Hello Pandora team when i repair the nothing phone 2a imei then show this error what is the problem is this model not supported yet or other issue. Here is the full log of software.
Selected model: Nothing 23111 (Phone 2A)
Operation: Repair
Software version: 9.9
Work ID: 96210876
Connect phone in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM32 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 1229
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0001, HW SUB CODE: 8A00
Detect chip [MT6886]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x40AB57FD, 0xC07ABEFA, 0xFC7A9AED, 0x66C36586
Load DownloadAgent... OK
Search DA... OK [0]
Send bootloader... OK
Start bootloader... OK
Setup device enviroment... OK
Setup device parametres... OK
Get device info... OK
UFS CID (FW VER): H9QT0G6CN6X146 ()
Send 2nd DA... OK
DA2 auth: disabled
Get device info... OK
UFS INFO:
UFS_CID : H9QT0G6CN6X146
UFS_FWVER :
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
[EFUSE INFO]: BROM not disabled
[EFUSE INFO]: BROM SLA disabled
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : Nothing
Product Manufacturer : Nothing
Product Model : A142
Product Name : Pacman
Product Device : Pacman
Product Board : mgvi_64_armv82
Board Platform : common
Build ID : TP1A.220624.014
Build Date : Wed Aug 28 19:06:44 CST 2024
Display ID : U2.6-240828-1906
Security Patch : 2024-09-01
Version SDK : 34
Version Release : 14
Version Codename : REL
Firmware Version : 2408281906
Userdata FS Type : F2FS
hrid len = 0
Read security partition from phone...
Decrypting security data...
Exception: Access violation at address 0187CB7D in module PandoraTool.exe (offset E0CB7D). Read of address 00000000
Selected model: Nothing 23111 (Phone 2A)
Operation: Repair
Software version: 9.9
Work ID: 96210876
Connect phone in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM32 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 1229
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0001, HW SUB CODE: 8A00
Detect chip [MT6886]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x40AB57FD, 0xC07ABEFA, 0xFC7A9AED, 0x66C36586
Load DownloadAgent... OK
Search DA... OK [0]
Send bootloader... OK
Start bootloader... OK
Setup device enviroment... OK
Setup device parametres... OK
Get device info... OK
UFS CID (FW VER): H9QT0G6CN6X146 ()
Send 2nd DA... OK
DA2 auth: disabled
Get device info... OK
UFS INFO:
UFS_CID : H9QT0G6CN6X146
UFS_FWVER :
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
[EFUSE INFO]: BROM not disabled
[EFUSE INFO]: BROM SLA disabled
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : Nothing
Product Manufacturer : Nothing
Product Model : A142
Product Name : Pacman
Product Device : Pacman
Product Board : mgvi_64_armv82
Board Platform : common
Build ID : TP1A.220624.014
Build Date : Wed Aug 28 19:06:44 CST 2024
Display ID : U2.6-240828-1906
Security Patch : 2024-09-01
Version SDK : 34
Version Release : 14
Version Codename : REL
Firmware Version : 2408281906
Userdata FS Type : F2FS
hrid len = 0
Read security partition from phone...
Decrypting security data...
Exception: Access violation at address 0187CB7D in module PandoraTool.exe (offset E0CB7D). Read of address 00000000

