[Please help] Chip type not match! (0x84010000)
[Please help] Chip type not match! (0x84010000)
(31-05-2021, 02:38 PM)morenett Hello!
I have MT8735 with download agent authorization. I bypass this with the exploit https://github.com/MTK-bypass/bypass_utility (since MT6735 is supported and MT8735 has the same hardware code) and everything goes well.
Then, I try to dump internal memory (tried different areas) using the SP Flash Tool, but the following error appears with the scatter file for MT6735:
> CHIP TYPE NOT match!! target efuse value: 0x84010000
Different scatter files result in an error with DRAM. Scatter file for MT8735 is not supported yet by SP Flash Tool.
Please advise how to deal with this and how to get a dump of the device?
Thank you!
(01-06-2021, 12:23 PM)X3non which scatter file are you using? an empty mt6735 scatter file from wwr mtk?
can you post the contents of the scatter file?
(01-06-2021, 06:53 PM)morenett ...
Is it possible there is some kind of hardware protection against reading the internal memory? (efuses?)
(01-06-2021, 06:53 PM)morenett By the way, with the exploit, it's possible to successfully download bootROM of the device - I've done it.
(02-06-2021, 10:47 AM)X3non unlikely, but just to confirm, do you get the same error if you try to readback from different regions? ie emmc_boot1 and emmc_user
alt. you could try backing up firmware using a different tool, you'd require a custom da
(02-06-2021, 10:47 AM)X3non(01-06-2021, 06:53 PM)morenett By the way, with the exploit, it's possible to successfully download bootROM of the device - I've done it.
i don't understand what you mean by this
(02-06-2021, 08:08 PM)morenett Unfortunately, I don’t have DA.
Yes, I get the same error if I try to readback from different regions In this case, does it look like hardware protection, or can you suggest something else? What else could be done to dump the device?
For what purpose does the SP Flash Tool check efuses and can it be ignored in some way?
Thank you for your time!
(01-06-2021, 06:53 PM)morenett The exploit that I posted at the beginning (https://github.com/MTK-bypass/bypass_utility) has the functionality to dump BootROM of the device, which I managed to do. But it probably doesn't matter in case of dumping the internal memory.
(03-06-2021, 11:21 AM)X3non you can try a different tool such as miracle thunder or any other hardware dongle / box you might have. some of these hardware boxes now support mtk bypass so you won't necessarily need a custom da
(03-06-2021, 11:21 AM)X3non the tool is only meant to disable mtk secure boot, it can't dump firmware
(03-06-2021, 06:19 PM)morenett Do I need some kind of dongle for miracle thunder in case of using it for mtk?