|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
04-16-2021, 23:00 | #1 (permalink) |
Freak Poster Join Date: Mar 2007
Posts: 332
Member: 469257 Status: Offline Thanks Meter: 34 | G973U U4 read codes failed [Answered] |
04-17-2021, 08:07 | #3 (permalink) | |
Product Supporter Join Date: Oct 2009 Location: Romania, Bucharest
Posts: 99,845
Member: 1146942 Status: Offline Sonork: 100.1587278 Thanks Meter: 27,412 | Hello. Please post here full Software log of Read codes operation, we will check it. Quote:
| |
04-17-2021, 17:29 | #4 (permalink) | |
Freak Poster Join Date: Mar 2007
Posts: 332
Member: 469257 Status: Offline Thanks Meter: 34 | Quote:
INFO : 4/16/2021 2:36:05 PM > Work ID: 0000000000E2D077 INFO : 4/16/2021 2:36:06 PM > Platform: Samsung Android INFO : 4/16/2021 2:36:06 PM > Selected port: COM33 INFO : 4/16/2021 2:36:06 PM > Selected model: SM-G973U INFO : 4/16/2021 2:36:06 PM > Operation: Read Codes - General INFO : 4/16/2021 2:36:08 PM > Detected phone model: SM-G973U INFO : 4/16/2021 2:36:08 PM > Firmware compiled date: Tue Jun 16 19:13:36 KST 2020 INFO : 4/16/2021 2:36:08 PM > PDA version: FA90_G973USQU4ATF1 INFO : 4/16/2021 2:36:08 PM > CSC version: unknown INFO : 4/16/2021 2:36:08 PM > SW version: G973USQU4ATF1 INFO : 4/16/2021 2:36:08 PM > Build number: 16121330 INFO : 4/16/2021 2:36:08 PM > Phone SN: R38M40DN6ZF INFO : 4/16/2021 2:36:08 PM > Android version: 9 (PPR1.180610.011) INFO : 4/16/2021 2:36:08 PM > Sales code: unknown INFO : 4/16/2021 2:36:08 PM > Country: unknown INFO : 4/16/2021 2:36:08 PM > HW platform: msmnile INFO : 4/16/2021 2:36:08 PM > HW Chip: unknown INFO : 4/16/2021 2:36:08 PM > HW Modem: SM8150 INFO : 4/16/2021 2:36:08 PM > Security patch level: 2019-01-01 INFO : 4/16/2021 2:36:08 PM > Warranty Void: 0 INFO : 4/16/2021 2:36:08 PM > SIM 1 status: absent INFO : 4/16/2021 2:36:08 PM > Codename: beyond1qltesq WARN : 4/16/2021 2:36:12 PM > "Devices with Unlock App (branded to T-Mobile, MetroPCS, etc.) are not supported! WARN : 4/16/2021 2:36:12 PM > WARN : 4/16/2021 2:36:12 PM > Make sure device requests to enter unlock code and only then perform “Read Codes” operation!" WARN : 4/16/2021 2:36:12 PM > WARN : 4/16/2021 2:36:12 PM > Continue? INFO : 4/16/2021 2:36:14 PM > Searching for USB diagnostic port... ERROR : 4/16/2021 2:36:14 PM > failed INFO : 4/16/2021 2:36:14 PM > Initializing exploit... WARN : 4/16/2021 2:36:41 PM > OK INFO : 4/16/2021 2:36:41 PM > Initializing diagnostic port... WARN : 4/16/2021 2:36:51 PM > OK INFO : 4/16/2021 2:36:51 PM > Searching for ADB device... WARN : 4/16/2021 2:36:54 PM > OK INFO : 4/16/2021 2:36:54 PM > Initializing exploit... WARN : 4/16/2021 2:37:17 PM > OK INFO : 4/16/2021 2:37:23 PM > Searching for USB diagnostic port... WARN : 4/16/2021 2:37:23 PM > OK INFO : 4/16/2021 2:37:23 PM > Reading QCN: INFO : 4/16/2021 2:37:23 PM > Send SPC... WARN : 4/16/2021 2:37:23 PM > OK INFO : 4/16/2021 2:37:23 PM > Reading mobile property... WARN : 4/16/2021 2:37:23 PM > OK INFO : 4/16/2021 2:37:23 PM > Reading feature mask... WARN : 4/16/2021 2:37:23 PM > OK INFO : 4/16/2021 2:37:23 PM > Reading roaming list 0... WARN : 4/16/2021 2:37:23 PM > OK INFO : 4/16/2021 2:37:23 PM > Reading NV items... WARN : 4/16/2021 2:38:04 PM > OK INFO : 4/16/2021 2:38:04 PM > Reading NV SIM1 items... WARN : 4/16/2021 2:38:48 PM > OK INFO : 4/16/2021 2:38:48 PM > Reading NV SIM2 items... WARN : 4/16/2021 2:39:31 PM > OK INFO : 4/16/2021 2:39:31 PM > Reading NV items... WARN : 4/16/2021 2:39:36 PM > OK INFO : 4/16/2021 2:39:37 PM > Reading EFS... WARN : 4/16/2021 2:39:37 PM > OK INFO : 4/16/2021 2:39:37 PM > Reading provisioning items... WARN : 4/16/2021 2:39:48 PM > OK INFO : 4/16/2021 2:39:48 PM > Backup saved as C:\Program Files (x86)\Octoplus\Octoplus_Samsung\BACKUP\QCN-SM-G973U-16-04-2021_14-36-14.qcn file INFO : 4/16/2021 2:39:48 PM > Reading QCN done! INFO : 4/16/2021 2:39:48 PM > Connecting to server... WARN : 4/16/2021 2:39:50 PM > OK INFO : 4/16/2021 2:39:50 PM > Checking smart card... WARN : 4/16/2021 2:39:57 PM > OK INFO : 4/16/2021 2:39:57 PM > Username: 2x38jyz INFO : 4/16/2021 2:39:57 PM > Authorizing... WARN : 4/16/2021 2:40:01 PM > OK INFO : 4/16/2021 2:40:01 PM > Checking balance... WARN : 4/16/2021 2:40:02 PM > OK INFO : 4/16/2021 2:40:02 PM > Your balance: 240 credits. INFO : 4/16/2021 2:40:02 PM > Checking operation... WARN : 4/16/2021 2:40:04 PM > OK INFO : 4/16/2021 2:40:04 PM > Initializing exploit... INFO : 4/16/2021 2:40:32 PM > Preparing phone.. WARN : 4/16/2021 2:40:32 PM > OK WARN : 4/16/2021 2:40:58 PM > OK INFO : 4/16/2021 2:40:58 PM > Sending device information... WARN : 4/16/2021 2:41:47 PM > OK INFO : 4/16/2021 2:41:50 PM > Preparing device for Uplode Mode... WARN : 4/16/2021 2:42:50 PM > OK INFO : 4/16/2021 2:42:51 PM > Searching for device in Uploade Mode... WARN : 4/16/2021 2:42:53 PM > OK INFO : 4/16/2021 2:42:53 PM > Reading Uplode Mode data... INFO : 4/16/2021 2:43:11 PM > Searching for signatures... WARN : 4/16/2021 2:43:20 PM > OK INFO : 4/16/2021 2:43:22 PM > Searching for ADB device... WARN : 4/16/2021 2:43:58 PM > OK INFO : 4/16/2021 2:43:59 PM > Initializing exploit... WARN : 4/16/2021 2:44:30 PM > OK INFO : 4/16/2021 2:44:32 PM > Reseting MSL... WARN : 4/16/2021 2:45:53 PM > OK WARN : 4/16/2021 2:45:55 PM > Phone will restart now. Please don't disconnect cable! INFO : 4/16/2021 2:45:56 PM > Rebooting phone... WARN : 4/16/2021 2:46:02 PM > OK INFO : 4/16/2021 2:46:04 PM > Searching for ADB device... WARN : 4/16/2021 2:46:29 PM > OK INFO : 4/16/2021 2:46:31 PM > Initializing exploit... WARN : 4/16/2021 2:47:04 PM > OK INFO : 4/16/2021 2:47:05 PM > Bypassing security 1... WARN : 4/16/2021 2:49:57 PM > OK WARN : 4/16/2021 2:50:00 PM > Phone will restart now. Please don't disconnect cable! INFO : 4/16/2021 2:50:01 PM > Rebooting phone... WARN : 4/16/2021 2:50:07 PM > OK INFO : 4/16/2021 2:50:09 PM > Searching for ADB device... WARN : 4/16/2021 2:50:35 PM > OK INFO : 4/16/2021 2:50:37 PM > Initializing exploit... WARN : 4/16/2021 2:51:08 PM > OK INFO : 4/16/2021 2:51:10 PM > Bypassing security 2... ERROR : 4/16/2021 2:52:39 PM > MyExceptionEIdSocketErrorSocket Error # 10054 Connection reset by peer. ERROR : 4/16/2021 2:52:39 PM > MyExceptionEIdSocketErrorSocket Error # 10054 Connection reset by peer. ERROR : 4/16/2021 2:52:39 PM > Socket Error # 10054 Connection reset by peer. ERROR : 4/16/2021 2:52:40 PM > MyExceptionEIdSocketErrorSocket Error # 10054 Connection reset by peer. I try for second time and it succeded, but i used double credits with this device, can you bring the credits consumed in the first try? | |
Bookmarks |
| |
|