[GUIDE] How to unlock the bootloader for Nokia 2.2

Search This thread

hikari_calyx

Senior Member
  • To moderators: There's no Nokia 2.2 forum in XDA-Developers, please move this topic when available.
    To content farms: DO NOT COPY AND PASTE THE ENTIRE GUIDE!

    Now the last piece of puzzle of Nokia x.2 series bootloader unlock line has been completed, thanks to the help of a member called Woke_World.
    After I read his procedure, I decided to optimize the entire procedure and use my own firmware file to achieve it.

    Step 1: Do full backup
    (For this case please use SP Flash Tool 5.1924 or newer that can be found on spflashtool.com )

    The firmware for this procedure can be downloaded here: https://www.androidfilehost.com/?fid=2188818919693749336
    SHA256: D056631A8A795A06795B3A4E5F334DBF9B55C3C71269831F8E7926FA3ABA5637

    Please follow the procedure in this topic to do readback: https://forum.xda-developers.com/t/...-global-nokia-5-1-plus-unbrick-guide.3858253/
    For this case, you need to keep Download Agent file as the same came with SP Flash Tool, and altunlock-MT6761_Android_scatter.txt

    Once readback done, please extract these images inside your backup for later use:
    Code:
    nvcfg.img
    nvram.img
    proinfo.img
    protect1.img
    protect2.img

    DO NOT SKIP STEP 1, OR YOUR PHONE WILL NOT HAVE IMEI AND SN!

    Step 2: Format all + Download to flash the firmware with altunlock scatter file
    Switch to Download tab, and choose format all + download to flash the entire phone with this scatter file: "altunlock-MT6761_Android_scatter.txt"
    Once flash complete, disconnect the phone.

    Step 3: Bootloader unlock
    Press and hold volume down key and connect to PC - keep that condition for around 12 seconds then the phone will boot to Fastboot mode.
    Execute these 2 commands to perform bootloader unlock:
    Code:
    fastboot flashing lock_critical
    fastboot oem unlock

    Look at your phone and press volume up to confirm unlock. Once done, disconnect the phone and remove the battery, wait 5 seconds and place the battery back.

    Step 4: Do readback again
    Once readback done, please extract these images inside your backup for later use:
    Code:
    sec1.img
    seccfg.img

    Step 5: Format all + Download to flash the firmware with original scatter file
    Switch to Download tab, and choose format all + download to flash the entire phone with the original scatter file named as "MT6761_Android_scatter.txt" - note there's no altunlock at the beginning of filename.
    Once flash complete, disconnect the phone.

    Step 6: Power on the phone and enable USB debugging, root the phone with MTK Easy SU
    [NOTE: DO NOT INSERT ANY SIM CARDS AND YOU MUST SKIP INTERNET CONNECTION]

    You can download the MTK Easy SU apk from here : https://github.com/JunioJsv/mtk-easy-su/releases/latest
    And Magisk APK from here : https://github.com/topjohnwu/magisk/releases/latest

    When you have both MTK Easy Su and Magisk APK installed, please enable the "Run as 64 Bits" option, and tap the hash (#) button to enable root.
    Once root complete, we can now re-enable bootloader unlock and restore IMEI.

    Step 7: Re-enable bootloader unlock and restore IMEI
    Please copy the 7 img files to your phone's internal storage:
    Code:
    nvcfg.img
    nvram.img
    proinfo.img
    protect1.img
    protect2.img
    sec1.img
    seccfg.img
    We assume you copied them to root directory of internal storage (a.k.a. /storage/emulated/0/ )

    Then execute these commands on your PC:
    Code:
    adb shell
    su
    dd if=/storage/emulated/0/nvcfg.img of=/dev/block/bootdevice/by-name/nvcfg
    dd if=/storage/emulated/0/nvram.img of=/dev/block/bootdevice/by-name/nvram
    dd if=/storage/emulated/0/proinfo.img of=/dev/block/bootdevice/by-name/proinfo
    dd if=/storage/emulated/0/protect1.img of=/dev/block/bootdevice/by-name/protect1
    dd if=/storage/emulated/0/protect2.img of=/dev/block/bootdevice/by-name/protect2
    dd if=/storage/emulated/0/sec1.img of=/dev/block/bootdevice/by-name/sec1
    dd if=/storage/emulated/0/seccfg.img of=/dev/block/bootdevice/by-name/seccfg

    When it's done, please perform factory reset to apply the NVRAM restoration.

    Please watch this video for entire procedure demonstration:

    That wraps up the entire procedure of bootloader unlock, and have fun for modding this device!

    Credits:
    Woke_World from triple-color company product community
    diplomatic for his MTK-SU Exploit and simplified utility called JunioJsv
    topjohnwu for MagiskSU
     
    Last edited:

    nico2781993

    New member
    Oct 13, 2019
    4
    0
    Now the last piece of puzzle of Nokia x.2 series bootloader unlock line has been completed, thanks to the help of a member called Woke_World.
    After I read his procedure, I decided to optimize the entire procedure and use my own firmware file to achieve it.

    Step 1: Do full backup
    (For this case please use SP Flash Tool 5.1924 or newer that can be found on spflashtool.com )

    The firmware for this procedure can be downloaded here: https://www.androidfilehost.com/?fid=2188818919693749336
    SHA256: D056631A8A795A06795B3A4E5F334DBF9B55C3C71269831F8E7926FA3ABA5637

    Please follow the procedure in this topic to do readback: https://forum.xda-developers.com/t/...-global-nokia-5-1-plus-unbrick-guide.3858253/
    For this case, you need to keep Download Agent file as the same came with SP Flash Tool, and altunlock-MT6761_Android_scatter.txt

    Once readback done, please extract these images inside your backup for later use:
    Code:
    nvcfg.img
    nvram.img
    proinfo.img
    protect1.img
    protect2.img



    Step 2: Format all + Download to flash the firmware with altunlock scatter file
    Switch to Download tab, and choose format all + download to flash the entire phone with this scatter file: "altunlock-MT6761_Android_scatter.txt"
    Once flash complete, disconnect the phone.

    Step 3: Bootloader unlock
    Press and hold volume down key and connect to PC - keep that condition for around 12 seconds then the phone will boot to Fastboot mode.
    Execute these 2 commands to perform bootloader unlock:
    Code:
    fastboot flashing lock_critical
    fastboot oem unlock

    Look at your phone and press volume up to confirm unlock. Once done, disconnect the phone and remove the battery, wait 5 seconds and place the battery back.

    Step 4: Do readback again
    Once readback done, please extract these images inside your backup for later use:
    Code:
    sec1.img
    seccfg.img

    Step 5: Format all + Download to flash the firmware with original scatter file
    Switch to Download tab, and choose format all + download to flash the entire phone with the original scatter file named as "MT6761_Android_scatter.txt" - note there's no altunlock at the beginning of filename.
    Once flash complete, disconnect the phone.

    Step 6: Power on the phone and enable USB debugging, root the phone with MTK Easy SU
    [NOTE: DO NOT INSERT ANY SIM CARDS AND YOU MUST SKIP INTERNET CONNECTION]

    Puede descargar la aplicación MTK Easy SU desde aquí: https://github.com/JunioJsv/mtk-easy-su/releases/latest
    Y Magisk APK desde aquí: https://github.com/topjohnwu/magisk/releases/latest

    Cuando tenga instalados MTK Easy Su y Magisk APK, habilite la opción "Ejecutar como 64 Bits" y toque el botón hash (#) para habilitar la raíz.
    Una vez que se haya completado la raíz, ahora podemos volver a habilitar el desbloqueo del cargador de arranque y restaurar el IMEI.

    Paso 7: vuelva a habilitar el desbloqueo del cargador de arranque y restaure el IMEI
    Copie los 7 archivos img en el almacenamiento interno de su teléfono:
    [CÓDIGO] nvcfg.img
    nvram.img
    proinfo.img
    protect1.img
    protect2.img
    sec1.img
    seccfg.img [/ CODE]
    Suponemos que los copió en el directorio raíz del almacenamiento interno (también conocido como / almacenamiento / emulado / 0 /)

    Luego ejecute estos comandos en su PC:
    [CÓDIGO]
    shell adb
    su
    dd if = / storage / emulated / 0 / nvcfg.img of = / dev / block / bootdevice / by-name / nvcfg
    dd if = / almacenamiento / emulado / 0 / nvram.img de = / dev / block / bootdevice / by-name / nvram
    dd if = / almacenamiento / emulado / 0 / proinfo.img de = / dev / block / bootdevice / by-name / proinfo
    dd if = / storage / emulated / 0 / protect1.img of = / dev / block / bootdevice / by-name / protect1
    dd if = / storage / emulated / 0 / protect2.img of = / dev / block / bootdevice / by-name / protect2
    dd if = / storage / emulated / 0 / sec1.img of = / dev / block / bootdevice / by-name / sec1
    dd if = / storage / emulated / 0 / seccfg.img of = / dev / block / bootdevice / by-name / seccfg
    [/CÓDIGO]

    Cuando haya terminado, realice un restablecimiento de fábrica para aplicar la restauración de NVRAM.

    Mire este video para ver una demostración completa del procedimiento:
    [MEDIA = youtube] OgGfv65wT7U [/ MEDIA]

    Eso concluye todo el procedimiento de desbloqueo del cargador de arranque, ¡y diviértete modificando este dispositivo!

    Créditos:
    Woke_World de la comunidad de productos de la empresa de triple color
    diplomático por su MTK-SU Exploit y utilidad simplificada llamada JunioJsv
    topjohnwu para MagiskSU


    ¿Es funcional con Android 10 con parche de seguridad 05/01/2021?
     

    nico2781993

    New member
    Oct 13, 2019
    4
    0
    Now the last piece of puzzle of Nokia x.2 series bootloader unlock line has been completed, thanks to the help of a member called Woke_World.
    After I read his procedure, I decided to optimize the entire procedure and use my own firmware file to achieve it.

    Step 1: Do full backup
    (For this case please use SP Flash Tool 5.1924 or newer that can be found on spflashtool.com )

    The firmware for this procedure can be downloaded here: https://www.androidfilehost.com/?fid=2188818919693749336
    SHA256: D056631A8A795A06795B3A4E5F334DBF9B55C3C71269831F8E7926FA3ABA5637

    Please follow the procedure in this topic to do readback: https://forum.xda-developers.com/t/...-global-nokia-5-1-plus-unbrick-guide.3858253/
    For this case, you need to keep Download Agent file as the same came with SP Flash Tool, and altunlock-MT6761_Android_scatter.txt

    Once readback done, please extract these images inside your backup for later use:
    Code:
    nvcfg.img
    nvram.img
    proinfo.img
    protect1.img
    protect2.img



    Step 2: Format all + Download to flash the firmware with altunlock scatter file
    Switch to Download tab, and choose format all + download to flash the entire phone with this scatter file: "altunlock-MT6761_Android_scatter.txt"
    Once flash complete, disconnect the phone.

    Step 3: Bootloader unlock
    Press and hold volume down key and connect to PC - keep that condition for around 12 seconds then the phone will boot to Fastboot mode.
    Execute these 2 commands to perform bootloader unlock:
    Code:
    fastboot flashing lock_critical
    fastboot oem unlock

    Look at your phone and press volume up to confirm unlock. Once done, disconnect the phone and remove the battery, wait 5 seconds and place the battery back.

    Step 4: Do readback again
    Once readback done, please extract these images inside your backup for later use:
    Code:
    sec1.img
    seccfg.img

    Step 5: Format all + Download to flash the firmware with original scatter file
    Switch to Download tab, and choose format all + download to flash the entire phone with the original scatter file named as "MT6761_Android_scatter.txt" - note there's no altunlock at the beginning of filename.
    Once flash complete, disconnect the phone.

    Step 6: Power on the phone and enable USB debugging, root the phone with MTK Easy SU
    [NOTE: DO NOT INSERT ANY SIM CARDS AND YOU MUST SKIP INTERNET CONNECTION]

    You can download the MTK Easy SU apk from here : https://github.com/JunioJsv/mtk-easy-su/releases/latest
    And Magisk APK from here : https://github.com/topjohnwu/magisk/releases/latest

    When you have both MTK Easy Su and Magisk APK installed, please enable the "Run as 64 Bits" option, and tap the hash (#) button to enable root.
    Once root complete, we can now re-enable bootloader unlock and restore IMEI.

    Step 7: Re-enable bootloader unlock and restore IMEI
    Please copy the 7 img files to your phone's internal storage:
    Code:
    nvcfg.img
    nvram.img
    proinfo.img
    protect1.img
    protect2.img
    sec1.img
    seccfg.img
    We assume you copied them to root directory of internal storage (a.k.a. /storage/emulated/0/ )

    Then execute these commands on your PC:
    Code:
    adb shell
    su
    dd if = / storage / emulated / 0 / nvcfg.img of = / dev / block / bootdevice / by-name / nvcfg
    dd if = / almacenamiento / emulado / 0 / nvram.img de = / dev / block / bootdevice / by-name / nvram
    dd if = / almacenamiento / emulado / 0 / proinfo.img de = / dev / block / bootdevice / by-name / proinfo
    dd if = / storage / emulated / 0 / protect1.img of = / dev / block / bootdevice / by-name / protect1
    dd if = / storage / emulated / 0 / protect2.img of = / dev / block / bootdevice / by-name / protect2
    dd if = / storage / emulated / 0 / sec1.img of = / dev / block / bootdevice / by-name / sec1
    dd if = / storage / emulated / 0 / seccfg.img of = / dev / block / bootdevice / by-name / seccfg
    [/CÓDIGO]
    
    Cuando haya terminado, realice un restablecimiento de fábrica para aplicar la restauración de NVRAM.
    
    Mire este video para ver una demostración completa del procedimiento:
    [MEDIA = youtube] OgGfv65wT7U [/ MEDIA]
    
    Eso concluye todo el procedimiento de desbloqueo del cargador de arranque, ¡y diviértete modificando este dispositivo!
    
    Créditos:
    Woke_World from triple-color company product community
    diplomatic for his MTK-SU Exploit and simplified utility called JunioJsv
    topjohnwu for MagiskSU
    [/QUOTE]
    I have read that the security patch 05/01/2021 in android 10 does not allow the use of MTK easy SU (Step 6).
    Carrying out the steps prior to that step, (step 6), is it possible to use the application even with the latest security patch installed?
     

    TheBeast941

    Member
  • Apr 6, 2021
    17
    0
    Just managed to unlock the bottloader on my phone :D
    Is it safe to connect to the Internet and insert a sim after completing the tutorial, and/or is there any way I can get about permanently rooting the phone?
     
    Last edited:

    Top Liked Posts

    • There are no posts matching your filters.
    • 1
      View attachment 5328475
      fastboot -w command didn't work, how do i solve this?
      dont worry it does that for me and still works
    • 8
      To moderators: There's no Nokia 2.2 forum in XDA-Developers, please move this topic when available.
      To content farms: DO NOT COPY AND PASTE THE ENTIRE GUIDE!

      Now the last piece of puzzle of Nokia x.2 series bootloader unlock line has been completed, thanks to the help of a member called Woke_World.
      After I read his procedure, I decided to optimize the entire procedure and use my own firmware file to achieve it.

      Step 1: Do full backup
      (For this case please use SP Flash Tool 5.1924 or newer that can be found on spflashtool.com )

      The firmware for this procedure can be downloaded here: https://www.androidfilehost.com/?fid=2188818919693749336
      SHA256: D056631A8A795A06795B3A4E5F334DBF9B55C3C71269831F8E7926FA3ABA5637

      Please follow the procedure in this topic to do readback: https://forum.xda-developers.com/t/...-global-nokia-5-1-plus-unbrick-guide.3858253/
      For this case, you need to keep Download Agent file as the same came with SP Flash Tool, and altunlock-MT6761_Android_scatter.txt

      Once readback done, please extract these images inside your backup for later use:
      Code:
      nvcfg.img
      nvram.img
      proinfo.img
      protect1.img
      protect2.img

      DO NOT SKIP STEP 1, OR YOUR PHONE WILL NOT HAVE IMEI AND SN!

      Step 2: Format all + Download to flash the firmware with altunlock scatter file
      Switch to Download tab, and choose format all + download to flash the entire phone with this scatter file: "altunlock-MT6761_Android_scatter.txt"
      Once flash complete, disconnect the phone.

      Step 3: Bootloader unlock
      Press and hold volume down key and connect to PC - keep that condition for around 12 seconds then the phone will boot to Fastboot mode.
      Execute these 2 commands to perform bootloader unlock:
      Code:
      fastboot flashing lock_critical
      fastboot oem unlock

      Look at your phone and press volume up to confirm unlock. Once done, disconnect the phone and remove the battery, wait 5 seconds and place the battery back.

      Step 4: Do readback again
      Once readback done, please extract these images inside your backup for later use:
      Code:
      sec1.img
      seccfg.img

      Step 5: Format all + Download to flash the firmware with original scatter file
      Switch to Download tab, and choose format all + download to flash the entire phone with the original scatter file named as "MT6761_Android_scatter.txt" - note there's no altunlock at the beginning of filename.
      Once flash complete, disconnect the phone.

      Step 6: Power on the phone and enable USB debugging, root the phone with MTK Easy SU
      [NOTE: DO NOT INSERT ANY SIM CARDS AND YOU MUST SKIP INTERNET CONNECTION]

      You can download the MTK Easy SU apk from here : https://github.com/JunioJsv/mtk-easy-su/releases/latest
      And Magisk APK from here : https://github.com/topjohnwu/magisk/releases/latest

      When you have both MTK Easy Su and Magisk APK installed, please enable the "Run as 64 Bits" option, and tap the hash (#) button to enable root.
      Once root complete, we can now re-enable bootloader unlock and restore IMEI.

      Step 7: Re-enable bootloader unlock and restore IMEI
      Please copy the 7 img files to your phone's internal storage:
      Code:
      nvcfg.img
      nvram.img
      proinfo.img
      protect1.img
      protect2.img
      sec1.img
      seccfg.img
      We assume you copied them to root directory of internal storage (a.k.a. /storage/emulated/0/ )

      Then execute these commands on your PC:
      Code:
      adb shell
      su
      dd if=/storage/emulated/0/nvcfg.img of=/dev/block/bootdevice/by-name/nvcfg
      dd if=/storage/emulated/0/nvram.img of=/dev/block/bootdevice/by-name/nvram
      dd if=/storage/emulated/0/proinfo.img of=/dev/block/bootdevice/by-name/proinfo
      dd if=/storage/emulated/0/protect1.img of=/dev/block/bootdevice/by-name/protect1
      dd if=/storage/emulated/0/protect2.img of=/dev/block/bootdevice/by-name/protect2
      dd if=/storage/emulated/0/sec1.img of=/dev/block/bootdevice/by-name/sec1
      dd if=/storage/emulated/0/seccfg.img of=/dev/block/bootdevice/by-name/seccfg

      When it's done, please perform factory reset to apply the NVRAM restoration.

      Please watch this video for entire procedure demonstration:

      That wraps up the entire procedure of bootloader unlock, and have fun for modding this device!

      Credits:
      Woke_World from triple-color company product community
      diplomatic for his MTK-SU Exploit and simplified utility called JunioJsv
      topjohnwu for MagiskSU
      1
      How to extract *.img files from ROM_0 backup?
      1
      Please make a tutorial on how to unlock the bootloader of Nokia 2.1 with Android 10 update.