|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
06-22-2023, 13:41 | #1 (permalink) |
Freak Poster Join Date: Sep 2013 Location: VELLORE
Posts: 173
Member: 2029741 Status: Offline Thanks Meter: 61 | mi 11i (pissarro) after repair imei patch done but showing nv data corrupted [Solved] Connect phone in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,usbser,MediaTek USB Port,usbser.sys,10.0.19041.2130] Device found at COM5 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,usbser,MediaTek USB Port,usbser.sys,10.0.19041.2130] Device found at COM5 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834 Get Chip ID... [MT6877] Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [17] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): MT128GAXAU2U227X (0101) Load EMI from phone... Skip (invalid magic flash header) Load EMI config from database [DB VER: 212 DB DATE: 05-15-2023] OK [1] Trying EMI [6810353F, 92D70400, 15E8723C, 33F60415, 925968A5, 4EF37DF1] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : MT128GAXAU2U227X UFS_FWVER : 0101 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0180000000 (6.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [B] Read product info... [EXT4] ... OK Product Brand : Xiaomi Product Manufacturer : Xiaomi Product Model : pissarro Product Name : pissarro Product Device : pissarro Product Board : pissarro Board Platform : 6877 Build ID : SP1A.210812.016 Build Date : Wed May 17 20:34:52 CST 2023 Display ID : TP1A.220624.014 Security Patch : 2023-05-01 Version SDK : 33 Version Release : 13 Version Codename : REL Firmware Version : V14.0.3.0****TINXM Userdata FS Type : F2FS Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Read IMEI... OK IMEI 1: 86xxxxxxxxxxxxxxxx IMEI 2: 86xxxxxxxxxxxxxxxx Repairing IMEI... IMEI 1: 111111111111119 IMEI 2: 222222222222228 Write IMEI and patch CERT [NVDATA]... OK Load partiton for patching... OK Checking boot patch possiblity... POSSIBLE WITH BOOT UNLOCK Patching CERT... already patched, skip Selected "Auto unlock bootloader" Read security partition from phone... OK Decrypting security data... OK Encrypt security data... OK Write security partition to phone... OK Unlock bootloader done! Formatting "userdata" partition... OK Formatting "metadata" partition... OK Write IMEI and patch CERT [NVRAM]... OK Write partition "nvdata"... OK Write partition "nvram"... OK Repair Security and Patch cert done! If your phone after repair keeps rebooting - use wipe data option. Selected model: Xiaomi 11i (Pissarro) Operation: Repair Software version: 5.1 Work ID: 3760448 |
06-23-2023, 06:21 | #3 (permalink) |
Freak Poster Join Date: Sep 2013 Location: VELLORE
Posts: 173
Member: 2029741 Status: Offline Thanks Meter: 61 | this version also not fixed patch certificate Selected model: Xiaomi 11i (Pissarro) Operation: Repair Software version: 5.2 Work ID: 3791849 Connect phone in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,usbser,MediaTek USB Port,usbser.sys,10.0.19041.2130] Device found at COM5 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,usbser,MediaTek USB Port,usbser.sys,10.0.19041.2130] Device found at COM5 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834 Get Chip ID... [MT6877] Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [17] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): MT128GAXAU2U227X (0101) Load EMI from phone... Skip (invalid magic flash header) Load EMI config from database [DB VER: 212 DB DATE: 05-15-2023] OK [1] Trying EMI [6810353F, 92D70400, 15E8723C, 33F60415, 925968A5, 4EF37DF1] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : MT128GAXAU2U227X UFS_FWVER : 0101 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0180000000 (6.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [B] Read product info... [EXT4] ... OK Product Brand: Xiaomi Product Manufacturer: Xiaomi Product Model: pissarro Product Name: pissarro Product Device: pissarro Product Board: pissarro Board Platform: 6877 Build ID: SP1A.210812.016 Build Date: Wed May 17 20:34:52 CST 2023 Display ID: TP1A.220624.014 Security Patch: 2023-05-01 Version SDK: 33 Version Release: 13 Version Codename: REL Firmware Version: V14.0.3.0****TINXM Userdata FS Type: F2FS Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Read IMEI... OK IMEI 1: 86xxxxxxxxxxxxxx IMEI 2: 86xxxxxxxxxxxxxx Repairing IMEI... IMEI 1: 111111111111119 IMEI 2: 222222222222228 Write IMEI and patch CERT [NVDATA]... OK Load partiton for patching... OK Checking boot patch possiblity... POSSIBLE WITH BOOT UNLOCK Patching CERT... already patched, skip Selected "Auto unlock bootloader" Read security partition from phone... OK Decrypting security data... OK Encrypt security data... OK Write security partition to phone... OK Unlock bootloader done! Write IMEI and patch CERT [NVRAM]... OK Write partition "nvdata"... OK Write partition "nvram"... OK Repair Security and Patch cert done! If your phone after repair keeps rebooting - use wipe data option. |
06-23-2023, 17:16 | #5 (permalink) |
Freak Poster Join Date: Sep 2013 Location: VELLORE
Posts: 173
Member: 2029741 Status: Offline Thanks Meter: 61 | dump partitions link ****************************/file/3wi54...39-55).7z/file |
07-02-2023, 14:52 | #6 (permalink) |
Freak Poster Join Date: Sep 2013 Location: VELLORE
Posts: 173
Member: 2029741 Status: Offline Thanks Meter: 61 | STILL PATCH CERTIFICATE NOT WORKING PLEASE FIX THIS Selected model: Xiaomi 11i (Pissarro) Operation: Repair Software version: 5.3 Work ID: 4179106 Connect phone in BROM/PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0] Device found at COM24 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0] Device found at COM24 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834 Get Chip ID... [MT6877] Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [17] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): MT128GAXAU2U227X (0101) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : MT128GAXAU2U227X UFS_FWVER : 0101 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0180000000 (6.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [A] Read product info... [EXT4] ... OK Product Brand: Xiaomi Product Manufacturer: Xiaomi Product Model: missi Product Name: missi Product Device: missi Product Board: pissarro Board Platform: 6877 Build ID: TP1A.220624.014 Build Date: Thu Mar 30 11:24:38 UTC 2023 Display ID: TP1A.220624.014 Security Patch: 2023-04-01 Version SDK: 33 Version Release: 13 Version Codename: REL Firmware Version: V14.0.2.0****TINXM Userdata FS Type: F2FS Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Read IMEI... error Repairing IMEI... IMEI 1: 000000000000000 IMEI 2: 000000000000000 Write IMEI and patch CERT [NVDATA]... OK Load partiton for patching... OK Checking boot patch possiblity... POSSIBLE WITH BOOT UNLOCK Patching CERT... already patched, skip Selected "Auto unlock bootloader" Read security partition from phone... OK Decrypting security data... OK Encrypt security data... OK Write security partition to phone... OK Unlock bootloader done! Write IMEI and patch CERT [NVRAM]... OK Write partition "nvdata"... OK Write partition "nvram"... OK Repair Security and Patch cert done! If your phone after repair keeps rebooting - use wipe data option. |
07-03-2023, 10:57 | #8 (permalink) |
Freak Poster Join Date: Sep 2013 Location: VELLORE
Posts: 173
Member: 2029741 Status: Offline Thanks Meter: 61 | AFTER RESTORE ORIGIBAL BACKUP THEN FLASHING Selected model: Xiaomi 11i (Pissarro) Operation: Flash (Download only) Software version: 5.3 Work ID: 4200195 Parse scatter file... OK Load Rom Images... OK Connect phone in BROM/PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0] Device found at COM24 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0] Device found at COM24 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834 Get Chip ID... [MT6877] Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [17] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): MT128GAXAU2U227X (0101) Load EMI config from preloader... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : MT128GAXAU2U227X UFS_FWVER : 0101 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0180000000 (6.00Gb) Get scatter info... OK Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [A] Read product info... [EXT4] ... OK Product Brand: Xiaomi Product Manufacturer: Xiaomi Product Model: missi Product Name: missi Product Device: missi Product Board: pissarro Board Platform: 6877 Build ID: TP1A.220624.014 Build Date: Thu Mar 30 11:24:38 UTC 2023 Display ID: TP1A.220624.014 Security Patch: 2023-04-01 Version SDK: 33 Version Release: 13 Version Codename: REL Firmware Version: V14.0.2.0****TINXM Userdata FS Type: F2FS Get scatter info... OK Verify scatter file... OK Do NAND BMT remark... OK Setup download info... OK Get partition table catagory... OK [GPT] Read mirror partition table... OK Checking partition table layout changed... OK Read major partition table... OK Checking major partition table layout changed... OK Download "preloader"... OK Download "vbmeta_a"... OK Download "vbmeta_system_a"... OK Download "vbmeta_vendor_a"... OK Download "md1img_a"... OK Download "spmfw_a"... OK Download "audio_dsp_a"... OK Download "pi_img_a"... OK Download "dpm_a"... OK Download "scp_a"... OK Download "sspm_a"... OK Download "mcupm_a"... OK Download "cam_vpu1_a"... OK Download "cam_vpu2_a"... OK Download "cam_vpu3_a"... OK Download "gz_a"... OK Download "lk_a"... OK Download "boot_a"... OK Download "dtbo_a"... OK Download "tee_a"... OK Download "logo_a"... OK Download "logo_b"... OK Download "countrycode"... OK Download "super"... OK Download "cust"... OK Download "rescue"... OK Download "userdata"... OK Flashing done! REPAIR AND PATCH Selected model: Xiaomi 11i (Pissarro) Operation: Repair Software version: 5.3 Work ID: 4200555 Connect phone in BROM/PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0] Device found at COM24 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0] Device found at COM24 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834 Get Chip ID... [MT6877] Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [17] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): MT128GAXAU2U227X (0101) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : MT128GAXAU2U227X UFS_FWVER : 0101 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0180000000 (6.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [A] Read product info... [EXT4] ... OK Product Brand: Xiaomi Product Manufacturer: Xiaomi Product Model: missi Product Name: missi Product Device: missi Product Board: pissarro Board Platform: 6877 Build ID: TP1A.220624.014 Build Date: Thu Mar 30 11:24:38 UTC 2023 Display ID: TP1A.220624.014 Security Patch: 2023-04-01 Version SDK: 33 Version Release: 13 Version Codename: REL Firmware Version: V14.0.2.0****TINXM Userdata FS Type: F2FS Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Read IMEI... OK IMEI 1: 86xxxxxxxxxxxxx IMEI 2: 86xxxxxxxxxxxxx Repairing IMEI... IMEI 1: 111111111111119 IMEI 2: 222222222222228 Write IMEI and patch CERT [NVDATA]... OK Load partiton for patching... OK Checking boot patch possiblity... POSSIBLE WITH BOOT UNLOCK Patching CERT... OK Save patched partiton... OK Selected "Auto unlock bootloader" Read security partition from phone... OK Checking boot unlock status... LOCKED Downgrading bootloaders for pissarro ... [BL1] ... [BL2] ... OK Decrypting security data... OK Encrypt security data... OK Write security partition to phone... OK Unlock bootloader done! Write IMEI and patch CERT [NVRAM]... OK Write partition "nvdata"... OK Write partition "nvram"... OK Repair Security and Patch cert done! If your phone after repair keeps rebooting - use wipe data option. STILL NV DATA CORUPPTED |
07-03-2023, 11:28 | #9 (permalink) | |
Product Supporter Join Date: Feb 2008 Location: z3x
Posts: 15,951
Member: 706257 Status: Offline Thanks Meter: 5,065 | Quote:
| |
07-04-2023, 05:20 | #10 (permalink) | ||
Freak Poster Join Date: Sep 2013 Location: VELLORE
Posts: 173
Member: 2029741 Status: Offline Thanks Meter: 61 | Quote:
Quote:
| ||
07-08-2023, 06:38 | #14 (permalink) |
Freak Poster Join Date: Sep 2013 Location: VELLORE
Posts: 173
Member: 2029741 Status: Offline Thanks Meter: 61 | the latest version fixed my problem thanks team keep it up Selected model: Xiaomi 11i (Pissarro) Operation: Repair Software version: 5.4 Work ID: 4434172 Connect phone in BROM/PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0] Device found at COM37 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0] Device found at COM37 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x5DF7BE9F, 0x7CA9231B, 0xF83B107D, 0x047AC834 Get Chip ID... [MT6877] Get SOC ID... [020C9539BB35F9C347315A1E607AA082A8288AC01E339C357A DA7B9FA25F34A3] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [17] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): MT128GAXAU2U227X (0101) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : MT128GAXAU2U227X UFS_FWVER : 0101 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0180000000 (6.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [A] Read product info... [EXT4] ... OK Product Brand: Xiaomi Product Manufacturer: Xiaomi Product Model: missi Product Name: missi Product Device: missi Product Board: pissarro Board Platform: 6877 Build ID: TP1A.220624.014 Build Date: Thu Mar 30 11:24:38 UTC 2023 Display ID: TP1A.220624.014 Security Patch: 2023-04-01 Version SDK: 33 Version Release: 13 Version Codename: REL Firmware Version: V14.0.2.0****TINXM Userdata FS Type: F2FS Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Read IMEI... OK IMEI 1: 35xxxxxxxxxxxxxx IMEI 2: 35xxxxxxxxxxxxxx Repairing IMEI... IMEI 1: 91xxxxxxxxxxxxxx IMEI 2: 91xxxxxxxxxxxxxx Write IMEI and patch CERT [NVDATA]... OK Load partiton for patching... OK Checking boot patch possiblity... POSSIBLE WITH BOOT UNLOCK Patching CERT... already patched, skip Selected "Auto unlock bootloader" Read security partition from phone... OK Decrypting security data... OK Encrypt security data... OK Write security partition to phone... OK Unlock bootloader done! Write IMEI and patch CERT [NVRAM]... OK Write partition "nvdata"... OK Write partition "nvram"... OK Repair Security and Patch cert done! If your phone after repair keeps rebooting - use wipe data option. |
The Following User Says Thank You to chinnappadoss For This Useful Post: |
07-29-2023, 13:01 | #15 (permalink) | |
Product Supporter Join Date: Dec 2004 Location: Furious Team ... GPGIndustries Age: 45
Posts: 10,341
Member: 95960 Status: Offline Sonork: 100.1574721 Thanks Meter: 14,047 | Quote:
did you change resistance or not friend | |
Bookmarks |
| |
|