Skocz do zawartości

Forum XperiaSite.pl używa ciasteczek (cookies). Przeczytaj naszą Polityka prywatności i plików cookies by dowiedzieć się więcej. Kliknięcie w przycisk obok wyłączy to okno.    Zgadzam się na ciastka
  • Log In with Google      Logowanie »   
  • Rejestracja



Zdjęcie

bootloop

bootloop

  • Zaloguj się, aby dodać odpowiedź
4 odpowiedzi w tym temacie

#1 OFFLINE majonez

majonez

    Nowicjusz

  • Reputacja: 0
  • 3 postów
  • Telefon:Xperia E4g
  • Android:KitKat (4.4.4)
  • Rom:stock
  • Kernel:stock
  • Operator:Play

Napisano 23 kwiecień 2019 - 21:20

Cześć, kupiłem xa za 50zł w super stanie tylko że ma bootloopa to myślę sobie zrobię to w pół godziny i będzie git ale jednak nie jest tak łatwo XperiaCompanion nie daje rady naprawić roma a flashtool nic nie może zrobić próby np. odblokowania bootloadera kończą sie takim komunikatem da się to jeszcze uratować?

 

 INFO  - FAILED (remote: Command not allowed)

 


  • 0

#2 ONLINE DominQ

DominQ

    Uzależniony od forum

  • Reputacja: 64
  • 647 postów
  • Skąd:Kalisz
  • Telefon:Xperia XZ Premium
  • Android:Pie (9.0)
  • Rom:eXistenZ Pie v8.0.0
  • Kernel:4.4.148-+
  • Operator:T-Mobile

Napisano 23 kwiecień 2019 - 21:44

Cześć, kupiłem xa za 50zł w super stanie tylko że ma bootloopa to myślę sobie zrobię to w pół godziny i będzie git ale jednak nie jest tak łatwo XperiaCompanion nie daje rady naprawić roma a flashtool nic nie może zrobić próby np. odblokowania bootloadera kończą sie takim komunikatem da się to jeszcze uratować?

flashowałeś go z zaznaczonymi wipe?


  • 0

#3 OFFLINE majonez

majonez

    Nowicjusz

  • Autor tematu
  • Reputacja: 0
  • 3 postów
  • Telefon:Xperia E4g
  • Android:KitKat (4.4.4)
  • Rom:stock
  • Kernel:stock
  • Operator:Play

Napisano 24 kwiecień 2019 - 12:36

flashowałeś go z zaznaczonymi wipe?

tak


  • 0

#4 ONLINE DominQ

DominQ

    Uzależniony od forum

  • Reputacja: 64
  • 647 postów
  • Skąd:Kalisz
  • Telefon:Xperia XZ Premium
  • Android:Pie (9.0)
  • Rom:eXistenZ Pie v8.0.0
  • Kernel:4.4.148-+
  • Operator:T-Mobile

Napisano 24 kwiecień 2019 - 14:04

tak

spróbuj newflasherem


  • 0

#5 OFFLINE majonez

majonez

    Nowicjusz

  • Autor tematu
  • Reputacja: 0
  • 3 postów
  • Telefon:Xperia E4g
  • Android:KitKat (4.4.4)
  • Rom:stock
  • Kernel:stock
  • Operator:Play

Napisano 24 kwiecień 2019 - 16:48

wywala mi taki komunikat

 

No usb device with vid:0x0fce pid:0xb00b !

Press any key to continue . . .


Dodano: 24 kwiecień 2019 - 17:48

spróbowałem xflasherem i chyba coś sie udało ale fon nadal stoi na logu xperii juz 10 minutwięc chyba dalej bootloop, niżej daje logi z xflashera

Spoiler:
-------------------------------------------------------

Xperia Command Line Flasher v23

by Munjeni @ 2014,2017
-------------------------------------------------------
Device path: \\?\usb#vid_0fce&pid_adde#5&c0aa250&1&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Class Description: SOMC Flash Device
Device Instance Id: USB\VID_0FCE&PID_ADDE\5&C0AA250&1&1

- Successfully read 0xd bytes from handle.
Raw input [0xD]:

00000000 00 00 00 01 00 00 00 01 00 00 03 80 8A .............

- Successfully read 0x380 bytes from handle.
Raw input [0x380]:

00000000 50 52 4F 54 5F 56 45 52 3D 22 30 34 22 3B 56 45 PROT_VER="04";VE
00000010 52 3D 22 53 31 5F 42 6F 6F 74 5F 4D 54 36 37 35 R="S1_Boot_MT675
00000020 35 5F 4E 30 2E 4D 50 31 30 33 5F 31 30 34 22 3B 5_N0.MP103_104";
00000030 53 31 53 42 4C 5F 56 45 52 3D 22 4D 54 36 37 35 S1SBL_VER="MT675
00000040 35 5F 31 34 22 3B 49 44 3D 22 31 32 39 38 2D 39 5_14";ID="1298-9
00000050 32 34 31 22 3B 54 59 50 45 3D 22 53 31 5F 42 4F 241";TYPE="S1_BO
00000060 4F 54 22 3B 41 43 54 49 56 45 5F 43 4F 4D 50 5F OT";ACTIVE_COMP_
00000070 41 49 44 3D 22 30 30 30 34 22 3B 4D 41 58 5F 50 AID="0004";MAX_P
00000080 4B 54 5F 53 5A 3D 22 30 30 38 30 30 30 30 30 22 KT_SZ="00800000"
00000090 3B 49 47 4E 4F 52 45 5F 43 52 43 3D 22 48 44 52 ;IGNORE_CRC="HDR
000000A0 2C 44 41 54 41 22 3B 44 45 46 5F 53 45 43 3D 22 ,DATA";DEF_SEC="
000000B0 4F 4E 22 3B 48 57 43 4F 4E 46 5F 41 49 44 3D 22 ON";HWCONF_AID="
000000C0 30 30 30 34 22 3B 4C 4F 41 44 45 52 5F 41 49 44 0004";LOADER_AID
000000D0 3D 22 30 30 30 34 22 3B 42 4F 4F 54 5F 41 49 44 ="0004";BOOT_AID
000000E0 3D 22 30 30 30 34 22 3B 4E 4F 5F 53 55 42 5F 53 ="0004";NO_SUB_S
000000F0 59 53 54 45 4D 53 3D 22 30 30 30 31 22 3B 4F 54 YSTEMS="0001";OT
00000100 50 5F 44 41 54 41 5F 31 3D 22 30 34 30 30 22 3B P_DATA_1="0400";
00000110 4F 54 50 5F 4C 4F 43 4B 5F 53 54 41 54 55 53 5F OTP_LOCK_STATUS_
00000120 31 3D 22 4C 4F 43 4B 45 44 22 3B 55 4E 49 51 55 1="LOCKED";UNIQU
00000130 45 5F 44 45 56 5F 49 44 5F 31 3D 22 35 33 46 32 E_DEV_ID_1="53F2
00000140 34 33 38 34 33 41 37 34 44 41 31 44 22 3B 49 44 43843A74DA1D";ID
00000150 43 4F 44 45 5F 31 3D 22 32 36 30 33 30 30 30 30 CODE_1="26030000
00000160 30 31 30 30 30 30 30 30 22 3B 53 55 49 44 5F 31 01000000";SUID_1
00000170 3D 22 30 39 30 30 30 30 30 30 32 36 30 33 30 30 ="09000000260300
00000180 30 30 36 37 34 38 45 46 46 37 43 36 32 39 32 36 006748EFF7C62926
00000190 36 45 22 3B 53 31 5F 52 4F 4F 54 3D 22 53 31 5F 6E";S1_ROOT="S1_
000001A0 52 6F 6F 74 5F 63 66 32 61 2C 53 31 5F 52 6F 6F Root_cf2a,S1_Roo
000001B0 74 5F 54 65 73 74 5F 62 33 31 36 22 3B 4D 53 4E t_Test_b316";MSN
000001C0 3D 22 52 51 33 30 30 33 45 56 36 43 22 3B 48 57 ="RQ3003EV6C";HW
000001D0 5F 43 4F 4E 46 49 47 5F 56 45 52 3D 22 30 30 30 _CONFIG_VER="000
000001E0 36 22 3B 48 57 5F 43 4F 4E 46 49 47 5F 49 4E 46 6";HW_CONFIG_INF
000001F0 4F 3D 22 48 57 43 5F 4B 61 62 69 6E 69 5F 43 6F O="HWC_Kabini_Co
00000200 6D 5F 30 30 36 22 3B 53 45 43 5F 53 54 41 54 45 m_006";SEC_STATE
00000210 3D 22 48 57 43 5F 4B 61 62 69 6E 69 5F 43 6F 6D ="HWC_Kabini_Com
00000220 5F 30 30 36 22 3B 49 4D 45 49 3D 22 33 35 34 33 _006";IMEI="3543
00000230 39 35 30 38 31 37 32 38 37 32 22 3B 50 52 4F 44 9508172872";PROD
00000240 5F 49 44 3D 22 30 30 30 31 22 3B 47 4C 4F 42 5F _ID="0001";GLOB_
00000250 53 45 43 3D 22 30 30 30 30 22 3B 50 48 4F 4E 45 SEC="0000";PHONE
00000260 5F 49 44 3D 22 30 30 30 30 3A 33 35 34 33 39 35 _ID="0000:354395
00000270 30 38 31 37 32 38 37 32 22 3B 48 57 5F 43 4F 4E 08172872";HW_CON
00000280 46 49 47 3D 22 53 31 5F 42 6F 6F 74 3A 30 30 30 FIG="S1_Boot:000
00000290 34 3A 30 30 31 33 2C 53 31 5F 4C 6F 61 64 65 72 4:0013,S1_Loader
000002A0 3A 30 30 30 34 3A 30 30 30 42 2C 53 31 5F 53 57 :0004:000B,S1_SW
000002B0 3A 30 30 30 35 3A 30 30 31 33 2C 53 31 5F 43 75 :0005:0013,S1_Cu
000002C0 73 74 3A 30 30 30 34 3A 30 30 31 33 2C 53 31 5F st:0004:0013,S1_
000002D0 45 4C 61 62 65 6C 3A 30 30 30 34 3A 30 30 31 33 ELabel:0004:0013
000002E0 2C 53 31 5F 53 4C 3A 30 30 30 34 3A 30 30 34 33 ,S1_SL:0004:0043
000002F0 2C 53 31 5F 46 4F 54 41 3A 30 30 30 35 3A 30 30 ,S1_FOTA:0005:00
00000300 32 33 2C 53 31 5F 52 4C 6F 63 6B 3A 30 30 30 34 23,S1_RLock:0004
00000310 3A 30 32 32 33 22 3B 52 4F 4F 54 49 4E 47 5F 53 :0223";ROOTING_S
00000320 54 41 54 55 53 3D 22 52 4F 4F 54 41 42 4C 45 22 TATUS="ROOTABLE"
00000330 3B 50 4C 46 5F 52 4F 4F 54 5F 31 3D 22 33 41 39 ;PLF_ROOT_1="3A9
00000340 42 44 38 38 39 31 45 45 33 44 37 34 31 36 36 33 BD8891EE3D741663
00000350 39 32 30 46 45 44 35 46 41 46 42 30 38 31 38 39 920FED5FAFB08189
00000360 42 35 35 33 31 34 32 32 30 30 32 36 39 37 46 37 B5531422002697F7
00000370 41 36 32 38 44 41 44 35 41 31 38 35 44 22 3B 00 A628DAD5A185D";.

- Successfully read 0x4 bytes from handle.
Raw input [0x4]:

00000000 2C 06 72 89 ,.r.

Proccessing loader.sin...
File size: 0x454EC
Sin header size: 0x400
Sin data size: 0x450EC
Setting max packet size to: 0x800000
Sending command...
Raw command[0xD]:

00000000 00 00 00 05 00 00 00 03 00 00 04 00 09 .............

- Successfully write 0xd bytes to handle.
Writing sin header with size of 0x400 bytes
- Successfully write 0x400 bytes to handle.
Sin header writen.
CRC32[0x4]:

00000000 E6 F4 C9 95 ....

Writing crc32 for sin header...
- Successfully write 0x4 bytes to handle.
- Successfully read 0xd bytes from handle.
Raw input [0xD]:

00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............

Verifying crc32...
success: device replied with 0000000500000001000000000B which mean ok.

- Successfully read 0x4 bytes from handle.
Raw input [0x4]:

00000000 00 00 00 00 ....

Sending command...
Raw command[0xD]:

00000000 00 00 00 06 00 00 00 03 00 04 50 EC C4 ..........P..

- Successfully write 0xd bytes to handle.
Writing chunk part: 1 with size of 0x450ec bytes
- Successfully write 0x450ec bytes to handle.
Chunk part: 1 writen.
CRC32[0x4]:

00000000 DC 54 F7 E7 .T..

Writing crc32 for chunk part: 1
- Successfully write 0x4 bytes to handle.
WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
- Successfully read 0xd bytes from handle.
Raw input [0xD]:

00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............

Verifying crc32...
Success: device replied with 0000000600000001000000000E which mean ok.

LAST PACKET REAPLY AFTER ms: 2.000000
- Successfully read 0x4 bytes from handle.
Raw input [0x4]:

00000000 00 00 00 00 ....

Finished.


loader.sin uploaded sucessfully.

- Successfully read 0xd bytes from handle.
Raw input [0xD]:

00000000 00 00 00 01 00 00 00 01 00 00 03 A8 B2 .............

- Successfully read 0x3a8 bytes from handle.
Raw input [0x3A8]:

00000000 50 52 4F 54 5F 56 45 52 3D 22 30 34 22 3B 56 45 PROT_VER="04";VE
00000010 52 3D 22 4D 54 36 37 35 35 5F 31 33 22 3B 49 44 R="MT6755_13";ID
00000020 3D 22 31 32 39 38 2D 39 32 34 34 22 3B 54 59 50 ="1298-9244";TYP
00000030 45 3D 22 53 31 5F 4C 4F 41 44 45 52 22 3B 41 43 E="S1_LOADER";AC
00000040 54 49 56 45 5F 43 4F 4D 50 5F 41 49 44 3D 22 30 TIVE_COMP_AID="0
00000050 30 30 34 22 3B 4D 41 58 5F 50 4B 54 5F 53 5A 3D 004";MAX_PKT_SZ=
00000060 22 30 30 38 30 30 30 30 30 22 3B 49 47 4E 4F 52 "00800000";IGNOR
00000070 45 5F 43 52 43 3D 22 48 44 52 2C 44 41 54 41 22 E_CRC="HDR,DATA"
00000080 3B 44 45 46 5F 53 45 43 3D 22 4F 4E 22 3B 48 57 ;DEF_SEC="ON";HW
00000090 43 4F 4E 46 5F 41 49 44 3D 22 30 30 30 34 22 3B CONF_AID="0004";
000000A0 4C 4F 41 44 45 52 5F 41 49 44 3D 22 30 30 30 34 LOADER_AID="0004
000000B0 22 3B 42 4F 4F 54 5F 41 49 44 3D 22 30 30 30 34 ";BOOT_AID="0004
000000C0 22 3B 4E 4F 5F 53 55 42 5F 53 59 53 54 45 4D 53 ";NO_SUB_SYSTEMS
000000D0 3D 22 30 30 30 31 22 3B 4F 54 50 5F 44 41 54 41 ="0001";OTP_DATA
000000E0 5F 31 3D 22 30 34 30 30 22 3B 4F 54 50 5F 4C 4F _1="0400";OTP_LO
000000F0 43 4B 5F 53 54 41 54 55 53 5F 31 3D 22 4C 4F 43 CK_STATUS_1="LOC
00000100 4B 45 44 22 3B 55 4E 49 51 55 45 5F 44 45 56 5F KED";UNIQUE_DEV_
00000110 49 44 5F 31 3D 22 35 33 46 32 34 33 38 34 33 41 ID_1="53F243843A
00000120 37 34 44 41 31 44 22 3B 49 44 43 4F 44 45 5F 31 74DA1D";IDCODE_1
00000130 3D 22 32 36 30 33 30 30 30 30 30 31 30 30 30 30 ="26030000010000
00000140 30 30 22 3B 53 55 49 44 5F 31 3D 22 30 39 30 30 00";SUID_1="0900
00000150 30 30 30 30 32 36 30 33 30 30 30 30 36 37 34 38 0000260300006748
00000160 45 46 46 37 43 36 32 39 32 36 36 45 22 3B 53 31 EFF7C629266E";S1
00000170 5F 52 4F 4F 54 3D 22 53 31 5F 52 6F 6F 74 5F 63 _ROOT="S1_Root_c
00000180 66 32 61 2C 53 31 5F 52 6F 6F 74 5F 54 65 73 74 f2a,S1_Root_Test
00000190 5F 62 33 31 36 22 3B 48 57 5F 43 4F 4E 46 49 47 _b316";HW_CONFIG
000001A0 5F 56 45 52 3D 22 30 30 30 36 22 3B 48 57 5F 43 _VER="0006";HW_C
000001B0 4F 4E 46 49 47 5F 49 4E 46 4F 3D 22 48 57 43 5F ONFIG_INFO="HWC_
000001C0 4B 61 62 69 6E 69 5F 43 6F 6D 5F 30 30 36 22 3B Kabini_Com_006";
000001D0 53 45 43 5F 53 54 41 54 45 3D 22 48 57 43 5F 4B SEC_STATE="HWC_K
000001E0 61 62 69 6E 69 5F 43 6F 6D 5F 30 30 36 22 3B 49 abini_Com_006";I
000001F0 4D 45 49 3D 22 33 35 34 33 39 35 30 38 31 37 32 MEI="35439508172
00000200 38 37 32 22 3B 50 52 4F 44 5F 49 44 3D 22 30 30 872";PROD_ID="00
00000210 30 31 22 3B 47 4C 4F 42 5F 53 45 43 3D 22 30 30 01";GLOB_SEC="00
00000220 30 30 22 3B 50 48 4F 4E 45 5F 49 44 3D 22 30 30 00";PHONE_ID="00
00000230 30 30 3A 33 35 34 33 39 35 30 38 31 37 32 38 37 00:3543950817287
00000240 32 22 3B 48 57 5F 43 4F 4E 46 49 47 3D 22 53 31 2";HW_CONFIG="S1
00000250 5F 42 6F 6F 74 3A 30 30 30 34 3A 30 30 31 33 2C _Boot:0004:0013,
00000260 53 31 5F 4C 6F 61 64 65 72 3A 30 30 30 34 3A 30 S1_Loader:0004:0
00000270 30 30 42 2C 53 31 5F 53 57 3A 30 30 30 35 3A 30 00B,S1_SW:0005:0
00000280 30 31 33 2C 53 31 5F 43 75 73 74 3A 30 30 30 34 013,S1_Cust:0004
00000290 3A 30 30 31 33 2C 53 31 5F 45 4C 61 62 65 6C 3A :0013,S1_ELabel:
000002A0 30 30 30 34 3A 30 30 31 33 2C 53 31 5F 53 4C 3A 0004:0013,S1_SL:
000002B0 30 30 30 34 3A 30 30 34 33 2C 53 31 5F 46 4F 54 0004:0043,S1_FOT
000002C0 41 3A 30 30 30 35 3A 30 30 32 33 2C 53 31 5F 52 A:0005:0023,S1_R
000002D0 4C 6F 63 6B 3A 30 30 30 34 3A 30 32 32 33 22 3B Lock:0004:0223";
000002E0 41 55 54 48 5F 4C 45 56 45 4C 3D 22 4E 4F 4E 45 AUTH_LEVEL="NONE
000002F0 22 3B 41 55 54 48 5F 4D 45 54 3D 22 30 30 30 31 ";AUTH_MET="0001
00000300 22 3B 4D 45 4D 44 45 56 53 3D 22 30 33 3A 30 30 ";MEMDEVS="03:00
00000310 3A 30 30 31 35 3A 30 31 30 30 3A 30 30 30 36 3A :0015:0100:0006:
00000320 30 31 44 31 46 30 30 30 3A 30 30 30 30 30 34 30 01D1F000:0000040
00000330 30 3A 30 30 30 30 30 32 30 30 22 3B 50 4C 46 5F 0:00000200";PLF_
00000340 52 4F 4F 54 5F 31 3D 22 33 41 39 42 44 38 38 39 ROOT_1="3A9BD889
00000350 31 45 45 33 44 37 34 31 36 36 33 39 32 30 46 45 1EE3D741663920FE
00000360 44 35 46 41 46 42 30 38 31 38 39 42 35 35 33 31 D5FAFB08189B5531
00000370 34 32 32 30 30 32 36 39 37 46 37 41 36 32 38 44 422002697F7A628D
00000380 41 44 35 41 31 38 35 44 22 3B 52 41 4D 5F 49 4E AD5A185D";RAM_IN
00000390 46 4F 3D 22 30 31 30 35 30 30 31 46 3A 30 31 30 FO="0105001F:010
000003A0 35 30 30 31 46 22 3B 00 5001F";.

- Successfully read 0x4 bytes from handle.
Raw input [0x4]:

00000000 3D C0 FC 4B =..K

-------------------------------------------------------
Xperia Command Line Flasher v23

by Munjeni @ 2014,2017
-------------------------------------------------------
Device path: \\?\usb#vid_0fce&pid_adde#5&c0aa250&1&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Class Description: SOMC Flash Device
Device Instance Id: USB\VID_0FCE&PID_ADDE\5&C0AA250&1&1

Proccessing partitions_S1-SW-LIVE-CF2A-PID1-0005-MBR.sin...
File size: 0x1618
Sin header size: 0x408
Sin data size: 0x1210
Setting max packet size to: 0x800000
Sending command...
Raw command[0xD]:

00000000 00 00 00 05 00 00 00 03 00 00 04 08 11 .............

- Successfully write 0xd bytes to handle.
Writing sin header with size of 0x408 bytes
- Successfully write 0x408 bytes to handle.
Sin header writen.
CRC32[0x4]:

00000000 66 8A 37 46 f.7F

Writing crc32 for sin header...
- Successfully write 0x4 bytes to handle.
- Successfully read 0xd bytes from handle.
Raw input [0xD]:

00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............

Verifying crc32...
success: device replied with 0000000500000001000000000B which mean ok.

- Successfully read 0x4 bytes from handle.
Raw input [0x4]:

00000000 00 00 00 00 ....

Sending command...
Raw command[0xD]:

00000000 00 00 00 06 00 00 00 03 00 00 12 10 0E .............

- Successfully write 0xd bytes to handle.
Writing chunk part: 1 with size of 0x1210 bytes
- Successfully write 0x1210 bytes to handle.
Chunk part: 1 writen.
CRC32[0x4]:

00000000 E4 E6 7C 34 ..|4

Writing crc32 for chunk part: 1
- Successfully write 0x4 bytes to handle.
WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
- Successfully read 0xd bytes from handle.
Raw input [0xD]:

00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............

Verifying crc32...
Success: device replied with 0000000600000001000000000E which mean ok.

LAST PACKET REAPLY AFTER ms: 38.000000
- Successfully read 0x4 bytes from handle.
Raw input [0x4]:

00000000 00 00 00 00 ....

Finished.


partitions_S1-SW-LIVE-CF2A-PID1-0005-MBR.sin uploaded sucessfully.

-------------------------------------------------------
Xperia Command Line Flasher v23

by Munjeni @ 2014,2017
-------------------------------------------------------
Device path: \\?\usb#vid_0fce&pid_adde#5&c0aa250&1&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Class Description: SOMC Flash Device
Device Instance Id: USB\VID_0FCE&PID_ADDE\5&C0AA250&1&1

Proccessing apps_log_S1-SW-LIVE-CF2A-PID1-0005-MMC.sin...
File size: 0x192E9C
Sin header size: 0x528
Sin data size: 0x192974
Setting max packet size to: 0x800000
Sending command...
Raw command[0xD]:

00000000 00 00 00 05 00 00 00 03 00 00 05 28 32 ...........(2

- Successfully write 0xd bytes to handle.
Writing sin header with size of 0x528 bytes
- Successfully write 0x528 bytes to handle.
Sin header writen.
CRC32[0x4]:

00000000 FD 74 62 96 .tb.

Writing crc32 for sin header...
- Successfully write 0x4 bytes to handle.
- Successfully read 0xd bytes from handle.
Raw input [0xD]:

00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............

Verifying crc32...
success: device replied with 0000000500000001000000000B which mean ok.

- Successfully read 0x4 bytes from handle.
Raw input [0x4]:

00000000 00 00 00 00 ....

Sending command...
Raw command[0xD]:

00000000 00 00 00 06 00 00 00 03 00 19 29 74 48 ..........)tH

- Successfully write 0xd bytes to handle.
Writing chunk part: 1 with size of 0x192974 bytes
- Successfully write 0x192974 bytes to handle.
Chunk part: 1 writen.
CRC32[0x4]:

00000000 8E 6E 56 74 .nVt

Writing crc32 for chunk part: 1
- Successfully write 0x4 bytes to handle.
WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
- Successfully read 0xd bytes from handle.
Raw input [0xD]:

00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............

Verifying crc32...
Success: device replied with 0000000600000001000000000E which mean ok.

LAST PACKET REAPLY AFTER ms: 117.000000
- Successfully read 0x4 bytes from handle.
Raw input [0x4]:

00000000 00 00 00 00 ....

Finished.


apps_log_S1-SW-LIVE-CF2A-PID1-0005-MMC.sin uploaded sucessfully.

-------------------------------------------------------
Xperia Command Line Flasher v23

by Munjeni @ 2014,2017
-------------------------------------------------------
Device path: \\?\usb#vid_0fce&pid_adde#5&c0aa250&1&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Class Description: SOMC Flash Device
Device Instance Id: USB\VID_0FCE&PID_ADDE\5&C0AA250&1&1

Proccessing cache_S1-SW-LIVE-CF2A-PID1-0005-MMC.sin...
File size: 0x6475
Sin header size: 0x408
Sin data size: 0x606D
Setting max packet size to: 0x800000
Sending command...
Raw command[0xD]:

00000000 00 00 00 05 00 00 00 03 00 00 04 08 11 .............

- Successfully write 0xd bytes to handle.
Writing sin header with size of 0x408 bytes
- Successfully write 0x408 bytes to handle.
Sin header writen.
CRC32[0x4]:

00000000 77 F9 27 6A w.'j

Writing crc32 for sin header...
- Successfully write 0x4 bytes to handle.
- Successfully read 0xd bytes from handle.
Raw input [0xD]:

00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............

Verifying crc32...
success: device replied with 0000000500000001000000000B which mean ok.

- Successfully read 0x4 bytes from handle.
Raw input [0x4]:

00000000 00 00 00 00 ....

Sending command...
Raw command[0xD]:

00000000 00 00 00 06 00 00 00 03 00 00 60 6D 0F ..........`m.

- Successfully write 0xd bytes to handle.
Writing chunk part: 1 with size of 0x606d bytes
- Successfully write 0x606d bytes to handle.
Chunk part: 1 writen.
CRC32[0x4]:

00000000 FF 00 18 75 ...u

Writing crc32 for chunk part: 1
- Successfully write 0x4 bytes to handle.
WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
- Successfully read 0xd bytes from handle.
Raw input [0xD]:

00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............

Verifying crc32...
Success: device replied with 0000000600000001000000000E which mean ok.

LAST PACKET REAPLY AFTER ms: 291.000000
- Successfully read 0x4 bytes from handle.
Raw input [0x4]:

00000000 00 00 00 00 ....

Finished.


cache_S1-SW-LIVE-CF2A-PID1-0005-MMC.sin uploaded sucessfully.

-------------------------------------------------------
Xperia Command Line Flasher v23

by Munjeni @ 2014,2017
-------------------------------------------------------
Device path: \\?\usb#vid_0fce&pid_adde#5&c0aa250&1&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Class Description: SOMC Flash Device
Device Instance Id: USB\VID_0FCE&PID_ADDE\5&C0AA250&1&1

Proccessing diag_S1-SW-LIVE-CF2A-PID1-0005-MMC.sin...
File size: 0x1944A4
Sin header size: 0x5DC
Sin data size: 0x193EC8
Setting max packet size to: 0x800000
Sending command...
Raw command[0xD]:

00000000 00 00 00 05 00 00 00 03 00 00 05 DC E6 .............

- Successfully write 0xd bytes to handle.
Writing sin header with size of 0x5dc bytes
- Successfully write 0x5dc bytes to handle.
Sin header writen.
CRC32[0x4]:

00000000 88 A9 7B 31 ..{1

Writing crc32 for sin header...
- Successfully write 0x4 bytes to handle.
- Successfully read 0xd bytes from handle.
Raw input [0xD]:

00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............

Verifying crc32...
success: device replied with 0000000500000001000000000B which mean ok.

- Successfully read 0x4 bytes from handle.
Raw input [0x4]:

00000000 00 00 00 00 ....

Sending command...
Raw command[0xD]:

00000000 00 00 00 06 00 00 00 03 00 19 3E C8 F1 ..........>..

- Successfully write 0xd bytes to handle.
Writing chunk part: 1 with size of 0x193ec8 bytes
- Successfully write 0x193ec8 bytes to handle.
Chunk part: 1 writen.
CRC32[0x4]:

00000000 BC 07 76 4E ..vN

Writing crc32 for chunk part: 1
- Successfully write 0x4 bytes to handle.
WRITING LAST PACKET. SETTING TIMEOUT TO 600000 (ms).
- Successfully read 0xd bytes from handle.
Raw input [0xD]:

00000000 00 00 00 06 00 00 00 01 00 00 00 00 0E .............

Verifying crc32...
Success: device replied with 0000000600000001000000000E which mean ok.

LAST PACKET REAPLY AFTER ms: 142.000000
- Successfully read 0x4 bytes from handle.
Raw input [0x4]:

00000000 00 00 00 00 ....

Finished.


diag_S1-SW-LIVE-CF2A-PID1-0005-MMC.sin uploaded sucessfully.

-------------------------------------------------------
Xperia Command Line Flasher v23

by Munjeni @ 2014,2017
-------------------------------------------------------
Device path: \\?\usb#vid_0fce&pid_adde#5&c0aa250&1&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Class Description: SOMC Flash Device
Device Instance Id: USB\VID_0FCE&PID_ADDE\5&C0AA250&1&1

Proccessing elabel-F3111-row-row_201706150757659.3_33.3.A.1.97_S1-ELABEL-LIVE-CF2A-PID1-0004-MMC.sin...
File size: 0x10008F0
Sin header size: 0x88C
Sin data size: 0x1000064
Setting max packet size to: 0x800000
Sending command...
Raw command[0xD]:

00000000 00 00 00 05 00 00 00 03 00 00 08 8C 89 .............

- Successfully write 0xd bytes to handle.
Writing sin header with size of 0x88c bytes
- Successfully write 0x88c bytes to handle.
Sin header writen.
CRC32[0x4]:

00000000 C3 78 BF 41 .x.A

Writing crc32 for sin header...
- Successfully write 0x4 bytes to handle.
- Successfully read 0xd bytes from handle.
Raw input [0xD]:

00000000 00 00 00 05 00 00 00 01 00 00 00 00 0B .............

Verifying crc32...
success: device replied with 0000000500000001000000000B which mean ok.

- Successfully read 0x4 bytes from handle.
Raw input [0x4]:

00000000 00 00 00 00 ....

Sending command...
Raw command[0xD]:

00000000 00 00 00 06 00 00 00 07 00 80 00 00 88 .............

- Successfully write 0xd bytes to handle.
Writing chunk part: 1 with size of 0x800000 bytes
ERROR: GetOverLapped_out_Result: failed with error code 87 as follows:
Parametr jest niepoprawny.


- Error write! Need nBytes: 0x800000 but done: 0x0
nBytes[0x0]:


Error writing chunk part: 1
Error uploading elabel-F3111-row-row_201706150757659.3_33.3.A.1.97_S1-ELABEL-LIVE-CF2A-PID1-0004-MMC.sin!

-------------------------------------------------------
Xperia Command Line Flasher v23

by Munjeni @ 2014,2017
-------------------------------------------------------
Device path: \\?\usb#vid_0fce&pid_adde#5&c0aa250&1&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Class Description: SOMC Flash Device
Device Instance Id: USB\VID_0FCE&PID_ADDE\5&C0AA250&1&1

Proccessing fotakernel_S1-SW-LIVE-CF2A-PID1-0005-MMC.sin...
File size: 0x11F5F45
Sin header size: 0x8F4
Sin data size: 0x11F5651
Setting max packet size to: 0x800000
Sending command...
Raw command[0xD]:

00000000 00 00 00 05 00 00 00 03 00 00 08 F4 01 .............

- Successfully write 0xd bytes to handle.
Writing sin header with size of 0x8f4 bytes
- Successfully write 0x8f4 bytes to handle.
Sin header writen.
CRC32[0x4]:

00000000 DC D2 DE CB ....

Writing crc32 for sin header...
- Successfully write 0x4 bytes to handle.
ERROR: TIMEOUT: failed with error code 997 as follows:
Pokrywająca się operacja We/Wy jest w toku.

Unable to get reaply from device related to sin header verification!

Error uploading fotakernel_S1-SW-LIVE-CF2A-PID1-0005-MMC.sin!


  • 0





Również z jednym lub większą ilością słów kluczowych: bootloop

Użytkownicy przeglądający ten temat: 0

0 użytkowników, 0 gości, 0 anonimowych


XperiaSite.pl jest nieoficjalnym i niezależnym serwisem poświęconym smartfonom z serii Sony Xperia. Wszystkie znaki towarowe, nazwy firm oraz logotypy wymienione na stronie należą do ich właścicieli.Strona ma charakter informacyjny.