|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
06-26-2022, 15:16 | #1 (permalink) |
No Life Poster Join Date: Jan 2010 Location: izmir
Posts: 840
Member: 1210902 Status: Offline Thanks Meter: 231 | VİVO y15 1901 new securıty patch read fw perfect 17:06:21 - Brom Mode : Press Vol and Connect Usb Cable 17:06:21 - Preloader Mode : Connect Usb Cable to Powered off Phone.. 17:06:21 - Waiting for Device Interface.. 17:06:26 - Device Found : \\?\usb#vid_0e8d&pid_2000#5&2d3a3f9d&0&7# 17:06:26 - Mode : [Preloader] COM4 - MediaTek PreLoader USB VCOM_V1632 (Android) (COM4) 17:06:26 - Drivers : MediaTek Inc.,usb2ser.sys [1-22-2015] [3.0.1504.0] 17:06:27 - Checking Device Interface.. 17:06:27 - Device Ack Found.. 17:06:28 - Chip : MT6765 [Helio P35/G35] 17:06:28 - HW ID : [FD07660000] [8A00-CA00-0000] [00000005] 17:06:28 - Secure Boot Device : True 17:06:28 - SL Authorization : False 17:06:28 - DA Authorization : True 17:06:28 - [SwJtag : True] [EPP : False] [Root Cert : False] 17:06:28 - [M_Read Auth : False] [M_Write Auth : False] [Cmd_C8 : False] 17:06:28 - BL Version : 03 [03] 17:06:28 - Mediatek Download Agent Information.. 17:06:28 - Sign : MTK_DOWNLOAD_AGENT 17:06:28 - ID : MTK_AllInOne_DA_v3.3001.2018/03/20.21:08_402229+403250 17:06:28 - Sending Boot [Auth].. 17:06:28 - Sending Boot [PL].. 17:06:32 - EMMC ID : 17:06:32 - EMMC CID : 00000000000000000000000000000000 17:06:32 - EMMC Boot1 Size : bytes 17:06:32 - EMMC Boot2 Size : bytes 17:06:32 - EMMC RPMB Size : bytes 17:06:32 - EMMC USER Size : bytes 17:06:32 - Sending Boot [DA].. 17:06:37 - Reading Partition Table.. 17:06:37 - Memory Type : eMMC 17:06:37 - Partition Count : 40 17:06:37 - Userdata : 58,18 GB 17:06:37 - Reading Device Information... 17:06:37 - Model : k62v1_64_bsp 17:06:37 - Vivo Os : Funtouch OS_9 17:06:37 - Android Version : 11 17:06:37 - Build Id : RP1A.200720.012 17:06:37 - Fw Code : REL 17:06:37 - Fv : full_k62v1_64_bsp-user 17:06:37 - Fw Desc. : full_k62v1_64_bsp-user 11 RP1A.200720.012 eng.compil.20220218.164640 release-keys 17:06:37 - Id : RP1A.200720.012 release-keys [Fri Feb 18 16:42:47 CST 2022] 17:06:38 - Platform : MTK6765 17:06:38 - Internation : yes 17:06:38 - Security Patch Level : 2022-02-01 17:06:38 - Reading Partition : BOOT_PARA -> boot_para.img 17:06:39 - Reading Partition : RECOVERY -> recovery.img 17:06:42 - Reading Partition : PARA -> para.img 17:06:43 - Reading Partition : EXPDB -> expdb.img 17:06:45 - Reading Partition : FRP -> frp.bin 17:06:46 - Reading Partition : NVCFG -> nvcfg.img 17:06:48 - Reading Partition : NVDATA -> nvdata.img 17:06:52 - Reading Partition : BACKUP -> backup.img 17:06:53 - Reading Partition : SURVIVAL -> survival.img 17:06:56 - Reading Partition : RESERVED -> reserved.img 17:06:58 - Reading Partition : CUST -> cust.img 17:07:01 - Reading Partition : METADATA -> metadata.img 17:07:03 - Reading Partition : PROTECT1 -> protect1.img 17:07:05 - Reading Partition : PROTECT2 -> protect2.img 17:07:06 - Reading Partition : SECCFG -> seccfg.img 17:07:08 - Reading Partition : PERSIST -> persist.img 17:07:11 - Reading Partition : SEC1 -> sec1.img 17:07:12 - Reading Partition : PROINFO -> proinfo.img 17:07:13 - Reading Partition : EFUSE -> efuse.img 17:07:14 - Reading Partition : MD1IMG -> md1img.img 17:07:18 - Reading Partition : SPMFW -> spmfw.img 17:07:19 - Reading Partition : SCP1 -> scp1.img 17:07:21 - Reading Partition : SCP2 -> scp2.img 17:07:22 - Reading Partition : SSPM_1 -> sspm_1.img 17:07:23 - Reading Partition : SSPM_2 -> sspm_2.img 17:07:24 - Reading Partition : GZ1 -> gz1.img 17:07:26 - Reading Partition : GZ2 -> gz2.img 17:07:27 - Reading Partition : NVRAM -> nvram.img 17:07:31 - Reading Partition : LK -> lk.img 17:07:32 - Reading Partition : LK2 -> lk2.img 17:07:33 - Reading Partition : BOOT -> boot.img 17:07:37 - Reading Partition : LOGO -> logo.bin 17:07:38 - Reading Partition : DTBO -> dtbo.img 17:07:39 - Reading Partition : TEE1 -> tee1.img 17:07:41 - Reading Partition : TEE2 -> tee2.img 17:07:42 - Reading Partition : VENDOR -> vendor.img 17:08:21 - Rebooting Device.. 17:08:21 - Finished! select manual da and aut files and untick disable auth dump preloader first. |
The Following User Says Thank You to master353535 For This Useful Post: |
Bookmarks |
| |
|