source : romdevelop.com

OPPO A17 CPH2477 ANDROID 12 Security REPAIR with PANDORA

information:

Selected model: OPPO CPH2077 (OPPO A12)

Operation: Repair

Software version: 5.0


Host Power Off... OK

Switch virtual port to NONE... OK

Connect Type-C to HUB... OK

Host Power On... OK

Connect phone to [BOX] in BROM/PRELOADER Mode

Waiting for device... OK

Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]

Device found at COM118 [PRELOADER]

Open port... OK

Send start cmd... OK

Get HW code from device... 0766

Get sec config... OK [00000005]

Active sec flags: [SBC DAA]

Get HW & SW version from device... OK

HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00

Detect chip [MT6765]

Library Version [2]

Select platform... OK

Init BROM... OK

Force Charge... OK

Disable WatchDog Timer... OK

Force switch to BROM... OK

Host Power Off... OK

Switch virtual port to USB... OK

Connect Type-C to BOX... OK

Host Power On... OK

Waiting for device... OK

Read usbhost speed... HIGH

Read Device Descriptor...

Get VID/PID...0E8D/0003

Send start cmd... OK

Get HW code from device... 0766

Get HW & SW version from device... OK

HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00

Detect chip [MT6765]

Get sec config... OK [000000E5]

Active sec flags: [SBC DAA]

Release testpoint

Advanced Bypass Security... OK

Switch virtual port to NONE... OK

Connect Type-C to HUB... OK

Waiting for device... OK

Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]

Device found at COM75 [BROM]

Open port... OK

Send start cmd... OK

Get HW code from device... 0766

Get sec config... OK [000000E0]

Active sec flags: []

Get HW & SW version from device... OK

HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00

Detect chip [MT6765]

Library Version [2]

Select platform... OK

Init BROM... OK

Force Charge... OK

Disable WatchDog Timer... OK

Reopen port for libver2... OK

Get ME ID... OK

ME_ID =  0x6693B79B, 0x13B10BCB, 0xE6D73D7A, 0x12D8C163

Get Chip ID... [MT6765]

Get SOC ID... [C7E1FACC9A27BABA2213ECA79996A8962A3F095BF3BC597C1C05979E8F093E8D]

Get sec config... OK [000000E0]

Load DownloadAgent... OK

Search DA... OK [7]

Send preloader... OK

Start preloader... OK

Checking preloader answer... OK

Send bootloader... OK

Start bootloader... OK

Wait for answer from bootloader... OK

Send SYNC signal... OK

Setup device enviroment... OK

Setup device parametres... OK

Receive DA SYNC signal... OK

Set DA parametres... OK

Get device connection agent... [BROM]

Get device info... OK

EMMC_ID: 0x9B010059325030363400C9540C17698D

Load EMI from phone... OK

Parse EMI config... OK

Init EXT RAM... OK

Send 2nd DA... OK

Get device info... OK

EMMC INFO:

   EMMC_CNAME: Y2P064

   EMMC_ID   : 0x9B010059325030363400C9540C17698D

   EMMC_BOOT1: 0x0000400000 (4.00Mb)

   EMMC_BOOT2: 0x0000400000 (4.00Mb)

   EMMC_RPMB : 0x0001000000 (16.00Mb)

   EMMC_USER : 0x0E8F800000 (58.24Gb)

RAM INFO:

   INT_SRAM: 0x000003A000 (232.00Kb)

   EXT_RAM : 0x0100000000 (4.00Gb)

Checking USB status... USB_HIGH_SPEED

Read partitions info from phone... OK

Checking A/B state... OK [A]

Read product info... [EROFS] ... OK

Product Brand        : oplus

Product Manufacturer : oplus

Product Model        : ossi

Product Name         : ossi

Product Device       : ossi

Product Board        : k65v1_64_bsp

Board Platform       : connac1x

Build ID             : SP1A.210812.016

Build Date           : Sat Sep 17 00:33:35 CST 2022

Display ID           : SP1A.210812.016 release-keys

Security Patch       : 2022-08-05

Version SDK          : 31

Version Release      : 12

Version Codename     : REL

Firmware Version     : 1663346015818

Userdata FS Type     : F2FS

Read partition "nvdata"... OK

Read partition "nvram"... OK

Read NVDATA files... OK

Read NVRAM files... OK

Repairing IMEI...

  IMEI 1:  9955500xxxxxxxx

  IMEI 2:  99555000xxxxxxx

Patch CERT [NVDATA]... OK

Checking patch type... [1]

Patching partition... OK

Save patched partiton... OK

Selected "Auto unlock bootloader"

Read partitions info from phone... OK

Read security partition from phone... OK

Decrypting security data... OK

Encrypt security data... OK

Write security partition to phone... OK

Checking additional lock... [DISABLED]

Patch CERT [NVRAM]... OK

Write partition "nvdata"... OK

Write partition "nvram"... OK

Repair Security done!