|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Today's Posts | Search |
| LinkBack | Thread Tools | Display Modes |
03-24-2024, 16:40 | #1 (permalink) |
Freak Poster Join Date: Jun 2010 Location: Egypt
Posts: 144
Member: 1327995 Status: Offline Thanks Meter: 13 | oppo f11 cph 1911 imei repair error Operation: Repair Software version: 6.6 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Connect phone to [BOX] in BROM mode Waiting for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0788 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6771] Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Release testpoint Advanced Bypass Security... OK Waiting for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0788 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6771] Get sec config... OK [000000E0] Active sec flags: [] Switch virtual port to NONE... OK Connect Type-C to HUB... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0] Device found at COM122 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0788 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6771] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x39238223, 0xFDB82C65, 0x9A55DDBE, 0xF22098A7 Get Chip ID... [MT6771] Get SOC ID... [379084DAFEF96A08CB2CCF16E22302FBA3BF42A277FA666535 B663B07814792D] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [9] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x90014A68433861503E03494BD9422621 Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: hC8aP> EMMC_ID : 0x90014A68433861503E03494BD9422621 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x0E8F800000 (58.24Gb) RAM INFO: INT_SRAM: 0x0000039000 (228.00Kb) EXT_RAM : 0x0180000000 (6.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : alps Product Manufacturer : alps Product Model : oplus_mssi_64_cn Product Name : sys_oplus_mssi_64_cn Product Device : oplus_mssi_64_cn Product Board : oppo6771 Board Platform : mt6771 Build ID : RP1A.200720.011 Build Date : Sun Feb 13 21:03:44 CST 2022 Display ID : RP1A.200720.011 release-keys Security Patch : 2022-02-05 Version SDK : 30 Version Release : 11 Version Codename : REL Firmware Version : 1644756677176 Read security partition from phone... Decrypting security data... OK Encrypt security data... OK Read partition "nvdata"... OK Read partition "protect1"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Read security files... OK Calculating... OK Repairing IMEI... IMEI 1: 86592305........... IMEI 2: 86592305........... Write IMEI and patch CERT [NVDATA]... OK Checking patch type... error(2.ERR_SF_4) |
03-24-2024, 22:27 | #3 (permalink) |
Freak Poster Join Date: Jun 2010 Location: Egypt
Posts: 144
Member: 1327995 Status: Offline Thanks Meter: 13 | |
03-25-2024, 15:33 | #5 (permalink) |
Freak Poster Join Date: Jun 2010 Location: Egypt
Posts: 144
Member: 1327995 Status: Offline Thanks Meter: 13 | |
The Following User Says Thank You to elsharawy_fon For This Useful Post: |
Bookmarks |
| |
|