OPPO CPH2161 (Oppo A73 5G) Imei Repair Failed [Answered] Selected model: OPPO CPH2161 (Oppo A73 5G) Operation: Repair Software version: 2.11 Host Power Off... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Host Power On... OK Connect phone to BOX in BROM/PRELOADER Mode Wait for device connecting... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM17 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0996 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6853] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Force switch to BROM... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0996 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6853] Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM17 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0996 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6853] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xB3031EA5, 0x8C8A62EB, 0xB5984FC6, 0x0718F8CD Get Chip ID... [MT6853] Get SOC ID... [D153D76302F31CDED349DA325A4FA22D7B0B66583ED1461E6A B06DAE8E1A3AFC] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [30] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): KM8V8001JM-B813 (1900) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : KM8V8001JM-B813 UFS_FWVER : 1900 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Check A/B state... OK Read product info... OK Product Brand : alps Product Manufacturer : alps Product Model : oplus_mssi_64_cn Product Name : sys_oplus_mssi_64_cn Product Device : oplus_mssi_64_cn Product Board : oppo6853 Board Platform : MT6853 Build ID : RP1A.200720.011 Build Date : Mon Aug 23 21:11:09 CST 2021 Display ID : RP1A.200720.011 release-keys Security Patch : 2021-09-05 Version SDK : 30 Version Release : 11 Version Codename : REL Firmware Version : 1629723568022 Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Repairing IMEI... IMEI 1: 863768 IMEI 2: 863768 Write IMEI [NVDATA]... OK Load partiton for patching... Exception: Access violation at address 0042CD6B in module 'PandoraTool.exe'. Read of address 00000000 |
help me ? oppo imei repair faild? |
Hello. Dump partitions (without userdata and cache) and upload them. We will fix issue. |
Quote:
Selected model: OPPO CPH2161 (Oppo A73 5G) Operation: Repair Software version: 2.11 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Connect phone to BOX in BROM mode Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0996 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6853] Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM17 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0996 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6853] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xB3031EA5, 0x8C8A62EB, 0xB5984FC6, 0x0718F8CD Get Chip ID... [MT6853] Get SOC ID... [D153D76302F31CDED349DA325A4FA22D7B0B66583ED1461E6A B06DAE8E1A3AFC] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [30] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): KM8V8001JM-B813 (1900) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : KM8V8001JM-B813 UFS_FWVER : 1900 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Check A/B state... OK Read product info... OK Product Brand : alps Product Manufacturer : alps Product Model : oplus_mssi_64_cn Product Name : sys_oplus_mssi_64_cn Product Device : oplus_mssi_64_cn Product Board : oppo6853 Board Platform : MT6853 Build ID : RP1A.200720.011 Build Date : Mon Aug 23 21:11:09 CST 2021 Display ID : RP1A.200720.011 release-keys Security Patch : 2021-09-05 Version SDK : 30 Version Release : 11 Version Codename : REL Firmware Version : 1629723568022 Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Repairing IMEI... IMEI 1: 863768033267749 IMEI 2: 863768033529866 Write IMEI [NVDATA]... OK Load partiton for patching... Exception: Access violation at address 0042CD6B in module 'PandoraTool.exe'. Read of address 00000000 |
1 Attachment(s) Quote:
without (user data cach) |
Quote:
|
Quote:
screen shot send me |
Quote:
and upload that file somewhere on mediafire, 4 shared or somewhere else. then post the link here.... so that z3x team can download your file and fix the issue |
Hi Z3x Team, I'm facing this problem during repairing imei of this model CPH2161 A73 5G I tried on versions 2.10 and 2.11 both same problem Selected model: OPPO CPH2161 (Oppo A73 5G) Operation: Repair Software version: 2.10 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Connect phone to BOX in BROM mode Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0996 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6853] Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM332 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0996 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6853] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xCA4B8498, 0xB7A49B38, 0x54B6986C, 0x0AF29B87 Get Chip ID... [MT6853] Get SOC ID... [82CFB986E277F36955C4D7D6C315F14FA028E587EB2249EE74 ECCFBC899FA0AB] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [30] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): KM8V8001JM-B813 (1900) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : KM8V8001JM-B813 UFS_FWVER : 1900 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Check A/B state... OK Read product info... OK Product Board : oppo6853 Board Platform : MT6853 Build ID : QP1A.190711.020 Build Date : Tue Sep 29 13:52:29 CST 2020 Security Patch : 2020-09-05 Version SDK : 29 Version Release : 10 Version Codename : REL Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Read IMEI... error Repairing IMEI... IMEI 1: xxxxxxxxxxxxxxxx IMEI 2: xxxxxxxxxxxxxxxx Write IMEI [NVDATA]... OK Load partiton for patching... Exception: Access violation at address 0042CD6B in module 'PandoraTool.exe'. Read of address 00000000 |
Quote:
|
Here is the link Team. In this link, I uploaded nvdata.bin & nvram.bin https://drive.google.com/file/d/15cf...ew?usp=sharing |
|
All partitions except userdata and cache please. |
oppo hi android 11 ? if posible downgrade to 10 repair done on 10 |
Quote:
|
All times are GMT +1. The time now is 12:55. |
vBulletin Optimisation provided by
vB Optimise (Pro) -
vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -