====== Oukitel WP12 Android Phone (rooting) ====== {{:img:star_full.png?nolink&22|}} {{:img:star_full.png?nolink&22|}} {{:img:star_full.png?nolink&22|}} {{:img:star_empty.png?nolink&22|}} {{:img:star_empty.png?nolink&22|}} Rugged Android smartphone, pourchased in **August 2021** at about **140 €**, getting **root privileges** was rather easy. | {{:img:pros_icon.png?nolink&32|}} | New **Android 11**.\\ 4 Gb **RAM**.\\ 32 Gb **Flash**.\\ 4000 mAh **Battery**.\\ Easy **rooting**.\\ Protected from dust and water immersion **IP68**. | | {{:img:cons_icon.png?nolink&32|}} | Outdated screen resolution **720x1440**.\\ Non replaceable **battery**.\\ **Notification LED** does not exists.\\ Poor screen protection due **non raised border**. | {{.:oukitel-wp12:oukitel-wp12.jpg?480|The Oukitel WP12}} ^ Model | Oukitel WP12 | ^ Size | 174x81x14.3 mm, weight 237 g | ^ RAM | 4.0 Gb | ^ Internal Memory | 32 Gb | ^ CPU | MediaTek Helio A22 - ARM Cortex-A53 1.8 GHz, 4 core | ^ Screen | 5.5 inches, 720 x 1440, brightness 350 cd/m² typical | ^ Battery | Non replaceable 4000 mA | ^ Connector | Micro USB | ^ Audio jack | 3.5 mm | ^ Android | 11 | ^ Build | alps-mp-r0.mp1-V8.67 | ^ Aggiornamento sicurezza | April 2021 | ^ Numero build | OUKITEL_WP12_EEA_V09_20210416 | ^ A/B (Seamless) System Updates | Yes, current-slot: a\\ Verified with **fastboot getvar current-slot** | ^ Anti-Rollback Protection | GetVar Variable Not found\\ Verified with **fastboot getvar anti** | ===== Rooting ===== A quick resume of the rooting process: - **Unlock** the bootloader (causes a factory reset). - Get a copy of the bootloader **boot_a.img** and of the Verified Boot partitions **vbmeta_a.img**, **vbmeta_system_a.img**, **vbmeta_vendor_a.img** using the SP Flash Tool program. - **Patch** the ''boot_a.img'' file using **Magisk** on the phone. - **Flash** the patched image back to the phone. - Flash the **vbmeta** partitions using the **%%--disable-verity%%** **%%--disable-verification%%** options. ===== Install the ADB tools on the PC ===== On your GNU/Linux box install the Debian packages **adb** and **fastboot**, you will get the same-named command line tools. Both programs are at version **8.1.0**, as provided by Debian 10 Buster. ===== Enable Developer options and USB debugging ===== First of all we need to enable the **developer options**: * Settings => System => About phone (in Italian: Impostazioni => Sistema => Informazioni sul telefono). * Tap 7 times on **Build number** (**Numero build**), untill you get the message **You are now a developer** (**Ora sei uno sviluppatore** in Italian). The PIN is eventually requested. To check that the developer options are actually enabled, verify that a new menu is exposed: * Settings => System => **Developer options** (in Italian: Impostazioni => Sistema => **Opzioni sviluppatore**). Now it is possible to enable the **USB debugging** option: * Settings => System => Developer options => **USB debugging** (in Italian Impostazioni => Sistema => Opzioni sviluppatore => **Debug USB**). Quando si connette un PC tramite cavetto USB, sul telefono viene chiesto **Consentire debug USB?**. La domanda è specifica per ogni PC diverso connesso, che viene identificato da un //fingerprint//. Una volta concessa l'autorizzazione sarà possibile dal PC eseguire dei comandi del tipo: adb shell ===== Booting in fastboot or recovery ===== * **Turn off** the device * Press **VolumeUp + Power** buttons for about 4 seconds, untill the **Select Boot Mode** menu appears. * Using **VolumeUp** you choose the menu item **Recovery**, **Fastboot** or **Normal**. * Using the **VolumeDown** you confirm the choice. Alternatively, once you have enabled the USB Debug option, from a PC connected over an USB cable you enter the command: adb reboot bootloader When you are in fastboot mode, on the phone display you can see a small write: => FASTBOOT mode... You can view some of the commands available in fastboot mode in **[[xiaomi_mi_a1#fastboot_mode|this paragraph]]**. To **terminate the fastboot mode**, press the **power button** for 12 seconds. ===== Unlock the Bootloader (causes a factory reset) ===== The process requires two steps: - Enable the **OEM unlocking** option in Settings. - Execute the command **fastboot oem unlock** in fastboot mode. First of all enable the relevant option in **Settings** => System => Developer options => **OEM unlocking** (in Italian is Impostazioni => Sitema => Opzioni sviluppatore => **Sblocco OEM**). Then reboot in fastboot mode using this command from the connected PC: adb reboot bootloader From the PC check if the unlock ability set as above, is actually enabled: fastboot flashing get_unlock_ability (bootloader) unlock_ability = 16777216 If you forget to enable the settings option, you will get the following message: fastboot flashing get_unlock_ability (bootloader) unlock_ability = 0 If the ability is enabled, you can **unlock the bootloader**: fastboot flashing unlock_critical The phone will show a warning message, you have to accept pressing **VolumeUP**: {{.:oukitel-wp12:oukitel-wp12-unlock-bootloader.jpg?400|Unlock bootloader warning message}} Once you have accepted the unlock, you can reboot the phone. A warning message will appear during bootstrap, informing that the phone is in **Orange State**: {{:doc:appunti:hardware:oukitel-wp12:oukitel-wp12-orange-state.jpg?400|Orange State}} Then the phone proceed with a **factory reset**, cancelling all the user data and customizations. Because of the factory reset, you have to repeat the following steps: * Enable Developer otions * Enable USB debugging ===== Install SP Flash Tool v5 on the PC ===== We downloaded **SP_Flash_Tool_v5.2124_Linux.zip** from **[[https://spflashtools.com/]]** (we did not use version 6, because we were not able to read the scatter file with it). Unfortunately that version of **SP Flash Tool** requires a Linux kernel **4.19.14 or** above, our Debian Buster had version 4.19.181, but which is detected as 4.19.0, so the program refuses to start. We had to download and install kernel 5.10.0 from Buster backports. The program can be run by a non-privileged user, just add your user to the **dialout** group, so it can access the **/dev/ttyACM0** device. ===== Read the boot_a.img from the phone ===== To fully operate the **SP Flash Tool** on your phone, you need the **original firmare** from Oukitel, which includes the **images** of the partitions and the **scatter file**. The scatter file is just the map of each partitions into the phone's memory, with the **partition name**, the **physical start address** and the **partition size**. You can get the original firmware from the Oukitel download site, see below. However, to root the phone, you only need to backup a single partition and re-flash it after patching it. So you actually need only the **{{.:oukitel-wp12:oukitel-wp12_mt6761_android_scatter.txt|scatter file}}**. **WARNING**! Do not use a scatter file from another phone! Memory addresses may be totally different and you can brick your phone by writing outside the correct memory region! * Uncompress the firmare: you get the **TE656_OQ_S86_61_R0_EEA_V1.9.1_S210416** directory. * Start the **SP Flash Tool 5.2124** by running the **flash_tool.sh** script. * From the **Download** tab, click to choose the **Scatter loading file** and point to the **MT6761_Android_scatter.txt** file inside the firmare directory. * If the scatter file is parsed correctly, you get the complete table of partitions, with **Name**, **Begin Address** and **End Address**. * For rooting you need to read the **boot_a** partition into a file: click the **Readback**, **Add** and fill the required info: name **boot_a.img**, start address **0x1c000000** and length **0x2000000**. * **Power-off** the phone and disconnect the USB cable. * Click on **Read Back** button. * **Connect the phone** on the USB cable, the readback procedure should **start automatically** and the file will be saved (33554432 bytes, MD5SUM is c007184848c5462d9dbeb90cf8b62b77). === Problem executing SP Flash Tool on some notebooks === I got some problems reading images from the phone to the PC (the **readback** operation); the process stops after a few percent and I get the following debug log (enable log in program options): [Tid0x00007f0af7006700] [error] ./dagent/device/protocol/data_mux.cpp(177): Throw in function void data_mux::worker() Dynamic exception type: boost::exception_detail::clone_impl std::exception::what: Data flow disorder. 0x4CDDDF61 is not magic number 0xFEEEEEEF I got the above error on both an Acer and a **Teclast F6** notebooks. No problems instead running the same software (with the same Debian 10 Buster operating system) on my HP Compaq Elite 8300 desktop. ===== Read vbmeta_a.img, vbmeta_system_a.img and vbmeta_vendor_a.img images ===== In the same manner as you have downloaded the **boot_a.img** file, you have to readback from the phone the the **%%vbmeta_*%%** images too. The full list of images to readback is: * **boot_a.img** * **vbmeta_a.img** * **vbmeta_system_a.img** * **vbmeta_vendor_a.img** ===== Install Magisk on the phone ===== - Download Magisk-v23.0.apk - Copy the file to phone sdcard - Grant the **install from unknown sources** permission to **Files by Google** - Install the apk file. ===== Patch the boot_a.img with Magisk ===== Copy the **boot_a.img** to the internal storage of the phone adb push boot_a.img /sdcard/Download * Start Magisk v23 * Tap the **Install** item * Choose the **Select and Patch a File** option (**Seleziona e aggiorna un file** in Italian). * Choose the **boot_a.img** uploaded to the phone. * Tap **LET'S GO** (**Andiamo!**) The output will be: {{.:oukitel-wp12:oukitel-wp12-magisk-patching.jpg?400|Magisk patching boot_a.img}} ===== Flash the patched boot image to the phone ===== fastboot flash boot_a magisk_patched-23000_rgkOP.img target reported max download size of 134217728 bytes sending 'boot_a' (32768 KB)... OKAY [ 1.654s] writing 'boot_a'... OKAY [ 0.429s] finished. total time: 2.083s If you forgot to unlock the oem, you will get the followingo error message instead: writing 'boot_a'... FAILED (remote: not allowed in locked state) Now you have to flash the **[[https://source.android.com/security/verifiedboot|Verified Boot partitions]]** using some special flags, which actually disable the verification: fastboot --disable-verity --disable-verification flash vbmeta vbmeta_a.img fastboot --disable-verity --disable-verification flash vbmeta_system vbmeta_system_a.img fastboot --disable-verity --disable-verification flash vbmeta_vendor vbmeta_vendor_a.img Now it is possibile to reboot the phone: fastboot reboot WARNING: if you don't flash the **%%vbmeta_*%%** partitions disabling them, you will get a **boot loop**!. In that case you have to keep pressed **VolumeUp + Power** for several seconds (with the **USB cable detached**) to enter the **Select Boot Mode** menu, choose Fastboot and restore the original boot_a.img: fastboot flash boot_a boot_a.img ===== Various Apps Problems ===== ==== K-9 Mail and OpenKeyChain: Cannot connect to the crypto provider ==== I encountered the problem described into **[[https://github.com/k9mail/k-9/issues/3420|K-9 Mail issue #3420]]**. Once enabled the OpenKeyChain crypto provider into K-9 Mail, the error popup **Cannot connect to the crypto provider** is displayed whenever I try to send a mail. **Disabling DuraSpeed** setting for OpenKeyChain does solve the problem. ==== Termux-Widget stops to work ==== I opened the **[[https://github.com/termux/termux-widget/issues/56|issue #56]]** against **Termux-widget**, because the widget suddenly stops to work after a certain time. I turned out that I have to disable DuraSpeed at all, to have the widget working well. ===== Android 11 Settings ===== * **Don't auto-update apps** * **Play Store** => Settings => Auto-update apps => **Don't auto-update apps** * **Install unknown apps** * **Settings** => Apps & notifications => Special app access => **Install unknown apps** * **Play Store** => **Impostazioni** => **Generali** => **Notifiche** * Account: Sì * Aggiornamenti disponibili: No * Aggiornamenti completati: Sì * Altro: No ===== Web References ===== * **[[https://forum.xda-developers.com/t/oukitel-wp12-magisk-root-bootloop.4310443/|Oukitel WP12 Magisk root bootloop]]** * **[[https://www.getdroidtips.com/root-oukitel-wp12/|How to Root Oukitel WP12 using Magisk without TWRP]]** * **[[https://www.hardreset.info/devices/oukitel/oukitel-wp12/faq/faq/|FAQ OUKITEL WP12]]** * **[[https://www.hardreset.info/devices/oukitel/oukitel-wp12/developer-options/|Developer Options OUKITEL WP12]]** * **[[https://oukitel.com/pages/download-center|Oukitel Download Center]]** * **[[https://mega.nz/file/k9gExKgT#2lD_As6jEt9AzbdQMgylCMLx2ymzpv36hHwqz8Z9ZPI|TE656_OQ_S86_61_R0_EEA_V1.9.1_S210416.zip (WP 12 Stock Firmare)]]** - Link listed in Oukitel Download Center.