|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
06-09-2022, 14:39 | #1 (permalink) |
No Life Poster Join Date: Feb 2011 Location: ( United States Of Islam ) Age: 35
Posts: 3,954
Member: 1519396 Status: Offline Sonork: 100.1612702 Thanks Meter: 1,951 | cph2203 patch impossible [Answered] Code: Selected model: OPPO CPH2203 (Oppo A94) Operation: Repair Software version: 3.6 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Connect phone to BOX in BROM mode Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0725 Get HW & SW version from device... OK HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6779] Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM15 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0725 Get HW & SW version from device... OK HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6779] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xCF654AF2, 0xD95467F5, 0x53EFC85F, 0x3F620AD0 Get Chip ID... [MT6779] Get SOC ID... [B30BAD17A88E59A365E17CD1ED0E44A2338FA7C6D56A5CAA20FFF493BF9DD9C0] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [10] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): KM8V8001JM-B813 (1900) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : KM8V8001JM-B813 UFS_FWVER : 1900 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000080000 (512.00Kb) EXT_RAM : 0x0200000000 (8.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Check A/B state... OK Read product info... OK Product Brand : alps Product Manufacturer : alps Product Model : oplus_mssi_64_cn Product Name : sys_oplus_mssi_64_cn Product Device : oplus_mssi_64_cn Product Board : oppo6779 Board Platform : MT6779 Build ID : RP1A.200720.011 Build Date : Thu Nov 18 21:08:07 CST 2021 Display ID : RP1A.200720.011 release-keys Security Patch : 2021-11-05 Version SDK : 30 Version Release : 11 Version Codename : REL Firmware Version : 1637240235501 Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Repairing IMEI... IMEI 1: 357xxxxxxxxxx IMEI 2: 35751xxxxxxx Write IMEI [NVDATA]... OK Load partiton for patching... patch impossible |
Bookmarks |
| |
|