Разлочка Sony Ericsson E15i
Лог удачной разлочки Sony Ericsson E15i при помощи JTAG Medusa
Скрытый текстMedusa JTAG Firmware version 1.1.0.
Medusa JTAG Hardware S64 revision B. Detected TAP ID: 203C00E1, IR Length = 4. MI: Halting target, attempt 1. JTAG speed : 400 KHz. VREF level : 1.42 V CPU : Qualcomm MSM7227 Core ID : 203C00E1 MI: Loading Medusa Device Server V1.2. MI: Starting... MI: Received status 0x0000F00F, cycle 0. MI: Received server capabilities 0x00000037. MI: Detailed server caps: FLASH, CFG, ECC, WDOG, DWP MI: Watchdog configuration: 0xB800010C, 0x00000001... ok MI: Server init. MI: Received flash ID 0xA02055BC. MI: Flash geometry set. MI: Recheking settings... ok Server caps : 00000037 Flash device: ST Micro 512Mb Flash ID : 002055BC Page size : 2048 bytes Block size : 64 pages (128 Kb) Block count: 4096 Flash size : 512 Mb Write protection disabled. MI: Setting configuration: 0xAAD400DA, 0x0044747E, 0x0000000D MI: Configuration done. Connect successful. Reading TA section. Please wait... Done TA section has been backed up to "D:\Medusa\Firmware\Sony Ericsson E15i TA Backup 21-02-2012 06_54_15.mf". Unlocking. Please wait... Done |
Текущее время: 08:01. Часовой пояс GMT +3. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd. Перевод: zCarot
© 2007—2022 www.UO5OQ.com