Selected model: Alcatel 5007A (Alcatel 1V (2020))
Operation: Unlock network
Software version: 6.3
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to [BOX] in BROM mode
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM88 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3BCACC1C, 0xC7E955B7, 0xB3EDD107, 0x445342B4
Get Chip ID... [MT6761]
Get SOC ID... [392319C0F4CCD063A50C035B96FBA5F8D51417B15A89C11AD6CAD1F3AFECA233]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [5]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xD6010341334135353112640373D179AF
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: A3A551
EMMC_ID : 0xD6010341334135353112640373D179AF
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x073A000000 (28.91Gb)
RAM INFO:
INT_SRAM: 0x000003A500 (233.25Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : HotPepper
Product Manufacturer : Chinoe
Product Model : HPPL60A
Product Name : Chilaca
Product Device : HPPL60A
Product Board : HotPepper
Board Platform : mt6761
Build ID : SP1A.210812.016
Build Date : Sat Jun 10 22:16:40 CST 2023
Display ID : HPP-L60A-3.0.22
Security Patch : 2023-06-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 767
Userdata FS Type : F2FS
Read security partition from phone... OK
Read security files... OK
Read security files... OK
Read lock info... OK
Read OTP... OK
Unlock... OK [DF1, DF2, GB1, GB2, SM]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
Operation: Unlock network
Software version: 6.3
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to [BOX] in BROM mode
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0717
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM88 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0717
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00
Detect chip [MT6761]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3BCACC1C, 0xC7E955B7, 0xB3EDD107, 0x445342B4
Get Chip ID... [MT6761]
Get SOC ID... [392319C0F4CCD063A50C035B96FBA5F8D51417B15A89C11AD6CAD1F3AFECA233]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [5]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0xD6010341334135353112640373D179AF
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: A3A551
EMMC_ID : 0xD6010341334135353112640373D179AF
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x073A000000 (28.91Gb)
RAM INFO:
INT_SRAM: 0x000003A500 (233.25Kb)
EXT_RAM : 0x0080000000 (2.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : HotPepper
Product Manufacturer : Chinoe
Product Model : HPPL60A
Product Name : Chilaca
Product Device : HPPL60A
Product Board : HotPepper
Board Platform : mt6761
Build ID : SP1A.210812.016
Build Date : Sat Jun 10 22:16:40 CST 2023
Display ID : HPP-L60A-3.0.22
Security Patch : 2023-06-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 767
Userdata FS Type : F2FS
Read security partition from phone... OK
Read security files... OK
Read security files... OK
Read lock info... OK
Read OTP... OK
Unlock... OK [DF1, DF2, GB1, GB2, SM]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!