Selected model: OPPO CPH2083 (OPPO A12)
Operation: Repair
Software version: 4.10
Work ID: 1762408
Connect phone in BROM Mode
Waiting for device… OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM0 [BROM]
Open port… OK
Send start cmd… OK
Get HW code from device… 0766
Get sec config… OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device… OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Install LibUSB… OK
Waiting for device… OK
Open port… OK
Library Version [2]
Select platform… OK
Init BROM… OK
Force Charge… OK
Disable WatchDog Timer… OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security… OK
Waiting for device… OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM9 [BROM]
Open port… OK
Send start cmd… OK
Get HW code from device… 0766
Get sec config… OK [000000E0]
Active sec flags: []
Get HW & SW version from device… OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform… OK
Init BROM… OK
Force Charge… OK
Disable WatchDog Timer… OK
Reopen port for libver2… OK
Get ME ID… OK
ME_ID = 0xCF9A7459, 0x407F7AC2, 0xD1754482, 0xB113F998
Get Chip ID… [MT6765]
Get SOC ID… [5B371FE05778E3DABE369F50DEE8DB5DCF26B3638D432202B16F74C2374ECC45]
Get sec config… OK [000000E0]
Load DownloadAgent… OK
Search DA… OK [7]
Send preloader… OK
Start preloader… OK
Checking preloader answer… OK
Send bootloader… OK
Start bootloader… OK
Wait for answer from bootloader… OK
Send SYNC signal… OK
Setup device enviroment… OK
Setup device parametres… OK
Receive DA SYNC signal… OK
Set DA parametres… OK
Get device connection agent… [BROM]
Get device info… OK
EMMC_ID: 0x9B010059325030363400E8DB2D3D79CD
Load EMI from phone… OK
Parse EMI config… OK
Init EXT RAM… OK
Send 2nd DA… OK
Get device info… OK
EMMC INFO:
EMMC_CNAME: Y2P064
EMMC_ID : 0x9B010059325030363400E8DB2D3D79CD
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status… USB_HIGH_SPEED
Read partitions info from phone… OK
Checking A/B state… OK [A]
Read product info… error(6)
Read partition “nvdata”… OK
Read partition “nvram”… OK
Read NVDATA files… OK
Read NVRAM files… OK
Repairing IMEI…
IMEI 1: 000000000000000
IMEI 2: 000000000000000
Write IMEI [NVDATA]… OK
Checking patch type… [1]
Patching partition… OK
Save patched partiton… OK
Read partitions info from phone… OK
Read security partition from phone… OK
Decrypting security data… OK
Encrypt security data… OK
Write security partition to phone… OK
Checking additional lock… [ENABLED]
Disable additional lock… OK
Write IMEI [NVRAM]… OK
Write partition “nvdata”… OK
Repair Security done!
If your phone after repair keeps rebooting – use wipe data option.
Selected model: OPPO CPH2083 (OPPO A12)
Operation: Repair
Software version: 4.10
Work ID: 1762701
Connect phone in BROM Mode
Waiting for device… OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM9 [BROM]
Open port… OK
Send start cmd… OK
Get HW code from device… 0766
Get sec config… OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device… OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Install LibUSB… OK
Waiting for device… OK
Open port… OK
Library Version [2]
Select platform… OK
Init BROM… OK
Force Charge… OK
Disable WatchDog Timer… OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security… OK
Waiting for device… OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM9 [BROM]
Open port… OK
Send start cmd… OK
Get HW code from device… 0766
Get sec config… OK [000000E0]
Active sec flags: []
Get HW & SW version from device… OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform… OK
Init BROM… OK
Force Charge… OK
Disable WatchDog Timer… OK
Reopen port for libver2… OK
Get ME ID… OK
ME_ID = 0xCF9A7459, 0x407F7AC2, 0xD1754482, 0xB113F998
Get Chip ID… [MT6765]
Get SOC ID… [5B371FE05778E3DABE369F50DEE8DB5DCF26B3638D432202B16F74C2374ECC45]
Get sec config… OK [000000E0]
Load DownloadAgent… OK
Search DA… OK [7]
Send preloader… OK
Start preloader… OK
Checking preloader answer… OK
Send bootloader… OK
Start bootloader… OK
Wait for answer from bootloader… OK
Send SYNC signal… OK
Setup device enviroment… OK
Setup device parametres… OK
Receive DA SYNC signal… OK
Set DA parametres… OK
Get device connection agent… [BROM]
Get device info… OK
EMMC_ID: 0x9B010059325030363400E8DB2D3D79CD
Load EMI from phone… OK
Parse EMI config… OK
Init EXT RAM… OK
Send 2nd DA… OK
Get device info… OK
EMMC INFO:
EMMC_CNAME: Y2P064
EMMC_ID : 0x9B010059325030363400E8DB2D3D79CD
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status… USB_HIGH_SPEED
Read partitions info from phone… OK
Checking A/B state… OK [A]
Read product info… error(6)
Read partition “nvdata”… OK
Read partition “nvram”… OK
Read NVDATA files… OK
Read NVRAM files… OK
Repairing IMEI…
IMEI 1: 86145800000000
IMEI 2: 86145800000000
Write IMEI [NVDATA]… OK
Checking patch type… [1]
Patching partition… already patched, skip
Read partitions info from phone… OK
Read security partition from phone… OK
Decrypting security data… OK
Encrypt security data… OK
Write security partition to phone… OK
Checking additional lock… [DISABLED]
Write IMEI [NVRAM]… OK
Write partition “nvdata”… OK
Repair Security done!
If your phone after repair keeps rebooting – use wipe data option.