|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
03-08-2023, 11:30 | #1 (permalink) |
No Life Poster Join Date: Dec 2015 Location: Somewhere on the Internet
Posts: 1,162
Member: 2500215 Status: Offline Thanks Meter: 417 | Oppo Reno 5F Android 12 Color OS 12.1 Dec 5, 2022 Sec IMEI Repar Done [Done] Operation: Repair Software version: 4.6 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Connect phone to BOX in BROM mode Waiting for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0725 Get HW & SW version from device... OK HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6779] Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Advanced Bypass Security... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM510 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0725 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6779] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x12CE5E9B, 0x1A7DAC4B, 0x877888F1, 0xF2135F9B Get Chip ID... [MT6779] Get SOC ID... [4A411DC8FF34FB00435B81176B4D51E594856AD44E4BE1BEDA 9E85FB5E45B308] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [10] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): H9HQ15AFAMBDAR (A002) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : H9HQ15AFAMBDAR UFS_FWVER : A002 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000080000 (512.00Kb) EXT_RAM : 0x0200000000 (8.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... error(3) Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Repairing IMEI... IMEI 1: 3551020XXXXXXXX IMEI 2: 3551020XXXXXXXX Write IMEI [NVDATA]... OK Checking patch type... [2] Load partiton for patching... OK Patching CERT... OK Save patched partiton... OK Read partitions info from phone... OK Checking A/B state... OK Read security partition from phone... OK Decrypting security data... OK Encrypt security data... OK Write security partition to phone... OK Checking additional lock... [ENABLED] Disable additional lock... OK Write IMEI [NVRAM]... OK Write partition "nvdata"... OK Write partition "nvram"... OK Repair Security done! If your phone after repair keeps rebooting - use wipe data option. One click, no issues. |
Bookmarks |
| |
|