I sent you a messageMan God bless you Warlock. I successfully rooted an unlockable, unrootable phone.
I finally figured out the problem. Maybe you should fix up your OP again
So in the instructions it says to change the names to patched_a.img. patched_b.img. I did but I actually named it that. I decided to try and take the img ending since the file is img and all went through.
Million thanks bro.
And what is GSI? You said you put android 11 and 12 on yours????
ok i joined the discord and installed app and posted my questions,,, is there any advice you can give now? sorry i just been at this one a while and still pretty new to this stuff
Listen. Just start at the top of the OP and install everything in order. I printed the instructions and read them thoroughly before attempting it. Then do as Warlock guides. It's pretty simple. The only problem for me was connecting. That was tough. I had to try like 25 times before 1 got through. Though I later learned to disconnect it fast enough before it booted up. Less time wasted. He covers all the steps you gotta take. Great guide.
I'm sorry I fell asleep just woke up to use the bathroom but the commands to flash the flash.bin backup it's "python mtk wf flash.bin" or the out folder flash is "python mtk wl out"Heeelllppppppppp.
Ok so I was able to use LG Up to refurbish and I got a new phone. Still got bootloader unlocked, not sure of root. But I would still like to get back to the state before I unlocked the bootloader, what would be the command to flash that backup?????
oops my output got cut off a bit but there were no issues unlocking the bootloader through mtkclient for the m250n. only issue is i have no confirmation, not a warning screen or a message in the dev options. i already have temp root through mtk-su so i didnt experiment much furtherCould you provide the exact details? The procedure was probably a bit different than the one explained in the OP??? Thanks.
Here is another way to have root on m250n. Have you tested it?
What I think is different for a user that it doesn't show info about the bootloader being unlocked, which would be nice...
Though I haven't tested so I don't for it sure...
Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xcb00 Preloader - SW Ver: 0x1 Preloader - ME_ID: Mtk - We're not in bootrom, trying to crash da... PLTools - Crashing da... Preloader Preloader - [LIB]: upload_data failed with error: DA_IMAGE_SIG_VERIFY_FAIL (0x2001) Preloader Preloader - [LIB]: Error on uploading da data Preloader - Jumping to 0x0 usb_class - USBError(5, 'Input/Output Error') Preloader - Status: Waiting for PreLoader VCOM, please connect mobile Preloader Preloader - [LIB]: Status: Handshake failed, retrying... Port - Device detected :) Preloader - CPU: MT6755/MT6750/M/T/S(Helio P10/P15/P18) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212c00 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader - HW code: 0x326 Preloader - Target config: 0x5 Preloader - SBC enabled: True Preloader - SLA enabled: False Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xcb00 Preloader - SW Ver: 0x1 Preloader - ME_ID: 69A24F1A1C650D8183AD3DC76CB8BD73 PLTools - Loading payload from mt6755_payload.bin, 0x258 bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Kamakiri - Done sending payload... PLTools - Successfully sent payload: /opt/mtkclient/mtkclient/payloads/mt6755_payload.bin Port - Device detected :) DA_handler - Device is protected. DA_handler - Device is in BROM mode. Trying to dump preloader. DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - Sending emi data ... DAXFlash - Sending emi data succeeded. DAXFlash - Uploading stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: QE13MB DAXFlash - EMMC CID: 150100514531334d420d52ac90781419 DAXFlash - EMMC Boot1 Size: 0x400000 DAXFlash - EMMC Boot2 Size: 0x400000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x400000 DAXFlash - EMMC USER Size: 0x3a3e00000 DAXFlash - Reconnecting to preloader DAXFlash - Connected to preloader DAXFlash - DA-CODE : 0x50B76 DAXFlash - DA Extensions successfully added sej - HACC init sej - HACC run sej - HACC terminate sej - HACC init sej - HACC run sej - HACC terminate Done |--------------------------------------------------| 0.0% Write (Sector 0x0Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x1 of 0x1, ) 0.04 MB/s DA_handler - Successfully wrote seccfg.