GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > Pandora’s box


Reply
 
LinkBack Thread Tools Display Modes
Old 06-06-2022, 06:09   #1 (permalink)
No Life Poster
 
rahihimkhan's Avatar
 
Join Date: Oct 2007
Location: Dera Ismail Khan (KPK) Pak
Posts: 2,544
Member: 613449
Status: Offline
Sonork: 100.1614074
Thanks Meter: 634
Realme RMX3430 after Repair boot image corrupted [Answered]


Selected model: Realme RMX3430 (Realme Narzo 50A)
Operation: Repair
Software version: 3.5

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to BOX in BROM mode
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM7 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x69BEFF14, 0x1409BC53, 0x9007D431, 0x9C1E1188
Get Chip ID... [MT6768]
Get SOC ID... [CFF54518D02E8A9939599285D2710CFA4AD1EBAC1A9E7952D2 29D53FF6956E21]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x15010044563644414202689DFAACA837
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x15010044563644414202689DFAACA837
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6769
Board Platform : MT6768
Build ID : RP1A.200720.011
Build Date : Sun May 8 18:15:37 CST 2022
Display ID : RP1A.200720.011 release-keys
Security Patch : 2022-05-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 0mp3k6833v164P6
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Repairing IMEI...
IMEI 1: 35512aaaaaaaaaaaaaa
IMEI 2: 355125aaaaaaaaaaaaaa
Write IMEI [NVDATA]... OK
Load partiton for patching... OK
Patching CERT... OK
Save patched partiton... OK
Unlock bootloader... OK
Write IMEI [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security done!
If your phone after repair keeps rebooting - use wipe data option
  Reply With Quote
Old 06-06-2022, 07:23   #2 (permalink)
Z3X
Product Supporter
 
Join Date: Feb 2008
Location: z3x
Posts: 15,937
Member: 706257
Status: Offline
Thanks Meter: 5,057
Hello. Bottloader unlocked or no?
  Reply With Quote
Old 06-06-2022, 07:29   #3 (permalink)
No Life Poster
 
rahihimkhan's Avatar
 
Join Date: Oct 2007
Location: Dera Ismail Khan (KPK) Pak
Posts: 2,544
Member: 613449
Status: Offline
Sonork: 100.1614074
Thanks Meter: 634
Quote:
Originally Posted by Z3X View Post
Hello. Bottloader unlocked or no?
only show corropted image (boot/recovery)
  Reply With Quote
Old 06-06-2022, 07:58   #4 (permalink)
No Life Poster
 
rahihimkhan's Avatar
 
Join Date: Oct 2007
Location: Dera Ismail Khan (KPK) Pak
Posts: 2,544
Member: 613449
Status: Offline
Sonork: 100.1614074
Thanks Meter: 634
RMX3430_11_A.11_

RMX3430_EX_11_A.06

RMX3430_EX_11_A.09


try with this file but not Repair

same problem corropted image (boot/recovery)
  Reply With Quote
Old 06-06-2022, 08:35   #5 (permalink)
Z3X
Product Supporter
 
Join Date: Feb 2008
Location: z3x
Posts: 15,937
Member: 706257
Status: Offline
Thanks Meter: 5,057
Enter fastboot and perfrom fastboot getvar all. Attach log.
  Reply With Quote
Old 06-06-2022, 09:15   #6 (permalink)
No Life Poster
 
rahihimkhan's Avatar
 
Join Date: Oct 2007
Location: Dera Ismail Khan (KPK) Pak
Posts: 2,544
Member: 613449
Status: Offline
Sonork: 100.1614074
Thanks Meter: 634
Quote:
Originally Posted by Z3X View Post
Enter fastboot and perfrom fastboot getvar all. Attach log.
mobile not enter in fastboot
  Reply With Quote
Old 06-06-2022, 10:30   #7 (permalink)
Z3X
Product Supporter
 
Join Date: Feb 2008
Location: z3x
Posts: 15,937
Member: 706257
Status: Offline
Thanks Meter: 5,057
Ok, reflash to older firmware and repeat operation.
  Reply With Quote
Old 06-06-2022, 10:52   #8 (permalink)
No Life Poster
 
rahihimkhan's Avatar
 
Join Date: Oct 2007
Location: Dera Ismail Khan (KPK) Pak
Posts: 2,544
Member: 613449
Status: Offline
Sonork: 100.1614074
Thanks Meter: 634
Rmx3430_ex_11_a.06 flash with this

mobile reboot on logo
  Reply With Quote
Old 06-06-2022, 11:01   #9 (permalink)
Z3X
Product Supporter
 
Join Date: Feb 2008
Location: z3x
Posts: 15,937
Member: 706257
Status: Offline
Thanks Meter: 5,057
Restore security backup.
  Reply With Quote
Old 06-06-2022, 11:48   #10 (permalink)
No Life Poster
 
rahihimkhan's Avatar
 
Join Date: Oct 2007
Location: Dera Ismail Khan (KPK) Pak
Posts: 2,544
Member: 613449
Status: Offline
Sonork: 100.1614074
Thanks Meter: 634
Quote:
Originally Posted by Z3X View Post
Restore security backup.



Operation: Write OFP
Software version: 3.5

Extract scatter file... OK
Read super info... OK
Parse scatter file... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to BOX in BROM mode
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x69BEFF14, 0x1409BC53, 0x9007D431, 0x9C1E1188
Get Chip ID... [MT6768]
Get SOC ID... [CFF54518D02E8A9939599285D2710CFA4AD1EBAC1A9E7952D2 29D53FF6956E21]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x15010044563644414202689DFAACA837
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x15010044563644414202689DFAACA837
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Get scatter info... OK
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6769
Board Platform : MT6768
Build ID : RP1A.200720.011
Build Date : Wed Feb 23 19:06:59 CST 2022
Display ID : RP1A.200720.011 release-keys
Security Patch : 2022-02-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 0mp3k6833v164P6
Get scatter info... OK
Verify scatter file... OK
Do NAND BMT remark... OK
Setup download info... OK
Get partition table catagory... OK [GPT]
Read mirror partition table... OK
Check partition table layout changed... OK
Read major partition table... OK
Check major partition table layout changed... OK
Download "preloader"... OK
Download "recovery"... OK
Download "opporeserve2"... OK
Download "vbmeta"... OK
Download "vbmeta_system"... OK
Download "vbmeta_vendor"... OK
Download "cdt_engineering"... OK
Download "logo"... OK
Download "md1img"... OK
Download "spmfw"... OK
Download "scp1"... OK
Download "scp2"... OK
Download "sspm_1"... OK
Download "sspm_2"... OK
Download "gz1"... OK
Download "gz2"... OK
Download "lk"... OK
Download "lk2"... OK
Download "boot"... OK
Download "dtbo"... OK
Download "tee1"... OK
Download "tee2"... OK
Download "super" part 1... OK
Download "super" part 2... OK
Download "super" part 3... OK
Download "cache"... OK
Download "userdata"... OK
Flashing done


Mobile phone fully on but imei blank when Repair imei same problem only show corropted image (boot/recovery)


Selected model: Realme RMX3430 (Realme Narzo 50A)
Operation: Flash (Download only)
Software version: 3.5

File(s) not selected


Selected model: Realme RMX3430 (Realme Narzo 50A)
Operation: Repair
Software version: 3.5

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to BOX in BROM mode
Wait for device... error(2)


Selected model: Realme RMX3430 (Realme Narzo 50A)
Operation: Repair
Software version: 3.5

Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to BOX in BROM mode
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM8 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x69BEFF14, 0x1409BC53, 0x9007D431, 0x9C1E1188
Get Chip ID... [MT6768]
Get SOC ID... [CFF54518D02E8A9939599285D2710CFA4AD1EBAC1A9E7952D2 29D53FF6956E21]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x15010044563644414202689DFAACA837
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_ID : 0x15010044563644414202689DFAACA837
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6769
Board Platform : MT6768
Build ID : RP1A.200720.011
Build Date : Thu Oct 28 11:24:04 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-10-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 0mp3k6833v164P6
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Repairing IMEI...zzzzzzzzzzzz
IMEI 1: 35512511zzzzzzzzzz
Write IMEI [NVDATA]... OK
Load partiton for patching... OK
Patching CERT... OK
Save patched partiton... OK
Unlock bootloader... OK
Write IMEI [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security done!
If your phone after repair keeps rebooting - use wipe data option.
  Reply With Quote
Old 06-06-2022, 11:51   #11 (permalink)
No Life Poster
 
rahihimkhan's Avatar
 
Join Date: Oct 2007
Location: Dera Ismail Khan (KPK) Pak
Posts: 2,544
Member: 613449
Status: Offline
Sonork: 100.1614074
Thanks Meter: 634
https://easy-firmware.com/index.php?...file&id=389237 please unlock this link
  Reply With Quote
Old 06-06-2022, 12:04   #12 (permalink)
No Life Poster
 
rahihimkhan's Avatar
 
Join Date: Oct 2007
Location: Dera Ismail Khan (KPK) Pak
Posts: 2,544
Member: 613449
Status: Offline
Sonork: 100.1614074
Thanks Meter: 634
BootLoader State : Locked!

BootLoader State : Unlocked!

Done!
Elapsed: 00:00:41

Reconnect Power/Cable!
  Reply With Quote
Old 06-06-2022, 12:15   #13 (permalink)
Z3X
Product Supporter
 
Join Date: Feb 2008
Location: z3x
Posts: 15,937
Member: 706257
Status: Offline
Thanks Meter: 5,057
So after repair again correupted image? Provide partitions backup (except userdata and cache).
  Reply With Quote
Old 06-07-2022, 08:30   #14 (permalink)
No Life Poster
 
rahihimkhan's Avatar
 
Join Date: Oct 2007
Location: Dera Ismail Khan (KPK) Pak
Posts: 2,544
Member: 613449
Status: Offline
Sonork: 100.1614074
Thanks Meter: 634
Quote:
Originally Posted by Z3X View Post
So after repair again correupted image? Provide partitions backup (except userdata and cache).
https://www.4shared.com/rar/WsJFLaGoea/DUMP_.html
  Reply With Quote
Old 06-07-2022, 11:23   #15 (permalink)
No Life Poster
 
rahihimkhan's Avatar
 
Join Date: Oct 2007
Location: Dera Ismail Khan (KPK) Pak
Posts: 2,544
Member: 613449
Status: Offline
Sonork: 100.1614074
Thanks Meter: 634
Quote:
Originally Posted by Z3X View Post
Hello. Bottloader unlocked or no?
Bootloader locked


i try for unlock Bootloader cm2 chimera and umt but same Bootloader locked
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 15:35.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.24790 seconds with 9 queries

SEO by vBSEO