GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > Pandora’s box


Reply
 
LinkBack Thread Tools Display Modes
Old 06-22-2023, 13:41   #1 (permalink)
Freak Poster
 
Join Date: Sep 2013
Location: VELLORE
Posts: 173
Member: 2029741
Status: Offline
Thanks Meter: 61
mi 11i (pissarro) after repair imei patch done but showing nv data corrupted [Solved]


bootloader unlocked officially then repair with auto patch then showing nv data is corrupted in recovery mode any solution?



Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,usbser,MediaTek USB Port,usbser.sys,10.0.19041.2130]
Device found at COM5 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,usbser,MediaTek USB Port,usbser.sys,10.0.19041.2130]
Device found at COM5 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834
Get Chip ID... [MT6877]
Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): MT128GAXAU2U227X (0101)
Load EMI from phone... Skip (invalid magic flash header)
Load EMI config from database [DB VER: 212 DB DATE: 05-15-2023] OK [1]
Trying EMI [6810353F, 92D70400, 15E8723C, 33F60415, 925968A5, 4EF37DF1]

Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : MT128GAXAU2U227X
UFS_FWVER : 0101
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0180000000 (6.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [B]
Read product info... [EXT4] ... OK
Product Brand : Xiaomi
Product Manufacturer : Xiaomi
Product Model : pissarro
Product Name : pissarro
Product Device : pissarro
Product Board : pissarro
Board Platform : 6877
Build ID : SP1A.210812.016
Build Date : Wed May 17 20:34:52 CST 2023
Display ID : TP1A.220624.014
Security Patch : 2023-05-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : V14.0.3.0****TINXM
Userdata FS Type : F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 86xxxxxxxxxxxxxxxx
IMEI 2: 86xxxxxxxxxxxxxxxx
Repairing IMEI...
IMEI 1: 111111111111119
IMEI 2: 222222222222228
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Checking boot patch possiblity... POSSIBLE WITH BOOT UNLOCK
Patching CERT... already patched, skip
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Decrypting security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Unlock bootloader done!
Formatting "userdata" partition... OK
Formatting "metadata" partition... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.

Selected model: Xiaomi 11i (Pissarro)
Operation: Repair
Software version: 5.1
Work ID: 3760448
  Reply With Quote
Old 06-22-2023, 14:28   #2 (permalink)
Z3X
Product Supporter
 
Join Date: Feb 2008
Location: z3x
Posts: 15,951
Member: 706257
Status: Offline
Thanks Meter: 5,065
Hello. Wait for update please. We made some fixes.
  Reply With Quote
The Following 2 Users Say Thank You to Z3X For This Useful Post:
Old 06-23-2023, 06:21   #3 (permalink)
Freak Poster
 
Join Date: Sep 2013
Location: VELLORE
Posts: 173
Member: 2029741
Status: Offline
Thanks Meter: 61
this version also not fixed patch certificate


Selected model: Xiaomi 11i (Pissarro)
Operation: Repair
Software version: 5.2
Work ID: 3791849

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,usbser,MediaTek USB Port,usbser.sys,10.0.19041.2130]
Device found at COM5 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,usbser,MediaTek USB Port,usbser.sys,10.0.19041.2130]
Device found at COM5 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834
Get Chip ID... [MT6877]
Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): MT128GAXAU2U227X (0101)
Load EMI from phone... Skip (invalid magic flash header)
Load EMI config from database [DB VER: 212 DB DATE: 05-15-2023] OK [1]
Trying EMI [6810353F, 92D70400, 15E8723C, 33F60415, 925968A5, 4EF37DF1]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : MT128GAXAU2U227X
UFS_FWVER : 0101
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0180000000 (6.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [B]
Read product info... [EXT4] ... OK
Product Brand: Xiaomi
Product Manufacturer: Xiaomi
Product Model: pissarro
Product Name: pissarro
Product Device: pissarro
Product Board: pissarro
Board Platform: 6877
Build ID: SP1A.210812.016
Build Date: Wed May 17 20:34:52 CST 2023
Display ID: TP1A.220624.014
Security Patch: 2023-05-01
Version SDK: 33
Version Release: 13
Version Codename: REL
Firmware Version: V14.0.3.0****TINXM
Userdata FS Type: F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 86xxxxxxxxxxxxxx
IMEI 2: 86xxxxxxxxxxxxxx
Repairing IMEI...
IMEI 1: 111111111111119
IMEI 2: 222222222222228
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Checking boot patch possiblity... POSSIBLE WITH BOOT UNLOCK
Patching CERT... already patched, skip
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Decrypting security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Unlock bootloader done!
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
  Reply With Quote
Old 06-23-2023, 07:07   #4 (permalink)
Z3X
Product Supporter
 
Join Date: Feb 2008
Location: z3x
Posts: 15,951
Member: 706257
Status: Offline
Thanks Meter: 5,065
Reead partitions dump (except userdata and cache) and upload it.
  Reply With Quote
Old 06-23-2023, 17:16   #5 (permalink)
Freak Poster
 
Join Date: Sep 2013
Location: VELLORE
Posts: 173
Member: 2029741
Status: Offline
Thanks Meter: 61
dump partitions link
****************************/file/3wi54...39-55).7z/file
  Reply With Quote
Old 07-02-2023, 14:52   #6 (permalink)
Freak Poster
 
Join Date: Sep 2013
Location: VELLORE
Posts: 173
Member: 2029741
Status: Offline
Thanks Meter: 61
STILL PATCH CERTIFICATE NOT WORKING PLEASE FIX THIS


Selected model: Xiaomi 11i (Pissarro)
Operation: Repair
Software version: 5.3
Work ID: 4179106

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM24 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM24 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834
Get Chip ID... [MT6877]
Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): MT128GAXAU2U227X (0101)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : MT128GAXAU2U227X
UFS_FWVER : 0101
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0180000000 (6.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand: Xiaomi
Product Manufacturer: Xiaomi
Product Model: missi
Product Name: missi
Product Device: missi
Product Board: pissarro
Board Platform: 6877
Build ID: TP1A.220624.014
Build Date: Thu Mar 30 11:24:38 UTC 2023
Display ID: TP1A.220624.014
Security Patch: 2023-04-01
Version SDK: 33
Version Release: 13
Version Codename: REL
Firmware Version: V14.0.2.0****TINXM
Userdata FS Type: F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... error
Repairing IMEI...
IMEI 1: 000000000000000
IMEI 2: 000000000000000
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Checking boot patch possiblity... POSSIBLE WITH BOOT UNLOCK
Patching CERT... already patched, skip
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Decrypting security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Unlock bootloader done!
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
  Reply With Quote
Old 07-02-2023, 17:05   #7 (permalink)
Z3X
Product Supporter
 
Join Date: Feb 2008
Location: z3x
Posts: 15,951
Member: 706257
Status: Offline
Thanks Meter: 5,065
Hello.

Patching CERT... already patched, skip

Restore original backup, reflash phone and repeat operation.
  Reply With Quote
Old 07-03-2023, 10:57   #8 (permalink)
Freak Poster
 
Join Date: Sep 2013
Location: VELLORE
Posts: 173
Member: 2029741
Status: Offline
Thanks Meter: 61
AFTER RESTORE ORIGIBAL BACKUP THEN FLASHING

Selected model: Xiaomi 11i (Pissarro)
Operation: Flash (Download only)
Software version: 5.3
Work ID: 4200195

Parse scatter file... OK
Load Rom Images... OK
Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM24 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM24 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834
Get Chip ID... [MT6877]
Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): MT128GAXAU2U227X (0101)
Load EMI config from preloader... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : MT128GAXAU2U227X
UFS_FWVER : 0101
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0180000000 (6.00Gb)
Get scatter info... OK
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand: Xiaomi
Product Manufacturer: Xiaomi
Product Model: missi
Product Name: missi
Product Device: missi
Product Board: pissarro
Board Platform: 6877
Build ID: TP1A.220624.014
Build Date: Thu Mar 30 11:24:38 UTC 2023
Display ID: TP1A.220624.014
Security Patch: 2023-04-01
Version SDK: 33
Version Release: 13
Version Codename: REL
Firmware Version: V14.0.2.0****TINXM
Userdata FS Type: F2FS
Get scatter info... OK
Verify scatter file... OK
Do NAND BMT remark... OK
Setup download info... OK
Get partition table catagory... OK [GPT]
Read mirror partition table... OK
Checking partition table layout changed... OK
Read major partition table... OK
Checking major partition table layout changed... OK
Download "preloader"... OK
Download "vbmeta_a"... OK
Download "vbmeta_system_a"... OK
Download "vbmeta_vendor_a"... OK
Download "md1img_a"... OK
Download "spmfw_a"... OK
Download "audio_dsp_a"... OK
Download "pi_img_a"... OK
Download "dpm_a"... OK
Download "scp_a"... OK
Download "sspm_a"... OK
Download "mcupm_a"... OK
Download "cam_vpu1_a"... OK
Download "cam_vpu2_a"... OK
Download "cam_vpu3_a"... OK
Download "gz_a"... OK
Download "lk_a"... OK
Download "boot_a"... OK
Download "dtbo_a"... OK
Download "tee_a"... OK
Download "logo_a"... OK
Download "logo_b"... OK
Download "countrycode"... OK
Download "super"... OK
Download "cust"... OK
Download "rescue"... OK
Download "userdata"... OK
Flashing done!

REPAIR AND PATCH

Selected model: Xiaomi 11i (Pissarro)
Operation: Repair
Software version: 5.3
Work ID: 4200555

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM24 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM24 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834
Get Chip ID... [MT6877]
Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): MT128GAXAU2U227X (0101)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : MT128GAXAU2U227X
UFS_FWVER : 0101
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0180000000 (6.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand: Xiaomi
Product Manufacturer: Xiaomi
Product Model: missi
Product Name: missi
Product Device: missi
Product Board: pissarro
Board Platform: 6877
Build ID: TP1A.220624.014
Build Date: Thu Mar 30 11:24:38 UTC 2023
Display ID: TP1A.220624.014
Security Patch: 2023-04-01
Version SDK: 33
Version Release: 13
Version Codename: REL
Firmware Version: V14.0.2.0****TINXM
Userdata FS Type: F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 86xxxxxxxxxxxxx
IMEI 2: 86xxxxxxxxxxxxx
Repairing IMEI...
IMEI 1: 111111111111119
IMEI 2: 222222222222228
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Checking boot patch possiblity... POSSIBLE WITH BOOT UNLOCK
Patching CERT... OK
Save patched partiton... OK
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Checking boot unlock status... LOCKED
Downgrading bootloaders for pissarro ... [BL1] ... [BL2] ... OK
Decrypting security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Unlock bootloader done!
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.



STILL NV DATA CORUPPTED
  Reply With Quote
Old 07-03-2023, 11:28   #9 (permalink)
Z3X
Product Supporter
 
Join Date: Feb 2008
Location: z3x
Posts: 15,951
Member: 706257
Status: Offline
Thanks Meter: 5,065
Quote:
Originally Posted by chinnappadoss View Post
AFTER RESTORE ORIGIBAL BACKUP THEN FLASHING

Selected model: Xiaomi 11i (Pissarro)
Operation: Flash (Download only)
Software version: 5.3
Work ID: 4200195

Parse scatter file... OK
Load Rom Images... OK
Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM24 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM24 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834
Get Chip ID... [MT6877]
Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): MT128GAXAU2U227X (0101)
Load EMI config from preloader... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : MT128GAXAU2U227X
UFS_FWVER : 0101
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0180000000 (6.00Gb)
Get scatter info... OK
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand: Xiaomi
Product Manufacturer: Xiaomi
Product Model: missi
Product Name: missi
Product Device: missi
Product Board: pissarro
Board Platform: 6877
Build ID: TP1A.220624.014
Build Date: Thu Mar 30 11:24:38 UTC 2023
Display ID: TP1A.220624.014
Security Patch: 2023-04-01
Version SDK: 33
Version Release: 13
Version Codename: REL
Firmware Version: V14.0.2.0****TINXM
Userdata FS Type: F2FS
Get scatter info... OK
Verify scatter file... OK
Do NAND BMT remark... OK
Setup download info... OK
Get partition table catagory... OK [GPT]
Read mirror partition table... OK
Checking partition table layout changed... OK
Read major partition table... OK
Checking major partition table layout changed... OK
Download "preloader"... OK
Download "vbmeta_a"... OK
Download "vbmeta_system_a"... OK
Download "vbmeta_vendor_a"... OK
Download "md1img_a"... OK
Download "spmfw_a"... OK
Download "audio_dsp_a"... OK
Download "pi_img_a"... OK
Download "dpm_a"... OK
Download "scp_a"... OK
Download "sspm_a"... OK
Download "mcupm_a"... OK
Download "cam_vpu1_a"... OK
Download "cam_vpu2_a"... OK
Download "cam_vpu3_a"... OK
Download "gz_a"... OK
Download "lk_a"... OK
Download "boot_a"... OK
Download "dtbo_a"... OK
Download "tee_a"... OK
Download "logo_a"... OK
Download "logo_b"... OK
Download "countrycode"... OK
Download "super"... OK
Download "cust"... OK
Download "rescue"... OK
Download "userdata"... OK
Flashing done!

REPAIR AND PATCH

Selected model: Xiaomi 11i (Pissarro)
Operation: Repair
Software version: 5.3
Work ID: 4200555

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM24 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM24 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834
Get Chip ID... [MT6877]
Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): MT128GAXAU2U227X (0101)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : MT128GAXAU2U227X
UFS_FWVER : 0101
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0180000000 (6.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand: Xiaomi
Product Manufacturer: Xiaomi
Product Model: missi
Product Name: missi
Product Device: missi
Product Board: pissarro
Board Platform: 6877
Build ID: TP1A.220624.014
Build Date: Thu Mar 30 11:24:38 UTC 2023
Display ID: TP1A.220624.014
Security Patch: 2023-04-01
Version SDK: 33
Version Release: 13
Version Codename: REL
Firmware Version: V14.0.2.0****TINXM
Userdata FS Type: F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 86xxxxxxxxxxxxx
IMEI 2: 86xxxxxxxxxxxxx
Repairing IMEI...
IMEI 1: 111111111111119
IMEI 2: 222222222222228
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Checking boot patch possiblity... POSSIBLE WITH BOOT UNLOCK
Patching CERT... OK
Save patched partiton... OK
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Checking boot unlock status... LOCKED
Downgrading bootloaders for pissarro ... [BL1] ... [BL2] ... OK
Decrypting security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Unlock bootloader done!
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.



STILL NV DATA CORUPPTED
Read partitions dump (except userdata and cache) and upload it.
  Reply With Quote
Old 07-04-2023, 05:20   #10 (permalink)
Freak Poster
 
Join Date: Sep 2013
Location: VELLORE
Posts: 173
Member: 2029741
Status: Offline
Thanks Meter: 61
Quote:
Originally Posted by chinnappadoss View Post
Quote:
Originally Posted by chinnappadoss View Post
this version also not fixed patch certificate


Selected model: Xiaomi 11i (Pissarro)
Operation: Repair
Software version: 5.2
Work ID: 3791849

Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,usbser,MediaTek USB Port,usbser.sys,10.0.19041.2130]
Device found at COM5 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,usbser,MediaTek USB Port,usbser.sys,10.0.19041.2130]
Device found at COM5 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834
Get Chip ID... [MT6877]
Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): MT128GAXAU2U227X (0101)
Load EMI from phone... Skip (invalid magic flash header)
Load EMI config from database [DB VER: 212 DB DATE: 05-15-2023] OK [1]
Trying EMI [6810353F, 92D70400, 15E8723C, 33F60415, 925968A5, 4EF37DF1]
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : MT128GAXAU2U227X
UFS_FWVER : 0101
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0180000000 (6.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [B]
Read product info... [EXT4] ... OK
Product Brand: Xiaomi
Product Manufacturer: Xiaomi
Product Model: pissarro
Product Name: pissarro
Product Device: pissarro
Product Board: pissarro
Board Platform: 6877
Build ID: SP1A.210812.016
Build Date: Wed May 17 20:34:52 CST 2023
Display ID: TP1A.220624.014
Security Patch: 2023-05-01
Version SDK: 33
Version Release: 13
Version Codename: REL
Firmware Version: V14.0.3.0****TINXM
Userdata FS Type: F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 86xxxxxxxxxxxxxx
IMEI 2: 86xxxxxxxxxxxxxx
Repairing IMEI...
IMEI 1: 111111111111119
IMEI 2: 222222222222228
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Checking boot patch possiblity... POSSIBLE WITH BOOT UNLOCK
Patching CERT... already patched, skip
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Decrypting security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Unlock bootloader done!
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
Already dump file uploaded still not checked? 😞
  Reply With Quote
Old 07-04-2023, 07:33   #11 (permalink)
Z3X
Product Supporter
 
Join Date: Feb 2008
Location: z3x
Posts: 15,951
Member: 706257
Status: Offline
Thanks Meter: 5,065
Quote:
Originally Posted by chinnappadoss View Post
Already dump file uploaded still not checked? 😞
Patch again and dump after. Because we made some fixes to it. We will check why it still not working.
  Reply With Quote
Old 07-04-2023, 07:39   #12 (permalink)
No Life Poster
 
Pastime_GSM's Avatar
 
Join Date: Aug 2012
Location: under pross
Posts: 2,470
Member: 1798174
Status: Offline
Sonork: 100.114149
Thanks Meter: 1,048
Quote:
Originally Posted by chinnappadoss View Post
Already dump file uploaded still not checked? 😞
reupload again after restore original BACKUP THEN FLASHING
  Reply With Quote
Old 07-04-2023, 08:42   #13 (permalink)
Freak Poster
 
Join Date: Sep 2013
Location: VELLORE
Posts: 173
Member: 2029741
Status: Offline
Thanks Meter: 61
Quote:
Originally Posted by Pastime_GSM View Post
reupload again after restore original BACKUP THEN FLASHING
I uploaded original backup nv restored dump only
  Reply With Quote
Old 07-08-2023, 06:38   #14 (permalink)
Freak Poster
 
Join Date: Sep 2013
Location: VELLORE
Posts: 173
Member: 2029741
Status: Offline
Thanks Meter: 61
the latest version fixed my problem thanks team keep it up


Selected model: Xiaomi 11i (Pissarro)
Operation: Repair
Software version: 5.4
Work ID: 4434172

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM37 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM37 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834
Get Chip ID... [MT6877]
Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): MT128GAXAU2U227X (0101)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : MT128GAXAU2U227X
UFS_FWVER : 0101
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0180000000 (6.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand: Xiaomi
Product Manufacturer: Xiaomi
Product Model: missi
Product Name: missi
Product Device: missi
Product Board: pissarro
Board Platform: 6877
Build ID: TP1A.220624.014
Build Date: Thu Mar 30 11:24:38 UTC 2023
Display ID: TP1A.220624.014
Security Patch: 2023-04-01
Version SDK: 33
Version Release: 13
Version Codename: REL
Firmware Version: V14.0.2.0****TINXM
Userdata FS Type: F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 35xxxxxxxxxxxxxx
IMEI 2: 35xxxxxxxxxxxxxx
Repairing IMEI...
IMEI 1: 91xxxxxxxxxxxxxx
IMEI 2: 91xxxxxxxxxxxxxx
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Checking boot patch possiblity... POSSIBLE WITH BOOT UNLOCK
Patching CERT... already patched, skip
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Decrypting security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Unlock bootloader done!
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
  Reply With Quote
The Following User Says Thank You to chinnappadoss For This Useful Post:
Old 07-29-2023, 13:01   #15 (permalink)
Product Supporter
 
Fast Unlocker's Avatar
 
Join Date: Dec 2004
Location: Furious Team ... GPGIndustries
Age: 45
Posts: 10,341
Member: 95960
Status: Offline
Sonork: 100.1574721
Thanks Meter: 14,047
Donate money to this user
Quote:
Originally Posted by chinnappadoss View Post
the latest version fixed my problem thanks team keep it up


Selected model: Xiaomi 11i (Pissarro)
Operation: Repair
Software version: 5.4
Work ID: 4434172

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM37 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM37 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834
Get Chip ID... [MT6877]
Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): MT128GAXAU2U227X (0101)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : MT128GAXAU2U227X
UFS_FWVER : 0101
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0180000000 (6.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand: Xiaomi
Product Manufacturer: Xiaomi
Product Model: missi
Product Name: missi
Product Device: missi
Product Board: pissarro
Board Platform: 6877
Build ID: TP1A.220624.014
Build Date: Thu Mar 30 11:24:38 UTC 2023
Display ID: TP1A.220624.014
Security Patch: 2023-04-01
Version SDK: 33
Version Release: 13
Version Codename: REL
Firmware Version: V14.0.2.0****TINXM
Userdata FS Type: F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 35xxxxxxxxxxxxxx
IMEI 2: 35xxxxxxxxxxxxxx
Repairing IMEI...
IMEI 1: 91xxxxxxxxxxxxxx
IMEI 2: 91xxxxxxxxxxxxxx
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Checking boot patch possiblity... POSSIBLE WITH BOOT UNLOCK
Patching CERT... already patched, skip
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Decrypting security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Unlock bootloader done!
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.

did you change resistance or not friend
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 11:14.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.41572 seconds with 8 queries

SEO by vBSEO