Skip to main content

Posts

Showing posts from June, 2022

mt6765 scatter

RMX2185:/ # ls -la /dev/block/by-name/            mmcblk0boot0 -> /dev/block/mmcblk0boot0 mmcblk0boot1 -> /dev/block/mmcblk0boot1        mmcblk0 -> /dev/block/mmcblk0     boot_para -> /dev/block/mmcblk0p1   recovery -> /dev/block/mmcblk0p2 para -> /dev/block/mmcblk0p3 opporeserve1 -> /dev/block/mmcblk0p4 opporeserve2 -> /dev/block/mmcblk0p5 opporeserve3 -> /dev/block/mmcblk0p6 oppo_custom -> /dev/block/mmcblk0p7 expdb -> /dev/block/mmcblk0p8 vbmeta_system -> /dev/block/mmcblk0p9 vbmeta_vendor -> /dev/block/mmcblk0p10 frp -> /dev/block/mmcblk0p11 nvcfg -> /dev/block/mmcblk0p12 nvdata -> /dev/block/mmcblk0p13 md_udc -> /dev/block/mmcblk0p14 metadata -> /dev/block/mmcblk0p15 protect1 -> /dev/block/mmcblk0p16 protect2 -> /dev/block/mmcblk0p17 seccfg -> /dev/block/mmcblk0p18 persist -> /dev/block/mmcblk0p19 sec1 -> /dev/block/mmcblk0p20 proinfo -> /dev/block/mmcblk0p21 md1img -> /dev/block/mmcblk0p22 spmfw -> /dev

alpine chroot install

 https://mirrors.alpinelinux.org/ https://wiki.alpinelinux.org/wiki/Category:Installation https://wiki.alpinelinux.org/wiki/Alpine_Linux_in_a_chroot 1. Download  and extract static apk https://gitlab.alpinelinux.org/alpine/apk-tools/-/releases download latest one for your arch or goto  https://dl-cdn.alpinelinux.org/alpine/latest-stable/main/x86_64/ apk-tools-static-X.X-X.apk https://pkgs.alpinelinux.org/package/edge/main/x86/apk-tools-static tar -xzf apk-tools-static-*.apk or chmod +x apk.static    #allow execute permission ./apk.static    #to execute it  2.format rootfs and mount to /mnt https://battlepenguin.com/tech/alpine-linux-with-full-disk-encryption/ https://wejn.org/2021/01/alpinelinux-secure-boot-with-full-encryption/ https://wiki.alpinelinux.org/wiki/Root_on_ZFS_with_native_encryption apk add fdisk  fdisk -l doas cfdisk sda or nvme0n1 create new partition let it be sdax  mkfs.ext4 /dev/sdax mount /dev/sdax /mnt 3.install  find {mirror} from http://nl.alpinelinux.org/alpine/

mtkclient dump rom of mtk chipset

latest update of realme,xiaomi patches preloader so cant use some exploit  if updated fw   git clone https://github.com/bkerler/mtkclient sudo apt install python3 git libusb-1.0-0 python3-pip cd mtkclient pip3 install -r requirements.txt python3 setup.py install --install-dir ~/.local cat /home/kai/.local/bin/mtkgui python3 ~/src/mtkclient/mtk_gui   ##adding udev rules   sudo usermod -a -G plugdev $USER  sudo usermod -a -G dialout $USER  sudo cp Setup/Linux/*.rules /etc/udev/rules.d  sudo udevadm control -R    nano /etc/udev/rules.d/51-edl.rules #rmx2180 SUBSYSTEMS=="usb", ATTRS{idVendor}=="22d9", ATTRS{idProduct}=="0006", MODE="0666", GROUP="plugdev" SUBSYSTEMS=="usb", ATTRS{idVendor}=="0e8d", ATTRS{idProduct}=="0003", MODE="0666", GROUP="plugdev"     python mtk_gui ##root using magisk python mtk r boot,vbmeta boot.img,vbmeta.img  patched magisk https://raw.githubusercontent.com/vvb2060