View Single Post
Old 02-28-2024, 23:04   #484 (permalink)
RMESystems
Freak Poster
 
Join Date: Mar 2020
Location: bolivia
Posts: 314
Member: 2951556
Status: Offline
Thanks Meter: 356
Selected model: Tecno KE7 (Tecno Spark 6)
Operation: Eliminar FRP
Software version: 6.3

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM9 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Read Efuse error
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM51 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x7440CBB9, 0xE6138591, 0x0F00A20D, 0x13B75870
Get Chip ID... [MT6768]
Get SOC ID... [478D54DE68B1A8F326E4C85C593FC426AC4EF211D10A1EDF32 E3EEBD7A21B046]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x90014A684339615033010089B3B0182F
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: hC9aP3
EMMC_ID : 0x90014A684339615033010089B3B0182F
EMMC_BOOT1: 0x0000400000 (4,00Mb)
EMMC_BOOT2: 0x0000400000 (4,00Mb)
EMMC_RPMB : 0x0001000000 (16,00Mb)
EMMC_USER : 0x0E8F800000 (58,24Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448,00Kb)
EXT_RAM : 0x0100000000 (4,00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : TECNO
Product Manufacturer : TECNO MOBILE LIMITED
Product Model : TECNO KE7
Product Name : KE7-GL
Product Device : TECNO-KE7
Product Board : TECNO-KE7
Board Platform : mt6768
Build ID : QP1A.190711.020
Build Date : Fri Jul 29 22:06:10 CST 2022
Display ID : TECNO-Q-64-220729V379
Security Patch : 2022-07-05
Version SDK : 29
Version Release : 10
Version Codename : REL
Firmware Version : 220729V398
Userdata FS Type : F2FS
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Tecno_KE7%20(Tecno%20Spark%206)/FRP_BACKUP_(2024-2-28_17-52-40)/
Writting FRP data... OK
Erase FRP done!
  Reply With Quote
 
Page generated in 0.05558 seconds with 7 queries