pandora tool faild
Selected model: Xiaomi Poco M4 5G (Light)
Operation: Repair
Software version: 7.6
Work ID: 48545552
Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xBBABA89F, 0xEE7B08EA, 0x9AD82D5F, 0x7C679583
Get Chip ID... [MT6833]
Get SOC ID... [72451F9C2B14523455028ED62D366415ADD069F18F33BA16F331992B864CEDC0]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [14]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): HN8T061ZGKX012 (A043)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : HN8T061ZGKX012
UFS_FWVER : A043
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 0% - 10% device life time used
DeviceLifeTimeEstB: 0% - 10% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : 22041219G
Product Name : light
Product Device : light
Product Board : light
Board Platform : mt6833
Build ID : SP1A.210812.016
Build Date : Fri Feb 3 15:09:23 CST 2023
Display ID : AN6138A-light-build-20230203150015
Security Patch : 2023-02-01
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : V13.0.11.0.SLSMIXM
Userdata FS Type : F2FS
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Read IMEI... OK
IMEI 1: 86xxxxxxxxxxxxxxx
IMEI 2: 86xxxxxxxxxxxxxxx
Repairing IMEI...
IMEI 1: 35xxxxxxxxxxxxxxx
IMEI 2: 35xxxxxxxxxxxxxxx
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Checking boot unlock status... LOCKED
You need to perform the official bootloader unlocking procedure.
other tool done
Waiting for MTK port: 140
Driver Info: MediaTek Inc.
Driver version: 3.0.1504.0
Driver date: 1-22-2015
HW Chip: MT6833
HW version: ca00
SW version: 00
HW sub version: 8a00
SEC_CFG_SBC_EN: true
SEC_CFG_SLA_EN: true
SEC_CFG_DAA_EN: true
MEID: 0x9FA8ABBBEA087BEE5F2DD89A8395677C
Brom exploit: OK
Preloader name: preloader_light
Preloader version: 52
Send DA SYNC signal: OK
Setup device enviroment: OK
Receive DA SYNC signal: OK
USB_SPEED: HIGH-SPEED
Device mode: brom
Init EXT RAM: OK
Send 2nd DA : OK
INT_SRAM: 448.00 KB
EXT_RAM: 4.00 GB
STORAGE TYPE UFS
UFS_ID: HN8T061ZGKX012
UFS_CID: AD01484E38543036315A474B58303132
UFS_LU0 SIZE: 4.00 MB
UFS_LU1 SIZE: 4.00 MB
UFS_LU2 SIZE: 119.17 GB
UFS BLOCK: 4.00 KB
UserSize: 119.17 GB
Reading device Info [EXT4]
Brand: Redmi
Model: 22041219G
Device: light
Hardware Info: Global/MP/6138B.19.0
Product name: light
Manufacturer: Xiaomi
Mod device: light_global
Cust device: light
Android version: 12
Display ID: AN6138A-light-build-20230203150015
Android cpu: arm64-v8a
Android platform: mt6833
Incremental version: V13.0.11.0.SLSMIXM
Security patch: 2023-02-01
Activate slot: b
Read data
IMEIA: 86xxxxxxxxxxxxxxx
IMEIB: 86xxxxxxxxxxxxxxx
Encrypting IMEI: OK
Write security data: OK
vbmeta verity flag: 0x01
Performing Unlock bootloader
Unlock Bootloader: success
Patch cert: successful
New IMEIA: 35xxxxxxxxxxxxxxx
New IMEIB: 35xxxxxxxxxxxxxxx
Repair IMEI: successful
Be aware that the effect of this procedure lasts only until the system is unchanged. Doing a firmware update or an OTA update likely causes the phone to restore to its original state.
Operation time: 00:33
Operation: Finish 5.0.0.6
pandora team wakeup
Selected model: Xiaomi Poco M4 5G (Light)
Operation: Repair
Software version: 7.6
Work ID: 48545552
Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xBBABA89F, 0xEE7B08EA, 0x9AD82D5F, 0x7C679583
Get Chip ID... [MT6833]
Get SOC ID... [72451F9C2B14523455028ED62D366415ADD069F18F33BA16F331992B864CEDC0]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [14]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): HN8T061ZGKX012 (A043)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : HN8T061ZGKX012
UFS_FWVER : A043
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 0% - 10% device life time used
DeviceLifeTimeEstB: 0% - 10% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : Redmi
Product Manufacturer : Xiaomi
Product Model : 22041219G
Product Name : light
Product Device : light
Product Board : light
Board Platform : mt6833
Build ID : SP1A.210812.016
Build Date : Fri Feb 3 15:09:23 CST 2023
Display ID : AN6138A-light-build-20230203150015
Security Patch : 2023-02-01
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : V13.0.11.0.SLSMIXM
Userdata FS Type : F2FS
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Read IMEI... OK
IMEI 1: 86xxxxxxxxxxxxxxx
IMEI 2: 86xxxxxxxxxxxxxxx
Repairing IMEI...
IMEI 1: 35xxxxxxxxxxxxxxx
IMEI 2: 35xxxxxxxxxxxxxxx
Write IMEI and patch CERT [NVDATA]... OK
Load partiton for patching... OK
Checking boot unlock status... LOCKED
You need to perform the official bootloader unlocking procedure.
other tool done
Waiting for MTK port: 140
Driver Info: MediaTek Inc.
Driver version: 3.0.1504.0
Driver date: 1-22-2015
HW Chip: MT6833
HW version: ca00
SW version: 00
HW sub version: 8a00
SEC_CFG_SBC_EN: true
SEC_CFG_SLA_EN: true
SEC_CFG_DAA_EN: true
MEID: 0x9FA8ABBBEA087BEE5F2DD89A8395677C
Brom exploit: OK
Preloader name: preloader_light
Preloader version: 52
Send DA SYNC signal: OK
Setup device enviroment: OK
Receive DA SYNC signal: OK
USB_SPEED: HIGH-SPEED
Device mode: brom
Init EXT RAM: OK
Send 2nd DA : OK
INT_SRAM: 448.00 KB
EXT_RAM: 4.00 GB
STORAGE TYPE UFS
UFS_ID: HN8T061ZGKX012
UFS_CID: AD01484E38543036315A474B58303132
UFS_LU0 SIZE: 4.00 MB
UFS_LU1 SIZE: 4.00 MB
UFS_LU2 SIZE: 119.17 GB
UFS BLOCK: 4.00 KB
UserSize: 119.17 GB
Reading device Info [EXT4]
Brand: Redmi
Model: 22041219G
Device: light
Hardware Info: Global/MP/6138B.19.0
Product name: light
Manufacturer: Xiaomi
Mod device: light_global
Cust device: light
Android version: 12
Display ID: AN6138A-light-build-20230203150015
Android cpu: arm64-v8a
Android platform: mt6833
Incremental version: V13.0.11.0.SLSMIXM
Security patch: 2023-02-01
Activate slot: b
Read data
IMEIA: 86xxxxxxxxxxxxxxx
IMEIB: 86xxxxxxxxxxxxxxx
Encrypting IMEI: OK
Write security data: OK
vbmeta verity flag: 0x01
Performing Unlock bootloader
Unlock Bootloader: success
Patch cert: successful
New IMEIA: 35xxxxxxxxxxxxxxx
New IMEIB: 35xxxxxxxxxxxxxxx
Repair IMEI: successful
Be aware that the effect of this procedure lasts only until the system is unchanged. Doing a firmware update or an OTA update likely causes the phone to restore to its original state.
Operation time: 00:33
Operation: Finish 5.0.0.6
pandora team wakeup