Xiaomi Mi play açılmıyor

ErenPredator

Centipat
Katılım
3 Ağustos 2024
Mesajlar
381
Çözümler
3
Yer
Mars
Daha fazla  
Cinsiyet
Erkek
Selam. Ben telefonu şarja taktım 1 saat sonra geldiğimde telefon çalışıyordu 20 dakika normal kullandıktan sonra dondu ve kapandı tekrar açmaya çalıştığımda telefon açılmıyordu. Telefonun aşağısında mavi LED ışık var o telefonun Power tuşuna basılı tutunca o 2 kez yanıp sönüyor. Ekran bozuk olma ihtimali az ekran bozuk olsa telefon açılır ama hiç açılmıyor. BROM moda gire biliyorum MTKClient ile boot image ve recovery image atmaya çalışınca stage 1 de duruyor.
.Port - Device detected
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
DaHandler - Device is protected.
DaHandler - Device is in BROM-Mode. Bypassing security.
PLTools - Loading payload from mt6765_payload.bin, 0x264 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
PLTools - Successfully sent payload: C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\payloads\mt6765_payload.bin
Port - Device detected
DaHandler
DaHandler - [LIB]: [33mDevice is in BROM mode. No preloader given, trying to dump preloader from ram.[0m
DAXFlash - Uploading xflash stage 1 from MTK_DA_V5.bin
XFlashExt - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "hash_check" in preloader
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
XFlashExt - Patching da2 ...
XFlashExt - Security check patched
XFlashExt - DA version anti-rollback patched
XFlashExt - SBC patched to be disabled
XFlashExt - Register read/write not allowed patched
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash
DAXFlash - [LIB]: [31mxread error: unpack requires a buffer of 12 bytes[0m
DAXFlash
DAXFlash - [LIB]: [31mError jumping to DA: -1[0m
SP Flash Tool çalışmıyor status_err gibi hatalar veriyor.
Telefon: Mi Play (lotus) M1901F9E

@Eminss0 hocam size ihtiyacım var yine

 

Hangi Da'yı (download agent) kullanıyorsunuz yeniden? Ayrıca sürücüler kurulu mu, mevcut kablonuzda bir sorun var mı?


py -3 mtk.py dumppreloader --ptype=kamakiri --filename=current_preloader.bin

bu komut ile şu anki preloaderin dumpunu alın, daha sonrasında stock ROM indirip bana geri dönüş yapın.
 
Son düzenleme:
DA olarak MT6765 kullanıyorum. Stock ROM var
Preloader
Preloader - [LIB]: [31mStatus: Handshake failed, retrying...[0m
Preloader
Preloader - [LIB]: [31mStatus: Handshake failed, retrying...[0m
Port - Device detected
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
PLTools - Kamakiri / DA Run
PLTools - Loading payload from generic_preloader_dump_payload.bin, 0x250 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
DeviceClass - USBError(5, 'Input/Output Error')
Exploitation - Error, payload answered instead:
PLTools
PLTools - [LIB]: [31mError on sending payload: C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\payloads\generic_preloader_dump_payload.bin[0m
Traceback (most recent call last):
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1021, in <module>
main()
~~~~^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1017, in main
mtk = Main(args).run(parser)
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\mtk_main.py", line 461, in run
data, filename = plt.run_dump_preloader(self.args.ptype)
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 158, in run_dump_preloader
if self.runpayload(filename=pfilename, ack=0xC1C2C3C4, offset=0):
~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 104, in runpayload
self.error(f"Error, payload answered instead: {hexlify(response_ack).decode('utf-8')}")
~~~~~~~^^^^^^^^^^^^^^
TypeError: a bytes-like object is required, not 'NoneType'
Ne yapmalıyım?
 
DA olarak V6 kullanın. Size daha önce iletmiştim.

py -3 mtk.py dumppreloader --ptype=kamakiri --filename=current_preloader.bin

py -3 mtk.py dumppreloader --ptype=kamakiri2 --filename=current_preloader_k2.bin

py -3 mtk.py dumppreloader --ptype=amonet --filename=current_preloader_amonet.bin

py -3 mtk.py dumppreloader --ptype=hashimoto --filename=current_preloader_hashi.bin

Hepsini tek tek çalıştırıp toplu olarak tüm logları atın.
 
Bilgisayara format attığım için V6 elimde değil şu an.
Port - Device detected
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
PLTools - Kamakiri / DA Run
PLTools - Loading payload from generic_preloader_dump_payload.bin, 0x250 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
DeviceClass - USBError(5, 'Input/Output Error')
Exploitation - Error, payload answered instead:
PLTools
PLTools - [LIB]: [31mError on sending payload: C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\payloads\generic_preloader_dump_payload.bin[0m
Traceback (most recent call last):
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1021, in <module>
main()
~~~~^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1017, in main
mtk = Main(args).run(parser)
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\mtk_main.py", line 461, in run
data, filename = plt.run_dump_preloader(self.args.ptype)
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 158, in run_dump_preloader
if self.runpayload(filename=pfilename, ack=0xC1C2C3C4, offset=0):
~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 104, in runpayload
self.error(f"Error, payload answered instead: {hexlify(response_ack).decode('utf-8')}")
~~~~~~~^^^^^^^^^^^^^^
TypeError: a bytes-like object is required, not 'NoneType'

Port - Device detected
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
PLTools - Kamakiri / DA Run
PLTools - Loading payload from generic_preloader_dump_payload.bin, 0x250 bytes
Exploitation - Kamakiri Run
Exploitation - Done sending payload...
PLTools - Successfully sent payload: C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\payloads\generic_preloader_dump_payload.bin
Progress: |██████████████████████████████████████████████████| 100.0% Complete
Main - Preloader dumped as: preloader_lotus.bin

Port - Device detected
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
HwCrypto - GCPU Init Crypto Engine
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c0c, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c10, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c14, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c18, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c1c, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c20, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c24, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c28, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c2c, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c48, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c58, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mError on da_write32, addr 0x10050c68, INVALID_ADDRESS (0x1d02)[0m
Preloader
Preloader - [LIB]: [31mUnknown: 0x1d08[0m
Traceback (most recent call last):
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1021, in <module>
main()
~~~~^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1017, in main
mtk = Main(args).run(parser)
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\mtk_main.py", line 461, in run
data, filename = plt.run_dump_preloader(self.args.ptype)
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 165, in run_dump_preloader
if self.exploit.dump_brom(filename):
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\Exploit\amonet.py", line 124, in dump_brom
self.hwcrypto.disable_range_blacklist(btype, self.mtk)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\Hardware\hwcrypto.py", line 129, in disable_range_blacklist
self.gcpu.acquire()
~~~~~~~~~~~~~~~~~^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\Hardware\hwcrypto_gcpu.py", line 311, in acquire
self.reg.GCPU_REG_CTL &= 0xFFFFFFF0
TypeError: unsupported operand type(s) for &=: 'list' and 'int'
Port - Device detected
Preloader - CPU: MT6765/MT8768t(Helio P35/G35)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x766
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: F3D012B452E31E4755D3E9B0597BE178
Preloader - SOC_ID: F14488D6AABF0716AF303FC73FE81668C9F9FFBF4E3F6C0634A0FF4499E5BFCF
Preloader
Preloader - [LIB]: [33mAuth file is required. Use --auth option.[0m
HwCrypto - Disable Caches
Traceback (most recent call last):
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1021, in <module>
main()
~~~~^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtk.py", line 1017, in main
mtk = Main(args).run(parser)
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\mtk_main.py", line 461, in run
data, filename = plt.run_dump_preloader(self.args.ptype)
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\pltools.py", line 165, in run_dump_preloader
if self.exploit.dump_brom(filename):
~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\Exploit\hashimoto.py", line 93, in dump_brom
self.hwcrypto.disable_range_blacklist(btype, self.mtk)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "C:\Users\Konan\Desktop\mtkclient-main1111\mtkclient\Library\Hardware\hwcrypto.py", line 138, in disable_range_blacklist
refreshcache(b"\xB1")
~~~~~~~~~~~~^^^^^^^^^
TypeError: 'Mtk' object is not callable
Bende olan MtkClient Bozuk galiba.
 
Bunu deneyin:

MTKClient Githubunda V6'yı bulabilirsiniz.
python mtk w recovery recovery.img --preloader=preloader.bin --da=MTK_DA_V6.bin --auth=auth_sv5.auth
python mtk w boot boot.img --preloader=preloader.bin --da=MTK_DA_V6.bin --auth=auth_sv5.auth
 

Aynı hata devam ediyor
Not: USB değiştirdim ama yine aynı. Galiba telefonu artık geri dönderemeyeceğiz. Redmi Note 9 için yaptığımız kodu yazdığımda da aynı hatayı veriyor.
 
Aynı hata devam ediyor.
Not: USB değiştirdim ama yine aynı. Galiba telefonu artık geri dönderemeyeceğiz. Redmi Note 9 için yaptığımız kodu yazdığımda da aynı hatayı veriyor.

Bu sorun donanım kaynaklı olabilir, servise göstermeyi düşündünüz mü hiç?
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…