ErenPredator
Centipat
Daha fazla
- Cinsiyet
- Erkek
Selam. Ben telefonu şarja taktım 1 saat sonra geldiğimde telefon çalışıyordu 20 dakika normal kullandıktan sonra dondu ve kapandı tekrar açmaya çalıştığımda telefon açılmıyordu. Telefonun aşağısında mavi LED ışık var o telefonun Power tuşuna basılı tutunca o 2 kez yanıp sönüyor. Ekran bozuk olma ihtimali az ekran bozuk olsa telefon açılır ama hiç açılmıyor. BROM moda gire biliyorum MTKClient ile boot image ve recovery image atmaya çalışınca stage 1 de duruyor.
SP Flash Tool çalışmıyor status_err gibi hatalar veriyor.
Telefon: Mi Play (lotus) M1901F9E
@Eminss0 hocam size ihtiyacım var yine
.Port - Device detected 
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
DaHandler - Device is protected.
DaHandler - Device is in BROM-Mode. Bypassing security.
PLTools - Loading payload from mt6765_payload.bin, 0x264 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
PLTools - Successfully sent payload: C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\payloads\mt6765_payload.bin
Port - Device detected
DaHandler
DaHandler - [LIB]: [33mDevice is in BROM mode. No preloader given, trying to dump preloader from ram.[0m
DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin
XFlashExt - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "hash_check" in preloader
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
XFlashExt - Patching da2 ...
XFlashExt - Security check patched
XFlashExt - DA version anti-rollback patched
XFlashExt - SBC patched to be disabled
XFlashExt - Register read/write not allowed patched
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash
DAXFlash - [LIB]: [31mxread error: unpack requires a buffer of 12 bytes[0m
DAXFlash
DAXFlash - [LIB]: [31mError jumping to DA: -1[0m
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
DaHandler - Device is protected.
DaHandler - Device is in BROM-Mode. Bypassing security.
PLTools - Loading payload from mt6765_payload.bin, 0x264 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
PLTools - Successfully sent payload: C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\payloads\mt6765_payload.bin
Port - Device detected
DaHandler
DaHandler - [LIB]: [33mDevice is in BROM mode. No preloader given, trying to dump preloader from ram.[0m
DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin
XFlashExt - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "hash_check" in preloader
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
XFlashExt - Patching da2 ...
XFlashExt - Security check patched
XFlashExt - DA version anti-rollback patched
XFlashExt - SBC patched to be disabled
XFlashExt - Register read/write not allowed patched
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash
DAXFlash - [LIB]: [31mxread error: unpack requires a buffer of 12 bytes[0m
DAXFlash
DAXFlash - [LIB]: [31mError jumping to DA: -1[0m
Telefon: Mi Play (lotus) M1901F9E