|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
10-11-2021, 09:44 | #1 (permalink) |
Freak Poster Join Date: May 2019 Location: pakistan
Posts: 197
Member: 2911786 Status: Offline Thanks Meter: 34 | vivo s1 repair failed by pandora [Answered] Selected model: Vivo PD1913F (Vivo S1) Operation: Repair Software version: 2.6 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Wait for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0707 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6768] Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Advanced Bypass Security... OK Disconnect virtual port... OK Connect Type-C to HUB... OK Wait for device connecting... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0] Device found at COM40 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0707 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6768] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x62AA52BA, 0x275E6BD0, 0x499A1CB6, 0xD7C457F4 Get Chip ID... [MT6768] Get SOC ID... [D51958D91E03AE861E58B017E5D106DBB08C7318F371460B8B CDF9011F02ADC9] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [25] Send preloader... OK Start preloader... OK Check preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x150100445636444D42024B1D6843667F Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_ID : 0x150100445636444D42024B1D6843667F EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x1D1EC00000 (116.48Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Check USB status... USB_HIGH_SPEED Read partitions info from phone... OK Read product info... OK Product Brand : vivo Product Manufacturer : vivo Product Model : vivo 1907 Product Name : 1907N Product Device : 1907N Board Platform : MTK6768 Product Board : k68v1_64 Build ID : RP1A.200720.012 Build Date : Thu Jul 29 21:37:21 CST 2021 Display ID : Funtouch OS_10.5 Security Patch : 2021-08-01 Version SDK : 30 Version Release : 11 Version Codename : REL Read partitions info from phone... OK Reading security from phone... OK IMEI 1: 863691048975777 IMEI 2: 863691048975769 Set new IMEI to: IMEI 1: 866809038317704 IMEI 2: 866809038317712 Searching security key... found! [3] Writing security to phone... OK Read partitions info from phone... OK Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Read IMEI... error(2) Repairing IMEI... IMEI 1: 866809038317704 IMEI 2: 866809038317712 Write IMEI [NVDATA]... error(2) |
Bookmarks |
| |
|