Z3X Vivo Y76 5G PD2156F New Security Without Test Point

Z3X Team

Yeminoo

Friend's Martview
Sep 13, 2019
667
521
Myawaddy
Selected model: Vivo PD2156F (Y76 5G)
Operation: Format RPMB
Software version: 4.7
This procedure can damage your device!!!
The number of records of RPMB blocks is limited!!!
Continue? YES

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1633 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM33 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Read Efuse error
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0989
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM20 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xB662D7D7, 0xA7859267, 0x600BC25D, 0x353B59D7
Get Chip ID... [MT6833]
Get SOC ID... [4FA6896CD59794422F4B3AD49ED6A91A290617BD0D2B5A55CCC7232E31DF80EC]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [14]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM8V9001JM-B813 (0600)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM8V9001JM-B813
UFS_FWVER : 0600
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read Write Counter[WC][MAX=0xFFFFFFFF]... 9755 OK
Get UFS RPMB size... 0x01000000 OK
Read RPMB... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Vivo_PD2156F%20(Y76%205G)/"directory
Searching RPMB key... found! [3]
WC not incremented if data of page in rpmb same as in file
Format RPMB 0x1000000 bytes (0x10000 pages)... OK
Read Write Counter[WC][MAX=0xFFFFFFFF]... 9755 OK
Format RPMB done!
y76.png
 
  • Like
Reactions: FAROK
Top