View Single Post
Old 02-12-2022, 14:54   #4 (permalink)
bartarbartar
Major Poster
 
Join Date: Nov 2012
Posts: 40
Member: 1834763
Status: Offline
Thanks Meter: 2
Quote:
Originally Posted by Z3X View Post
Hello. Dump partitions (without userdata and cache) and upload them. We will fix issue.

Selected model: OPPO CPH2161 (Oppo A73 5G)
Operation: Repair
Software version: 2.11

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to BOX in BROM mode
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0996
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6853]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM17 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0996
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6853]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB3031EA5, 0x8C8A62EB, 0xB5984FC6, 0x0718F8CD
Get Chip ID... [MT6853]
Get SOC ID... [D153D76302F31CDED349DA325A4FA22D7B0B66583ED1461E6A B06DAE8E1A3AFC]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [30]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM8V8001JM-B813 (1900)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM8V8001JM-B813
UFS_FWVER : 1900
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6853
Board Platform : MT6853
Build ID : RP1A.200720.011
Build Date : Mon Aug 23 21:11:09 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1629723568022
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Repairing IMEI...
IMEI 1: 863768033267749
IMEI 2: 863768033529866
Write IMEI [NVDATA]... OK
Load partiton for patching...
Exception: Access violation at address 0042CD6B in module 'PandoraTool.exe'. Read of address 00000000
  Reply With Quote
 
Page generated in 0.08254 seconds with 7 queries