Z3X Oppo Reno5 F Stuck on logo and boot loop after repair IMEI

Z3X Team

gsm-fazal

Active Member
Jun 24, 2021
30
8
Pakistan
Hello, Team I Just Repair Oppo Reno5 F with a pandora box now my device is boot loop.
What should I do?
And the most important question is why does that happen.


Selected model: OPPO CPH2217 (Oppo Reno5 F)
Operation: Repair
Software version: 2.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB5530E73, 0x69D78BA0, 0x471AE4EC, 0x5861B254
Get Chip ID... [MT6779]
Get SOC ID... [96719D6F0A12A0D00199D66F6925087AF3376D862141BF0ABE35BC69562E1884]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [26]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6779
Board Platform : MT6779
Build ID : RP1A.200720.011
Build Date : Sat Sep 18 23:07:36 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1631976954541
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 86771xxxxxxxxxx
IMEI 2: 86771xxxxxxxxxx
Repairing IMEI...
IMEI 1: 35643xxxxxxxxxx
IMEI 2: 35643xxxxxxxxxx
Write IMEI [NVDATA]... OK
Load partiton for patching... OK OK
Save patched partiton... OK
Unlock bootloader... OK
Write IMEI [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security done!
 

Attachments

  • InkedCapture_LI.jpg
    InkedCapture_LI.jpg
    764.1 KB · Views: 136
  • Like
Reactions: saddiqullah0311

k4bini

Active Member
Dec 8, 2020
95
21
solomon islands
Hello, Team I Just Repair Oppo Reno5 F with a pandora box now my device is boot loop.
What should I do?
And the most important question is why does that happen.


Selected model: OPPO CPH2217 (Oppo Reno5 F)
Operation: Repair
Software version: 2.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB5530E73, 0x69D78BA0, 0x471AE4EC, 0x5861B254
Get Chip ID... [MT6779]
Get SOC ID... [96719D6F0A12A0D00199D66F6925087AF3376D862141BF0ABE35BC69562E1884]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [26]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6779
Board Platform : MT6779
Build ID : RP1A.200720.011
Build Date : Sat Sep 18 23:07:36 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1631976954541
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 86771xxxxxxxxxx
IMEI 2: 86771xxxxxxxxxx
Repairing IMEI...
IMEI 1: 35643xxxxxxxxxx
IMEI 2: 35643xxxxxxxxxx
Write IMEI [NVDATA]... OK
Load partiton for patching... OK OK
Save patched partiton... OK
Unlock bootloader... OK
Write IMEI [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security done!

Hello, Team I Just Repair Oppo Reno5 F with a pandora box now my device is boot loop.
What should I do?
And the most important question is why does that happen.


Selected model: OPPO CPH2217 (Oppo Reno5 F)
Operation: Repair
Software version: 2.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB5530E73, 0x69D78BA0, 0x471AE4EC, 0x5861B254
Get Chip ID... [MT6779]
Get SOC ID... [96719D6F0A12A0D00199D66F6925087AF3376D862141BF0ABE35BC69562E1884]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [26]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6779
Board Platform : MT6779
Build ID : RP1A.200720.011
Build Date : Sat Sep 18 23:07:36 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1631976954541
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 86771xxxxxxxxxx
IMEI 2: 86771xxxxxxxxxx
Repairing IMEI...
IMEI 1: 35643xxxxxxxxxx
IMEI 2: 35643xxxxxxxxxx
Write IMEI [NVDATA]... OK
Load partiton for patching... OK OK
Save patched partiton... OK
Unlock bootloader... OK
Write IMEI [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security done!
flash it with new firmware.......
 
  • Like
Reactions: saddiqullah0311

gsm-fazal

Active Member
Jun 24, 2021
30
8
Pakistan
Restore Backup

Selected model: OPPO CPH2217 (Oppo Reno5 F)
Operation: Restore From Backup
Software version: 2.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB5530E73, 0x69D78BA0, 0x471AE4EC, 0x5861B254
Get Chip ID... [MT6779]
Get SOC ID... [96719D6F0A12A0D00199D66F6925087AF3376D862141BF0ABE35BC69562E1884]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [26]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6779
Board Platform : MT6779
Build ID : RP1A.200720.011
Build Date : Sat Sep 18 23:07:36 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1631976954541
Write file "nvdata.bin"... OK
Write file "nvram.bin"... OK
Restore Backup done!
restore backup.JPG restore backup.JPG

Write Firmware

Selected model: OPPO CPH2217 (Oppo Reno5 F)
Operation: Write OFP
Software version: 2.10

Extract scatter file... OK
Parse scatter file... OK
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB5530E73, 0x69D78BA0, 0x471AE4EC, 0x5861B254
Get Chip ID... [MT6779]
Get SOC ID... [96719D6F0A12A0D00199D66F6925087AF3376D862141BF0ABE35BC69562E1884]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [26]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Get scatter info... OK
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6779
Board Platform : MT6779
Build ID : RP1A.200720.011
Build Date : Sat Sep 18 23:07:36 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1631976954541
Get scatter info... OK
Verify scatter file... OK
Do NAND BMT remark... OK
Setup download info... OK
Get partition table catagory... OK [GPT]
Read mirror partition table... OK
Check partition table layout changed... OK
Read major partition table... OK
Check major partition table layout changed... OK
Download "preloader"... OK
Download "recovery"... OK
Download "opporeserve2"... OK
Download "vbmeta"... OK
Download "cdt_engineering"... OK
Download "md1img"... OK
Download "spmfw"... OK
Download "audio_dsp"... OK
Download "scp1"... OK
Download "scp2"... OK
Download "sspm_1"... OK
Download "sspm_2"... OK
Download "cam_vpu1"... OK
Download "cam_vpu2"... OK
Download "cam_vpu3"... OK
Download "gz1"... OK
Download "gz2"... OK
Download "lk"... OK
Download "lk2"... OK
Download "boot"... OK
Download "logo"... OK
Download "dtbo"... OK
Download "tee1"... OK
Download "tee2"... OK
Download "vbmeta_system"... OK
Download "vbmeta_vendor"... OK
Download "cache"... OK
Download "userdata"... OK
Flashing done!



Note: While writing firmware there is no super.img which is the base file for the whole firmware is not written. I don't know why but when I extract OFP the super.img file was in the list but while writing with Pandora box it's skipped by itself.
 

gsm-fazal

Active Member
Jun 24, 2021
30
8
Pakistan
try cm2 smart reset

Restore Backup

Selected model: OPPO CPH2217 (Oppo Reno5 F)
Operation: Restore From Backup
Software version: 2.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB5530E73, 0x69D78BA0, 0x471AE4EC, 0x5861B254
Get Chip ID... [MT6779]
Get SOC ID... [96719D6F0A12A0D00199D66F6925087AF3376D862141BF0ABE35BC69562E1884]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [26]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6779
Board Platform : MT6779
Build ID : RP1A.200720.011
Build Date : Sat Sep 18 23:07:36 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1631976954541
Write file "nvdata.bin"... OK
Write file "nvram.bin"... OK
Restore Backup done!


Write Firmware

Selected model: OPPO CPH2217 (Oppo Reno5 F)
Operation: Write OFP
Software version: 2.10

Extract scatter file... OK
Parse scatter file... OK
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB5530E73, 0x69D78BA0, 0x471AE4EC, 0x5861B254
Get Chip ID... [MT6779]
Get SOC ID... [96719D6F0A12A0D00199D66F6925087AF3376D862141BF0ABE35BC69562E1884]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [26]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Get scatter info... OK
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6779
Board Platform : MT6779
Build ID : RP1A.200720.011
Build Date : Sat Sep 18 23:07:36 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1631976954541
Get scatter info... OK
Verify scatter file... OK
Do NAND BMT remark... OK
Setup download info... OK
Get partition table catagory... OK [GPT]
Read mirror partition table... OK
Check partition table layout changed... OK
Read major partition table... OK
Check major partition table layout changed... OK
Download "preloader"... OK
Download "recovery"... OK
Download "opporeserve2"... OK
Download "vbmeta"... OK
Download "cdt_engineering"... OK
Download "md1img"... OK
Download "spmfw"... OK
Download "audio_dsp"... OK
Download "scp1"... OK
Download "scp2"... OK
Download "sspm_1"... OK
Download "sspm_2"... OK
Download "cam_vpu1"... OK
Download "cam_vpu2"... OK
Download "cam_vpu3"... OK
Download "gz1"... OK
Download "gz2"... OK
Download "lk"... OK
Download "lk2"... OK
Download "boot"... OK
Download "logo"... OK
Download "dtbo"... OK
Download "tee1"... OK
Download "tee2"... OK
Download "vbmeta_system"... OK
Download "vbmeta_vendor"... OK
Download "cache"... OK
Download "userdata"... OK
Flashing done!



Note: While writing firmware there is no super.img which is the base file for the whole firmware is not written. I don't know why but when I extract OFP the super.img file was in the list but while writing with Pandora box it's skipped by itself.
 

(SOFTWARE~DEVELOPER)

Active Member
Jul 16, 2019
17
9
PayPal:

Donate money to this user
Restore Backup

Selected model: OPPO CPH2217 (Oppo Reno5 F)
Operation: Restore From Backup
Software version: 2.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB5530E73, 0x69D78BA0, 0x471AE4EC, 0x5861B254
Get Chip ID... [MT6779]
Get SOC ID... [96719D6F0A12A0D00199D66F6925087AF3376D862141BF0ABE35BC69562E1884]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [26]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6779
Board Platform : MT6779
Build ID : RP1A.200720.011
Build Date : Sat Sep 18 23:07:36 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1631976954541
Write file "nvdata.bin"... OK
Write file "nvram.bin"... OK
Restore Backup done!


Write Firmware

Selected model: OPPO CPH2217 (Oppo Reno5 F)
Operation: Write OFP
Software version: 2.10

Extract scatter file... OK
Parse scatter file... OK
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB5530E73, 0x69D78BA0, 0x471AE4EC, 0x5861B254
Get Chip ID... [MT6779]
Get SOC ID... [96719D6F0A12A0D00199D66F6925087AF3376D862141BF0ABE35BC69562E1884]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [26]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Get scatter info... OK
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6779
Board Platform : MT6779
Build ID : RP1A.200720.011
Build Date : Sat Sep 18 23:07:36 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1631976954541
Get scatter info... OK
Verify scatter file... OK
Do NAND BMT remark... OK
Setup download info... OK
Get partition table catagory... OK [GPT]
Read mirror partition table... OK
Check partition table layout changed... OK
Read major partition table... OK
Check major partition table layout changed... OK
Download "preloader"... OK
Download "recovery"... OK
Download "opporeserve2"... OK
Download "vbmeta"... OK
Download "cdt_engineering"... OK
Download "md1img"... OK
Download "spmfw"... OK
Download "audio_dsp"... OK
Download "scp1"... OK
Download "scp2"... OK
Download "sspm_1"... OK
Download "sspm_2"... OK
Download "cam_vpu1"... OK
Download "cam_vpu2"... OK
Download "cam_vpu3"... OK
Download "gz1"... OK
Download "gz2"... OK
Download "lk"... OK
Download "lk2"... OK
Download "boot"... OK
Download "logo"... OK
Download "dtbo"... OK
Download "tee1"... OK
Download "tee2"... OK
Download "vbmeta_system"... OK
Download "vbmeta_vendor"... OK
Download "cache"... OK
Download "userdata"... OK
Flashing done!

Change flash file & again flash

Latest file download From here
CPH2217export_11_A.19_202103060944_GsmMafia.Com
 

nauman jan

Active Member
Apr 4, 2017
17
1
Mobile Software
Restore Backup

Selected model: OPPO CPH2217 (Oppo Reno5 F)
Operation: Restore From Backup
Software version: 2.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB5530E73, 0x69D78BA0, 0x471AE4EC, 0x5861B254
Get Chip ID... [MT6779]
Get SOC ID... [96719D6F0A12A0D00199D66F6925087AF3376D862141BF0ABE35BC69562E1884]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [26]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6779
Board Platform : MT6779
Build ID : RP1A.200720.011
Build Date : Sat Sep 18 23:07:36 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1631976954541
Write file "nvdata.bin"... OK
Write file "nvram.bin"... OK
Restore Backup done!


Write Firmware

Selected model: OPPO CPH2217 (Oppo Reno5 F)
Operation: Write OFP
Software version: 2.10

Extract scatter file... OK
Parse scatter file... OK
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM4 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB5530E73, 0x69D78BA0, 0x471AE4EC, 0x5861B254
Get Chip ID... [MT6779]
Get SOC ID... [96719D6F0A12A0D00199D66F6925087AF3376D862141BF0ABE35BC69562E1884]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [26]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Get scatter info... OK
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6779
Board Platform : MT6779
Build ID : RP1A.200720.011
Build Date : Sat Sep 18 23:07:36 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1631976954541
Get scatter info... OK
Verify scatter file... OK
Do NAND BMT remark... OK
Setup download info... OK
Get partition table catagory... OK [GPT]
Read mirror partition table... OK
Check partition table layout changed... OK
Read major partition table... OK
Check major partition table layout changed... OK
Download "preloader"... OK
Download "recovery"... OK
Download "opporeserve2"... OK
Download "vbmeta"... OK
Download "cdt_engineering"... OK
Download "md1img"... OK
Download "spmfw"... OK
Download "audio_dsp"... OK
Download "scp1"... OK
Download "scp2"... OK
Download "sspm_1"... OK
Download "sspm_2"... OK
Download "cam_vpu1"... OK
Download "cam_vpu2"... OK
Download "cam_vpu3"... OK
Download "gz1"... OK
Download "gz2"... OK
Download "lk"... OK
Download "lk2"... OK
Download "boot"... OK
Download "logo"... OK
Download "dtbo"... OK
Download "tee1"... OK
Download "tee2"... OK
Download "vbmeta_system"... OK
Download "vbmeta_vendor"... OK
Download "cache"... OK
Download "userdata"... OK
Flashing done!



Note: While writing firmware there is no super.img which is the base file for the whole firmware is not written. I don't know why but when I extract OFP the super.img file was in the list but while writing with Pandora box it's skipped by itself.
I Need Flash File...
 
Top