ZTE V955/ZTE V880G ищу фулл
#1
Уважаемые владельцы RIFF кто имеет в ремонте
ZTE V955 слейте фулл, есть аппарат после прошивки в другую модель естественно стал кирпичом. Распиновку JTAG выяснил, конектилтся как модель
Huawei U8950D, прилагаю лог и чеки.
Небольшое уточнение, подойдет прошивка от
ZTE V880G - это российский вариант китайского
ZTE V955.
Connect & Get ID
Open serial port...OK
Connecting to the RIFF Box...OK
Firmware Version: 1.37, JTAG Manager Version: 1.51
Selected Resurrector: [Huawei U8950D V1.0.4910.51312]
Connecting to the dead body...OK
Set I/O Voltage reads as 2.61V, TCK Frequency is RTCK
Detected dead body ID: 0x007730E1[свернуть]
Analyze JTAG Chain
Open serial port...OK
Connecting to the RIFF Box...OK
Firmware Version: 1.37, JTAG Manager Version: 1.51
Selected Resurrector: [Huawei U8950D V1.0.4910.51312]
Connecting to the target...OK
Set I/O Voltage reads as 2.60V, TCK Frequency is RTCK
Following devices are found on the JTAG chain:
Device on TAP #0: ID = 0x007730E1, IR Length = 0x04 bits
Total IR length: 0x0004 bits[свернуть]
Read Flash
Open serial port...OK
Connecting to the RIFF Box...OK
Firmware Version: 1.37, JTAG Manager Version: 1.51
Selected Resurrector: [Huawei U8950D V1.0.4910.51312]
Connecting to the dead body...OK
Detected dead body ID: 0x007730E1 - CORRECT!
Set I/O Voltage reads as 2.60V, TCK Frequency is RTCK
Adaptive Clocking RTCK Sampling is: [Sample at MAX]
Settings Code: 0x24010000000000000000000001000000
Resurrection sequence started.
Establish communication with the phone...OK
Initializing internal hardware configuration...OK
Uploading resurrector data into memory...OK
Starting communication with resurrector...OK
Detected an Initialized FLASH1 Chip, ID: 0x0015/0x0100 (SJS00M, 0x0000E9000000 Bytes = 3.64 GB)
Detected an Initialized FLASH2 Chip, ID: 0x0015/0x0100 (SJS00M, 0x000000100000 Bytes = 1.00 MB)
Reading FLASH1 address space from 0x000000000000 to 0x0000E8FFFFFF[свернуть]