Hello, Team I Just Repair Oppo Reno5 F with a pandora box now my device is boot loop.
What should I do?
And the most important question is why does that happen.
Selected model: OPPO CPH2217 (Oppo Reno5 F)
Operation: Repair
Software version: 2.10
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB5530E73, 0x69D78BA0, 0x471AE4EC, 0x5861B254
Get Chip ID... [MT6779]
Get SOC ID... [96719D6F0A12A0D00199D66F6925087AF3376D862141BF0ABE35BC69562E1884]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [26]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6779
Board Platform : MT6779
Build ID : RP1A.200720.011
Build Date : Sat Sep 18 23:07:36 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1631976954541
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 86771xxxxxxxxxx
IMEI 2: 86771xxxxxxxxxx
Repairing IMEI...
IMEI 1: 35643xxxxxxxxxx
IMEI 2: 35643xxxxxxxxxx
Write IMEI [NVDATA]... OK
Load partiton for patching... OK OK
Save patched partiton... OK
Unlock bootloader... OK
Write IMEI [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security done!
What should I do?
And the most important question is why does that happen.
Selected model: OPPO CPH2217 (Oppo Reno5 F)
Operation: Repair
Software version: 2.10
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM3 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB5530E73, 0x69D78BA0, 0x471AE4EC, 0x5861B254
Get Chip ID... [MT6779]
Get SOC ID... [96719D6F0A12A0D00199D66F6925087AF3376D862141BF0ABE35BC69562E1884]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [26]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6779
Board Platform : MT6779
Build ID : RP1A.200720.011
Build Date : Sat Sep 18 23:07:36 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1631976954541
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 86771xxxxxxxxxx
IMEI 2: 86771xxxxxxxxxx
Repairing IMEI...
IMEI 1: 35643xxxxxxxxxx
IMEI 2: 35643xxxxxxxxxx
Write IMEI [NVDATA]... OK
Load partiton for patching... OK OK
Save patched partiton... OK
Unlock bootloader... OK
Write IMEI [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security done!