View Single Post
Old 08-24-2015, 08:29   #1 (permalink)
ij_cell
No Life Poster
 
ij_cell's Avatar
 
Join Date: May 2013
Location: TkinterPy,Hex Cal,Ext2,Ext4,
Posts: 4,540
Member: 1937038
Status: Offline
Sonork: QQ 2045657399
Thanks Meter: 4,492
MTK 6572 pattern read bug report.

Hello team.

i configure one bug on new update.may be iam wrong but can you please check info logs and see pic of pattern.

log.

Analysis of USB port,Please insert phone USB cable.
Connecting...
CPU TYPE:MT6572
Hardware version:CA01
Software version:0000
SecCfgVal :0x00000000
BromVersion :0xFF
BLVersion :0x01
Boot downloading complete!
EMMC_ID:0x45010053454D3034473A0365485BD167
EMMC_PRODUCT_NAME: SAMSUNG :0x53454D303447
EMMC_BOOT1_SIZE: 0x00200000
EMMC_BOOT2_SIZE: 0x00200000
EMMC_PRMB_SIZE: 0x00200000
EMMC_GP1_SIZE: 0x00000000
EMMC_GP2_SIZE: 0x00000000
EMMC_GP3_SIZE: 0x00000000
EMMC_GP4_SIZE: 0x00000000
EMMC_USER_SIZE: 0x0EC000000(3.69 G)



Analysis of system files...
PRELOADER: addr:0x000000 --length:0x880000
MBR: addr:0x880000 --length:0x080000
EBR1: addr:0x900000 --length:0x080000
PRO_INFO: addr:0x980000 --length:0x300000
NVRAM: addr:0xC80000 --length:0x500000
PROTECT_F: addr:0x1180000 --length:0xA00000
PROTECT_S: addr:0x1B80000 --length:0xA00000
SECCFG: addr:0x2580000 --length:0x020000
UBOOT: addr:0x25A0000 --length:0x060000
BOOTIMG: addr:0x2600000 --length:0x600000
RECOVERY: addr:0x2C00000 --length:0x600000
SEC_RO: addr:0x3200000 --length:0x040000
MISC: addr:0x3240000 --length:0x080000
LOGO: addr:0x32C0000 --length:0x300000
EXPDB: addr:0x35C0000 --length:0xA00000
ANDROID: addr:0x3FC0000 --length:0x2BC00000
CACHE: addr:0x2FBC0000 --length:0x7E00000
USRDATA: addr:0x379C0000 --length:0x4CC00000
FAT: addr:0x845C0000 --length:0x66B40000
BMTPOOL: addr:0xFFFF00A8 --length:0x000000


Format addr:0x379C0000 --Format length:0x4CC00000
Read phone information success.
>>Pattern lock is : 0124678


pic of pattern.

 
 
Page generated in 0.08058 seconds with 7 queries