bkerler / mtkclient

MTK reverse engineering and flash tool
GNU General Public License v3.0
2.67k stars 525 forks source link

Handshake failed, retrying in MTKClient V2.0 when connects to a bricked Redmi 11 4G China version #388

Closed cnwonge closed 1 month ago

cnwonge commented 2 years ago

Issue 20220530 connection

cnwonge commented 2 years ago

The chipset most likely is Helio G88 MT7921?

xxroot commented 2 years ago

能正常解锁,我已经测试过了。完美解锁,我有打包汉化好的,你需要吗?

cnwonge commented 2 years ago

@xxroot , 非常感謝, 太好能救回變磚手機. 免浪費.

能正常解锁,我已经测试过了。完美解锁,我有打包汉化好的,你需要吗?

cnwonge commented 2 years ago

不幸 仍未接通變磚手機

xxroot commented 2 years ago

音量上 音量下开机三个键同时按住,重试

cnwonge commented 2 years ago

[16:18:42]: CPU: MT6768(Helio P65/G85 k68v1) [16:18:42]: HW version: 0x0 [16:18:42]: WDT: 0x10007000 [16:18:42]: Uart: 0x11002000 [16:18:42]: Brom payload addr: 0x100a00 [16:18:42]: DA payload addr: 0x201000 [16:18:42]: CQ_DMA addr: 0x10212000 [16:18:42]: Var1: 0x25 [16:18:42]: Disabling Watchdog... [16:18:42]: HW code: 0x707 [16:18:42]: Target config: 0xe7 [16:18:42]: SBC enabled: True [16:18:42]: SLA enabled: True [16:18:42]: DAA enabled: True [16:18:42]: SWJTAG enabled: True [16:18:42]: EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False [16:18:42]: Root cert required: False [16:18:42]: Mem read auth: True [16:18:42]: Mem write auth: True [16:18:42]: Cmd 0xC8 blocked: True [16:18:42]: Get Target info [16:18:42]: BROM mode detected. [16:18:42]: HW subcode: 0x8a00 [16:18:42]: HW Ver: 0xca00 [16:18:42]: SW Ver: 0x0 [16:18:42]: ME_ID: 275BFB45161B2D9EB37C09D5F10498F9 [16:18:42]: SOC_ID: 632135909F2564B0431A38F7094AC2425EB48A7AEDD5E6AE0157954B21AF781D [16:18:42]: 状态: 等待PreLoader VCOM, 请连接手机

16:19:37: Loading payload from mt6768_payload.bin, 0x264 bytes 16:19:37: Kamakiri / DA Run 16:19:37: Trying kamakiri2..

cnwonge commented 2 years ago

[16:23:53]: Successfully sent payload: C:\Users\cnwon\AppData\Local\Temp_MEI128722\mtkclient\payloads\mt6768_payload.bin [16:23:53]: Device is protected. [16:23:53]: Device is in BROM mode. Trying to dump preloader. [16:23:53]: unpack requires a buffer of 65536 bytes [16:23:54]: Error on DA_Send cmd

cnwonge commented 2 years ago

[16:43:36]: SOC_ID: 632135909F2564B0431A38F7094AC2425EB48A7AEDD5E6AE0157954B21AF781D [16:43:36]: 状态: 等待PreLoader VCOM, 请连接手机

16:44:44: Loading payload from mt6768_payload.bin, 0x264 bytes 16:44:44: Kamakiri / DA Run 16:44:44: Trying kamakiri2..

cnwonge commented 2 years ago

[16:44:44]: Trying kamakiri2.. 卡在此

xxroot commented 2 years ago

我专门拿我的手机试了一下,完全没有问题

[17:12:01]: 状态: 等待PreLoader VCOM, 请连接手机 [17:12:12]: CPU: MT6768(Helio P65/G85 k68v1) [17:12:12]: HW version: 0x0 [17:12:12]: WDT: 0x10007000 [17:12:12]: Uart: 0x11002000 [17:12:12]: Brom payload addr: 0x100a00 [17:12:12]: DA payload addr: 0x201000 [17:12:12]: CQ_DMA addr: 0x10212000 [17:12:12]: Var1: 0x25 [17:12:12]: Disabling Watchdog... [17:12:12]: HW code: 0x707 [17:12:12]: Target config: 0xe7 [17:12:12]: SBC enabled: True [17:12:12]: SLA enabled: True [17:12:12]: DAA enabled: True [17:12:12]: SWJTAG enabled: True [17:12:12]: EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False [17:12:12]: Root cert required: False [17:12:12]: Mem read auth: True [17:12:12]: Mem write auth: True [17:12:12]: Cmd 0xC8 blocked: True [17:12:12]: Get Target info [17:12:12]: BROM mode detected. [17:12:12]: HW subcode: 0x8a00 [17:12:12]: HW Ver: 0xca00 [17:12:12]: SW Ver: 0x0 [17:12:12]: ME_ID: F11A5B8992800F812CBC5AB8D4BC067B [17:12:12]: SOC_ID: B44040B3D29152A59B0B5AD88BF2D3D3E7E8C0804BB68905F0CCA21785B82FCD [17:12:12]: 状态: 等待PreLoader VCOM, 请连接手机

[17:12:19]: CPU: MT6768(Helio P65/G85 k68v1) [17:12:19]: HW version: 0x0 [17:12:19]: WDT: 0x10007000 [17:12:19]: Uart: 0x11002000 [17:12:19]: Brom payload addr: 0x100a00 [17:12:19]: DA payload addr: 0x201000 [17:12:19]: CQ_DMA addr: 0x10212000 [17:12:19]: Var1: 0x25 [17:12:19]: Disabling Watchdog... [17:12:19]: HW code: 0x707 [17:12:19]: Target config: 0xe7 [17:12:19]: SBC enabled: True [17:12:19]: SLA enabled: True [17:12:19]: DAA enabled: True [17:12:19]: SWJTAG enabled: True [17:12:19]: EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False [17:12:19]: Root cert required: False [17:12:19]: Mem read auth: True [17:12:19]: Mem write auth: True [17:12:19]: Cmd 0xC8 blocked: True [17:12:19]: Get Target info [17:12:19]: BROM mode detected. [17:12:19]: HW subcode: 0x8a00 [17:12:19]: HW Ver: 0xca00 [17:12:19]: SW Ver: 0x0 [17:12:19]: ME_ID: F11A5B8992800F812CBC5AB8D4BC067B [17:12:19]: SOC_ID: B44040B3D29152A59B0B5AD88BF2D3D3E7E8C0804BB68905F0CCA21785B82FCD [17:12:19]: Loading payload from mt6768_payload.bin, 0x264 bytes [17:12:19]: Kamakiri / DA Run [17:12:19]: Trying kamakiri2.. [17:12:19]: Done sending payload... [17:12:19]: Successfully sent payload: C:\Users\Administrator\AppData\Local\Temp_MEI108722\mtkclient\payloads\mt6768_payload.bin [17:12:19]: Device is protected. [17:12:19]: Device is in BROM mode. Trying to dump preloader. [17:12:21]: Jumping to 0x200000 [17:12:21]: Jumping to 0x200000: ok.

cnwonge commented 2 years ago

換一台電腦, 再試.

cnwonge commented 2 years ago

看mi.com 手機CPU 是 Helio G88, MKclient 認出 MT6768(Helio P65/G85 k68v1), 未知是否问题所在?

bkerler commented 2 years ago

Please don't link to other "versions" of mtkclient here, especially if it violates the gplv3 license of this repository.

github-actions[bot] commented 1 month ago

Stale issue message