|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
03-30-2023, 11:55 | #1 (permalink) |
Freak Poster Join Date: Jun 2021 Location: north east syria Age: 31
Posts: 219
Member: 2990103 Status: Offline Sonork: 100.1684896 no sonork Thanks Meter: 43 | A107f Erse Frp not Working with v4.9 [Answered] Selected model: Samsung SM-A107F (Samsung Galaxy A10s) Operation: Erase FRP Software version: 4.9 Host Power Off... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Host Power On... OK Connect phone to BOX in BROM/PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0] Device found at COM40 [PRELOADER] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [00000005] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Force switch to BROM... OK Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Waiting for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0766 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Release testpoint Advanced Bypass Security... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM29 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xEB4665BE, 0xCD896909, 0x38F8C5D2, 0x4011B826 Get Chip ID... [MT6765] Get SOC ID... [6E10E6F75C0F09DB05E545FF6EC9BD33736BD1AF0D1B69A245 4F4CE6DDF0AF8D] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [7] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x150100515836334D42005CD69A33B7A5 Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: QX63MB EMMC_ID : 0x150100515836334D42005CD69A33B7A5 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x0747C00000 (29.12Gb) RAM INFO: INT_SRAM: 0x000003A000 (232.00Kb) EXT_RAM : 0x0080000000 (2.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : samsung Product Manufacturer : samsung Product Model : SM-A107F Product Name : S96116AA1 Product Device : a10s Product Board : S96116RA1 Board Platform : MT6765 Build ID : RP1A.200720.012 Build Date : Thu Jul 21 13:37:49 KST 2022 Display ID : RP1A.200720.012.A107FXXU8CVG2 Security Patch : 2022-05-01 Version SDK : 30 Version Release : 11 Version Codename : REL Firmware Version : A107FXXU8CVG2 Read partitions info from phone... OK Read partition "frp"... OK Read partition "persistent"... OK Backup saved to Exception: Access violation at address 00000000 in module PandoraTool.exe. Execution of address 00000000 |
The Following User Says Thank You to mnafmf For This Useful Post: |
Bookmarks |
| |
|