|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
03-27-2024, 10:15 | #1 (permalink) |
Junior Member Join Date: Jun 2005 Location: Ukraine, Kharkiv
Posts: 23
Member: 154719 Status: Offline Thanks Meter: 7 | Pandor 6.7 Access violation at address 01158566 [Solved] Selected model: Samsung SM-M536B (Samsung Galaxy M53) Operation: Erase FRP Software version: 6.7 Work ID: 23501768 Connect phone in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM8 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM8 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x63037BF7, 0x9C497709, 0x8463E2F9, 0xB260F80E Get Chip ID... [MT6877] Get SOC ID... [0F936A81BF2404E813953235576A124EE0196262A8A29775C3 57A1736395AF17] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [17] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): H9HQ15AECMBDAR (0001) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : H9HQ15AECMBDAR UFS_FWVER : 0001 BLOCK_SIZE: 0x0000001000 (4,00Kb) UFS_LU0 : 0x0000400000 (4,00Mb) UFS_LU1 : 0x0000400000 (4,00Mb) UFS_LU2 : 0x1DCB000000 (119,17Gb) RAM INFO: INT_SRAM: 0x0000070000 (448,00Kb) EXT_RAM : 0x0180000000 (6,00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [F2FS] ... Exception: Access violation at address 01158566 in module PandoraTool.exe. Read of address 0CD83F8F |
Bookmarks |
| |
|