bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.32k stars 477 forks source link

Unbrick Redmi Note 13 Pro+ 5G #1029

Open ggb-st opened 1 month ago

ggb-st commented 1 month ago

My phone is Redmi Note 13 Pro+ 5G The chip is mt6886 and I cannot find a payload file. Please help

Logs from android util when trying to do anything:

Waiting for mtk usb device... ok BootMode : BootRom[COM3] DriverDesc : MediaTek USB Port DriverPath : usb\vid_0e8d&pid_0003\5&201b4142&0&3 DriverSRV : wdm_usb DriverVersion : 3.0.1504.0 DriverDate : 1-22-2015 DriverCFG : oem66.inf DriverOEM : MediaTek Inc. Start handshake with BootROM... ● BRom protocol error: ACK 00 != a0

Logs from mtk client:

Port - Device detected :) Preloader - CPU: () Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x200000 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader Preloader - [LIB]: Error on da_write32, addr 0x10007000, INVALID_ADDRESS (0x1d02) Preloader Preloader - [LIB]: Received wrong SetReg_DisableWatchDogTimer response Preloader - HW code: 0x1229 Preloader - Target config: 0xe7 Preloader - SBC enabled: True Preloader - SLA enabled: True Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca01 Preloader - SW Ver: 0x1 Preloader - ME_ID: 38D96D458EE856E1361FD4BBA82A7235

Other error (from mtk gui client)

[19:04:58]: Device detected :) [19:04:58]: Device is protected. [19:04:58]: Device is in BROM-Mode. Bypassing security. [19:04:58]: Loading payload from generic_patcher_payload.bin, 0x538 bytes [19:04:58]: Kamakiri Run [19:04:58]: Error on sending payload. [19:04:58]: Successfully sent payload: G:\cookingstuff (Android Debug Bridge ADB).MTK\mtkclient\payloads\generic_patcher_payload.bin

hopez13 commented 1 month ago

regarding this : Preloader - [LIB]: Error on da_write32, addr 0x10007000, INVALID_ADDRESS (0x1d02) watchdog address is wrong

mt6886 is newer chipset currently not supported

macekboris commented 4 weeks ago

preloader_zircon.zip DA_BR.zip

terminator850 commented 2 weeks ago
DaHandler - Device is protected.
DaHandler - Device is in BROM-Mode. Bypassing security.
DAXML - Uploading xflash stage 1
python .\mtk.py printgpt --loader D:\source\3rd_tools\mtkclient\mtkclient\Loader\DA_BR.bin --preloader d:\source\3rd_tools\mtkclient\mtkclient\Loader\preloader_zircon.bin

Blocked at the top position

preloader_zircon.zip DA_BR.zip

macekboris commented 1 week ago

Flash eng preloader in a and b slot, and use SPFlash without auth to flash ROM / Unbrick ! @ggb-st