dakot
18.11.2010, 10:51
Доброе время суток.
Тренируюсь с Mxkey, помогите разобраться с логами плиз. В качестве кролика сабж. Изначально - тело ударник, расколот дисплей. Заменил дисплей и ... contaсt sevise (вроде известная бяка). Подбор дисплеев ничего не дал, стал подбирать прошивки, родная была v4 ставил 7.02, 6-ю, 5-ю - CS не ушёл. На МФ писали-нужно erase flash+прошить+полный ПМ - безрезультатно. Решил потихоньку погреть (ударник) - и доигрался, перестал видеть флеш. Пришлось драть компаунд и реболить. После ребола :
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.9005(07-11-2010), 1.0.0.14948(07-11-2010)
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 001F2069:2984DA60
ASIC type: 2
UEM Imei: 35364701813516
Flash Imei: 35364701813516
MasterCode: 5014064426
RPL saved to "C:\mobileEx\3.4\data\backup\35364701813516_BACK.rpl"
Phone Type: RH-93
SW Version: V 7.02 10-12-07 RH-93 (c) NMP
Imei plain: 35364701813516-1
Cellular System: GSM
ASIC ID: 0x2201, type: 2
Language Pack:
- not available.
Imei net: 35364701813516
Version:
Counter: 0/3, 0/10
CONFIG_DATA: FFFFFFFFFFFFFFFF
PROFILE_BITS: 0000000000010000
BLOCK 1: 1.CORRUPTED
прошиваю
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.9005(07-11-2010), 1.0.0.14948(07-11-2010)
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 001F2069:2984DA60
ASIC type: 2
UEM Imei: 35364701813516
Flash Imei: 35364701813516
RPL saved to "C:\mobileEx\3.4\data\backup\RPL\35364701813516_BACK.rpl"
Processing MCU file: rh93_07.020
[DCT4,DCT4 ALGORITHM] size: 1.89 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 001F2069:2984DA60
Area [01000000-0100FFFF] erased in 0.390 s
Area [01010000-013BFFFF] erased in 23.703 s
Area [013C0000-013EFFFF] erased in 1.188 s
Area [017C0000-017EFFFF] erased in 0.109 s
Area [01FC0000-01FEFFFF] erased in 0.109 s
Flash programming ...
Programming completed in 13.813 s
File Processed in 48.610 s
Processing CNT file: rh930_nai7.02ej
[DCT4,DCT4 ALGORITHM] size: 155.11 KB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 001F2069:2984DA60
Area [01380000-013BFFFF] erased in 1.625 s
Flash programming ...
Programming completed in 1.172 s
Extracting Content Pack, File Server fake reply for CUI phone.
Content Pack extracted successfully in 0.172 s
File Processed in 18.078 s
Processing PPM file: rh93_07.02ej
[DCT4,DCT4 ALGORITHM] size: 1.48 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 001F2069:2984DA60
Area [011E0000-011EFFFF] erased in 0.437 s
Area [011F0000-0137FFFF] erased in 10.250 s
Flash programming ...
Programming completed in 10.781 s
File Processed in 32.938 s
Flashing completed in 2 min 34.703 s
After Flash Processing ...
Phone Type: RH-93
SW Version: V 7.02 10-12-07 RH-93 (c) NMP
Imei plain: 35364701813516-1
Cellular System: GSM
ASIC ID: 0x2201, type: 2
Ppm Id: EJ
Language Pack:
English,Russian,Ukrainian
Imei net: 35364701813516
Version:
Counter: 0/3, 0/10
CONFIG_DATA: FFFFFFFFFFFFFFFF
PROFILE_BITS: 0000000000010000
BLOCK 1: 1.CORRUPTED
FULL FACTORY... Failed!
Completed in 2.797 s
USER DATA... OK
LEAVE FACTORY... OK
SERVICE CENTER... OK
SOFTWARE UPGRADE... OK
Reset User Code (to default:12345) ... OK
Completed in 1.562 s
сбросы делал,но опять
CONFIG_DATA: FFFFFFFFFFFFFFFF
PROFILE_BITS: 0000000000010000
BLOCK 1: 1.CORRUPTED
Подтолкните плиз в нужную сторону...
Тренируюсь с Mxkey, помогите разобраться с логами плиз. В качестве кролика сабж. Изначально - тело ударник, расколот дисплей. Заменил дисплей и ... contaсt sevise (вроде известная бяка). Подбор дисплеев ничего не дал, стал подбирать прошивки, родная была v4 ставил 7.02, 6-ю, 5-ю - CS не ушёл. На МФ писали-нужно erase flash+прошить+полный ПМ - безрезультатно. Решил потихоньку погреть (ударник) - и доигрался, перестал видеть флеш. Пришлось драть компаунд и реболить. После ребола :
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.9005(07-11-2010), 1.0.0.14948(07-11-2010)
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 001F2069:2984DA60
ASIC type: 2
UEM Imei: 35364701813516
Flash Imei: 35364701813516
MasterCode: 5014064426
RPL saved to "C:\mobileEx\3.4\data\backup\35364701813516_BACK.rpl"
Phone Type: RH-93
SW Version: V 7.02 10-12-07 RH-93 (c) NMP
Imei plain: 35364701813516-1
Cellular System: GSM
ASIC ID: 0x2201, type: 2
Language Pack:
- not available.
Imei net: 35364701813516
Version:
Counter: 0/3, 0/10
CONFIG_DATA: FFFFFFFFFFFFFFFF
PROFILE_BITS: 0000000000010000
BLOCK 1: 1.CORRUPTED
прошиваю
Using device: UFS_USB V2.8 (c) SarasSoft 2007.
Library version: 1.0.0.9005(07-11-2010), 1.0.0.14948(07-11-2010)
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 001F2069:2984DA60
ASIC type: 2
UEM Imei: 35364701813516
Flash Imei: 35364701813516
RPL saved to "C:\mobileEx\3.4\data\backup\RPL\35364701813516_BACK.rpl"
Processing MCU file: rh93_07.020
[DCT4,DCT4 ALGORITHM] size: 1.89 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 001F2069:2984DA60
Area [01000000-0100FFFF] erased in 0.390 s
Area [01010000-013BFFFF] erased in 23.703 s
Area [013C0000-013EFFFF] erased in 1.188 s
Area [017C0000-017EFFFF] erased in 0.109 s
Area [01FC0000-01FEFFFF] erased in 0.109 s
Flash programming ...
Programming completed in 13.813 s
File Processed in 48.610 s
Processing CNT file: rh930_nai7.02ej
[DCT4,DCT4 ALGORITHM] size: 155.11 KB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 001F2069:2984DA60
Area [01380000-013BFFFF] erased in 1.625 s
Flash programming ...
Programming completed in 1.172 s
Extracting Content Pack, File Server fake reply for CUI phone.
Content Pack extracted successfully in 0.172 s
File Processed in 18.078 s
Processing PPM file: rh93_07.02ej
[DCT4,DCT4 ALGORITHM] size: 1.48 MB
Supported Ids: 0120, 0121, 1021, 1120, 1130, 1131, 1201, 2140, 2142, 2201, 2031, 2030, 2032, 2033
ASIC ID: 0x2201 [UPP_2M ver: 2]
SecondaryBoot: u_2nd.fia [DCT4] version: 4.76.0 revision: 0.7 size: 0x9A0
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
FlashID0: 00EC 2268 [Samsung K8S3215ETE,32 Mbits] page size: 64 K type: NOR area: 01000000-013FFFFF
FlashID1: 0000 0001 [unused/removed]
ExtBUSC: AD7E B61A 1BBE 0BE2 7D58 6BE4 DBEE 6514
Algorithm: u_amd.fia [DCT4 ALGORITHM] version: 4.76.0 revision: 0.7 size: 0x78B8
Supported Ids: 0011, 0010, 0121, 0120, 1120, 1131, 1130, 2141, 2140, 2142, 2151, 1141, 1181, 1015, 1021, 2031, 2030, 3041, 1201, 2201, 2291, 3161, 3160, 3164
Performing Flash Authentication ...OK
UEM ID: 001F2069:2984DA60
Area [011E0000-011EFFFF] erased in 0.437 s
Area [011F0000-0137FFFF] erased in 10.250 s
Flash programming ...
Programming completed in 10.781 s
File Processed in 32.938 s
Flashing completed in 2 min 34.703 s
After Flash Processing ...
Phone Type: RH-93
SW Version: V 7.02 10-12-07 RH-93 (c) NMP
Imei plain: 35364701813516-1
Cellular System: GSM
ASIC ID: 0x2201, type: 2
Ppm Id: EJ
Language Pack:
English,Russian,Ukrainian
Imei net: 35364701813516
Version:
Counter: 0/3, 0/10
CONFIG_DATA: FFFFFFFFFFFFFFFF
PROFILE_BITS: 0000000000010000
BLOCK 1: 1.CORRUPTED
FULL FACTORY... Failed!
Completed in 2.797 s
USER DATA... OK
LEAVE FACTORY... OK
SERVICE CENTER... OK
SOFTWARE UPGRADE... OK
Reset User Code (to default:12345) ... OK
Completed in 1.562 s
сбросы делал,но опять
CONFIG_DATA: FFFFFFFFFFFFFFFF
PROFILE_BITS: 0000000000010000
BLOCK 1: 1.CORRUPTED
Подтолкните плиз в нужную сторону...