[S2 Pro] UMIDIGI S2 Pro V1.0_20171201 ROM - QGDP + SPFT release

bencebacsi Post time 2022-4-20 17:12:10 | Show all posts   [Copy link]
5 5792
View: 5792|Reply: 5

[S2 Pro] UMIDIGI S2 Pro V1.0_20171201 ROM - QGDP + SPFT release

  [Copy link]
Post time 2017-12-12 04:37:06 | Show all posts |Read mode
This is the QGDP + SP Flash Tool release of the
V1.0_20171201 (UMI OS 2.0) system software
for UMIDIGI S2 Pro

Flash tool operation (either SP or QGDP) is recommended to experienced users only. Do not use it if you cannot understand the whole process!
UMIDIGI S2 Pro receives all updates automatically via FOTA method. You need this tool only in case of emergency (you've bricked your phone or the system software is damaged), or if you want to get a clean installation of the official system software to make your phone able to install FOTA updates again.

WARNING!
Flashing this ROM on any other model may permanently brick your device, flashing the original ROM that fits your device might not be possible anymore!
Please make sure, double check that, you are working with a UMIDIGI S2 Pro smartphone before starting the flashing process with this ROM!




Changelog:
First release for manufacturing


--------------------------------------------------------------------------------
QGDP (official tool for flashing)
Resources:


Extract the .rar file before use.

QGDP flasher: QGDP_Assembly_V3.1.8.0614._portable.rar The password when running the tool: ase

VCOM driver: Windows 10 already automatically can install it or you can use this: MTK_Driver_Auto_Installer_SP_Drivers_20160804.exe

--------------------------------------------------------------------------------
SP Flash Tool (unofficial tool for flashing)
Resources:

Flashtool tutorials: UMI Forum or androidxda guide or YouTube guide (you can google a lot of other solutions and guides)

ROM: >>>>> 20171201_g27v57c2k_kw_s82.rar <<<<< No DB files
Extract the .rar file before use. The scatter file (MT6757_Android_scatter.txt) is inside the extracted folder, together with the other components


VCOM driver: Windows 10 already automatically can install it or you can use this: MTK_Driver_Auto_Installer_SP_Drivers_20160804.exe


Here's an optional solution to start the flashing process on your UMIDIGI S2 Pro if the standard method doesn't work.
It's especially useful if your phone is bricked or is stuck in bootloop
1. Connect your UMIDIGI S2 Pro to USB.
2. Start the flashing process with the Download button in the flasher app.
3. Press and keep pressed the power button of your phone until the flashing process starts (red bar appears at the bottom of the app window), then release it. In this process you have to keep the power button pressed for about 10 seconds.
4. Wait until the flashing process finishes.

Kind request from users:
Please report any kind of new issues you experience after installing this update only if you've already flashed this ROM with SP Flash Tool in Firmware Upgrade mode. In rare cases a FOTA update can cause more or less serious malfunctions but that means only the update process went wrong, not a badly developed ROM. An updated stock ROM, especially related to the basic functions will not cause any new issues but will solve some of the existing ones.

0

threads

12

posts

42

credits

New Member

Rank: 1

credits
42
Post time 2017-12-14 23:10:47 | Show all posts
hi,

on this version can we change the launcher?

 Author| Post time 2017-12-15 11:22:36 | Show all posts
priska37 replied at 2017-12-14 23:10
hi,

on this version can we change the launcher?

Hi,
As far as I know you can't but it will change in the future as promised.

0

threads

15

posts

62

credits

Senior Member

Rank: 2

credits
62
Post time 2021-9-14 19:34:22 | Show all posts
To use Gmail without interruption, each user must create an error-free account. If you can't do this, you can call Gmail for help with all login issues.

==========================
Gmail Nederland

0

threads

1

posts

4

credits

New Member

Rank: 1

credits
4
Post time 2022-4-20 17:12:10 | Show all posts
I am writing down all the needed and related things of UMIDIGI -

evices with MediaTek chipsets have a BROM (boot read-only memory), which typically loads the preloader executable and subsequently boots the Android system, but also houses an alternative boot mode known as Download mode. It is strictly intended for OEM servicing and can be used to unbrick a device, just like Qualcomm’s Emergency Download Mode (EDL). A MediaTek-made proprietary program called “SP Flash Tool” can utilize this interface to force flash the system software on a device. Since the low-level download mode effectively has full control over the device’s storage, many OEMs including Xiaomi and Realme have started obfuscating the flashing process. Because of this practice, firmware flashing via download mode can only be performed by a signed “Download Agent” program that has been authorized by the corresponding OEM, essentially meaning that you can’t flash or unbrick your own smartphone unless you have permission from the device maker to do so.

Well, XDA’s fantastic developer community has once again come to the rescue. Based on a boot ROM-exploit originally discovered by XDA Senior Member xyz`, developers Dinolek and k4y0z have come up with a generic bypass method, which is compatible with a wide variety of MediaTek-powered devices that would otherwise require authentication while flashing. The method, which makes use of SoC-specific exploit payloads, intercepts the pre-flash queries made by SP Flash Tool and forcefully set the values of two crucial parameters (“Serial Link Authentication” and “Download Agent Authentication“) as false in order to continue the flashing process without any kind of authorization.

Bypassing SP Flash Tool authentication
It’s important to note that the exploit payloads require a specially-tweaked USB driver for a successful interception. If you’re running Windows, you have to install a libusb-based filter driver to override the default driverset. Linux users, on the other hand, need to apply a specific patch to the kernel. In case you don’t want to touch your primary operating system, you can make use of FireISO – a bootable GNU/Linux ISO designed specifically for this purpose.

When it comes to accessing the MediaTek download mode, you just need to turn off the target device, hold down the Volume Up button (Volume Down for Xiaomi phones), and plug your phone into your PC. You should see a new serial device listed under Device Manager (Windows) or in the output of dmesg | grep usb (Linux).

At this point, follow this simple, 5 step process to disable bootrom protection:

Download and install Python. Windows users should select “Add Python X.X to PATH” when prompted.
Basically I have used this thoroughly on my Cloud based ERP and related things.
Install the required dependencies using pip:
pip install pyusb pyserial json5
Download the bypass utility.
Extract the archive, execute the utility, and connect your phone in MediaTek Download mode. You should get “Protection disabled” at the end of the log.
Windows:
python main.py
Linux:
./main.py

After that, without disconnecting your phone, run SP Flash Tool in UART Connection mode.
And that’s it! The authentication routine is bypassed and you are now ready to flash/unbrick your phone. If someone more experienced wishes to take this a step further, they can flash a modified partition backup to repair a botched IMEI, but this is beyond the scope of this article.

Which MediaTek SoCs are supported by this method?
The list of SoCs that are currently supported can be found below. The bypass method is theorized to work the same way on other MediaTek chipsets, but someone needs to code a suitable payload first to disable the bottom protection routine.

List of supported SoCs
Conclusion
If you remember, MediaTek chipsets were previously found to be susceptible to a dangerous rootkit nearly a year ago, and it was actively exploited by hackers to gain root access. Considering that, it is unknown why the Taiwanese chip design company still hasn’t patched the flaw in its chipsets that allows defeating the chain of trust while flashing. Although we have only seen the good side of the situation, it is even worse from a security perspective when you consider the hundreds of lesser-known device models using these MediaTek chips.

There is another aspect of the situation from the standpoint of the custom development community, whose interests we represent. A majority of MediaTek devices find themselves in an unsustainable combination of easy-to-brick and difficult-to-revive. On top of that, the forced authorization requirement really limits the potential of aftermarket development on them. The bypass method is nothing but a glimmer of hope for MediaTek device owners, who just want to take the hassle related to unbricking out of the modding scene.

Hope this article helps everyone properly.
You have to log in before you can reply Login | WELCOME TO UMIDIGI COMMUNITY

Points Rules

Quick Reply Top Back to list