How to extract PStore from a device with mtkclient
- This must be done after a kernel panic/warm boot. Otherwise you might not get any meaningful data.
- The first two steps can be skipped if you know the address and the length of the region.
- Extract
expdbpartition and run thestringsagainst the image.
$ python mtk.py r expdb expdb.img
$ strings expdb.img > expdb.txt- Search for
ramoops.mem_addressor similarramoopsprops inexpdb.txt.
# Example for opal (redmi note 11s 5g, mt6883p)
ramoops.mem_address=0x48090000 ramoops.mem_size=0xe0000 ramoops.console_size=0x40000- Extract the PStore memory region.
# Example for opal (redmi note 11s 5g, mt6883p)
$ python mtk.py da peek 0x48090000 0xe0000 --filename pstore.bin
$ strings pstore.bin > pstore.txtNow just read the pstore.txt in your editor. The first half might be corrupted due to compression/etc
I have made an automation for this along with more info and automation of the
expdbstep:https://github.com/chickendrop89/mtk-log-util