Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cannot unlock MT6737T xiaolajiao X1(S1) #1401

Open
mouzei opened this issue Mar 1, 2025 · 0 comments
Open

Cannot unlock MT6737T xiaolajiao X1(S1) #1401

mouzei opened this issue Mar 1, 2025 · 0 comments

Comments

@mouzei
Copy link

mouzei commented Mar 1, 2025

.........Port - Device detected :)
Preloader - CPU: MT6735/T,MT8735A()
Preloader - HW version: 0x0
Preloader - WDT: 0x10212000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10217c00
Preloader - Var1: 0x28
Preloader - Disabling Watchdog...
Preloader - HW code: 0x321
Preloader - Target config: 0x1
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xcb00
Preloader - SW Ver: 0x0
Preloader - ME_ID: xxx
DaHandler - Device is protected.
DaHandler - Device is in BROM-Mode. Bypassing security.
PLTools - Loading payload from mt6735_payload.bin, 0x258 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
PLTools - Successfully sent payload: C:\Users\Administrator\Desktop\mtkclient_2025.2.23-1\mtkclient\mtkclient\payloads\mt6735_payload.bin
Port - Device detected :)
DaHandler
DaHandler - [LIB]: �[33mDevice is in BROM mode. No preloader given, trying to dump preloader from ram.�[0m
DALegacy - Uploading legacy da...
DALegacy - Uploading legacy stage 1 from MTK_DA_V5.bin
LegacyExt - Legacy DA2 is patched.
LegacyExt - Legacy DA2 CMD F0 is patched.
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DALegacy - Got loader sync !
DALegacy - Reading nand info
DALegacy - Reading emmc info
DALegacy - ACK: 04029b
DALegacy - Setting stage 2 config ...
DALegacy - DRAM config needed for : 520001154d313133968f0042e51860cc
DALegacy - Reading dram nand info ...
DALegacy - Sending dram info ... EMI-Version 0x14
DALegacy - RAM-Length: 0xbc
DALegacy - Checksum: B7E9
DALegacy - M_EXT_RAM_RET : 0
DALegacy - M_EXT_RAM_TYPE : 0x2
DALegacy - M_EXT_RAM_CHIP_SELECT : 0x0
DALegacy - M_EXT_RAM_SIZE : 0x80000000
DALegacy - Uploading stage 2...
DALegacy - Successfully uploaded stage 2
DALegacy - Connected to stage2
DALegacy - m_int_sram_ret = 0x0
m_int_sram_size = 0x20000
m_ext_ram_ret = 0x0
m_ext_ram_type = 0x2
m_ext_ram_chip_select = 0x0
m_int_sram_ret = 0x0
m_ext_ram_size = 0x80000000
randomid = 0x19436CBB2E756E7CEB97476E584CD8E0

m_emmc_ret = 0x0
m_emmc_boot1_size = 0x400000
m_emmc_boot2_size = 0x400000
m_emmc_rpmb_size = 0x400000
m_emmc_gp_size[0] = 0x0
m_emmc_gp_size[1] = 0x0
m_emmc_gp_size[2] = 0x0
m_emmc_gp_size[3] = 0x0
m_emmc_ua_size = 0x3ab400000
m_emmc_cid = 3331314d15010052cc6022e542008f96
m_emmc_fwver = 0000000000000000

LegacyExt - Detected V3 Lockstate
Sej - HACC init
Sej - HACC run
Sej - HACC terminate
Sej - HACC init
Sej
Sej - [LIB]: �[31mSEJ Legacy Hardware seems not to be configured correctly. Results may be wrong.�[0m
Sej - HACC run
Sej - HACC terminate
Traceback (most recent call last):
File "C:\Users\Administrator\Desktop\mtkclient_2025.2.23-1\mtkclient\mtk.py", line 1021, in
main()
File "C:\Users\Administrator\Desktop\mtkclient_2025.2.23-1\mtkclient\mtk.py", line 1017, in main
mtk = Main(args).run(parser)
File "C:\Users\Administrator\Desktop\mtkclient_2025.2.23-1\mtkclient\mtkclient\Library\mtk_main.py", line 684, in run
da_handler.handle_da_cmds(mtk, cmd, self.args)
File "C:\Users\Administrator\Desktop\mtkclient_2025.2.23-1\mtkclient\mtkclient\Library\DA\mtk_da_handler.py", line 921, in handle_da_cmds
v = mtk.daloader.seccfg(args.flag)
File "C:\Users\Administrator\Desktop\mtkclient_2025.2.23-1\mtkclient\mtkclient\Library\DA\mtk_daloader.py", line 394, in seccfg
return self.lft.seccfg(lockflag)
File "C:\Users\Administrator\Desktop\mtkclient_2025.2.23-1\mtkclient\mtkclient\Library\DA\legacy\extension\legacy.py", line 196, in seccfg
if self.legacy.writeflash(addr=partition.sector * self.mtk.daloader.daconfig.pagesize,
File "C:\Users\Administrator\Desktop\mtkclient_2025.2.23-1\mtkclient\mtkclient\Library\DA\legacy\dalegacy_lib.py", line 959, in writeflash
return self.sdmmc_write_data(addr=addr, length=length, filename=filename, offset=offset, parttype=parttype,
File "C:\Users\Administrator\Desktop\mtkclient_2025.2.23-1\mtkclient\mtkclient\Library\DA\legacy\dalegacy_lib.py", line 861, in sdmmc_write_data
fh = open(filename, "rb")
FileNotFoundError: [Errno 2] No such file or directory: ''

C:\Users\Administrator\Desktop\mtkclient_2025.2.23-1>

xiaolajiao X1(S1).zip

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant