|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
06-26-2022, 15:10 | #1 (permalink) |
Freak Poster Join Date: Oct 2016 Location: india
Posts: 336
Member: 2636476 Status: Offline Thanks Meter: 61 | Realme C3 Rmx2020 security repair done Code: Verifying user information. Successful Program version : 1.0.4.3 Process name : Mtk Flash Mode Toolkit (Bootloader Unlock) Process model name : Realme C3 (RMX2020) LibUsb checking and installing. Succesfuly Preloader mode: Turn off the device and plug in a usb cable. Brom mode: Turn off the device, connect the usb cable by pressing the volume up and down button. Waiting preloader or brom port. Found. Port Information : Name : MediaTek USB Port_V1632 Number : 22 Path : \\.\usb#vid_0e8d&pid_0003#6&1bf0bff0&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73} Connection Mode : Brom Connect mtk port. Succesfuly Connecting brom mode. Succesfuly Reading cpu information. Succesfuly Cpu name : MT6768 (Helio P65/G85 k68v1) Hardware code : 0x00000707 Hardware sub code : 0x8A00 Hardware version : 0xCA00 Sw version : 0x0000 Disabling watchdog. Succesfuly Get config target. Succesfuly SBC status : Active SLA status : Passive DAA status : Active SWJTAG status : Active EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT : Passive Root cert required : Passive Memory read auth : Active Memory write auth : Active Cmd 0xC8 blocked : Active Get meid. Succesfuly Meid : 6B7E743B58873ECA841894D3658F69D3 Get socid. Succesfuly Meid : 40A4EF6C191E08D565A06678AEED3AA4B794D213F1E1A48B470CD46923EA4566 Security bypass methot : Kamakiri2 Bypass security. Succesfuly Connecting brom mode. Succesfuly Reading emi from device. Succesfuly Loading preloader file. Succesfuly Emi name : preloader_oppo6769.bin Emi version : V116 Searching da from server. Succesfuly Da load mode : Stream File is being verified. Succesfuly Loading da file. Succesfuly Da version : MTK_AllInOne_DA_v3.3001.09/05/2021.05:41_572394 Da identifier : MTK_DOWNLOAD_AGENT Search entry. Succesfuly Flash protocol : XFlash Sending boot. Succesfuly Jump first boot. Succesfuly Set flash mode device. Succesfuly Get flash mode. Succesfuly Flash mode : brom Get ram information. Succesfuly SRAM size : 448 KB (0x0000000000200000) DRAM size : 448 KB (0x0000000000200000) Get storage information. Succesfuly Send emi data. Succesfuly Send second boot. Succesfuly Get storage information. Succesfuly Storage type : eMMC Disk size : 58.24 GB Disk cid : 3H6CA Check storage life. Succesfuly Reading device partition. Succesfuly Part count : 48 Download protocol start. Succesfuly Reading device information. Succesfuly Release : 10 Security version : 2020-11-05 Display id : QP1A.190711.020 release-keys Date : 1608028721 Description : full_oppo6769-user 10 QP1A.190711.020 68b77aba7cb33275 release-keys Cpu version : arm64-v8a Locale : en-US Id : QP1A.190711.020 Device bootloader encryption is calculated from server. Succesfuly Download protocol finish. Succesfuly Reboot device. Succesfuly Process status : Successful Process time : 85 .s Process number : 1091306 |
The Following User Says Thank You to coderinside For This Useful Post: |
Bookmarks |
| |
|