ok when can we start
Fatal error in launcher: Unable to create process using '"C:\Program Files\Python310\python.exe" "C:\Program Files\Python310\Scripts\pip3.exe" install -r requirements.txt': The system cannot find the file specified.
ok when can we start
After writing this command "python mtk e metadata,userdata,md_udc" always shows error when writing "python mtk xflash seccfg unlock" command. If I unplug the phone it just reboots. Tried multiple times without any success.Ok so I got the bootloader unlocked but I had to add an extra step. In between "python mtk e metadata,userdata,md_udc" & "python mtk xflash seccfg unlock" I had to unplug the phone, close out powershell & SpFlash, then open them back up, push "download" on SpFlash then run your second command in powershell (MTK client). If I didn't do this then I would get the 12 byte buffer error from earlier
cd into the directory with the .txt
How did you do it? can you please help. After writing the first command successfully, it always shows this error on "python mtk xflash seccfg unlock" command
Thanks for your reply. Now a new issue has cropped up. The phone shows charging symbol when connected to computer.
Do I need to have internet access on the PC when running the python install commands for the PIP to work? I'm seeing errors and that also that cannot find the page for pycryptodome amongst several other errors when I run the command
oops my output got cut off a bit but there were no issues unlocking the bootloader through mtkclient for the m250n. only issue is i have no confirmation, not a warning screen or a message in the dev options. i already have temp root through mtk-su so i didnt experiment much furtherCould you provide the exact details? The procedure was probably a bit different than the one explained in the OP??? Thanks.
Here is another way to have root on m250n. Have you tested it?
What I think is different for a user that it doesn't show info about the bootloader being unlocked, which would be nice...
Though I haven't tested so I don't for it sure...
Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xcb00 Preloader - SW Ver: 0x1 Preloader - ME_ID: Mtk - We're not in bootrom, trying to crash da... PLTools - Crashing da... Preloader Preloader - [LIB]: upload_data failed with error: DA_IMAGE_SIG_VERIFY_FAIL (0x2001) Preloader Preloader - [LIB]: Error on uploading da data Preloader - Jumping to 0x0 usb_class - USBError(5, 'Input/Output Error') Preloader - Status: Waiting for PreLoader VCOM, please connect mobile Preloader Preloader - [LIB]: Status: Handshake failed, retrying... Port - Device detected :) Preloader - CPU: MT6755/MT6750/M/T/S(Helio P10/P15/P18) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212c00 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader - HW code: 0x326 Preloader - Target config: 0x5 Preloader - SBC enabled: True Preloader - SLA enabled: False Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xcb00 Preloader - SW Ver: 0x1 Preloader - ME_ID: 69A24F1A1C650D8183AD3DC76CB8BD73 PLTools - Loading payload from mt6755_payload.bin, 0x258 bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Kamakiri - Done sending payload... PLTools - Successfully sent payload: /opt/mtkclient/mtkclient/payloads/mt6755_payload.bin Port - Device detected :) DA_handler - Device is protected. DA_handler - Device is in BROM mode. Trying to dump preloader. DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x200000 Preloader - Jumping to 0x200000: ok. DAXFlash - Successfully received DA sync DAXFlash - Sending emi data ... DAXFlash - Sending emi data succeeded. DAXFlash - Uploading stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: QE13MB DAXFlash - EMMC CID: 150100514531334d420d52ac90781419 DAXFlash - EMMC Boot1 Size: 0x400000 DAXFlash - EMMC Boot2 Size: 0x400000 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x400000 DAXFlash - EMMC USER Size: 0x3a3e00000 DAXFlash - Reconnecting to preloader DAXFlash - Connected to preloader DAXFlash - DA-CODE : 0x50B76 DAXFlash - DA Extensions successfully added sej - HACC init sej - HACC run sej - HACC terminate sej - HACC init sej - HACC run sej - HACC terminate Done |--------------------------------------------------| 0.0% Write (Sector 0x0Progress: |██████████████████████████████████████████████████| 100.0% Write (Sector 0x1 of 0x1, ) 0.04 MB/s DA_handler - Successfully wrote seccfg.