silivriserdar
Genel Moderator
- Katılım
- 21 Haz 2018
- Mesajlar
- 22,052
- Tepkime puanı
- 44,853
- Puanları
- 113
- Yaş
- 40
Çevrimdışı
Merhaba GSM Turkey Üyeleri bu paylaşacağım konuda OPPO Reno 4 Z 5G CPH2065 cihazına ait IMEI repair başarı raporunu paylaşacağım. Ben bu işlemi Pandora Box ile yaptım. Bu araç ücretli bir araçtır.
Detaylı anlatım VIP bölümünde vardır.
Detaylı anlatım VIP bölümünde vardır.
Kod:
Selected model:
Operation: Repair
Software version: 4.6
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to BOX in BROM mode
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0886
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6873]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM119 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0886
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6873]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE4D66E7A, 0xA183EEAA, 0xB1F8A0F3, 0x50218047
Get Chip ID... [MT6873]
Get SOC ID... [F2C4E6BE9335055E13E447D8670CB50593DFE09727154F6FB7139B12C7CD3DE1]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [16]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM8V8001JM-B813 (1500)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM8V8001JM-B813
UFS_FWVER : 1500
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... OK
Product Board : oppo6873
Board Platform : MT6873
Build ID : QP1A.190711.020
Build Date : Fri Aug 28 20:31:48 CST 2020
Security Patch : 2020-09-05
Version SDK : 29
Version Release : 10
Version Codename : REL
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Repairing IMEI...
IMEI 1:
IMEI 2:
Write IMEI [NVDATA]... OK
Checking patch type... [1]
Patching partition... already patched, skip
Write IMEI [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security done!
If your phone after repair keeps rebooting - use wipe data option.