bkerler / edl

Inofficial Qualcomm Firehose / Sahara / Streaming / Diag Tools :)
GNU General Public License v3.0
1.58k stars 370 forks source link

Finding it impossible to unlock the bootloader of Redmi 9A #294

Closed honjiidar closed 1 year ago

honjiidar commented 2 years ago

I've spent nearly a week trying to unlock the bootloader of a Redmi 9A. Below is the output log from the GUI Client: [14:47:15]: Status: Waiting for PreLoader VCOM, please connect mobile [14:48:03]: CPU: MT6765/MT8768t(Helio P35/G35) [14:48:03]: HW version: 0x0 [14:48:03]: WDT: 0x10007000 [14:48:03]: Uart: 0x11002000 [14:48:03]: Brom payload addr: 0x100a00 [14:48:03]: DA payload addr: 0x201000 [14:48:03]: CQ_DMA addr: 0x10212000 [14:48:03]: Var1: 0x25 [14:48:03]: Disabling Watchdog... [14:48:03]: HW code: 0x766 [14:48:03]: Target config: 0x0 [14:48:03]: SBC enabled: False [14:48:03]: SLA enabled: False [14:48:03]: DAA enabled: False [14:48:03]: SWJTAG enabled: False [14:48:03]: EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False [14:48:03]: Root cert required: False [14:48:03]: Mem read auth: False [14:48:03]: Mem write auth: False [14:48:03]: Cmd 0xC8 blocked: False [14:48:03]: Get Target info [14:48:03]: BROM mode detected. [14:48:03]: HW subcode: 0x8a00 [14:48:03]: HW Ver: 0xca00 [14:48:03]: SW Ver: 0x0 [14:48:04]: ME_ID: E4E6094446CDF30AF7FFB7E1F0A0DE99 [14:48:04]: SOC_ID: 367EF970464B9B8A5C3173E4FC4E5E47B7DE75DE3752DF64D27C0F94A74C4BF9 [14:48:06]: Device is unprotected. [14:48:06]: Device is in BROM-Mode. Bypassing security. [14:48:06]: Loading payload from mt6765_payload.bin, 0x264 bytes [14:48:06]: Kamakiri / DA Run [14:48:06]: Trying kamakiri2.. [14:48:06]: Done sending payload... [14:48:07]: Successfully sent payload: C:\Users\Z-ro\OneDrive\Desktop\mtkclient-main_G3\mtkclient\payloads\mt6765_payload.bin [14:48:07]: Device is in BROM mode. No preloader given, trying to dump preloader from ram. [14:48:13]: Jumping to 0x200000 [14:48:13]: Jumping to 0x200000: ok. = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =

And right below is the output log from CMD.

.....Port - Device detected :) Port - Device detected :) DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin xflashext - Patching da1 ... xflashext - Patching da2 ... DAXFlash - Successfully uploaded stage 1, jumping .. DAXFlash - Successfully received DA sync DAXFlash - DRAM config needed for : 90014a4842473461 DAXFlash - Sending emi data ... DAXFlash DAXFlash - [LIB]: ←[31mError on sending emi: unpack requires a buffer of 12 bytes←[0m None

Where did I go wrong?

aviatiq commented 2 years ago

Actually, for me, I used MiUnlock to unlock my own Redmi 9A bought from China and had no issues, have you tried that?

bkerler commented 1 year ago
  1. this isn't the mtkclient repository. 2. Do as aviatiq says, there is official support for doing that.