|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Today's Posts | Search |
| LinkBack | Thread Tools | Display Modes |
08-23-2023, 00:53 | #1 (permalink) |
Product Manager Join Date: Oct 2000 Location: future
Posts: 22,435
Member: 2368 Status: Offline Sonork: 100.111111 Thanks Meter: 186,642 | Pandora PRO 5.6 Update. New devices added and some fixes. Added support for listed Hisense devices: - HLTE229E Hisense E40 - HLTE223E, HLTE223E_22 Hisense Infinity H30 Lite - HLTE223E_10, HLTE223E_11 Hisense H30 Lite - HLTE223E_50, HLTE223E_51 Hisense E40 Lite - HLTE223E_40 Hisense F19 List of supported functions for listed Doogee devices (Relock/Unlock Bootloader, Backup/Write/Format RPMB, Erase FRP, Format Flash, Read Info/IMEI/Partitions, Restore From Backup, Unlock Network, Repair, Wipe Data/Partitions, Write PAC) Added support for listed BMobile devices: - BMobile B50Pro, B60Pro, - BL50P, BL52, - BL50, AX1077+, AX1078 List of supported functions for listed Doogee devices (Relock/Unlock Bootloader, Backup/Write/Format RPMB, Erase FRP, Format Flash, Read Info/IMEI/Partitions, Restore From Backup, Unlock Network, Repair, Wipe Data/Partitions, Write PAC) Fixed: - some decrypt error (5.5 ver) - some small bugs If you still not have pandora contact with official z3x reseller and buy a license and get Pandora Online immediately. If you wish a Standalone solution, contact with domestic official reseller and buy Pandora BOX. DO NOT POST ANY LOGS OF JOB HERE in this thread, if you have any error - open own thread and supporters will answer there!!! List of resellers with stock: HERE Telegram news: HERE Last edited by blang; 08-24-2023 at 16:52. |
The Following 12 Users Say Thank You to blang For This Useful Post: |
08-24-2023, 17:14 | #6 (permalink) |
No Life Poster Join Date: Oct 2014 Location: Algérie Age: 45
Posts: 891
Member: 2269857 Status: Offline Thanks Meter: 364 | OPPO CPH2121 (OPPO A93) flashe donne thanks mrr blang Selected model: OPPO CPH2121 (OPPO A93) Operation: Flash (Download only) Software version: 5.7 Read super info... OK Parse scatter file... OK Load Rom Images... OK Connect Type-C to NONE... OK Host Power Off... OK Connect phone to [PC] in BROM Mode Waiting for device... OK Driver: [Microsoft,usbser,USB Serial Device,usbser.sys,10.0.19041.2130] Device found at COM10 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0725 Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6779] Install LibUSB... OK Waiting for device... OK Open port... OK Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [Microsoft,usbser,USB Serial Device,usbser.sys,10.0.19041.2130] Device found at COM10 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0725 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6779] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x68DE8BFD, 0x00C67506, 0x0BA20BD0, 0x8B6EFCCD Get Chip ID... [MT6779] Get SOC ID... [E1C141BC29842DC8D57089082E96C35C2C5F0CA97A3BD49899 E47173CC4FD0CD] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [10] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): KM8V7001JM-B810 (1200) Load EMI config from preloader... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : KM8V7001JM-B810 UFS_FWVER : 1200 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000080000 (512.00Kb) EXT_RAM : 0x0200000000 (8.00Gb) Get scatter info... OK Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : alps Product Manufacturer : alps Product Model : oplus_mssi_64_cn Product Name : sys_oplus_mssi_64_cn Product Device : oplus_mssi_64_cn Product Board : oppo6779 Board Platform : MT6779 Build ID : RP1A.200720.011 Build Date : Sat May 15 23:10:47 CST 2021 Display ID : RP1A.200720.011 release-keys Security Patch : 2021-05-05 Version SDK : 30 Version Release : 11 Version Codename : REL Firmware Version : 1621090887673 Userdata FS Type : EXT4 Get scatter info... OK Verify scatter file... OK Do NAND BMT remark... OK Setup download info... OK Get partition table catagory... OK [GPT] Read mirror partition table... OK Checking partition table layout changed... OK Read major partition table... OK Checking major partition table layout changed... OK Download "preloader"... OK Download "recovery"... OK Download "opporeserve2"... OK Download "vbmeta"... OK Download "cdt_engineering"... OK Download "md1img"... OK Download "spmfw"... OK Download "audio_dsp"... OK Download "scp1"... OK Download "scp2"... OK Download "sspm_1"... OK Download "sspm_2"... OK Download "cam_vpu1"... OK Download "cam_vpu2"... OK Download "cam_vpu3"... OK Download "gz1"... OK Download "gz2"... OK Download "lk"... OK Download "lk2"... OK Download "boot"... OK Download "logo"... OK Download "dtbo"... OK Download "tee1"... OK Download "tee2"... OK Download "special_preload"... OK Download "my_custom"... OK Download "vbmeta_system"... OK Download "vbmeta_vendor"... OK Download "super" part 1... OK Download "super" part 2... OK Download "super" part 3... OK Download "cache"... OK Download "userdata"... OK Flashing done! |
08-24-2023, 21:35 | #7 (permalink) |
Freak Poster Join Date: Apr 2015
Posts: 335
Member: 2383501 Status: Offline Sonork: 100.1660513 Thanks Meter: 211 | Amazing Pandora PRO 5.7 Update Added support for listed Sparx devices Neo 5, Neo 6, Neo 7 PRO, S6 List of supported functions for listed Sparx devices Relock/Unlock Bootloader, Backup/Write/Format RPMB, Erase FRP, Format Flash, Read Info/IMEI/Partitions Restore From Backup, Unlock Network, Repair, Wipe Data/Partitions, Write PAC ------------------ New function added password changing for online account ----------------- Fixed Error(6.-2) with EFOFS Unisoc |
08-26-2023, 19:57 | #15 (permalink) |
Junior Member Join Date: Dec 2016 Location: Colombia
Posts: 33
Member: 2664998 Status: Offline Thanks Meter: 3 | bug patch on nokia ta1347-g20 Selected model: Nokia TA-1347 (Nokia G20) Operation: Repair Software version: 5.7 Connect Type-C to NONE... OK Host Power Off... OK Connect phone to [PC] in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM12 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM12 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x83EB6F31, 0x74824108, 0xFE6A7243, 0x8F65C1BE Get Chip ID... [MT6765] Get SOC ID... [1DB95A454F761C15BE1564B87B1A426A231A0BC32C40EA4203 3220F14880B48D] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [7] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x7001005832393132388A2F20E44A19C3 Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: X29128 EMMC_ID : 0x7001005832393132388A2F20E44A19C3 EMMC_BOOT1: 0x0000400000 (4,00Mb) EMMC_BOOT2: 0x0000400000 (4,00Mb) EMMC_RPMB : 0x0000400000 (4,00Mb) EMMC_USER : 0x1D25000000 (116,58Gb) RAM INFO: INT_SRAM: 0x000003A000 (232,00Kb) EXT_RAM : 0x0100000000 (4,00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [B] Read product info... [EXT4] ... OK Product Brand : Nokia Product Manufacturer : HMD Global Product Model : Nokia G20 Product Name : Ronin_00WW Product Device : RNN_sprout Product Board : MT6765 Board Platform : connac1x Build ID : SP1A.210812.016 Build Date : Tue Jul 18 05:20:43 UTC 2023 Display ID : 00WW_3_31B Security Patch : 2023-07-01 Version SDK : 33 Version Release : 13 Version Codename : REL Firmware Version : 00WW_3_31B Userdata FS Type : EXT4 Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Read IMEI... OK IMEI: 359358488005470 Repairing IMEI... IMEI: 359358488005496 Write IMEI and patch CERT [NVDATA]... OK Load partiton for patching... error(ERR_FN2) "They had already corrected it in version 5.6" Selected model: Nokia TA-1347 (Nokia G20) Operation: Repair Software version: 5.6 Connect Type-C to NONE... OK Host Power Off... OK Connect phone to [PC] in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM12 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM12 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x2B32D40D, 0x231757BE, 0x71EFE42A, 0x56BD0601 Get Chip ID... [MT6765] Get SOC ID... [518F15C7D31D45972941E1BE2744081F50DD17C01A422EAE64 33EF0651FEBC2A] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [7] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x880103534C4431323855C2F149B128FF Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: SLD128 EMMC_ID : 0x880103534C4431323855C2F149B128FF EMMC_BOOT1: 0x0000400000 (4,00Mb) EMMC_BOOT2: 0x0000400000 (4,00Mb) EMMC_RPMB : 0x0000400000 (4,00Mb) EMMC_USER : 0x1CCF000000 (115,23Gb) RAM INFO: INT_SRAM: 0x000003A000 (232,00Kb) EXT_RAM : 0x0100000000 (4,00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [B] Read product info... [EXT4] ... OK Product Brand : Nokia Product Manufacturer : HMD Global Product Model : Nokia G20 Product Name : Ronin_00WW Product Device : RNN_sprout Product Board : MT6765 Board Platform : connac1x Build ID : SP1A.210812.016 Build Date : Tue Jul 18 05:20:43 UTC 2023 Display ID : 00WW_3_31B Security Patch : 2023-07-01 Version SDK : 33 Version Release : 13 Version Codename : REL Firmware Version : 00WW_3_31B Userdata FS Type : EXT4 Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Read IMEI... OK IMEI: 359358488007658 Repairing IMEI... IMEI: 359358488007658 Write IMEI and patch CERT [NVDATA]... OK Load partiton for patching... OK Checking modem patch possiblity... POSSIBLE WITH BOOT UNLOCK Patching CERT... OK Save patched partiton... OK Selected "Auto unlock bootloader" Read security partition from phone... OK Decrypting security data... OK Encrypt security data... OK Write security partition to phone... OK Unlock bootloader done! Write IMEI and patch CERT [NVRAM]... OK Write partition "nvdata"... OK Write partition "nvram"... OK Repair Security and Patch cert done! If your phone after repair keeps rebooting - use wipe data option. please solve this error again because in version 5.6 it is already working well, they updated to 5.7 and again the same error, because they did not leave it as it was! |
Bookmarks |
| |
|