Selected model: Vivo PD2138CF (Vivo Y21s)
Operation: Unlock network
Software version: 5.3
Work ID: 4336341
Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM19 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM19 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x61E720EB, 0xB98CD41A, 0xA80E6682, 0x7DE4CB96
Get Chip ID... [MT6768]
Get SOC ID... [86114BAB28A30248CCA2DA887AE8AB6F42D7A4A145B42B4382DDD20A88959C81]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314A3953391012C9CC0458FF
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: G1J9S9
EMMC_ID : 0x13014E47314A3953391012C9CC0458FF
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1F000000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand: vivo
Product Manufacturer: vivo
Product Model: V2110
Product Name: 2110_EEA
Product Device: 2110
Product Board: k69v1_64
Board Platform: MTK6769
Build ID: TP1A.220624.014
Build Date: Wed May 10 14:42:51 CST 2023
Display ID: Funtouch OS 13 Global
Security Patch: 2023-05-01
Version SDK: 33
Version Release: 13
Version Codename: REL
Firmware Version: 38.15.1
Userdata FS Type: F2FS
Read security partition from phone... OK
Read security files... OK
Read security files... OK
Read lock info... OK
Unlock... OK [DF1, UN]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!
Operation: Unlock network
Software version: 5.3
Work ID: 4336341
Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM19 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM19 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x61E720EB, 0xB98CD41A, 0xA80E6682, 0x7DE4CB96
Get Chip ID... [MT6768]
Get SOC ID... [86114BAB28A30248CCA2DA887AE8AB6F42D7A4A145B42B4382DDD20A88959C81]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314A3953391012C9CC0458FF
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: G1J9S9
EMMC_ID : 0x13014E47314A3953391012C9CC0458FF
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1F000000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand: vivo
Product Manufacturer: vivo
Product Model: V2110
Product Name: 2110_EEA
Product Device: 2110
Product Board: k69v1_64
Board Platform: MTK6769
Build ID: TP1A.220624.014
Build Date: Wed May 10 14:42:51 CST 2023
Display ID: Funtouch OS 13 Global
Security Patch: 2023-05-01
Version SDK: 33
Version Release: 13
Version Codename: REL
Firmware Version: 38.15.1
Userdata FS Type: F2FS
Read security partition from phone... OK
Read security files... OK
Read security files... OK
Read lock info... OK
Unlock... OK [DF1, UN]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!