Brick -Xiaomi mi 9T- Impossible to EDL Flash (Bootloader unlocked) - Redmi K20 / Xiaomi Mi 9T Questions & Answers
Hi there,
I tried to troubleshoot with all the other Xiaomi users' posts, but I keep blocking my Xiaomi mi 9T for unbrick.
J'ai essayé de ma dépanner avec tous les posts des autres utilisateurs de Xiaomi, mais je continu à bloquer pour unbrick mon Xiaomi mi 9T
The story begins when you try to flash PixelExperience Rom for the very first time. In the rush I stupidly forgot to flash Magisk... :crying:
So I looked into the Brick..
I found a solution with ALL IN ONE TOOL to switch to EDL mode without physically opening my new phone:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
(Thanks to Fantomduck for that)
My phone looks good as "Qualcomm HS-USB QDLoader 9008 (COM3) so I guess I'm in EDL mode.
Before that I also verrified that my bootloader is always unlocked : That's ok.
So now I try to Flash a factory build "davinci_images_V11.0.4.0.QFJCNXM_20200214.0000.00_10.0_cn" founded on the Xiaomi website.
For that I used the last version of XiaoMiFlash tool. The soft install the drivers nicely after add the missing "log" folder. I connected also my Mi Account (with open bootloader) : Login successful, nice.
And here is the problem : When I try to flash the COM3 with the factory built : "Cannot receive hello packet" ..
I give you here the log Flash :
[15:26:20 COM3]:MiFlash 2018.11.15.0
[15:26:20 COM3]:flash in thread name:COM3,id:19
[15:26:20 COM3]:sw in images
[15:26:20 COM3]:flash in thread name:COM3,id:19
[15:26:20 COM3]:[COM3]:start flash.
[15:26:20 COM3]:received hello packet
[15:26:20 COM3]:download programmer C:\Users\Raphael\Desktop\ROOT\0_Rom_Xiaomi\2703\Factory_build\davinci_images_V11.0.4.0.QFJCNXM_20200214.0000.00_10.0_cn_13fe307d52\davinci_images_V11.0.4.0.QFJCNXM_20200214.0000.00_10.0_cn\images\prog_ufs_firehose_sdm855_ddr.elf
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 0,length 64
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 64,length 1008
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 4096,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 8192,length 3336
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 368016,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 372112,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 376208,length 12
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 12288,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 16384,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 20480,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 24576,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 28672,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 32768,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 36864,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 40960,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 45056,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 49152,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 53248,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 57344,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 61440,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 65536,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 69632,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 73728,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 77824,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 81920,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 86016,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 90112,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 94208,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 98304,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 102400,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 106496,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 110592,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 114688,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 118784,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 122880,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 126976,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 131072,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 135168,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 139264,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 143360,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 147456,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 151552,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 155648,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 159744,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 163840,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 167936,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 172032,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 176128,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 180224,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 184320,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 188416,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 192512,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 196608,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 200704,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 204800,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 208896,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 212992,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 217088,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 221184,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 225280,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 229376,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 233472,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 237568,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 241664,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 245760,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 249856,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 253952,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 258048,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 262144,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 266240,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 270336,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 274432,length 4096
[15:26:20 COM3]:sahara read 64b data:imgID 13,offset 278528,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 282624,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 286720,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 290816,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 294912,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 299008,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 303104,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 307200,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 311296,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 315392,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 319488,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 323584,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 327680,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 331776,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 335872,length 1068
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 376224,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 380320,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 384416,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 388512,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 392608,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 396704,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 400800,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 404896,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 408992,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 413088,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 417184,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 421280,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 425376,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 429472,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 433568,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 437664,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 441760,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 445856,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 449952,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 454048,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 458144,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 462240,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 466336,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 470432,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 474528,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 478624,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 482720,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 486816,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 490912,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 495008,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 499104,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 503200,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 507296,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 511392,length 2136
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 336944,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 341040,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 345136,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 349232,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 353328,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 357424,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 361520,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 365616,length 2400
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 513536,length 172
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 513708,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 517804,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 521900,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 525996,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 530092,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 534188,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 538284,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 542380,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 546476,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 550572,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 554668,length 2192
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 556860,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 560956,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 565052,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 569148,length 1028
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 570176,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 574272,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 578368,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 582464,length 1028
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 583492,length 16
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 583508,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 587604,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 591700,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 595796,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 599892,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 603988,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 608084,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 612180,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 616276,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 620372,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 624468,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 628564,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 632660,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 636756,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 640852,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 644948,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 649044,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 653140,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 657236,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 661332,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 665428,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 669524,length 4096
[15:26:21 COM3]:sahara read 64b data:imgID 13,offset 673620,length 4096
[15:26:21 COM3]:sahara read end imgID:13 status:0
[15:26:21 COM3]:Send done packet
[15:26:21 COM3]:file C:\Users\Raphael\Desktop\ROOT\0_Rom_Xiaomi\2703\Factory_build\davinci_images_V11.0.4.0.QFJCNXM_20200214.0000.00_10.0_cn_13fe307d52\davinci_images_V11.0.4.0.QFJCNXM_20200214.0000.00_10.0_cn\images\prog_ufs_firehose_sdm855_ddr.elf transferred successfully
[15:26:23 COM3]:send nop command
[15:26:23 COM3]:send command:<?xml version="1.0" ?><data><nop verbose="0" value="ping"/></data>
[15:26:23 COM3]:get response from target
[15:26:23 COM3]:resdump:<?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Binary build date: Feb 14 2020 @ 14:04:55" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Binary build date: Feb 14 2020 @ 14:04:55
" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Chip serial num: 1698514185 (0x653d4509)" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Supported Functions (14):" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: program" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: read" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: nop" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: patch" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: configure" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: setbootablestoragedrive" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: erase" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: power" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: firmwarewrite" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: getstorageinfo" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: benchmark" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: emmc" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: ufs" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: fixgpt" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: End of supported functions 14" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Calling handler for nop" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Binary build date: Feb 14 2020 @ 14:04:55
" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Chip serial num: 1698514185 (0x653d4509)" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Supported Functions (14):" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: program" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: read" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: nop" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: patch" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: configure" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: setbootablestoragedrive" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: erase" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: power" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: firmwarewrite" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: getstorageinfo" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: benchmark" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: emmc" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: ufs" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: fixgpt" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: End of supported functions 14" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<response value="ACK" rawmode="false" /></data>
[15:26:23 COM3]:send configure command
[15:26:23 COM3]:send command:<?xml version="1.0" ?><data><configure verbose="0" AlwaysValidate="0" ZlpAwareHost="1" MaxPayloadSizeToTargetInBytes="1048576" MemoryName="ufs" SkipStorageInit="0"/></data>
[15:26:23 COM3]:get response from target
[15:26:23 COM3]:resdump:<?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="ERROR: Only nop and sig tag can be recevied before authentication." /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<response value="NAK" rawmode="false" /></data>
[15:26:24 COM3]:flashSuccess False
[15:26:24 COM3]:isFactory False CheckCPUID False
[15:26:24 COM3]:before:flashSuccess is False set IsUpdate:True set IsDone True
[15:26:24 COM3]:after:flashSuccess is False set IsUpdate:false set IsDone true
[15:26:24 COM3]:no Binary dump
[15:26:24 COM3]:no Binary dump
[15:26:25 COM3]:no Binary dump
[15:26:25 COM3]:edl authentication
[15:26:25 COM3]:GetUserInfo
[15:26:26 COM3]:AuthFlash
[15:26:28 COM3]:You are not authorized to Download!!!
[15:26:28 COM3]:System.Exception: You are not authorized to Download!!!
à XiaoMiFlash.code.bl.SerialPortDevice.ConfigureDDR(Int32 intSectorSize, Int32 buffer_sectors, String ddrType, Int32 m_iSkipStorageInit)
à XiaoMiFlash.code.bl.SerialPortDevice.XiaomiFlash() à XiaoMiFlash.code.bl.SerialPortDevice.ConfigureDDR(Int32 intSectorSize, Int32 buffer_sectors, String ddrType, Int32 m_iSkipStorageInit)
à XiaoMiFlash.code.bl.SerialPortDevice.XiaomiFlash()
[15:26:28 COM3]:no provision exit:COM3
[15:26:29 COM3]:flashSuccess False
[15:26:29 COM3]:isFactory False CheckCPUID False
[15:26:29 COM3]:before:flashSuccess is False set IsUpdate:True set IsDone True
[15:26:29 COM3]:after:flashSuccess is False set IsUpdate:false set IsDone true
Is it a way for EDL flash without open the cover of the phone?
Someone can explain to me what are "hello packet"?
Thank you in advance and sorry for my dubious English!
Ask in an 9T forum, there you will receive an answer.
This is a 9T Pro forum.
SteveHG said:
Ask in an 9T forum, there you will receive an answer.
This is a 9T Pro forum.
Click to expand...
Click to collapse
This is the 9T forum lol
IEATMILKA said:
This is the 9T forum lol
Click to expand...
Click to collapse
I'm not crazy thank you!
Today I got an other error message :
In the MiFlash tool in the identification box it's written : "Login successful" and "Request failed"
With the following log :
[13:46:28 COM5]:MiFlash 2018.11.15.0
[13:46:28 COM5]:flash in thread name:COM5,id:19
[13:46:28 COM5]:sw in images
[13:46:28 COM5]:flash in thread name:COM5,id:19
[13:46:28 COM5]:[COM5]:start flash.
[13:46:28 COM5]:received hello packet
[13:46:28 COM5]:download programmer C:\Users\Raphael\Desktop\ROOT\0_Rom_Xiaomi\2703\Factory_build\davinci_images_V11.0.4.0.QFJCNXM_20200214.0000.00_10.0_cn_13fe307d52\davinci_images_V11.0.4.0.QFJCNXM_20200214.0000.00_10.0_cn\images\prog_ufs_firehose_sdm855_ddr.elf
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 0,length 64
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 64,length 1008
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 4096,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 8192,length 3336
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 368016,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 372112,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 376208,length 12
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 12288,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 16384,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 20480,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 24576,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 28672,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 32768,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 36864,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 40960,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 45056,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 49152,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 53248,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 57344,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 61440,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 65536,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 69632,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 73728,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 77824,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 81920,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 86016,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 90112,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 94208,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 98304,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 102400,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 106496,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 110592,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 114688,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 118784,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 122880,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 126976,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 131072,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 135168,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 139264,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 143360,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 147456,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 151552,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 155648,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 159744,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 163840,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 167936,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 172032,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 176128,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 180224,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 184320,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 188416,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 192512,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 196608,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 200704,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 204800,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 208896,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 212992,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 217088,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 221184,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 225280,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 229376,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 233472,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 237568,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 241664,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 245760,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 249856,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 253952,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 258048,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 262144,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 266240,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 270336,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 274432,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 278528,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 282624,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 286720,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 290816,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 294912,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 299008,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 303104,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 307200,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 311296,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 315392,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 319488,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 323584,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 327680,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 331776,length 4096
[13:46:28 COM5]:sahara read 64b data:imgID 13,offset 335872,length 1068
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 376224,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 380320,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 384416,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 388512,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 392608,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 396704,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 400800,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 404896,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 408992,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 413088,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 417184,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 421280,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 425376,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 429472,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 433568,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 437664,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 441760,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 445856,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 449952,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 454048,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 458144,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 462240,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 466336,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 470432,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 474528,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 478624,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 482720,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 486816,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 490912,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 495008,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 499104,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 503200,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 507296,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 511392,length 2136
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 336944,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 341040,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 345136,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 349232,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 353328,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 357424,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 361520,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 365616,length 2400
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 513536,length 172
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 513708,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 517804,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 521900,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 525996,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 530092,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 534188,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 538284,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 542380,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 546476,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 550572,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 554668,length 2192
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 556860,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 560956,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 565052,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 569148,length 1028
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 570176,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 574272,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 578368,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 582464,length 1028
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 583492,length 16
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 583508,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 587604,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 591700,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 595796,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 599892,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 603988,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 608084,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 612180,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 616276,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 620372,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 624468,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 628564,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 632660,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 636756,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 640852,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 644948,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 649044,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 653140,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 657236,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 661332,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 665428,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 669524,length 4096
[13:46:29 COM5]:sahara read 64b data:imgID 13,offset 673620,length 4096
[13:46:29 COM5]:sahara read end imgID:13 status:0
[13:46:29 COM5]:Send done packet
[13:46:29 COM5]:file C:\Users\Raphael\Desktop\ROOT\0_Rom_Xiaomi\2703\Factory_build\davinci_images_V11.0.4.0.QFJCNXM_20200214.0000.00_10.0_cn_13fe307d52\davinci_images_V11.0.4.0.QFJCNXM_20200214.0000.00_10.0_cn\images\prog_ufs_firehose_sdm855_ddr.elf transferred successfully
[13:46:31 COM5]:send nop command
[13:46:31 COM5]:send command:<?xml version="1.0" ?><data><nop verbose="0" value="ping"/></data>
[13:46:31 COM5]:get response from target
[13:46:31 COM5]:resdump:<?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Binary build date: Feb 14 2020 @ 14:04:55" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Binary build date: Feb 14 2020 @ 14:04:55
" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Chip serial num: 1698514185 (0x653d4509)" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Supported Functions (14):" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: program" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: read" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: nop" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: patch" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: configure" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: setbootablestoragedrive" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: erase" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: power" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: firmwarewrite" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: getstorageinfo" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: benchmark" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: emmc" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: ufs" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: fixgpt" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: End of supported functions 14" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Calling handler for nop" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Binary build date: Feb 14 2020 @ 14:04:55
" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Chip serial num: 1698514185 (0x653d4509)" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: Supported Functions (14):" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: program" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: read" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: nop" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: patch" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: configure" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: setbootablestoragedrive" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: erase" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: power" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: firmwarewrite" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: getstorageinfo" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: benchmark" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: emmc" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: ufs" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: fixgpt" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="INFO: End of supported functions 14" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<response value="ACK" rawmode="false" /></data>
[13:46:31 COM5]:send configure command
[13:46:31 COM5]:send command:<?xml version="1.0" ?><data><configure verbose="0" AlwaysValidate="0" ZlpAwareHost="1" MaxPayloadSizeToTargetInBytes="1048576" MemoryName="ufs" SkipStorageInit="0"/></data>
[13:46:31 COM5]:get response from target
[13:46:31 COM5]:resdump:<?xml version="1.0" encoding="UTF-8" ?>
<data>
<log value="ERROR: Only nop and sig tag can be recevied before authentication." /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<response value="NAK" rawmode="false" /></data>
[13:46:31 COM5]:flashSuccess False
[13:46:31 COM5]:isFactory False CheckCPUID False
[13:46:31 COM5]:before:flashSuccess is False set IsUpdate:True set IsDone True
[13:46:31 COM5]:after:flashSuccess is False set IsUpdate:false set IsDone true
[13:46:32 COM5]:no Binary dump
[13:46:32 COM5]:no Binary dump
[13:46:33 COM5]:no Binary dump
[13:46:33 COM5]:edl authentication
[13:46:33 COM5]:GetUserInfo
[13:46:33 COM5]:AuthFlash
[13:46:33 COM5]:need edl authentication.
[13:46:33 COM5]:authentication edl.
[13:46:33 COM5]:send command:<?xml version="1.0" ?><data> <sig TargetName="req" verbose="1"/></data>
[13:46:33 COM5]:get response from target
[13:46:33 COM5]:resdump:<?xml version="1.0" encoding="UTF-8" ?>
<data>
<sig TargetName="blob" value="AQAAAG0BAAAJRT1lIoFaiBHaR1JO0UU9mn1c2A" /></data><?xml version="1.0" encoding="UTF-8" ?>
<data>
<response value="ACK" rawmode="false" /></data>
[13:46:33 COM5]rigin:AQAAAG0BAAAJRT1lIoFaiBHaR1JO0UU9mn1c2A
[13:46:33 COM5]:SignEdl
[13:46:40 COM5]:authentication failed result -6
[13:46:40 COM5]:System.Exception: authentication failed L’opération a réussi
à XiaoMiFlash.code.bl.SerialPortDevice.dlAuth()
à XiaoMiFlash.code.bl.SerialPortDevice.ConfigureDDR(Int32 intSectorSize, Int32 buffer_sectors, String ddrType, Int32 m_iSkipStorageInit)
à XiaoMiFlash.code.bl.SerialPortDevice.XiaomiFlash() à XiaoMiFlash.code.bl.SerialPortDevice.dlAuth()
à XiaoMiFlash.code.bl.SerialPortDevice.ConfigureDDR(Int32 intSectorSize, Int32 buffer_sectors, String ddrType, Int32 m_iSkipStorageInit)
à XiaoMiFlash.code.bl.SerialPortDevice.XiaomiFlash()
[13:46:40 COM5]:no provision exit:COM5
[13:46:40 COM5]:flashSuccess False
[13:46:40 COM5]:isFactory False CheckCPUID False
[13:46:40 COM5]:before:flashSuccess is False set IsUpdate:True set IsDone True
[13:46:40 COM5]:after:flashSuccess is False set IsUpdate:false set IsDone true
Maybe I have forgotten something nah ?
you have forgot to get a verified miui account, for edl flash .. that's something u can't get anymore from xiaomi, unless you are a reseller or handy store.
With a normal account it is not allowed to EDL Flash this Smartphone.
Is there no trick or something I can do to unbrick it ?
sure there is, there are users here and on the internet .. who unbrick your phone .. yeah for a "small" fee .. like $50 (that's what i payed for a EDL flash)
Sry, I have a question: How did you brick your phone? Just by flashing Pixel Experience ROM? I'm asking because I don't want to risk the same thing
If your bootloader is unlocked and fastboot is working you don't need EDL to unbrick your phone. Anyways you can't use EDL flashing without an authorised account even with an unlocked bootloader...
Just boot the phone to fastboot and use Mi Flash (careful not to leave it to "clean all and lock") or the flash_all script to flash your stock ROM.
I have try that, got an error like this : "Mi Flash Error error:Not catch checkpoint (\$fastboot -s .* lock),flash is not done"
Fixed it by removing the checkpoint line from the MiFlash configuration.
So now Miflash say "Flash done" but I still blocked on the fastboot..
Greengorillia said:
I have try that, got an error like this : "Mi Flash Error error:Not catch checkpoint (\$fastboot -s .* lock),flash is not done"
Fixed it by removing the checkpoint line from the MiFlash configuration.
So now Miflash say "Flash done" but I still blocked on the fastboot..
Click to expand...
Click to collapse
Careful with Mi Flash, don't let the "Clean all and lock" option checked unless you want to relock the bootloader. And don't relock if you're not flashing the correct regional ROM for your device.
Anyways you should just try running the flash_all.bat script from a terminal window (see this post for more info). Mi Flash is just too unreliable to get the job done sometimes.
ShiningScias said:
Careful with Mi Flash, don't let the "Clean all and lock" option checked unless you want to relock the bootloader. And don't relock if you're not flashing the correct regional ROM for your device.
Anyways you should just try running the flash_all.bat script from a terminal window (see this post for more info). Mi Flash is just too unreliable to get the job done sometimes.
Click to expand...
Click to collapse
It works thank you!! :victory:
Related
One step closer to the no app preferences solution...maybe
So here is the thing that might happened to you, after some usage time on all firmwares that i used so far it reaches a point (suddenly) where applications can no longer get to their own preferences. This post here talks about the same problem http://forum.xda-developers.com/showthread.php?t=978012 and Dark3n here http://forum.xda-developers.com/showthread.php?t=1013063 developed a app thinking about that problem, but it wont solve it although it makes a wonderful job getting rid of unnecessary files. The thing is i never care too much about the problem because by the time it happens a new firmware is already released and it just encourages me to install it, even so this is a major problem...let me rephrase...MAJOR PROBLEM. So right now i am using 2.2.1 XXJQ1 and i was thinking about installing the new 2.3 firmware that is out for some days and, guess what...suddenly the "no shared preferences for you" problem appeared. Grrr now it's confirmed until the current firmware this problem exists and i haven't seen any cause or fix for the problem after digging around the web. (of course factory reset works but it is not a valid solution to the problem) Since the problem is with the apps preferences i went and checked the folders /dbdata/databases/ and /data/data/ and the permissions on those were quite low especially everything inside /data/data/ (sorry don't remember the actual permissions by the time). Then i just thought well if this is a permissions thing let me chmod -R 777 * on those, i went ahead and did just that and...ttaddamm problem solved the preferences don't go to default screen no more and they got their preferences right were i left em Now doing chmod -R 777 * on those folders might not be the securest thing to do but so far (like 1hour ago) and 2 reboots after the apps have their preferences as they should. The thing is .... does the permissions on those folders changed suddenly? If so what could be the origin of that change? If anyone currently with that problem could try and change permissions on those folders and report back if it worked for them would be awesome. Another request i make, if possible is if anyone not having the problem would be kind enough to post the default permissions on those folders.
Errrr...anyone?
DsMobile said: Errrr...anyone? Click to expand... Click to collapse Me no understand . jje
/dbdata/databases/ drwxrwxrwx /data/data/ drwxrwx--x Sorry I tend to forget how to evaluate the number. Your problem did not happen to me, up till know.
thanks hlaube, any chance you or anyone can tell me the permissions for the package folders inside those?are they the same?
I just flashed stock JVB, flashed CF-root kernel, and then flashed the rom "Simply Honey". Haven't done much installation and setting, so access rights are as they where set up by the maker of the FW. And now you have a list of my favorit App's as well # ls -l /dbdata/databases total 168 drwxrwx--x 3 1000 1000 4096 Apr 23 05:51 android drwxrwx--x 3 10033 10033 4096 Apr 23 05:51 com.android.calendar drwxrwx--x 3 10014 10014 4096 Apr 23 06:02 com.android.contacts drwxrwx--x 3 10059 10059 4096 Apr 23 05:51 com.android.email drwxrwx--x 3 10003 10003 4096 Apr 23 05:51 com.android.mms drwxrwx--x 3 1001 1001 4096 Apr 23 05:51 com.android.phone drwxrwx--x 3 10033 10033 4096 Apr 23 05:51 com.android.providers.calendar drwxrwx--x 3 10014 10014 4096 Apr 23 06:49 com.android.providers.contacts drwxrwx--x 2 10000 10000 4096 Apr 23 05:51 com.android.providers.downloads drwxrwx--x 2 10000 10000 4096 Apr 23 05:52 com.android.providers.media drwxrwx--x 2 1000 1000 4096 Apr 23 05:51 com.android.providers.settings drwxrwx--x 3 1001 1001 4096 Apr 23 05:51 com.android.providers.telephony drwxrwx--x 3 1000 1000 4096 Apr 23 06:13 com.android.settings drwxrwx--x 3 10034 10034 4096 Apr 23 06:05 com.android.vending drwxrwx--x 3 10107 10107 4096 Apr 23 06:45 com.aurorasoftworks.quadrant.ui.standard drwxrwx--x 2 10060 10060 4096 Apr 23 05:51 com.cooliris.media drwxrwx--x 3 10102 10102 4096 Apr 23 06:47 com.estrongs.android.pop drwxrwx--x 3 10103 10103 4096 Apr 23 06:50 com.facebook.katana drwxrwx--x 2 10002 10002 4096 Apr 23 06:26 com.google.android.apps.maps drwxrwx--x 3 1000 1000 4096 Apr 23 05:51 com.google.android.backup drwxrwx--x 3 10037 10037 4096 Apr 23 06:13 com.google.android.feedback drwxrwx--x 3 10017 10017 4096 Apr 23 05:53 com.google.android.gm drwxrwx--x 3 10036 10036 4096 Apr 23 06:01 com.google.android.gsf drwxrwx--x 3 10043 10043 4096 Apr 23 05:51 com.google.android.voicesearch drwxrwx--x 3 10026 10026 4096 Apr 23 05:52 com.google.android.youtube drwxrwx--x 3 10112 10112 4096 Apr 23 06:12 com.keramidas.TitaniumBackup drwxrwx--x 3 10007 10007 4096 Apr 23 06:01 com.layar drwxrwx--x 3 10087 10087 4096 Apr 23 06:00 com.mobilityflow.animatedweather.free drwxrwx--x 3 10005 10005 4096 Apr 23 05:54 com.noshufou.android.su drwxrwx--x 3 10097 10097 4096 Apr 23 06:31 com.quoord.tapatalkahilfe.activity drwxrwx--x 3 10118 10118 4096 Apr 23 06:34 com.quoord.tapatalkxda.activity drwxrwx--x 3 10044 10044 4096 Apr 23 05:51 com.sec.android.app.samsungapps.una drwxrwx--x 3 10031 10031 4096 Apr 23 05:51 com.sec.android.app.sns drwxrwx--x 2 10014 10014 4096 Apr 23 05:51 com.sec.android.provider.logsprovider drwxrwx--x 2 10018 10018 4096 Apr 23 05:51 com.sec.android.providers.downloads drwxrwxrwx 3 1000 1000 4096 Apr 23 05:51 com.sec.android.providers.drm drwxrwx--x 3 10006 10006 4096 Apr 23 06:32 com.swype.android.inputmethod drwxrwx--x 3 10113 10113 4096 Apr 23 06:50 com.thedeck.android.app drwxrwx--x 2 1000 1000 4096 Apr 23 05:51 com.wssyncmldm drwxrwx--x 3 10030 10030 4096 Apr 23 05:59 eu.chainfire.cfroot.cwmmanager drwxrwx--x 3 10096 10096 4096 Apr 23 06:46 lysesoft.andexplorer drwxrwx--x 3 10015 10015 4096 Apr 23 05:51 net.thinkindifferent.inputmethod.latin # ls -l /data/data total 692 drwxr-x--x 3 10019 10019 4096 Apr 23 05:50 android.tts drwxr-x--x 3 10100 10100 4096 Apr 23 06:06 ch.ethz.im.codecheck drwxr-x--x 3 10086 10086 4096 Apr 23 05:51 com.Double.FasterFix drwxr-x--x 3 10063 10063 4096 Apr 23 05:51 com.adobe.flashplayer drwxr-x--x 3 10075 10075 4096 Apr 23 05:51 com.aldiko.android.samsung drwxr-x--x 3 1000 1000 4096 Apr 23 05:49 com.android.MtpApplication drwxr-x--x 3 1000 1000 4096 Apr 23 05:51 com.android.Preconfig drwxr-x--x 3 10039 10039 4096 Apr 23 05:50 com.android.angryGps drwxr-x--x 3 10024 10024 4096 Apr 23 05:50 com.android.bluetooth drwxr-x--x 3 10080 10080 4096 Apr 23 05:51 com.android.bluetooth.bpp drwxr-x--x 3 1000 1000 4096 Apr 23 05:51 com.android.bluetoothtest drwxr-x--x 3 10010 10010 4096 Apr 23 05:50 com.android.browser drwxr-x--x 3 10033 10033 4096 Apr 23 05:50 com.android.calendar drwxr-x--x 3 10082 10082 4096 Apr 23 05:51 com.android.cardock drwxr-x--x 3 10045 10045 4096 Apr 23 05:50 com.android.certinstaller drwxr-x--x 3 10014 10014 4096 Apr 23 05:51 com.android.contacts drwxr-x--x 3 10052 10052 4096 Apr 23 05:50 com.android.defcontainer drwxr-x--x 6 10059 10059 4096 Apr 23 05:51 com.android.email drwxr-x--x 3 10056 10056 4096 Apr 23 05:50 com.android.htmlviewer drwxr-x--x 3 10032 10032 4096 Apr 23 05:50 com.android.inputmethod.latin drwxr-x--x 3 10038 10038 4096 Apr 23 05:50 com.android.magicsmoke drwxr-x--x 3 10003 10003 4096 Apr 23 05:50 com.android.mms drwxr-x--x 3 10023 10023 4096 Apr 23 05:50 com.android.music drwxr-x--x 3 10028 10028 4096 Apr 23 05:50 com.android.musicvis drwxr-x--x 3 10090 10090 4096 Apr 23 05:51 com.android.nexuss drwxr-x--x 3 10065 10065 4096 Apr 23 05:51 com.android.packageinstaller drwxr-x--x 4 1001 1001 4096 Apr 23 05:51 com.android.phone drwxr-x--x 3 10068 10068 4096 Apr 23 05:51 com.android.protips drwxr-x--x 3 10014 10014 4096 Apr 23 05:50 com.android.providers.applications drwxr-x--x 3 10033 10033 4096 Apr 23 05:51 com.android.providers.calendar drwxr-x--x 3 10014 10014 4096 Apr 23 05:51 com.android.providers.contacts drwxr-x--x 4 10000 10000 4096 Apr 23 06:01 com.android.providers.downloads drwxr-x--x 3 10000 10000 4096 Apr 23 05:49 com.android.providers.downloads.ui drwxr-x--x 4 10000 10000 4096 Apr 23 06:13 com.android.providers.drm drwxr-x--x 3 10000 10000 4096 Apr 23 05:51 com.android.providers.media drwxr-x--x 3 1000 1000 4096 Apr 23 05:50 com.android.providers.security drwxr-x--x 3 1000 1000 4096 Apr 23 05:51 com.android.providers.settings drwxr-x--x 3 1000 1000 4096 Apr 23 05:51 com.android.providers.subscribedfeeds drwxr-x--x 3 1001 1001 4096 Apr 23 05:54 com.android.providers.telephony drwxr-x--x 4 10014 10014 4096 Apr 23 05:51 com.android.providers.userdictionary drwxr-x--x 3 1001 1001 4096 Apr 23 05:51 com.android.samsungtest.DataCreate drwxr-x--x 3 1000 1000 4096 Apr 23 05:50 com.android.server.vpn drwxr-x--x 4 1000 1000 4096 Apr 23 05:51 com.android.settings drwxr-x--x 3 1000 1000 4096 Apr 23 05:51 com.android.settings.mt drwxr-x--x 3 10069 10069 4096 Apr 23 05:51 com.android.setupwizard drwxr-x--x 3 1001 1001 4096 Apr 23 05:50 com.android.stk drwxr-x--x 3 1000 1000 4096 Apr 23 05:50 com.android.systemui drwxr-x--x 5 10034 10034 4096 Apr 23 05:53 com.android.vending drwxr-x--x 3 10011 10011 4096 Apr 23 05:50 com.android.vending.updater drwxr-x--x 4 10081 10081 4096 Apr 23 05:51 com.android.voicedialer drwxr-x--x 3 10012 10012 4096 Apr 23 05:50 com.android.wallpaper drwxr-x--x 3 10049 10049 4096 Apr 23 05:50 com.android.wallpaper.livepicker drwxr-x--x 3 10084 10084 4096 Apr 23 05:51 com.androidapps.spare_parts drwxr-x--x 6 10107 10107 4096 Apr 23 06:45 com.aurorasoftworks.quadrant.ui.standard drwxr-x--x 3 10062 10062 4096 Apr 23 05:51 com.boombuler.system.appwidgetpicker drwxr-x--x 3 10053 10053 4096 Apr 23 05:50 com.broadcom.bt.app.pbap drwxr-x--x 3 1002 1002 4096 Apr 23 05:51 com.broadcom.bt.app.system drwxr-x--x 3 10088 10088 4096 Apr 23 05:51 com.bryanowens.Camcorder drwxr-x--x 3 10060 10060 4096 Apr 23 05:50 com.cooliris.media drwxr-x--x 5 10085 10085 4096 Apr 23 05:53 com.ebproductions.android.launcher drwxr-x--x 3 10102 10102 4096 Apr 23 06:07 com.estrongs.android.pop drwxr-x--x 6 10103 10103 4096 Apr 23 06:49 com.facebook.katana drwxr-x--x 4 10002 10002 4096 Apr 23 06:08 com.google.android.apps.maps drwxr-x--x 3 10029 10029 4096 Apr 23 05:50 com.google.android.apps.uploader drwxr-x--x 4 1000 1000 4096 Apr 23 05:51 com.google.android.backup drwxr-x--x 3 10094 10094 4096 Apr 23 05:51 com.google.android.carhome drwxr-x--x 7 10037 10037 4096 Apr 23 06:13 com.google.android.feedback drwxr-x--x 6 10017 10017 4096 Apr 23 05:53 com.google.android.gm drwxr-x--x 4 10050 10050 4096 Apr 23 06:01 com.google.android.googlequicksearchbox drwxr-x--x 5 10036 10036 4096 Apr 23 05:51 com.google.android.gsf drwxr-x--x 4 10036 10036 4096 Apr 23 05:51 com.google.android.location drwxr-x--x 3 10009 10009 4096 Apr 23 05:50 com.google.android.partnersetup drwxr-x--x 3 10077 10077 4096 Apr 23 05:51 com.google.android.street drwxr-x--x 4 10036 10036 4096 Apr 23 05:53 com.google.android.syncadapters.calendar drwxr-x--x 4 10036 10036 4096 Apr 23 05:53 com.google.android.syncadapters.contacts drwxr-x--x 3 10074 10074 4096 Apr 23 05:51 com.google.android.talk drwxr-x--x 3 10043 10043 4096 Apr 23 05:50 com.google.android.voicesearch drwxr-x--x 5 10026 10026 4096 Apr 23 05:52 com.google.android.youtube drwxr-x--x 3 10105 10105 4096 Apr 23 06:08 com.google.earth drwxr-xr-x 5 10112 10112 4096 Apr 23 06:12 com.keramidas.TitaniumBackup drwxr-x--x 3 10114 10114 4096 Apr 23 06:12 com.keramidas.TitaniumBackupPro drwxr-x--x 3 10109 10109 4096 Apr 23 06:08 com.kmagic.solitaire drwxr-x--x 4 10007 10007 4096 Apr 23 06:01 com.layar drwxr-x--x 3 10104 10104 4096 Apr 23 06:07 com.mictale.gpsessentials drwxr-x--x 4 10087 10087 4096 Apr 23 06:01 com.mobilityflow.animatedweather.free drwxr-x--x 3 10057 10057 4096 Apr 23 05:50 com.monotype.android.font.chococooky drwxr-x--x 3 10016 10016 4096 Apr 23 05:50 com.monotype.android.font.cooljazz drwxr-x--x 3 10079 10079 4096 Apr 23 05:51 com.monotype.android.font.rosemary drwxr-x--x 3 10046 10046 4096 Apr 23 05:50 com.newspaperdirect.pressreader.android.samsung drwxr-x--x 5 10005 10005 4096 Apr 23 05:53 com.noshufou.android.su drwxr-x--x 3 10110 10110 4096 Apr 23 06:09 com.onegravity.sudoku.sudoku10kfree drwxr-x--x 4 1001 1001 4096 Apr 23 05:51 com.osp.app.signin drwxr-x--x 3 10095 10095 4096 Apr 23 06:05 com.punsoftware.backup drwxr-x--x 5 10097 10097 4096 Apr 23 06:33 com.quoord.tapatalkahilfe.activity drwxr-x--x 5 10118 10118 4096 Apr 23 06:34 com.quoord.tapatalkxda.activity drwxr-x--x 3 10093 10093 4096 Apr 23 05:51 com.rechild.advancedtaskkillerfroyo drwxr-x--x 3 1000 1000 4096 Apr 23 05:50 com.samsung.InputEventApp drwxr-x--x 3 1000 1000 4096 Apr 23 05:51 com.samsung.android.app.divx drwxr-x--x 3 1000 1000 4096 Apr 23 05:50 com.samsung.mobileTracker.ui drwxr-x--x 3 1001 1001 4096 Apr 23 05:51 com.samsung.sec.android.application.csc drwxr-x--x 3 1001 1001 4096 Apr 23 05:50 com.samsung.simdetachnotifier drwxr-x--x 3 10021 10021 4096 Apr 23 05:50 com.sec.android.app.MmsProvision drwxr-x--x 3 10042 10042 4096 Apr 23 05:50 com.sec.android.app.calculator drwxr-x--x 3 1001 1001 4096 Apr 23 05:50 com.sec.android.app.callsetting drwxr-x--x 3 10073 10073 4096 Apr 23 05:51 com.sec.android.app.camera drwxr-x--x 3 10001 10001 4096 Apr 23 05:49 com.sec.android.app.camerafirmware drwxr-x--x 4 10076 10076 4096 Apr 23 05:51 com.sec.android.app.clockpackage drwxr-x--x 3 1000 1000 4096 Apr 23 05:51 com.sec.android.app.controlpanel drwxr-x--x 3 10014 10014 4096 Apr 23 05:51 com.sec.android.app.dialertab drwxr-x--x 3 10070 10070 4096 Apr 23 05:51 com.sec.android.app.dlna drwxr-x--x 3 10008 10008 4096 Apr 23 05:50 com.sec.android.app.drmua drwxr-x--x 3 1000 1000 4096 Apr 23 05:51 com.sec.android.app.encrypt drwxr-x--x 3 1000 1000 4096 Apr 23 05:49 com.sec.android.app.factorytest drwxr-x--x 3 10061 10061 4096 Apr 23 05:51 com.sec.android.app.fm drwxr-x--x 3 1000 1000 4096 Apr 23 05:50 com.sec.android.app.lcdtest drwxr-x--x 3 10078 10078 4096 Apr 23 05:51 com.sec.android.app.memo drwxr-x--x 3 10066 10066 4096 Apr 23 05:51 com.sec.android.app.minidiary drwxr-x--x 3 10058 10058 4096 Apr 23 05:50 com.sec.android.app.myfiles drwxr-x--x 3 1000 1000 4096 Apr 23 05:50 com.sec.android.app.personalization drwxr-x--x 3 1000 1000 4096 Apr 23 05:50 com.sec.android.app.phonesetupwizard drwxr-x--x 3 1000 1000 4096 Apr 23 05:51 com.sec.android.app.phoneutil drwxr-x--x 3 1000 1000 4096 Apr 23 05:50 com.sec.android.app.popupuireceiver drwxr-x--x 3 10025 10025 4096 Apr 23 05:50 com.sec.android.app.samsungapps drwxr-x--x 4 10044 10044 4096 Apr 23 05:51 com.sec.android.app.samsungapps.una drwxr-x--x 3 1003 1003 4096 Apr 23 05:50 com.sec.android.app.screencapture drwxr-x--x 3 1000 1000 4096 Apr 23 05:50 com.sec.android.app.selftestmode drwxr-x--x 3 1000 1000 4096 Apr 23 05:50 com.sec.android.app.servicemodeapp drwxr-x--x 3 10051 10051 4096 Apr 23 05:50 com.sec.android.app.shutdown drwxr-x--x 4 10031 10031 4096 Apr 23 05:51 com.sec.android.app.sns drwxr-x--x 3 10055 10055 4096 Apr 23 05:50 com.sec.android.app.snsaccount drwxr-x--x 3 10004 10004 4096 Apr 23 05:50 com.sec.android.app.soundplayer drwxr-x--x 3 10014 10014 4096 Apr 23 05:50 com.sec.android.app.twlauncher drwxr-x--x 3 10035 10035 4096 Apr 23 05:50 com.sec.android.app.twwallpaperchooser drwxr-x--x 3 10072 10072 4096 Apr 23 05:51 com.sec.android.app.unifiedinbox drwxr-x--x 3 10071 10071 4096 Apr 23 05:51 com.sec.android.app.videoplayer drwxr-x--x 3 10048 10048 4096 Apr 23 05:50 com.sec.android.app.voicerecorder drwxr-x--x 3 1000 1000 4096 Apr 23 05:50 com.sec.android.app.wlantest drwxr-x--x 3 10022 10022 4096 Apr 23 05:50 com.sec.android.inputmethod.axt9 drwxr-x--x 4 10067 10067 4096 Apr 23 05:51 com.sec.android.provider.badge drwxr-x--x 3 10014 10014 4096 Apr 23 05:50 com.sec.android.provider.logsprovider drwxr-x--x 3 10018 10018 4096 Apr 23 05:50 com.sec.android.providers.downloads drwxr-x--x 3 1000 1000 4096 Apr 23 05:49 com.sec.android.providers.drm drwxr-x--x 3 10014 10014 4096 Apr 23 05:50 com.sec.android.widgetapp.programmonitorwidget drwxr-x--x 3 1000 1000 4096 Apr 23 05:51 com.sec.app.RilErrorNotifier drwxr-x--x 3 10092 10092 4096 Apr 23 05:51 com.siriusapplications.quickboot drwxr-x--x 3 10041 10041 4096 Apr 23 05:50 com.smlds drwxr-x--x 3 10040 10040 4096 Apr 23 05:50 com.svox.pico drwxr-x--x 6 10006 10006 4096 Apr 23 06:33 com.swype.android.inputmethod drwxr-x--x 3 10013 10013 4096 Apr 23 05:50 com.tat.livewallpaper.aurora drwxr-x--x 3 10047 10047 4096 Apr 23 05:50 com.tat.livewallpaper.beach drwxr-x--x 3 10064 10064 4096 Apr 23 05:51 com.tat.livewallpaper.bluesea drwxr-x--x 3 10027 10027 4096 Apr 23 05:50 com.tf.thinkdroid.samsung drwxr-x--x 6 10113 10113 4096 Apr 23 06:53 com.thedeck.android.app drwxr-x--x 3 1001 1001 4096 Apr 23 05:50 com.wipereceiver drwxr-x--x 3 10020 10020 4096 Apr 23 05:50 com.wsomacp drwxr-x--x 3 1000 1000 4096 Apr 23 05:51 com.wssnps drwxr-x--x 3 1000 1000 4096 Apr 23 05:50 com.wssyncmldm drwxr-x--x 4 10108 10108 4096 Apr 23 06:57 com.zegoggles.smssync drwxr-x--x 3 10091 10091 4096 Apr 23 05:51 de.Fr4gg0r.SGS.Tools drwxr-x--x 3 10115 10115 4096 Apr 23 06:09 de.barcoo.android drwxr-x--x 3 10116 10116 4096 Apr 23 06:09 de.heise.android.heiseonlineapp drwxr-x--x 3 10117 10117 4096 Apr 23 06:10 de.schildbach.oeffi drwxr-x--x 3 10030 10030 4096 Apr 23 05:50 eu.chainfire.cfroot.cwmmanager drwxr-x--x 4 10089 10089 4096 Apr 23 05:54 eu.chainfire.cfroot.ext4manager drwxr-x--x 3 10054 10054 4096 Apr 23 05:50 eu.chainfire.cfroot.tweakmanager drwxr-x--x 3 10111 10111 4096 Apr 23 06:09 jackpal.androidterm drwxr-x--x 3 10096 10096 4096 Apr 23 06:06 lysesoft.andexplorer drwxr-x--x 3 10101 10101 4096 Apr 23 06:07 mobi.mgeek.TunnyBrowser drwxr-x--x 3 10098 10098 4096 Apr 23 06:06 net.jimblackler.newswidget drwxr-x--x 4 10015 10015 4096 Apr 23 05:51 net.thinkindifferent.inputmethod.latin drwxr-x--x 3 10106 10106 4096 Apr 23 06:08 org.leo.android.dict drwxr-x--x 3 10099 10099 4096 Apr 23 06:06 ru.org.amip.ClockSync drwxr-x--x 3 10083 10083 4096 Apr 23 05:51 ymst.android.homeswitcherfroyo
recovery partition
can anyone tell me what the recovery partition in relation to mmcblk0***? When I run df there is dev, mnt, system, cache, data, factory, storage, emulated x4 and that is it. I would think that there would be a recovery partition as well. Perhaps it is the one labeled "factory". I dont think it is though because it is showing as only 1.9M. I am trying to replace the recovery partition with dd because I cant get fastboot to work for some reason. I am using linux and adb works fine. Also I dont have root yet which is what I am trying to do now. Code: df Filesystem Size Used Free Blksize /dev 478.6M 68.0K 478.6M 4096 /sys/fs/cgroup 478.6M 0.0K 478.6M 4096 /sys/fs/cgroup/memory: Permission denied /mnt 478.6M 0.0K 478.6M 4096 /system 991.9M 925.9M 66.0M 4096 /cache 248.0M 3.0M 244.9M 4096 /data 5.8G 1.3G 4.5G 4096 /factory 1.9M 152.0K 1.7M 4096 /storage 478.6M 0.0K 478.6M 4096 /mnt/runtime/default/emulated: Permission denied /storage/emulated 5.8G 1.3G 4.5G 4096 /mnt/runtime/read/emulated: Permission denied /mnt/runtime/write/emulated: Permission denied Code: cat /proc/partitions major minor #blocks name 179 0 7634944 mmcblk0 179 1 16384 mmcblk0p1 179 2 16384 mmcblk0p2 179 3 16384 mmcblk0p3 179 4 6144 mmcblk0p4 179 5 4096 mmcblk0p5 179 6 4096 mmcblk0p6 179 7 1024 mmcblk0p7 179 8 16384 mmcblk0p8 179 9 262144 mmcblk0p9 259 0 1048576 mmcblk0p10 259 1 6243291 mmcblk0p11 179 30 4096 mmcblk0rpmb 179 20 4096 mmcblk0boot1 179 10 4096 mmcblk0boot0 253 0 102400 zram0
Software Problems in my Redmi 2 2014818 - HardBrick
Hello, This story started few days ago I am having REDMI 2 (2014818) and was using it On Lolipop Rom MIUI 7 Of REDMI 2 PRIME(because of VoLTE) with TWRP 3.0 then after I wanted to downgrade to 4.4 of Redmi 2 4G Rom. So I flashed using Mi Flash Tool Latest but it's results was bad and flash failed with error showing missing file and after that by mistake I flashed Mi Note 4G rom in confusion it also showed error and the situation was :- * Phone was not Booting up * Not Response of Power Button * No Response Of charging * Can't Access FASTBOOT or Recovery * No Reaction when it was attached to PC - Basically my phone was Hard Bricked. So I went through it and attached a wire in NEW TESTPOINT and it started Dedecting in PC with battery only as - °Qualcomm HS-USB QDLoader 9008" in task Manger. I am using Windows 7 32bit with Driver enforcement Disabled So I proceeded for flashing via latest Mi Flash Tool (2016.08.30.0) and Latest Redmi 2 Global Stable FastBoot Rom (MIUI 8) First I flashed and Got Error of "Ping Target Failed" and when I retried 2nd time I Got Error "cannot receive hello packet" I tried many times, Restarted Pc, changed pc, ran as administrator etc but nothing helped. So, secondly I gave a try with old MI Flash Tool (2015.10.28.0) with Latest Redmi 2 Global Stable FastBoot Rom (MIUI 8) First I got error of "reached the end of file . . . . . " and when I retried the error came like instalation can't perform waiting device . . . . And at Bottom It was Flashing device Busy and a Disable Driver Signature enforcement Popup came tried that also but nothing worked. I am Attaching log of Latest MI flash Tool. The I tried Snapdragon flash tool But that also not worked. I have attached the screen shot. Now Finally I need your help to get My phone Life back and I can't sent it to service center because it is out of warranty and they will go for Motherboard replacement which is costly. I have tried my best to solve it but I failed please help me. ---------------------------------------- Log Files *Error = Ping Target Failed [0.03 COM20]:[COM20]:start flash. [0.05 COM20]:received hello packet [0.05 COM20]:donwload programmer C:\ROM\MIUI\images\MPRG8916.mbn [0.05 COM20]:sahara read data:imgID 13, offset 0,length 52 [0.05 COM20]:sahara read data:imgID 13, offset 52,length 96 [0.05 COM20]:sahara read data:imgID 13, offset 4096,length 4096 [0.56 COM20]:sahara read data:imgID 13, offset 8192,length 2440 [0.56 COM20]:sahara read data:imgID 13, offset 12288,length 4096 [0.56 COM20]:sahara read data:imgID 13, offset 16384,length 4096 [0.56 COM20]:sahara read data:imgID 13, offset 20480,length 4096 [0.56 COM20]:sahara read data:imgID 13, offset 24576,length 4096 [0.56 COM20]:sahara read data:imgID 13, offset 28672,length 4096 [0.56 COM20]:sahara read data:imgID 13, offset 32768,length 4096 [0.56 COM20]:sahara read data:imgID 13, offset 36864,length 4096 [0.56 COM20]:sahara read data:imgID 13, offset 40960,length 4096 [0.58 COM20]:sahara read data:imgID 13, offset 45056,length 4096 [0.58 COM20]:sahara read data:imgID 13, offset 49152,length 4096 [0.58 COM20]:sahara read data:imgID 13, offset 53248,length 3572 [1.09 COM20]:sahara read end imgID:13 status:0 [1.09 COM20]:Send done packet [1.09 COM20]:file C:\ROM\MIUI\images\MPRG8916.mbn transferred successfully [2.11 COM20]:send nop command [2.11 COM20]:send command:<?xml version="1.0" ?><data><nop verbose="0" value="ping"/></data> [2.11 COM20]:get response from target [4.17 COM20]:dump: [4.17 COM20]:no Binary dump [6.74 COM20]:dump: [6.74 COM20]:no Binary dump [9.31 COM20]:dump: [9.31 COM20]:no Binary dump [11.89 COM20]:dump: [11.89 COM20]:no Binary dump [14.46 COM20]:dump: [14.46 COM20]:no Binary dump [14.98 COM20]ing target failed ----------------------- *Error = Cannot Receive hello packets [0.00 COM20]:[COM20]:start flash. [2.06 COM20]:cannot receive hello packet,MiFlash is trying to reset status! [4.63 COM20]:cannot receive hello packet,MiFlash is trying to reset status! [7.21 COM20]:try to reset status. [9.27 COM20]:Switch mode back [9.27 COM20]:cannot receive hello packet,MiFlash is trying to reset status! [11.84 COM20]:try to reset status. [13.90 COM20]:Switch mode back [13.90 COM20]:cannot receive hello packet,MiFlash is trying to reset status! [16.47 COM20]:try to reset status. [18.53 COM20]:Switch mode back [18.53 COM20]:cannot receive hello packet
It can fix but cause money Hardbrick is also happen to me when i changed CM13 to MIUI8... This is happen because you erase boot in the phone's ROM. That contain boot file to start Rom, Fastboot, Charging and Recovery...... So ,the phone cannot fix with any software..... You need to change you phone's hardware ROM or motherboard to fix this.... So, go to nearest MI service center. you need to pay money even have warranty...
[email protected] said: Hardbrick is also happen to me when i changed CM13 to MIUI8... This is happen because you erase boot in the phone's ROM. That contain boot file to start Rom, Fastboot, Charging and Recovery...... So ,the phone cannot fix with any software..... You need to change you phone's hardware ROM or motherboard to fix this.... So, go to nearest MI service center. you need to pay money even have warranty... Click to expand... Click to collapse First off all thnx for reply. Bro I can see my phone is connected as Qualcomm..... In my taskmanager
U need to use QFIL METHOD...
The Hard Gamer said: U need to use QFIL METHOD... Click to expand... Click to collapse Any guide for that
http://forum.gsmdevelopers.com/f78/xiaomi-redmi2-2014818-dead-boot-repair-unbrick-done-1477/
The Hard Gamer said: http://forum.gsmdevelopers.com/f78/xiaomi-redmi2-2014818-dead-boot-repair-unbrick-done-1477/ Click to expand... Click to collapse Brothers I am using this method only.. And facing these issues
Wait I will find ---------- Post added at 03:40 AM ---------- Previous post was at 03:39 AM ---------- Did u use QFIL ---------- Post added at 03:41 AM ---------- Previous post was at 03:40 AM ---------- Cause I recovers my phone using it Mi flash tool gave errors as u got
The Hard Gamer said: Wait I will find ---------- Post added at 03:40 AM ---------- Previous post was at 03:39 AM ---------- Did u use QFIL ---------- Post added at 03:41 AM ---------- Previous post was at 03:40 AM ---------- Cause I recovers my phone using it Mi flash tool gave errors as u got Click to expand... Click to collapse Thnx Bro I have sent u PM with more details kindly check it
try pressing volume up and volume down button simultaneously then connect USB(phone will detect as COM device in mi flash) if drivers are updating skip windows driver update Flash fast boot rom Use Mi flash 20151028 (google it)
Use old MiFlash version and it works See the thread "thread-354050-1-1.html" on en.miui.com (form the URL yourself using en.miui.com and the thread name given) Use old miflash version. I had exact same problem and the above thread worked for me
U can easily switch to Lp miui to Kk miui with 50mb fimrwares flashing through twrp ?. No need of mi flash tool. I have uploaded the firmwares to my drive. Miui Lp (for volte...kk won't work) - https://drive.google.com/file/d/0Bw3_QwnI11oUTlZ3TTM5S3NOQ2M/view?usp=drivesdk Miui Kk Firmware, after flashing from twrp clean rom and install miui kk to get booted up (volte will not work) in custom roms - https://drive.google.com/file/d/0Bw3_QwnI11oUUzhtQ3JucUdQRnc/view?usp=drivesdk
[solved] Bricked a2017 chinese
Hi Guys, I think I ended up bricking my Chinese A2017: After following step Step 8a: to flash twrp-3.0.4-0-ailsa_ii.img, described in this forum https://forum.xda-developers.com/axon-7/how-to/guide-b13-chinese-a2017-root-unlock-t3549873 I haven't been able to boot recovery again, not even using Axon7root.exe -p N to flash it again. I had the Chinese bootstack B10 and B29 US version installed working flawlessly, so I tried from EDL: Using Miflash 2016.12.22: Flashing FASTBOOT_UNLOCK and then B29_TWRP (Marshmallow): https://forum.xda-developers.com/axon-7/development/edl-emergency-dl-mode-twrp-unlock-t3553514 I think this made the boot image unbootable from my Chinese model, when I switch the phone on, ZTE logo appears , but I can't boot my system or recovery anymore, I'm stuck on EDL. There is another thread that I thought, would have worked: https://forum.xda-developers.com/axon-7/development/axon7-official-firmware-version-b07-cn-t3551590 I checked the MD5 listed in the post, and started flashing, however, after some seconds flash failed: ERROR_BAD_FORMAT 0 This is Mi Flash log [0:37:03 COM3]:MiFlash 2016.12.22.0(Release) [0:37:03 COM3]:[COM3]:start flash. [0:37:03 COM3]:received hello packet [0:37:03 COM3]:download programmer A:\New folder\prog_ufs_firehose_8996_ddr.elf [0:37:03 COM3]:sahara read 64b data:imgID 13,offset 0,length 64 [0:37:03 COM3]:sahara read 64b data:imgID 13,offset 64,length 560 [0:37:03 COM3]:sahara read 64b data:imgID 13,offset 4096,length 4096 [0:37:04 COM3]:sahara read 64b data:imgID 13,offset 8192,length 2664 [0:37:04 COM3]:sahara read 64b data:imgID 13,offset 12288,length 4096 [0:37:04 COM3]:sahara read 64b data:imgID 13,offset 16384,length 4096 [0:37:04 COM3]:sahara read 64b data:imgID 13,offset 20480,length 4096 [0:37:04 COM3]:sahara read 64b data:imgID 13,offset 24576,length 4096 [0:37:04 COM3]:sahara read 64b data:imgID 13,offset 28672,length 4096 [0:37:04 COM3]:sahara read 64b data:imgID 13,offset 32768,length 4096 [0:37:04 COM3]:sahara read 64b data:imgID 13,offset 36864,length 4096 [0:37:04 COM3]:sahara read 64b data:imgID 13,offset 40960,length 4096 [0:37:04 COM3]:sahara read 64b data:imgID 13,offset 45056,length 4096 [0:37:04 COM3]:sahara read 64b data:imgID 13,offset 49152,length 4096 [0:37:04 COM3]:sahara read 64b data:imgID 13,offset 53248,length 4096 [0:37:04 COM3]:sahara read 64b data:imgID 13,offset 57344,length 4096 [0:37:05 COM3]:sahara read 64b data:imgID 13,offset 61440,length 4096 [0:37:05 COM3]:sahara read 64b data:imgID 13,offset 65536,length 4096 [0:37:05 COM3]:sahara read 64b data:imgID 13,offset 69632,length 4096 [0:37:05 COM3]:sahara read 64b data:imgID 13,offset 73728,length 4096 [0:37:05 COM3]:sahara read 64b data:imgID 13,offset 77824,length 4096 [0:37:05 COM3]:sahara read 64b data:imgID 13,offset 81920,length 4096 [0:37:05 COM3]:sahara read 64b data:imgID 13,offset 86016,length 4096 [0:37:05 COM3]:sahara read 64b data:imgID 13,offset 90112,length 4096 [0:37:05 COM3]:sahara read 64b data:imgID 13,offset 94208,length 4096 [0:37:05 COM3]:sahara read 64b data:imgID 13,offset 98304,length 4096 [0:37:05 COM3]:sahara read 64b data:imgID 13,offset 102400,length 4096 [0:37:05 COM3]:sahara read 64b data:imgID 13,offset 106496,length 4096 [0:37:06 COM3]:sahara read 64b data:imgID 13,offset 110592,length 4096 [0:37:06 COM3]:sahara read 64b data:imgID 13,offset 114688,length 4096 [0:37:06 COM3]:sahara read 64b data:imgID 13,offset 118784,length 4096 [0:37:06 COM3]:sahara read 64b data:imgID 13,offset 122880,length 4096 [0:37:06 COM3]:sahara read 64b data:imgID 13,offset 126976,length 4096 [0:37:06 COM3]:sahara read 64b data:imgID 13,offset 131072,length 4096 [0:37:06 COM3]:sahara read 64b data:imgID 13,offset 135168,length 4096 [0:37:06 COM3]:sahara read 64b data:imgID 13,offset 139264,length 4096 [0:37:06 COM3]:sahara read 64b data:imgID 13,offset 143360,length 4096 [0:37:06 COM3]:sahara read 64b data:imgID 13,offset 147456,length 4096 [0:37:07 COM3]:sahara read 64b data:imgID 13,offset 151552,length 4096 [0:37:07 COM3]:sahara read 64b data:imgID 13,offset 155648,length 4096 [0:37:07 COM3]:sahara read 64b data:imgID 13,offset 159744,length 4096 [0:37:07 COM3]:sahara read 64b data:imgID 13,offset 163840,length 4096 [0:37:07 COM3]:sahara read 64b data:imgID 13,offset 167936,length 4096 [0:37:07 COM3]:sahara read 64b data:imgID 13,offset 172032,length 4096 [0:37:07 COM3]:sahara read 64b data:imgID 13,offset 176128,length 4096 [0:37:07 COM3]:sahara read 64b data:imgID 13,offset 180224,length 4096 [0:37:07 COM3]:sahara read 64b data:imgID 13,offset 184320,length 4096 [0:37:07 COM3]:sahara read 64b data:imgID 13,offset 188416,length 4096 [0:37:07 COM3]:sahara read 64b data:imgID 13,offset 192512,length 4096 [0:37:08 COM3]:sahara read 64b data:imgID 13,offset 196608,length 4096 [0:37:08 COM3]:sahara read 64b data:imgID 13,offset 200704,length 4096 [0:37:08 COM3]:sahara read 64b data:imgID 13,offset 204800,length 4096 [0:37:08 COM3]:sahara read 64b data:imgID 13,offset 208896,length 4096 [0:37:08 COM3]:sahara read 64b data:imgID 13,offset 212992,length 4096 [0:37:08 COM3]:sahara read 64b data:imgID 13,offset 217088,length 4096 [0:37:08 COM3]:sahara read 64b data:imgID 13,offset 221184,length 4096 [0:37:08 COM3]:sahara read 64b data:imgID 13,offset 225280,length 4096 [0:37:08 COM3]:sahara read 64b data:imgID 13,offset 229376,length 4096 [0:37:08 COM3]:sahara read 64b data:imgID 13,offset 233472,length 4096 [0:37:08 COM3]:sahara read 64b data:imgID 13,offset 237568,length 4096 [0:37:09 COM3]:sahara read 64b data:imgID 13,offset 241664,length 4096 [0:37:09 COM3]:sahara read 64b data:imgID 13,offset 245760,length 4096 [0:37:09 COM3]:sahara read 64b data:imgID 13,offset 249856,length 4096 [0:37:09 COM3]:sahara read 64b data:imgID 13,offset 253952,length 4096 [0:37:09 COM3]:sahara read 64b data:imgID 13,offset 258048,length 4096 [0:37:09 COM3]:sahara read 64b data:imgID 13,offset 262144,length 4096 [0:37:10 COM3]:sahara read 64b data:imgID 13,offset 266240,length 4096 [0:37:10 COM3]:sahara read 64b data:imgID 13,offset 270336,length 4096 [0:37:10 COM3]:sahara read 64b data:imgID 13,offset 274432,length 4096 [0:37:10 COM3]:sahara read 64b data:imgID 13,offset 278528,length 4096 [0:37:10 COM3]:sahara read 64b data:imgID 13,offset 282624,length 4096 [0:37:11 COM3]:sahara read 64b data:imgID 13,offset 286720,length 4096 [0:37:11 COM3]:sahara read 64b data:imgID 13,offset 290816,length 4096 [0:37:11 COM3]:sahara read 64b data:imgID 13,offset 294912,length 4096 [0:37:11 COM3]:sahara read 64b data:imgID 13,offset 299008,length 4096 [0:37:11 COM3]:sahara read 64b data:imgID 13,offset 303104,length 4096 [0:37:12 COM3]:sahara read 64b data:imgID 13,offset 307200,length 4096 [0:37:12 COM3]:sahara read 64b data:imgID 13,offset 311296,length 4096 [0:37:12 COM3]:sahara read 64b data:imgID 13,offset 315392,length 4096 [0:37:12 COM3]:sahara read 64b data:imgID 13,offset 319488,length 4096 [0:37:12 COM3]:sahara read 64b data:imgID 13,offset 323584,length 4096 [0:37:12 COM3]:sahara read 64b data:imgID 13,offset 327680,length 4096 [0:37:12 COM3]:sahara read 64b data:imgID 13,offset 331776,length 4096 [0:37:12 COM3]:sahara read 64b data:imgID 13,offset 335872,length 4096 [0:37:12 COM3]:sahara read 64b data:imgID 13,offset 339968,length 2784 [0:37:12 COM3]:sahara read 64b data:imgID 13,offset 342752,length 4096 [0:37:12 COM3]:sahara read 64b data:imgID 13,offset 346848,length 4096 [0:37:12 COM3]:sahara read 64b data:imgID 13,offset 350944,length 4096 [0:37:13 COM3]:sahara read 64b data:imgID 13,offset 355040,length 4096 [0:37:13 COM3]:sahara read 64b data:imgID 13,offset 359136,length 4096 [0:37:13 COM3]:sahara read 64b data:imgID 13,offset 363232,length 4096 [0:37:13 COM3]:sahara read 64b data:imgID 13,offset 367328,length 3656 [0:37:13 COM3]:sahara read 64b data:imgID 13,offset 370992,length 4096 [0:37:13 COM3]:sahara read 64b data:imgID 13,offset 375088,length 4096 [0:37:13 COM3]:sahara read 64b data:imgID 13,offset 379184,length 2032 [0:37:13 COM3]:sahara read 64b data:imgID 13,offset 381216,length 4096 [0:37:13 COM3]:sahara read 64b data:imgID 13,offset 385312,length 4096 [0:37:13 COM3]:sahara read 64b data:imgID 13,offset 389408,length 4096 [0:37:14 COM3]:sahara read 64b data:imgID 13,offset 393504,length 4048 [0:37:14 COM3]:sahara read 64b data:imgID 13,offset 397552,length 4096 [0:37:14 COM3]:sahara read 64b data:imgID 13,offset 401648,length 4096 [0:37:14 COM3]:sahara read 64b data:imgID 13,offset 405744,length 4096 [0:37:14 COM3]:sahara read 64b data:imgID 13,offset 409840,length 4096 [0:37:14 COM3]:sahara read 64b data:imgID 13,offset 413936,length 4096 [0:37:14 COM3]:sahara read 64b data:imgID 13,offset 418032,length 4096 [0:37:14 COM3]:sahara read 64b data:imgID 13,offset 422128,length 4096 [0:37:14 COM3]:sahara read 64b data:imgID 13,offset 426224,length 4096 [0:37:14 COM3]:sahara read 64b data:imgID 13,offset 430320,length 4096 [0:37:15 COM3]:sahara read 64b data:imgID 13,offset 434416,length 4096 [0:37:15 COM3]:sahara read 64b data:imgID 13,offset 438512,length 4004 [0:37:15 COM3]:sahara read end imgID:13 status:0 [0:37:15 COM3]:Send done packet [0:37:15 COM3]:file A:\New folder\prog_ufs_firehose_8996_ddr.elf transferred successfully [0:37:16 COM3]:send nop command [0:37:16 COM3]:send command:<?xml version="1.0" ?><data><nop verbose="0" value="ping"/></data> [0:37:17 COM3]:get response from target [0:37:17 COM3]:dump: [0:37:17 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <log value="Supported Functions: program configure nop firmwarewrite patch setbootablestoragedrive ufs emmc power benchmark read getstorageinfo getsha256digest erase peek poke getnumdisksectors "/> </data> [0:37:17 COM3]:dump: [0:37:17 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <log value="Supported Functions: program configure nop firmwarewrite patch setbootablestoragedrive ufs emmc power benchmark read getstorageinfo getsha256digest erase peek poke getnumdisksectors "/> </data><?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" /> </data> [0:37:18 COM3]:send configure command [0:37:18 COM3]:send command:<?xml version="1.0" ?><data><configure verbose="0" ZlpAwareHost="1" MaxPayloadSizeToTargetInBytes="1048576" MemoryName="ufs" SkipStorageInit="1"/></data> [0:37:18 COM3]:get response from target [0:37:18 COM3]:dump: [0:37:18 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" MinVersionSupported="1" MemoryName="UFS" MaxPayloadSizeFromTargetInBytes="4096" MaxPayloadSizeToTargetInBytes="1048576" MaxPayloadSizeToTargetInBytesSupported="1048576" MaxXMLSizeInBytes="4096" Version="1" TargetName="MSM8996" DateTime="Jul 22 2016 - 05:25:12" /> </data> [0:37:19 COM3]:max buffer sector is 256 [0:37:19 COM3]:start provision:A:\New folder\provision_samsung.xml [0:37:19 COM3]:send command:<?xml version="1.0" ?> <data> <ufs bNumberLU="6" bBootEnable="1" bDescrAccessEn="0" bInitPowerMode="1" bHighPriorityLUN="0x5" bSecureRemovalType="0" bInitActiveICCLevel="0" wPeriodicRTCUpdate="0" bConfigDescrLock="0" /> </data> [0:37:19 COM3]:get response from target [0:37:19 COM3]:dump: [0:37:19 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <log value="bNumberLU=6 bBootEnable=1 bDescrAccessEn=0 bInitPowerMode=1 bHighPriorityLUN=5 bSecureRemovalType=0 bInitActiveICCLevel=0 wPeriodicRTCUpdate=0 bConfigDescrLock=0 " /> </data><?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" /> </data> [0:37:20 COM3]:send command:<?xml version="1.0" ?> <data> <ufs LUNum="0" bLUEnable="1" bBootLunID="0" size_in_kb="25141248" bDataReliability="0" bLUWriteProtect="0" bMemoryType="0" bLogicalBlockSize="0x0c" bProvisioningType="2" wContextCapabilities="0" /> </data> [0:37:20 COM3]:get response from target [0:37:20 COM3]:dump: [0:37:20 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <log value="LUNum=0 bLUEnable=1 bBootLunID=0 bLUWriteProtect=0 bMemoryType=0 size_in_KB=25141248 bDataReliability=0 bLogicalBlockSize=12 bProvisioningType=2 wContextCapabilities=0 " /> </data><?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" /> </data> [0:37:21 COM3]:send command:<?xml version="1.0" ?> <data> <ufs LUNum="1" bLUEnable="1" bBootLunID="1" size_in_kb="4096" bDataReliability="0" bLUWriteProtect="1" bMemoryType="3" bLogicalBlockSize="0x0c" bProvisioningType="2" wContextCapabilities="0" /> </data> [0:37:21 COM3]:get response from target [0:37:21 COM3]:dump: [0:37:21 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <log value="LUNum=1 bLUEnable=1 bBootLunID=1 bLUWriteProtect=1 bMemoryType=3 size_in_KB=4096 bDataReliability=0 bLogicalBlockSize=12 bProvisioningType=2 wContextCapabilities=0 " /> </data><?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" /> </data> [0:37:22 COM3]:send command:<?xml version="1.0" ?> <data> <ufs LUNum="2" bLUEnable="1" bBootLunID="2" size_in_kb="4096" bDataReliability="0" bLUWriteProtect="1" bMemoryType="3" bLogicalBlockSize="0x0c" bProvisioningType="2" wContextCapabilities="0" /> </data> [0:37:22 COM3]:get response from target [0:37:22 COM3]:dump: [0:37:22 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <log value="LUNum=2 bLUEnable=1 bBootLunID=2 bLUWriteProtect=1 bMemoryType=3 size_in_KB=4096 bDataReliability=0 bLogicalBlockSize=12 bProvisioningType=2 wContextCapabilities=0 " /> </data><?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" /> </data> [0:37:23 COM3]:send command:<?xml version="1.0" ?> <data> <ufs LUNum="3" bLUEnable="1" bBootLunID="0" size_in_kb="4096" bDataReliability="0" bLUWriteProtect="1" bMemoryType="0" bLogicalBlockSize="0x0c" bProvisioningType="2" wContextCapabilities="0" /> </data> [0:37:23 COM3]:get response from target [0:37:23 COM3]:dump: [0:37:23 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <log value="LUNum=3 bLUEnable=1 bBootLunID=0 bLUWriteProtect=1 bMemoryType=0 size_in_KB=4096 bDataReliability=0 bLogicalBlockSize=12 bProvisioningType=2 wContextCapabilities=0 " /> </data><?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" /> </data> [0:37:24 COM3]:send command:<?xml version="1.0" ?> <data> <ufs LUNum="4" bLUEnable="1" bBootLunID="0" size_in_kb="6656000" bDataReliability="0" bLUWriteProtect="1" bMemoryType="0" bLogicalBlockSize="0x0c" bProvisioningType="2" wContextCapabilities="0" /> </data> [0:37:24 COM3]:get response from target [0:37:24 COM3]:dump: [0:37:24 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <log value="LUNum=4 bLUEnable=1 bBootLunID=0 bLUWriteProtect=1 bMemoryType=0 size_in_KB=6656000 bDataReliability=0 bLogicalBlockSize=12 bProvisioningType=2 wContextCapabilities=0 " /> </data><?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" /> </data> [0:37:25 COM3]:send command:<?xml version="1.0" ?> <data> <ufs LUNum="5" bLUEnable="1" bBootLunID="0" size_in_kb="40960" bDataReliability="0" bLUWriteProtect="0" bMemoryType="0" bLogicalBlockSize="0x0c" bProvisioningType="2" wContextCapabilities="0" /> </data> [0:37:25 COM3]:get response from target [0:37:25 COM3]:dump: [0:37:25 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <log value="LUNum=5 bLUEnable=1 bBootLunID=0 bLUWriteProtect=0 bMemoryType=0 size_in_KB=40960 bDataReliability=0 bLogicalBlockSize=12 bProvisioningType=2 wContextCapabilities=0 " /> </data><?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" /> </data> [0:37:26 COM3]:send command:<?xml version="1.0" ?> <data> <ufs LUNum="6" bLUEnable="0" bBootLunID="0" size_in_kb="0" bDataReliability="0" bLUWriteProtect="0" bMemoryType="0" bLogicalBlockSize="0x0c" bProvisioningType="0" wContextCapabilities="0" /> </data> [0:37:26 COM3]:get response from target [0:37:26 COM3]:dump: [0:37:26 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <log value="LUNum=6 bLUEnable=0 bBootLunID=0 bLUWriteProtect=0 bMemoryType=0 size_in_KB=0 bDataReliability=0 bLogicalBlockSize=12 bProvisioningType=0 wContextCapabilities=0 " /> </data><?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" /> </data> [0:37:27 COM3]:send command:<?xml version="1.0" ?> <data> <ufs LUNum="7" bLUEnable="0" bBootLunID="0" size_in_kb="0" bDataReliability="0" bLUWriteProtect="0" bMemoryType="0" bLogicalBlockSize="0x0c" bProvisioningType="0" wContextCapabilities="0" /> </data> [0:37:27 COM3]:get response from target [0:37:27 COM3]:dump: [0:37:27 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <log value="LUNum=7 bLUEnable=0 bBootLunID=0 bLUWriteProtect=0 bMemoryType=0 size_in_KB=0 bDataReliability=0 bLogicalBlockSize=12 bProvisioningType=0 wContextCapabilities=0 " /> </data><?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" /> </data> [0:37:28 COM3]:send command:<?xml version="1.0" ?> <data> <ufs LUNtoGrow="0" commit="1" /> </data> [0:37:28 COM3]:get response from target [0:37:29 COM3]:dump: [0:37:29 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" /> </data> [0:37:29 COM3]rovision done. [0:37:29 COM3]:restart target [0:37:29 COM3]:send command:<?xml version="1.0" ?><data><power verbose="0" value="reset_to_edl"/></data> [0:37:29 COM3]:get response from target [0:37:30 COM3]:dump: [0:37:30 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" /> </data> [0:37:31 COM3]:waiting for COM3 restart [0:37:31 COM3]:COM3 restart successfully [0:37:33 COM3]:[COM3]:start flash. [0:37:33 COM3]:received hello packet [0:37:33 COM3]:download programmer A:\New folder\prog_ufs_firehose_8996_ddr.elf [0:37:33 COM3]:sahara read 64b data:imgID 13,offset 0,length 64 [0:37:33 COM3]:sahara read 64b data:imgID 13,offset 64,length 560 [0:37:33 COM3]:sahara read 64b data:imgID 13,offset 4096,length 4096 [0:37:33 COM3]:sahara read 64b data:imgID 13,offset 8192,length 2664 [0:37:33 COM3]:sahara read 64b data:imgID 13,offset 12288,length 4096 [0:37:33 COM3]:sahara read 64b data:imgID 13,offset 16384,length 4096 [0:37:33 COM3]:sahara read 64b data:imgID 13,offset 20480,length 4096 [0:37:33 COM3]:sahara read 64b data:imgID 13,offset 24576,length 4096 [0:37:33 COM3]:sahara read 64b data:imgID 13,offset 28672,length 4096 [0:37:33 COM3]:sahara read 64b data:imgID 13,offset 32768,length 4096 [0:37:34 COM3]:sahara read 64b data:imgID 13,offset 36864,length 4096 [0:37:34 COM3]:sahara read 64b data:imgID 13,offset 40960,length 4096 [0:37:34 COM3]:sahara read 64b data:imgID 13,offset 45056,length 4096 [0:37:34 COM3]:sahara read 64b data:imgID 13,offset 49152,length 4096 [0:37:34 COM3]:sahara read 64b data:imgID 13,offset 53248,length 4096 [0:37:34 COM3]:sahara read 64b data:imgID 13,offset 57344,length 4096 [0:37:34 COM3]:sahara read 64b data:imgID 13,offset 61440,length 4096 [0:37:34 COM3]:sahara read 64b data:imgID 13,offset 65536,length 4096 [0:37:34 COM3]:sahara read 64b data:imgID 13,offset 69632,length 4096 [0:37:34 COM3]:sahara read 64b data:imgID 13,offset 73728,length 4096 [0:37:34 COM3]:sahara read 64b data:imgID 13,offset 77824,length 4096 [0:37:34 COM3]:sahara read 64b data:imgID 13,offset 81920,length 4096 [0:37:35 COM3]:sahara read 64b data:imgID 13,offset 86016,length 4096 [0:37:35 COM3]:sahara read 64b data:imgID 13,offset 90112,length 4096 [0:37:35 COM3]:sahara read 64b data:imgID 13,offset 94208,length 4096 [0:37:35 COM3]:sahara read 64b data:imgID 13,offset 98304,length 4096 [0:37:35 COM3]:sahara read 64b data:imgID 13,offset 102400,length 4096 [0:37:35 COM3]:sahara read 64b data:imgID 13,offset 106496,length 4096 [0:37:35 COM3]:sahara read 64b data:imgID 13,offset 110592,length 4096 [0:37:35 COM3]:sahara read 64b data:imgID 13,offset 114688,length 4096 [0:37:35 COM3]:sahara read 64b data:imgID 13,offset 118784,length 4096 [0:37:35 COM3]:sahara read 64b data:imgID 13,offset 122880,length 4096 [0:37:35 COM3]:sahara read 64b data:imgID 13,offset 126976,length 4096 [0:37:35 COM3]:sahara read 64b data:imgID 13,offset 131072,length 4096 [0:37:35 COM3]:sahara read 64b data:imgID 13,offset 135168,length 4096 [0:37:35 COM3]:sahara read 64b data:imgID 13,offset 139264,length 4096 [0:37:36 COM3]:sahara read 64b data:imgID 13,offset 143360,length 4096 [0:37:36 COM3]:sahara read 64b data:imgID 13,offset 147456,length 4096 [0:37:36 COM3]:sahara read 64b data:imgID 13,offset 151552,length 4096 [0:37:36 COM3]:sahara read 64b data:imgID 13,offset 155648,length 4096 [0:37:36 COM3]:sahara read 64b data:imgID 13,offset 159744,length 4096 [0:37:36 COM3]:sahara read 64b data:imgID 13,offset 163840,length 4096 [0:37:36 COM3]:sahara read 64b data:imgID 13,offset 167936,length 4096 [0:37:36 COM3]:sahara read 64b data:imgID 13,offset 172032,length 4096 [0:37:36 COM3]:sahara read 64b data:imgID 13,offset 176128,length 4096 [0:37:36 COM3]:sahara read 64b data:imgID 13,offset 180224,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 184320,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 188416,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 192512,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 196608,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 200704,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 204800,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 208896,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 212992,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 217088,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 221184,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 225280,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 229376,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 233472,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 237568,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 241664,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 245760,length 4096 [0:37:37 COM3]:sahara read 64b data:imgID 13,offset 249856,length 4096 [0:37:38 COM3]:sahara read 64b data:imgID 13,offset 253952,length 4096 [0:37:38 COM3]:sahara read 64b data:imgID 13,offset 258048,length 4096 [0:37:38 COM3]:sahara read 64b data:imgID 13,offset 262144,length 4096 [0:37:38 COM3]:sahara read 64b data:imgID 13,offset 266240,length 4096 [0:37:38 COM3]:sahara read 64b data:imgID 13,offset 270336,length 4096 [0:37:38 COM3]:sahara read 64b data:imgID 13,offset 274432,length 4096 [0:37:38 COM3]:sahara read 64b data:imgID 13,offset 278528,length 4096 [0:37:38 COM3]:sahara read 64b data:imgID 13,offset 282624,length 4096 [0:37:38 COM3]:sahara read 64b data:imgID 13,offset 286720,length 4096 [0:37:38 COM3]:sahara read 64b data:imgID 13,offset 290816,length 4096 [0:37:38 COM3]:sahara read 64b data:imgID 13,offset 294912,length 4096 [0:37:38 COM3]:sahara read 64b data:imgID 13,offset 299008,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 303104,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 307200,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 311296,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 315392,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 319488,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 323584,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 327680,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 331776,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 335872,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 339968,length 2784 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 342752,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 346848,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 350944,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 355040,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 359136,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 363232,length 4096 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 367328,length 3656 [0:37:39 COM3]:sahara read 64b data:imgID 13,offset 370992,length 4096 [0:37:40 COM3]:sahara read 64b data:imgID 13,offset 375088,length 4096 [0:37:40 COM3]:sahara read 64b data:imgID 13,offset 379184,length 2032 [0:37:40 COM3]:sahara read 64b data:imgID 13,offset 381216,length 4096 [0:37:40 COM3]:sahara read 64b data:imgID 13,offset 385312,length 4096 [0:37:40 COM3]:sahara read 64b data:imgID 13,offset 389408,length 4096 [0:37:41 COM3]:sahara read 64b data:imgID 13,offset 393504,length 4048 [0:37:41 COM3]:sahara read 64b data:imgID 13,offset 397552,length 4096 [0:37:41 COM3]:sahara read 64b data:imgID 13,offset 401648,length 4096 [0:37:41 COM3]:sahara read 64b data:imgID 13,offset 405744,length 4096 [0:37:41 COM3]:sahara read 64b data:imgID 13,offset 409840,length 4096 [0:37:41 COM3]:sahara read 64b data:imgID 13,offset 413936,length 4096 [0:37:41 COM3]:sahara read 64b data:imgID 13,offset 418032,length 4096 [0:37:41 COM3]:sahara read 64b data:imgID 13,offset 422128,length 4096 [0:37:41 COM3]:sahara read 64b data:imgID 13,offset 426224,length 4096 [0:37:41 COM3]:sahara read 64b data:imgID 13,offset 430320,length 4096 [0:37:41 COM3]:sahara read 64b data:imgID 13,offset 434416,length 4096 [0:37:41 COM3]:sahara read 64b data:imgID 13,offset 438512,length 4004 [0:37:42 COM3]:sahara read end imgID:13 status:0 [0:37:42 COM3]:Send done packet [0:37:42 COM3]:file A:\New folder\prog_ufs_firehose_8996_ddr.elf transferred successfully [0:37:43 COM3]:send nop command [0:37:43 COM3]:send command:<?xml version="1.0" ?><data><nop verbose="0" value="ping"/></data> [0:37:43 COM3]:get response from target [0:37:43 COM3]:dump: [0:37:43 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <log value="Supported Functions: program configure nop firmwarewrite patch setbootablestoragedrive ufs emmc power benchmark read getstorageinfo getsha256digest erase peek poke getnumdisksectors "/> </data> [0:37:44 COM3]:dump: [0:37:44 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <log value="Supported Functions: program configure nop firmwarewrite patch setbootablestoragedrive ufs emmc power benchmark read getstorageinfo getsha256digest erase peek poke getnumdisksectors "/> </data><?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" /> </data> [0:37:44 COM3]:send configure command [0:37:44 COM3]:send command:<?xml version="1.0" ?><data><configure verbose="0" ZlpAwareHost="1" MaxPayloadSizeToTargetInBytes="1048576" MemoryName="ufs" SkipStorageInit="0"/></data> [0:37:44 COM3]:get response from target [0:37:45 COM3]:dump: [0:37:45 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" MinVersionSupported="1" MemoryName="UFS" MaxPayloadSizeFromTargetInBytes="4096" MaxPayloadSizeToTargetInBytes="1048576" MaxPayloadSizeToTargetInBytesSupported="1048576" MaxXMLSizeInBytes="4096" Version="1" TargetName="MSM8996" DateTime="Jul 22 2016 - 05:25:12" /> </data> [0:37:45 COM3]:max buffer sector is 256 [0:37:45 COM3]:send command:<?xml version="1.0" ?><data><setbootablestoragedrive verbose="0" value="1"/></data> [0:37:45 COM3]:get response from target [0:37:46 COM3]:dump: [0:37:46 COM3]:<?xml version="1.0" encoding="UTF-8" ?> <data> <response value="ACK" /> </data> [0:37:46 COM3]:Set Boot Partition [0:37:46 COM3]pen program file A:\New folder\rawprogram0.xml [0:37:46 COM3]:Write file A:\New folder\devcfg.mbn to partition[devcfg] sector 205192 [0:37:46 COM3]:write file legnth 40008 to partition 205192 [0:37:46 COM3]:WriteFile position 0, size 40960 [0:37:46 COM3]:Image A:\New folder\devcfg.mbn transferred successfully [0:37:46 COM3]:Write sparse file A:\New folder\userdata.img to partition[userdata] sector 205512 [0:37:46 COM3]:ERROR_BAD_FORMAT 0 [0:37:46 COM3]:[0:37:46 COM3]:ERROR_BAD_FORMAT 0 [0:37:47 COM3]:flashSuccess False [0:37:47 COM3]:isFactory False CheckCPUID False [0:37:47 COM3]:before:flashSuccess is False set IsUpdate:True set IsDone True [0:37:47 COM3]:after:flashSuccess is False set IsUpdate:false set IsDone true Can you help me to check why no recovery image is usable? And furthermore, Why can't I flash the only full recovery image which should unbrick my phone? EDIT: I documented my solution in post #17: https://forum.xda-developers.com/showpost.php?p=71002693&postcount=17 Thanks a lot in advance!
I don't think you can flash twrp 3.0.4 with a locked bl. Try flashing signed twrp instead. Also, I don't think Miflash is compatible with your device but I could be wrong.
How to get signed TWRP? lafester said: I don't think you can flash twrp 3.0.4 with a locked bl. . Click to expand... Click to collapse I used TWRP and flash the IMG file, but that must be the problem. lafester said: Try flashing signed twrp instead.. Click to expand... Click to collapse But there is no Signed TWRP posted in XDA ¿Can someone PM me signed TWRP? Furthermore, how could I flash it if I only have EDL working? lafester said: Also, I don't think Miflash is compatible with your device but I could be wrong Click to expand... Click to collapse The thread AXON7 Official firmware Version B07 for US and CN, flash with miflash via 9008 port https://forum.xda-developers.com/axon-7/development/axon7-official-firmware-version-b07-cn-t3551590 Suggests something else, however, by following it, I ended up bricking, instead of unbricking my device. I can't post there, but I suggest you to warn others then. Thanks
https://forum.xda-developers.com/showthread.php?t=3441204
I'll give it a try! lafester said: https://forum.xda-developers.com/showthread.php?t=3441204 Click to expand... Click to collapse And which version should I try? the one for a2017 B10? (Which was my latest flashed bootstack) It isn't my lucky day... as currently, dev host's downloads aren't working http://d-h.st/aceq
I would start by only flashing twrp and unlocking.
lafester said: I would start by only flashing twrp and unlocking. Click to expand... Click to collapse Jus to be clear, do you mean, running a2017root-release-cn-b10.zip which (I think) flashes signed TWRP 3.0.2 Or flashing The image TWRP recovery 3.0.2-2 with miflash? I read that someone else asked about mirrors, and you @lafester answered that they were available in firmware thread. https://forum.xda-developers.com/showpost.php?p=70945594&postcount=919 I've been looking all over for them, but still the search engine didn't bring me back any results. Do you know where to download these? https://forum.xda-developers.com/axon-7/development/wip-axon-7-root-bootloader-unlokced-t3441204 thanks! regards
https://mega.nz/#F!kYtRAJjJ!5tD1zPpo0nw2tJwhANA9pQ!dVMjmayY Yes, I would use tenfar tool to flash twrp and then unlock. ---------- Post added at 03:09 PM ---------- Previous post was at 02:18 PM ---------- tokinger said: Jus to be clear, do you mean, running a2017root-release-cn-b10.zip which (I think) flashes signed TWRP 3.0.2 Or flashing The image TWRP recovery 3.0.2-2 with miflash? I read that someone else asked about mirrors, and you @lafester answered that they were available in firmware thread. https://forum.xda-developers.com/showpost.php?p=70945594&postcount=919 I've been looking all over for them, but still the search engine didn't bring me back any results. Do you know where to download these? https://forum.xda-developers.com/axon-7/development/wip-axon-7-root-bootloader-unlokced-t3441204 thanks! regards Click to expand... Click to collapse not sure what you mean by b10.zip. just flash twrp.
A2017_B13_BootStack_EDL https://mega.nz/#!gtRAQA4b!hHXczuQk1CkFQdLNYqjNbOjj54ehRkxGykHjsAiHSyA Flash my package, using miflash in edl mode. It also contains a full-functional fastboot! :good:
Dude I feel ya! I Have done the same, But after messing around i could flash recovery through fastboot "fastboot flash recovery twrp.img" and then flash the chinese boot again b11+ chinese system b11
parazite69 said: Dude I feel ya! I Have done the same, But after messing around i could flash recovery through fastboot "fastboot flash recovery twrp.img" and then flash the chinese boot again b11+ chinese system b11 Click to expand... Click to collapse As my bootloader is locked, it won't allow me to flash anything using fastboot: FAILED (remote: device is locked. Cannot erase)
djkuz said: A2017_B13_BootStack_EDL https://mega.nz/#!gtRAQA4b!hHXczuQk1CkFQdLNYqjNbOjj54ehRkxGykHjsAiHSyA Flash my package, using miflash in edl mode. It also contains a full-functional fastboot! :good: Click to expand... Click to collapse Ok, now I have a Chinese recovery and Fastboot. Fastboot won't work, as my bootloader is locked. I have overwritten boot and reflashed to have TWRP, but it can't mount /data /system /sdcard , TWRP reports unable to find crypto footer and fo each one, failed to mount
lafester said: https://mega.nz/#F!kYtRAJjJ!5tD1zPpo0nw2tJwhANA9pQ!dVMjmayY Yes, I would use tenfar tool to flash twrp and then unlock. Click to expand... Click to collapse I though I needed axon7root-a2017-b10.zip, however your mirror contains axon7root-a2017u-b20.zip
tokinger said: Ok, now I have a Chinese recovery and Fastboot. Fastboot won't work, as my bootloader is locked. I have overwritten boot and reflashed to have TWRP, but it can't mount /data /system /sdcard , TWRP reports unable to find crypto footer and fo each one, failed to mount Click to expand... Click to collapse A2017_B13_BootStack_EDL contains fastboot that supports all commands and this fastboot oem unlock You can't boot into fastboot by using "vol+ & power" ??? If you want tenfar`s TWRP, just replace recovery.img in my package with tenfar`s TWRP 3.0.2-2 signed and flash again or try this https://mega.nz/#!9kZyxJZa!XZOlo6Tfq1HTMiFsCnBxF6c32VfmXO7J8_TNW9Nh738
djkuz said: A2017_B13_BootStack_EDL contains fastboot that supports all commands and this fastboot oem unlock You can't boot into fastboot by using "vol+ & power" ??? If you want tenfar`s TWRP, just replace recovery.img in my package with tenfar`s TWRP 3.0.2-2 signed and flash again or try this https://mega.nz/#!9kZyxJZa!XZOlo6Tfq1HTMiFsCnBxF6c32VfmXO7J8_TNW9Nh738 Click to expand... Click to collapse that's what I did, but to allow TWRP to write partitions and flash a system I had to use the recovery (in Chinese) you provided me, and do a factory reset.
tokinger said: that's what I did, but to allow TWRP to write partitions and flash a system I had to use the recovery (in Chinese) you provided me, and do a factory reset. Click to expand... Click to collapse What is the current situation with your phone?
It's alive!! But can't root it... djkuz said: What is the current situation with your phone? Click to expand... Click to collapse So I was able to install TWRP: I had to flash A2017_B13_BootStack_EDL usgin miflash Then I booted into stock recovery and had to restore factory settings (as the encryption was messed up) Flashed A2017_B13_BootStack_EDLFlash again but changing recovery.img with twrp 3.0.2 signed (https://mega.nz/#F!kYtRAJjJ!5tD1zPpo0nw2tJwhANA9pQ!dVMjmayY) with with miflash Flash ZTE_A2017V1.0.0B10_BootStack_by_DrakenFX and draken ZTE_A2017V1.0.0B10_StockSystem_by_DrakenFX This unbricked my phone. What I still can't do is root it. I boot into TWRP flash TWRP_UnlockBootloaderPackage_by_DrakenFX.zip reboot in fastboot Fastboot oem unlock still says not allowed. I thought axon7root.exe was key to allow unlock, but when I used it once more, it messed my TWRP again (and I had to flash with miflash with TWRP once again)
check the settings -> developer options -> oem unlocking A2017_B13_BootStack_EDL allready have full fastboot, and you not need to flash Draken packege. Allow oem unlocking in settings, reboot in to fastboot and execute fastboot oem unlock. Then flash official TWRP, and then SuperSU
Got it working, you were right again! parazite69 said: Dude I feel ya! I Have done the same, But after messing around i could flash recovery through fastboot "fastboot flash recovery twrp.img" and then flash the chinese boot again b11+ chinese system b11 Click to expand... Click to collapse This didn't work when I had B29 over B10 bootstack installed, but now having full B10 it did!
Do you have the Navigation bar back? I had the same issue with my Chinese Axon 7 but when I restore the EDL image I still miss the navigation bar!!
Seeking sonimxp5800 firehose_8920 file
Seeking sonimxp5800 firehose_8920 file essential-phone :The thread is closed, this is the tested version of the firmware, the key cannot be verified Code: C:\Users\x\Desktop\fastboot getvar all (bootloader) version:0.5 (bootloader) battery-soc-ok:yes (bootloader) battery-voltage:4157000 (bootloader) variant:QRD eMMC (bootloader) secure:yes (bootloader) version-baseband: (bootloader) version-bootloader: (bootloader) display-panel: (bootloader) off-mode-charge:0 (bootloader) charger-screen-enabled:0 (bootloader) max-download-size: 0x1ff00000 (bootloader) partition-type:cache:ext4 (bootloader) partition-size:cache: 0x40000000 (bootloader) partition-type:userdata:ext4 (bootloader) partition-size:userdata: 0x2858d0e00 (bootloader) partition-type:system:ext4 (bootloader) partition-size:system: 0xa0000000 (bootloader) serialno:c3cacaf3 (bootloader) kernel:lk (bootloader) product:QC_REFERENCE_PHONE all: finished. total time: 0.111s XP5812:/ $ cat /proc/partitions major minor #blocks name 254 0 524288 zram0 179 0 15388672 mmcblk0 179 1 106496 mmcblk0p1 179 2 1 mmcblk0p2 179 3 8 mmcblk0p3 179 4 512 mmcblk0p4 179 5 512 mmcblk0p5 179 6 512 mmcblk0p6 179 7 512 mmcblk0p7 179 8 2048 mmcblk0p8 179 9 2048 mmcblk0p9 179 10 256 mmcblk0p10 179 11 256 mmcblk0p11 179 12 16384 mmcblk0p12 179 13 1536 mmcblk0p13 179 14 1536 mmcblk0p14 179 15 32 mmcblk0p15 179 16 1536 mmcblk0p16 179 17 16 mmcblk0p17 179 18 11264 mmcblk0p18 179 19 1024 mmcblk0p19 179 20 1024 mmcblk0p20 179 21 65536 mmcblk0p21 179 22 65536 mmcblk0p22 179 23 1024 mmcblk0p23 179 24 2621440 mmcblk0p24 179 25 1048576 mmcblk0p25 179 26 32768 mmcblk0p26 179 27 1024 mmcblk0p27 179 28 512 mmcblk0p28 179 29 32 mmcblk0p29 179 30 262144 mmcblk0p30 179 31 32 mmcblk0p31 259 0 512 mmcblk0p32 259 1 1024 mmcblk0p33 259 2 32768 mmcblk0p34 259 3 512 mmcblk0p35 259 4 4096 mmcblk0p36 259 5 256 mmcblk0p37 259 6 256 mmcblk0p38 259 7 256 mmcblk0p39 259 8 256 mmcblk0p40 259 9 256 mmcblk0p41 259 10 256 mmcblk0p42 259 11 256 mmcblk0p43 259 12 256 mmcblk0p44 259 13 8 mmcblk0p45 259 14 9020 mmcblk0p46 259 15 7636 mmcblk0p47 259 16 5824 mmcblk0p48 259 17 4820 mmcblk0p49 259 18 10576707 mmcblk0p50 179 32 4096 mmcblk0rpmb 253 0 2580508 dm-0 253 1 10576691 dm-1 XP5812:/ $ XP5812:/ $cat /proc/cpuinfo Processor : AArch64 Processor rev 4 (aarch64) processor : 0 BogoMIPS : 38.40 Features : fp asimd evtstrm aes pmull sha1 sha2 crc32 CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd03 CPU revision : 4 processor : 1 BogoMIPS : 38.40 Features : fp asimd evtstrm aes pmull sha1 sha2 crc32 CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd03 CPU revision : 4 processor : 2 BogoMIPS : 38.40 Features : fp asimd evtstrm aes pmull sha1 sha2 crc32 CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd03 CPU revision : 4 processor : 3 BogoMIPS : 38.40 Features : fp asimd evtstrm aes pmull sha1 sha2 crc32 CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd03 CPU revision : 4 Hardware : Qualcomm Technologies, Inc MSM8920 XP5812:/ $
what is a firehose file? and what is the zip file attached?
nijohnson said: what is a firehose file? and what is the zip file attached? Click to expand... Click to collapse This looks very interesting! I have a dead essential I can use this on if you can confirm it works!!!
I have a dead one as well. But I have no idea what to do with the file.
nijohnson said: what is a firehose file? and what is the zip file attached? Click to expand... Click to collapse https://forum.xda-developers.com/showpost.php?p=80465045&postcount=6
nijohnson said: I have a dead one as well. But I have no idea what to do with the file. Click to expand... Click to collapse Initial Steps EDL mode refresh firmware
eleotk said: Initial Steps EDL mode refresh firmware Click to expand... Click to collapse Initial step #1 - get pasword (( Does anybody found it?
I can't find password out. Can you just post it directly? Thanks a lot.
One idea.. Has anyone asked Sonim? They gave me debug images along with flash tools for the XP8 when I asked about a year ago.. Although not as useful as the early (unlockable) debug images provided by eleotk.. Sonim had to verify I was local in the US and it took a few days but was not an issue. We are seeing now that many variations of the debug image exist for the XP8 so I'm sure it's the same case on this XP5812. They do seem to keep a tighter grip on the XP5s since custom apps require Sonim direct validation/signing but it may be worth a shot since any debug images they provide would have the required mbn file for flashing. Obviously you need to give them a developer style excuse as they will likely not help if they know your trying to modify the device. I would ask them myself however the only XP5s I have is a Sprint XP5800 that's working with the ZTE 8920 mbn file. This issue appears unique to the variant I believe? Aside from the XP5823 label - it looks simular on my end. Code: XP5823:/ $ su XP5823:/ # cat /proc/partitions major minor #blocks name 254 0 524288 zram0 179 0 15388672 mmcblk0 179 1 106496 mmcblk0p1 179 2 1 mmcblk0p2 179 3 8 mmcblk0p3 179 4 512 mmcblk0p4 179 5 512 mmcblk0p5 179 6 512 mmcblk0p6 179 7 512 mmcblk0p7 179 8 2048 mmcblk0p8 179 9 2048 mmcblk0p9 179 10 256 mmcblk0p10 179 11 256 mmcblk0p11 179 12 16384 mmcblk0p12 179 13 1536 mmcblk0p13 179 14 1536 mmcblk0p14 179 15 32 mmcblk0p15 179 16 1536 mmcblk0p16 179 17 16 mmcblk0p17 179 18 11264 mmcblk0p18 179 19 1024 mmcblk0p19 179 20 1024 mmcblk0p20 179 21 65536 mmcblk0p21 179 22 65536 mmcblk0p22 179 23 1024 mmcblk0p23 179 24 2621440 mmcblk0p24 179 25 1048576 mmcblk0p25 179 26 32768 mmcblk0p26 179 27 1024 mmcblk0p27 179 28 512 mmcblk0p28 179 29 32 mmcblk0p29 179 30 262144 mmcblk0p30 179 31 32 mmcblk0p31 259 0 512 mmcblk0p32 259 1 1024 mmcblk0p33 259 2 32768 mmcblk0p34 259 3 512 mmcblk0p35 259 4 4096 mmcblk0p36 259 5 256 mmcblk0p37 259 6 256 mmcblk0p38 259 7 256 mmcblk0p39 259 8 256 mmcblk0p40 259 9 256 mmcblk0p41 259 10 256 mmcblk0p42 259 11 256 mmcblk0p43 259 12 256 mmcblk0p44 259 13 8 mmcblk0p45 259 14 9020 mmcblk0p46 259 15 7636 mmcblk0p47 259 16 5824 mmcblk0p48 259 17 4820 mmcblk0p49 259 18 10576707 mmcblk0p50 179 32 4096 mmcblk0rpmb 253 0 10576691 dm-0 XP5823:/ # cat /proc/cpuinfo Processor : AArch64 Processor rev 4 (aarch64) processor : 0 BogoMIPS : 38.40 Features : fp asimd evtstrm aes pmull sha1 sha2 crc32 CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd03 CPU revision : 4 processor : 1 BogoMIPS : 38.40 Features : fp asimd evtstrm aes pmull sha1 sha2 crc32 CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd03 CPU revision : 4 processor : 2 BogoMIPS : 38.40 Features : fp asimd evtstrm aes pmull sha1 sha2 crc32 CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd03 CPU revision : 4 processor : 3 BogoMIPS : 38.40 Features : fp asimd evtstrm aes pmull sha1 sha2 crc32 CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd03 CPU revision : 4 Hardware : Qualcomm Technologies, Inc MSM8920 XP5823:/ # Edit.. Missed the bootloader options. The Sprint variant at least seems to be shipped in an unlocked state with secure boot also disabled. This is likely why it trusts the ZTE mbn file. Code: (bootloader) version:0.5 (bootloader) battery-soc-ok:yes (bootloader) battery-voltage:3745000 (bootloader) variant:QRD eMMC (bootloader) secure:no (bootloader) version-baseband: (bootloader) version-bootloader: (bootloader) display-panel: (bootloader) off-mode-charge:0 (bootloader) charger-screen-enabled:0 (bootloader) max-download-size: 0x1ff00000 (bootloader) partition-type:cache:ext4 (bootloader) partition-size:cache: 0x40000000 (bootloader) partition-type:userdata:ext4 (bootloader) partition-size:userdata: 0x2858d0e00 (bootloader) partition-type:system:ext4 (bootloader) partition-size:system: 0xa0000000 (bootloader) model:XP5800 (bootloader) build:5SA.0.2-03-7.1.2-29.03.00 (bootloader) imei:XXXXXXXXXXXXXXX (bootloader) serialno:XXXXXXXX (bootloader) kernel:lk (bootloader) product:QC_REFERENCE_PHONE all: finished. total time: 0.030s
Maybe my English is not well written, password: sonimxp5800
smokeyou said: One idea.. Has anyone asked Sonim? They gave me debug images along with flash tools for the XP8 when I asked about a year ago.. Although not as useful as the early (unlockable) debug images provided by eleotk.. Sonim had to verify I was local in the US and it took a few days but was not an issue. We are seeing now that many variations of the debug image exist for the XP8 so I'm sure it's the same case on this XP5812. They do seem to keep a tighter grip on the XP5s since custom apps require Sonim direct validation/signing but it may be worth a shot since any debug images they provide would have the required mbn file for flashing. Obviously you need to give them a developer style excuse as they will likely not help if they know your trying to modify the device. I would ask them myself however the only XP5s I have is a Sprint XP5800 that's working with the ZTE 8920 mbn file. This issue appears unique to the variant I believe? Aside from the XP5823 label - it looks simular on my end. Code: XP5823:/ $ su XP5823:/ # cat /proc/partitions major minor #blocks name 254 0 524288 zram0 179 0 15388672 mmcblk0 179 1 106496 mmcblk0p1 179 2 1 mmcblk0p2 179 3 8 mmcblk0p3 179 4 512 mmcblk0p4 179 5 512 mmcblk0p5 179 6 512 mmcblk0p6 179 7 512 mmcblk0p7 179 8 2048 mmcblk0p8 179 9 2048 mmcblk0p9 179 10 256 mmcblk0p10 179 11 256 mmcblk0p11 179 12 16384 mmcblk0p12 179 13 1536 mmcblk0p13 179 14 1536 mmcblk0p14 179 15 32 mmcblk0p15 179 16 1536 mmcblk0p16 179 17 16 mmcblk0p17 179 18 11264 mmcblk0p18 179 19 1024 mmcblk0p19 179 20 1024 mmcblk0p20 179 21 65536 mmcblk0p21 179 22 65536 mmcblk0p22 179 23 1024 mmcblk0p23 179 24 2621440 mmcblk0p24 179 25 1048576 mmcblk0p25 179 26 32768 mmcblk0p26 179 27 1024 mmcblk0p27 179 28 512 mmcblk0p28 179 29 32 mmcblk0p29 179 30 262144 mmcblk0p30 179 31 32 mmcblk0p31 259 0 512 mmcblk0p32 259 1 1024 mmcblk0p33 259 2 32768 mmcblk0p34 259 3 512 mmcblk0p35 259 4 4096 mmcblk0p36 259 5 256 mmcblk0p37 259 6 256 mmcblk0p38 259 7 256 mmcblk0p39 259 8 256 mmcblk0p40 259 9 256 mmcblk0p41 259 10 256 mmcblk0p42 259 11 256 mmcblk0p43 259 12 256 mmcblk0p44 259 13 8 mmcblk0p45 259 14 9020 mmcblk0p46 259 15 7636 mmcblk0p47 259 16 5824 mmcblk0p48 259 17 4820 mmcblk0p49 259 18 10576707 mmcblk0p50 179 32 4096 mmcblk0rpmb 253 0 10576691 dm-0 XP5823:/ # cat /proc/cpuinfo Processor : AArch64 Processor rev 4 (aarch64) processor : 0 BogoMIPS : 38.40 Features : fp asimd evtstrm aes pmull sha1 sha2 crc32 CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd03 CPU revision : 4 processor : 1 BogoMIPS : 38.40 Features : fp asimd evtstrm aes pmull sha1 sha2 crc32 CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd03 CPU revision : 4 processor : 2 BogoMIPS : 38.40 Features : fp asimd evtstrm aes pmull sha1 sha2 crc32 CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd03 CPU revision : 4 processor : 3 BogoMIPS : 38.40 Features : fp asimd evtstrm aes pmull sha1 sha2 crc32 CPU implementer : 0x41 CPU architecture: 8 CPU variant : 0x0 CPU part : 0xd03 CPU revision : 4 Hardware : Qualcomm Technologies, Inc MSM8920 XP5823:/ # Edit.. Missed the bootloader options. The Sprint variant at least seems to be shipped in an unlocked state with secure boot also disabled. This is likely why it trusts the ZTE mbn file. Code: (bootloader) version:0.5 (bootloader) battery-soc-ok:yes (bootloader) battery-voltage:3745000 (bootloader) variant:QRD eMMC (bootloader) secure:no (bootloader) version-baseband: (bootloader) version-bootloader: (bootloader) display-panel: (bootloader) off-mode-charge:0 (bootloader) charger-screen-enabled:0 (bootloader) max-download-size: 0x1ff00000 (bootloader) partition-type:cache:ext4 (bootloader) partition-size:cache: 0x40000000 (bootloader) partition-type:userdata:ext4 (bootloader) partition-size:userdata: 0x2858d0e00 (bootloader) partition-type:system:ext4 (bootloader) partition-size:system: 0xa0000000 (bootloader) model:XP5800 (bootloader) build:5SA.0.2-03-7.1.2-29.03.00 (bootloader) imei:XXXXXXXXXXXXXXX (bootloader) serialno:XXXXXXXX (bootloader) kernel:lk (bootloader) product:QC_REFERENCE_PHONE all: finished. total time: 0.030s Click to expand... Click to collapse It seems that I should find the Sprint version XP5800 easier, XP5800 is too little information.
Please forgive my lack of knowledge. This file/process is not something that could fix a bricked phone, correct?
nijohnson said: Please forgive my lack of knowledge. This file/process is not something that could fix a bricked phone, correct? Click to expand... Click to collapse Yes, refill the wrong partition
Essential_Phone 9008 download 1. First you need to install QPST, and then confirm the following files in the QPST installation directory. D:\Program Files (x86)\Qualcomm\QPST\bin QFIL.exe Fhloader.exe QSaharaServer.exe 1 2 2. The device needs to switch to port 9008. 3 Download official file extract https://storage.googleapis.com/essential-static/PH1-Images-QP1A.191005.014.zip 4 I will release 4 files and extract them into the official file. 5 Running QFIL Set to see pictures
@eleotk something ent wrong... (
st.noigel said: @eleotk something ent wrong... ( Click to expand... Click to collapse devicetype:ufs
eleotk said: Essential_Phone 9008 download 1. First you need to install QPST, and then confirm the following files in the QPST installation directory. D:\Program Files (x86)\Qualcomm\QPST\bin QFIL.exe Fhloader.exe QSaharaServer.exe 1 2 2. The device needs to switch to port 9008. 3 Download official file extract https://storage.googleapis.com/essential-static/PH1-Images-QP1A.191005.014.zip 4 I will release 4 files and extract them into the official file. 5 Running QFIL Set to see pictures Click to expand... Click to collapse I guess I don't understand? I can't get Qsahara to work? I have everything downloaded and my screen is the same as yours?
tha_mechanic said: I guess I don't understand? I can't get Qsahara to work? I have everything downloaded and my screen is the same as yours? Click to expand... Click to collapse https://forum.xda-developers.com/z5.../restore-stock-image-lock-bootloader-t3888785 https://mirrors.lolinet.com/software/windows/Qualcomm/QPST/
eleotk said: https://forum.xda-developers.com/z5.../restore-stock-image-lock-bootloader-t3888785 https://mirrors.lolinet.com/software/windows/Qualcomm/QPST/ Click to expand... Click to collapse It looks like my PH-1 is completele dead ( P.S. I`ll try ahain with another PC )
St.Noigel said: It looks like my PH-1 is completele dead ( P.S. I`ll try ahain with another PC ) Click to expand... Click to collapse Replace the file, still can't pass my verification, end