|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
10-08-2018, 13:40 | #1 (permalink) |
No Life Poster Join Date: Dec 2014 Location: u.a.e
Posts: 509
Member: 2320256 Status: Offline Sonork: 100.1661545 Thanks Meter: 50 | mtk phone phone model: china mobile 4glte +360 can't get root permission to add arabic language try root from eft dongle after oem unlock and usb dubugging dump boot and make kernal to root , write to phone phone stuck in logo and restart plz help to get root mtk phone |
10-09-2018, 20:06 | #3 (permalink) |
No Life Poster Join Date: Dec 2014 Location: u.a.e
Posts: 509
Member: 2320256 Status: Offline Sonork: 100.1661545 Thanks Meter: 50 | Wating Device..........OK CPU: MT6753 Chip Version: 0x0000ca00 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 2.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 4.00 MB EMMC PART USER Size: 14.68 GB Battery: Battery Voltage: 4290 Injection..........OK Detecting Parts info............OK [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) [ID: 8] [PGPT] BaseAddr(0x00000000) Size(0x00080000) [ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) [ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000) [ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000) [ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000) [ID: 8] [lk] BaseAddr(0x01c80000) Size(0x00080000) [ID: 8] [para] BaseAddr(0x01d00000) Size(0x00080000) [ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000) [ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000) [ID: 8] [logo] BaseAddr(0x03d80000) Size(0x00800000) [ID: 8] [yl_params] BaseAddr(0x04580000) Size(0x00100000) [ID: 8] [autobak] BaseAddr(0x04680000) Size(0x01000000) [ID: 8] [panic] BaseAddr(0x05680000) Size(0x01400000) [ID: 8] [lk_bak] BaseAddr(0x06a80000) Size(0x00080000) [ID: 8] [expdb] BaseAddr(0x06b00000) Size(0x00a00000) [ID: 8] [seccfg] BaseAddr(0x07500000) Size(0x00080000) [ID: 8] [oemkeystore] BaseAddr(0x07580000) Size(0x00200000) [ID: 8] [secro] BaseAddr(0x07780000) Size(0x00600000) [ID: 8] [keystore] BaseAddr(0x07d80000) Size(0x00800000) [ID: 8] [tee1] BaseAddr(0x08580000) Size(0x00500000) [ID: 8] [tee2] BaseAddr(0x08a80000) Size(0x00500000) [ID: 8] [frp] BaseAddr(0x08f80000) Size(0x00100000) [ID: 8] [nvdata] BaseAddr(0x09080000) Size(0x02000000) [ID: 8] [metadata] BaseAddr(0x0b080000) Size(0x02780000) [ID: 8] [system] BaseAddr(0x0d800000) Size(0xc0000000) [ID: 8] [cache] BaseAddr(0xcd800000) Size(0x19000000) [ID: 8] [userdata] BaseAddr(0xe6800000) Size(0x2c3b80000) [ID: 8] [flashinfo] BaseAddr(0x3aa380000) Size(0x01000000) [ID: 8] [SGPT] BaseAddr(0x3ab380000) Size(0x00080000) Detecting Device info.......OK Product: 360 Device Model: 1501_M02 ID: 5.1.017.160222.1501-M02 Sw Internal: Build Date: Thu Dec 1 01:43:37 CST 2016 Chip Ver: S01 Android Version: 5.1 Architecture: arm64-v8a Dump Boot.img:...............OK All Done By EFT Dongle Selected Kernel [C:/Users/win7/Desktop/360/boot.img] Unpacking Kernel.....Done Adding Root Function.....Done Repacking Kernel.....Done Done Wating Device..........OK CPU: MT6753 Chip Version: 0x0000ca00 Chip Ext Clock: EXT_26M Writing Mode..........OK Internal RAM: Internal SRAM Size: 128.00 KB External RAM: Type DRAM External Ram Size: 2.00 GB EMMC: EMMC PART BOOT1 Size: 4.00 MB EMMC PART BOOT2 Size: 4.00 MB EMMC PART RPMB Size: 4.00 MB EMMC PART USER Size: 14.68 GB Battery: Battery Voltage: 4296 Injection..........OK Detecting Parts info............OK [ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000) [ID: 8] [PGPT] BaseAddr(0x00000000) Size(0x00080000) [ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000) [ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000) [ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000) [ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000) [ID: 8] [lk] BaseAddr(0x01c80000) Size(0x00080000) [ID: 8] [para] BaseAddr(0x01d00000) Size(0x00080000) [ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000) [ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000) [ID: 8] [logo] BaseAddr(0x03d80000) Size(0x00800000) [ID: 8] [yl_params] BaseAddr(0x04580000) Size(0x00100000) [ID: 8] [autobak] BaseAddr(0x04680000) Size(0x01000000) [ID: 8] [panic] BaseAddr(0x05680000) Size(0x01400000) [ID: 8] [lk_bak] BaseAddr(0x06a80000) Size(0x00080000) [ID: 8] [expdb] BaseAddr(0x06b00000) Size(0x00a00000) [ID: 8] [seccfg] BaseAddr(0x07500000) Size(0x00080000) [ID: 8] [oemkeystore] BaseAddr(0x07580000) Size(0x00200000) [ID: 8] [secro] BaseAddr(0x07780000) Size(0x00600000) [ID: 8] [keystore] BaseAddr(0x07d80000) Size(0x00800000) [ID: 8] [tee1] BaseAddr(0x08580000) Size(0x00500000) [ID: 8] [tee2] BaseAddr(0x08a80000) Size(0x00500000) [ID: 8] [frp] BaseAddr(0x08f80000) Size(0x00100000) [ID: 8] [nvdata] BaseAddr(0x09080000) Size(0x02000000) [ID: 8] [metadata] BaseAddr(0x0b080000) Size(0x02780000) [ID: 8] [system] BaseAddr(0x0d800000) Size(0xc0000000) [ID: 8] [cache] BaseAddr(0xcd800000) Size(0x19000000) [ID: 8] [userdata] BaseAddr(0xe6800000) Size(0x2c3b80000) [ID: 8] [flashinfo] BaseAddr(0x3aa380000) Size(0x01000000) [ID: 8] [SGPT] BaseAddr(0x3ab380000) Size(0x00080000) Detecting Device info.......OK Product: 360 Device Model: 1501_M02 ID: 5.1.017.160222.1501-M02 Sw Internal: Build Date: Thu Dec 1 01:43:37 CST 2016 Chip Ver: S01 Android Version: 5.1 Architecture: arm64-v8a Flash Boot.eft:...............OK All Done By EFT Dongle |
Bookmarks |
| |
|