телефон грузится только в fastboot. При разблокировке требует установить опции в Developer Tools , чего я сделать не могу из-за того, что телефон не грузится. Доступ к mi account есть.
Телефон Note 10 Pro M2103K19C (mt8633)
Пробовал из дистрибутива FirePro
https://github.com/MTK-bypass , єксплоит срабатывает, но телефон все равно остается заблокирован.
Лог MTK-bypass:
log MTK-bypass
[root@fireiso /opt/bypass_utility]# ./main.py -p mt6833_payload.bin
[2022-06-04 15:36:24.067814] Waiting for device
[2022-06-04 15:36:38.914037] Found device = 0e8d:0003
[2022-06-04 15:36:38.919026] Device hw code: 0x989
[2022-06-04 15:36:38.919062] Device hw sub code: 0x8a00
[2022-06-04 15:36:38.919086] Device hw version: 0xca00
[2022-06-04 15:36:38.919106] Device sw version: 0x0
[2022-06-04 15:36:38.919130] Device secure boot: True
[2022-06-04 15:36:38.919149] Device serial link authorization: True
[2022-06-04 15:36:38.919168] Device download agent authorization: True
[2022-06-04 15:36:38.919189] Disabling watchdog timer
[2022-06-04 15:36:38.919614] Disabling protection
[2022-06-04 15:36:38.932773] Protection disabled
[root@fireiso /opt/bypass_utility]#
[root@fireiso /opt/platform-tools]# ./fastboot getvar unlocked
< waiting for any device >
unlocked: no
Finished. Total time: 0.000s
Также пробовал через python mtk xflash seccfg unlock , также лдог успешный , но защита не снимается все равно.
log python mtk
Port - Device detected :)
Preloader - CPU: MT6833(Dimensity 700 5G k6833)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x73
Preloader - Disabling Watchdog...
Preloader - HW code: 0x989
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: E0D2402775A4F382A6F1BFD4CFF909
Preloader - SOC_ID: 5F0F16BFE4F004777989E09480AF2B0DA6E2357242CADC477A66EEC89DBCFB
PLTools - Loading payload from mt6833_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: /opt/unlock/file/mtkclient/payloads/mt6833_payload.bin
Port - Device detected :)
Main - Device is protected.
Main - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading stage 1 from MTK_AllInOne_DA_5.2136.bin
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - UFS FWVer: 0x0
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID: H9HQ15AECMBDAR
DAXFlash - UFS CID: ad014839485131354145434d424441
DAXFlash - UFS LU0 Size: 0x1dcb000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DRAM config needed for : ad014839485131354145434d424441
DAXFlash - Sending emi data ...
DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - UFS FWVer: 0x0
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID: H9HQ15AECMBDAR
DAXFlash - UFS CID: ad014839485131354145434d424441
DAXFlash - UFS LU0 Size: 0x1dcb000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DA-CODE : 0x89920
DAXFlash - DA Extensions successfully added
sej - HACC init
sej - HACC run
sej - HACC terminate
sej - HACC init
sej - HACC run
sej - HACC terminate
sej - HACC init
sej - HACC run
sej - HACC terminate
Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x1 of 0x1, ) 0.05 MB/s
xflashext - Successfully wrote seccfg.
Для анлока зажимал все 3 кнопки, грузился из FireISO linux
Куда копать дальше? Что посоветуете?
Сообщение отредактировал Varkuta - 04.06.22, 16:40