View Single Post
Old 08-21-2020, 16:38   #1161 (permalink)
djj007
No Life Poster
 
Join Date: Nov 2016
Location: GUJARAT
Posts: 1,439
Member: 2643730
Status: Offline
Thanks Meter: 1,115
NOKIA 3.1 PLUS(TA-1118) your device is corrupted , cannot be trusted FIX BY KING NK2




Operation : Write FW [ v1.20 ]

Setting : UserData preserve : False
Setting : Flash Pre-Erase : True
Setting : Bootloader update : True

1. Make sure device is powered off. Power off, if need. Wait 20 seconds after
2. Insert USB cable in phone
- > Info : Press and hold BOTH volume keys, if device boot fail at BROM stage!

Waiting for device connection ...

PTFN : MediaTek USB Port_V1632 (COM51)
MODE : BOOTROM
PORT : 51
Waiting BOOT ack ...
BROM : Skip ACK verify
BROM : Init BROM
BROM init passed!
CHIP : MT6765 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000
TYPE : MODERN RAPHAEL
BROM : DSLevel : DEV_KEY+DEV_ARB
BROM : BOOTROM
BROM : ARB : ACTIVE : LOG : F0: 102B 0000 F3: 0000 0000 [0200] V0: 0000 0000 [0001]
BROM : SOCID : 083B7679644D493E5EF24C2F9DB2448BA6763D4356E8D7CB28 E58C8B6C5BCEDE
AGENT : Look for suitable BootChain in DA ...
AGENT : DEFAULT AUTO
AGENT : Found MT6765
AGENT : BEST_Nokia_DA_v19_1711_06
BROM : Sending 1st DA ...
BROM : DA sent
BROM :Transfer control to DA ...
DA : AGENT started!
DA : SYNC
DA : MODE : BROM
DA : EXT_RAM NOT initialized!
EMI : EXT_RAM CFG Passed!
DA : BOOT to 2nd DA ...
DA : 2ND stage confirmed!
DA : SYNC with DA passed!
DA : Receiving HW info

SRAM: 0x00040000 [ 256.00 KB ]
DRAM: 0xC0000000 [ 3.00 GB ]

EMMC: 90014A68423861503E014AA06C4BB5B1
EMMC: VEN : HYNIX | OEM : 4A01 | DEV : hB8aP>
EMMC:
BOOT1 : 0x00400000 [ 4.00 MB ]
BOOT2 : 0x00400000 [ 4.00 MB ]
RPMB : 0x01000000 [ 16.00 MB ]
USER : 0x747C00000 [ 29.12 GB ]

CHIP : MT6765 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000 , EVOL : 0x0000

RNID : 9F932A3ACCE39FD92EFC5906F694C62A

DA : USB : HIGH-SPEED

Boot done!

DL_INFO : PMT present
SEC_DL : False (RAPHAEL)
SEC_ID : 0x494E46494E495459424F584245535432

[FL] : HW verification passed!

Erase : 0x0000000000000000 : 0x0000000001688000
Erase : 0x0000000003688000 : 0x0000000006000000
Erase : 0x000000000E800000 : 0x0000000000800000
Erase : 0x0000000012584000 : 0x0000000000800000
Erase : 0x0000000013DA4000 : 0x0000000001800000
Erase : 0x00000000156A4000 : 0x0000000002000000
Erase : 0x0000000018000000 : 0x00000000DE000000
Erase : 0x00000000F6100000 : 0x0000000002000000
Erase : 0x00000000F9000000 : 0x000000019D800000

PMT Update : OK

Flashing now ...

PROCESS : PRELOADER
Unpack : ROO-0-124H-preloader_ROO.bin
Flash : ROO-0-124H-preloader_ROO.bin
Update bootloader backup copy ...
Update bootloader backup copy Ok!

PROCESS : LOGO_A
Unpack : ROO-0-124H-00WW-logo.bin
Flash : ROO-0-124H-00WW-logo.bin

PROCESS : MD1IMG_A
Unpack : ROO-0-124H-md1img.img
Flash : ROO-0-124H-md1img.img

PROCESS : SPMFW_A
Unpack : ROO-0-124H-spmfw.img
Flash : ROO-0-124H-spmfw.img

PROCESS : SCP_A
Unpack : ROO-0-124H-scp.img
Flash : ROO-0-124H-scp.img

PROCESS : SSPM_A
Unpack : ROO-0-124H-sspm.img
Flash : ROO-0-124H-sspm.img

PROCESS : LK_A
Unpack : ROO-0-124H-00WW-lk.img
Flash : ROO-0-124H-00WW-lk.img

PROCESS : BOOT_A
Unpack : ROO-0-124H-00WW-boot.img
Flash : ROO-0-124H-00WW-boot.img

PROCESS : ODMDTBO_A
Unpack : ROO-0-124H-odmdtbo.img
Flash : ROO-0-124H-odmdtbo.img

PROCESS : TEE_A
Unpack : ROO-0-124H-tee.img
Flash : ROO-0-124H-tee.img

PROCESS : VENDOR_A
Unpack : ROO-0-124H-00WW-vendor.img
Flash : ROO-0-124H-00WW-vendor.img

PROCESS : SYSTEM_A
Unpack : ROO-0-124H-00WW-system.img
Flash : ROO-0-124H-00WW-system.img

PROCESS : VBMETA_A
Unpack : ROO-0-124H-00WW-vbmeta.img
Flash : ROO-0-124H-00WW-vbmeta.img

PROCESS : USERDATA
Unpack : ROO-0-124H-00WW-userdata.img
Flash : ROO-0-124H-00WW-userdata.img

PMT Update : OK
SEC_DL : False (RAPHAEL)
SEC_ID : 0x494E46494E495459424F584245535432

Flashing finished!

Done!
Elapsed: 00:04:59

Reconnect Power/Cable!
  Reply With Quote
The Following 2 Users Say Thank You to djj007 For This Useful Post:
 
Page generated in 0.10384 seconds with 7 queries