Trying to flash/unbrick an MT6753 #1227
Unanswered
Reinoheart
asked this question in
Q&A
Replies: 1 comment 1 reply
-
According to the log this doesn't look to be a known brand but it's
probably a Chinese clone of a phone in market already if you dont mind you
can dump the phone and have a back up and prot try to look around who might
have a device exactly like yours his dump will revive your phone challenge
is these clones don't have factory firmware they dnt have support so good
luck
…On Sat, 28 Sept 2024, 23:28 Starfrost, ***@***.***> wrote:
My parents ordered a brandless knockoff S23 Ultra and ended up doing
something that broke the phone. I have been trying to unbrick it for a
week. The screen doesn't turn on, but it is recognized by my computer.
Using mtkclient, unlocking the bootloader is smooth until DaHandler, where
it throws "unknown seccfg partition header". I think some of my attempts to
unbrick the phone might have ended up bricking it further, but I want to
try repair it. My parents already still have their old phones, so they're
not in a rush, but I'm out of ideas. Previous searches don't yield much
information about this error.
` .....Port - Device detected :)
Preloader - CPU: MT6753()
Preloader - HW version: 0x0
Preloader - WDT: 0x10212000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10217c00
Preloader - Var1: 0x28
Preloader - Disabling Watchdog...
Preloader - HW code: 0x337
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: 28D6C161B72253909F1F26661251541F
DA_handler - Device is unprotected.
DA_handler - Device is in BROM-Mode. Bypassing security.
PLTools - Loading payload from mt6753_payload.bin, 0x258 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload:
C:\Users\flyin\Downloads\mtkclient-gui-20220121-x64\mtkclient\mtkclient\payloads\mt6753_payload.bin
Port - Device detected :)
DA_handler
DA_handler - [LIB]: Device is in BROM mode. No preloader given, trying to
dump preloader from ram.
DALegacy - Uploading da...
DALegacy - Uploading legacy stage 1 from MTK_AllInOne_DA_5.2136.bin
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DALegacy - Got loader sync !
DALegacy - Reading nand info
DALegacy - Reading emmc info
DALegacy - Setting stage 2 config ...
DALegacy - DRAM config needed for : 470001154d423650461205426984106a
DALegacy - Reading dram nand info ...
DALegacy - Sending dram info ...
DALegacy - M_EXT_RAM_RET : 0
DALegacy - M_EXT_RAM_TYPE : 0x2
DALegacy - M_EXT_RAM_CHIP_SELECT : 0x0
DALegacy - M_EXT_RAM_SIZE : 0xc0000000
DALegacy - Uploading stage 2...
DALegacy - Successfully uploaded stage 2
DALegacy - Reconnecting to preloader
DALegacy - Connected to preloader
DALegacy - m_int_sram_ret = 0x0
m_int_sram_size = 0x20000
m_ext_ram_ret = 0x0
m_ext_ram_type = 0x2
m_ext_ram_chip_select = 0x0
m_int_sram_ret = 0x0
m_ext_ram_size = 0xc0000000
randomid = 0x8C22D9EED237E0DFC9907D7B153C3F1E
m_emmc_ret = 0x0
m_emmc_boot1_size = 0x400000
m_emmc_boot2_size = 0x400000
m_emmc_rpmb_size = 0x1000000
m_emmc_gp_size[0] = 0x0
m_emmc_gp_size[1] = 0x0
m_emmc_gp_size[2] = 0x0
m_emmc_gp_size[3] = 0x0
m_emmc_ua_size = 0xe8f800000
m_emmc_cid = 5036424d150100476a10696942051246
m_emmc_fwver = 0500000000000000
Done |--------------------------------------------------| 0.0% Read
(Sector 0x0 of 0x400) 0.00 MB/sDA_handler
DA_handler - [LIB]: Unknown seccfg partition header. Aborting unlock.
Press Enter to continue `
—
Reply to this email directly, view it on GitHub
<#1227>, or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AFRDI3GP7OBXSQ56CIRDIODZY4GQNAVCNFSM6AAAAABPA5I2LSVHI2DSMVQWIX3LMV43ERDJONRXK43TNFXW4OZXGI2DQNJYGM>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
|
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
My parents ordered a brandless knockoff S23 Ultra and ended up doing something that broke the phone. I have been trying to unbrick it for a week. The screen doesn't turn on, but it is recognized by my computer.
Using mtkclient, unlocking the bootloader is smooth until DaHandler, where it throws "unknown seccfg partition header". I think some of my attempts to unbrick the phone might have ended up bricking it further, but I want to try repair it. My parents already still have their old phones, so they're not in a rush, but I'm out of ideas. Previous searches don't yield much information about this error.
Beta Was this translation helpful? Give feedback.
All reactions