GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > EFT Dongle


Reply
 
LinkBack Thread Tools Display Modes
Old 10-08-2018, 13:40   #1 (permalink)
No Life Poster
 
Join Date: Dec 2014
Location: u.a.e
Posts: 509
Member: 2320256
Status: Offline
Sonork: 100.1661545
Thanks Meter: 50
mtk phone


hello brother

phone model: china mobile 4glte +360
can't get root permission to add arabic language
try root from eft dongle after oem unlock and usb dubugging
dump boot and make kernal to root , write to phone
phone stuck in logo and restart

plz help to get root mtk phone
  Reply With Quote
Old 10-09-2018, 00:05   #2 (permalink)
No Life Poster
 
Mohammed Aamri's Avatar
 
Join Date: Feb 2016
Location: Europe
Posts: 3,471
Member: 2536614
Status: Offline
Thanks Meter: 2,785
Please post full details and screenshots.

BR,
Mohammed Aamri
  Reply With Quote
Old 10-09-2018, 20:06   #3 (permalink)
No Life Poster
 
Join Date: Dec 2014
Location: u.a.e
Posts: 509
Member: 2320256
Status: Offline
Sonork: 100.1661545
Thanks Meter: 50
Wating Device..........OK
CPU: MT6753
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 2.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 14.68 GB
Battery:
Battery Voltage: 4290
Injection..........OK
Detecting Parts info............OK
[ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000)
[ID: 8] [PGPT] BaseAddr(0x00000000) Size(0x00080000)
[ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000)
[ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000)
[ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000)
[ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000)
[ID: 8] [lk] BaseAddr(0x01c80000) Size(0x00080000)
[ID: 8] [para] BaseAddr(0x01d00000) Size(0x00080000)
[ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000)
[ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000)
[ID: 8] [logo] BaseAddr(0x03d80000) Size(0x00800000)
[ID: 8] [yl_params] BaseAddr(0x04580000) Size(0x00100000)
[ID: 8] [autobak] BaseAddr(0x04680000) Size(0x01000000)
[ID: 8] [panic] BaseAddr(0x05680000) Size(0x01400000)
[ID: 8] [lk_bak] BaseAddr(0x06a80000) Size(0x00080000)
[ID: 8] [expdb] BaseAddr(0x06b00000) Size(0x00a00000)
[ID: 8] [seccfg] BaseAddr(0x07500000) Size(0x00080000)
[ID: 8] [oemkeystore] BaseAddr(0x07580000) Size(0x00200000)
[ID: 8] [secro] BaseAddr(0x07780000) Size(0x00600000)
[ID: 8] [keystore] BaseAddr(0x07d80000) Size(0x00800000)
[ID: 8] [tee1] BaseAddr(0x08580000) Size(0x00500000)
[ID: 8] [tee2] BaseAddr(0x08a80000) Size(0x00500000)
[ID: 8] [frp] BaseAddr(0x08f80000) Size(0x00100000)
[ID: 8] [nvdata] BaseAddr(0x09080000) Size(0x02000000)
[ID: 8] [metadata] BaseAddr(0x0b080000) Size(0x02780000)
[ID: 8] [system] BaseAddr(0x0d800000) Size(0xc0000000)
[ID: 8] [cache] BaseAddr(0xcd800000) Size(0x19000000)
[ID: 8] [userdata] BaseAddr(0xe6800000) Size(0x2c3b80000)
[ID: 8] [flashinfo] BaseAddr(0x3aa380000) Size(0x01000000)
[ID: 8] [SGPT] BaseAddr(0x3ab380000) Size(0x00080000)
Detecting Device info.......OK
Product: 360
Device Model: 1501_M02
ID: 5.1.017.160222.1501-M02
Sw Internal:
Build Date: Thu Dec 1 01:43:37 CST 2016
Chip Ver: S01
Android Version: 5.1
Architecture: arm64-v8a
Dump Boot.img:...............OK
All Done By EFT Dongle



Selected Kernel [C:/Users/win7/Desktop/360/boot.img]
Unpacking Kernel.....Done
Adding Root Function.....Done
Repacking Kernel.....Done
Done


Wating Device..........OK
CPU: MT6753
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 2.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 14.68 GB
Battery:
Battery Voltage: 4296
Injection..........OK
Detecting Parts info............OK
[ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000)
[ID: 8] [PGPT] BaseAddr(0x00000000) Size(0x00080000)
[ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000)
[ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000)
[ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000)
[ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000)
[ID: 8] [lk] BaseAddr(0x01c80000) Size(0x00080000)
[ID: 8] [para] BaseAddr(0x01d00000) Size(0x00080000)
[ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000)
[ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000)
[ID: 8] [logo] BaseAddr(0x03d80000) Size(0x00800000)
[ID: 8] [yl_params] BaseAddr(0x04580000) Size(0x00100000)
[ID: 8] [autobak] BaseAddr(0x04680000) Size(0x01000000)
[ID: 8] [panic] BaseAddr(0x05680000) Size(0x01400000)
[ID: 8] [lk_bak] BaseAddr(0x06a80000) Size(0x00080000)
[ID: 8] [expdb] BaseAddr(0x06b00000) Size(0x00a00000)
[ID: 8] [seccfg] BaseAddr(0x07500000) Size(0x00080000)
[ID: 8] [oemkeystore] BaseAddr(0x07580000) Size(0x00200000)
[ID: 8] [secro] BaseAddr(0x07780000) Size(0x00600000)
[ID: 8] [keystore] BaseAddr(0x07d80000) Size(0x00800000)
[ID: 8] [tee1] BaseAddr(0x08580000) Size(0x00500000)
[ID: 8] [tee2] BaseAddr(0x08a80000) Size(0x00500000)
[ID: 8] [frp] BaseAddr(0x08f80000) Size(0x00100000)
[ID: 8] [nvdata] BaseAddr(0x09080000) Size(0x02000000)
[ID: 8] [metadata] BaseAddr(0x0b080000) Size(0x02780000)
[ID: 8] [system] BaseAddr(0x0d800000) Size(0xc0000000)
[ID: 8] [cache] BaseAddr(0xcd800000) Size(0x19000000)
[ID: 8] [userdata] BaseAddr(0xe6800000) Size(0x2c3b80000)
[ID: 8] [flashinfo] BaseAddr(0x3aa380000) Size(0x01000000)
[ID: 8] [SGPT] BaseAddr(0x3ab380000) Size(0x00080000)
Detecting Device info.......OK
Product: 360
Device Model: 1501_M02
ID: 5.1.017.160222.1501-M02
Sw Internal:
Build Date: Thu Dec 1 01:43:37 CST 2016
Chip Ver: S01
Android Version: 5.1
Architecture: arm64-v8a
Flash Boot.eft:...............OK
All Done By EFT Dongle
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 13:47.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.15741 seconds with 8 queries

SEO by vBSEO