Z3X Functions / Phones adding requests. MTK based Only.

Z3X Team

escapero

Active Member
Jun 25, 2018
55
4
peru
Sonork ID
0
Hello, do you know how Samsung works and what option do I choose to remove KG please?
if they could activate help area
 

Gukuin

Junior Member
Sep 8, 2021
1
0
Myanmar
#Redmi 6a Bootloader unlock reports back a successfully finished job, but on phone still locked please fix next update

Selected model: Xiaomi M1804C3CC (Redmi 6A)
Operation: Unlock bootloader
Software version: 2.4

Parse scatter file... OK
Load Rom Images... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Device found at COM50 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE9737F77, 0x488C7D42, 0x46F195C6, 0x48154AAB
Get Chip ID... [MT6765]
Get SOC ID... [E58EDEFAE1409297357B0249E29F423EE427B8172DD1A1F035192A92600ABC9A]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [23]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x90014A484147346132A54D449EF41661
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x90014A484147346132A54D449EF41661
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x03AB400000 (14.68Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Get scatter info... OK
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read security partition from phone... OK
Decrypt security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Unlock bootloader done!Redmi... OK
Write security partition to phone... OK
Unlock bootloader done!
 
Top