[Q] hard bricked LG G3 D851 - G3 Q&A, Help & Troubleshooting

So i flashed the wrong version of rom and it is hard bricked now. no lights at all, no screen on, no recovery and no download mode.
tried many things, but nothing could be able to fix the issue. when plugging into pc it shows LGE AndroidNet USB Serial Port. screenshot attached.
Any help in this regard is highly appreciated, please!
http://s21.postimg.org/42wvuidnr/image.jpg

i have short tested and put the motherboard into qualcomm dloader 9008. but when i disconnects it went to again for LG AndroidNet serial port.
board diagnostics is not working. continously getting error of dload trying to flash programmer. any body can help me please?

LG BOOT DIAGNOSIS TOOL IS SHOWING EVERYTHING OK. STILL PC RECOGNIZES AS QUALCOMM 9008 (WITHOUT BATTERY) AND AS UN RECOGNIZED DEVICE (WITH BATTERY).
HERE ARE LG BOOT DIANOSIS TOOL LOGS:
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM15)
>> Ready to access the target board...
>> BootLoader File : LGD851_ATMO_TMUS.mbn
>> 1. Model : LGD851 , 2. Suffix : ATMO , 3. Operator : TMUS
>> Bootloader : LGD851_ATMO_TMUS.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGD851_ATMO_TMUS.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0C3CDA50
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000262
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310262
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0C3CDA50
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000262
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=20
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002ee6a
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002f50a
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x00032a25
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00034086
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x000343c9
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x00034468
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x0003450d
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x00034570
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x000345a6
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x00034681
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x000b821f
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x000bbe37
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x000bf98a
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x000bf9ee
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x000bff8b
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x000c0067
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x000c4f47
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x000f163b
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x28ec52ca
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x28ef0ee9
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2015-04-19 12:39:24...successfully Completed.
>> Saved Log File(LOG_LGD851_ATMO_TMUS_20150419_123924.txt) successfully.

LG G3 Qualcomm HS-USB QDLoader 9008
noteespirit said:
LG BOOT DIAGNOSIS TOOL IS SHOWING EVERYTHING OK. STILL PC RECOGNIZES AS QUALCOMM 9008 (WITHOUT BATTERY) AND AS UN RECOGNIZED DEVICE (WITH BATTERY).
HERE ARE LG BOOT DIANOSIS TOOL LOGS:
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM15)
>> Ready to access the target board...
>> BootLoader File : LGD851_ATMO_TMUS.mbn
>> 1. Model : LGD851 , 2. Suffix : ATMO , 3. Operator : TMUS
>> Bootloader : LGD851_ATMO_TMUS.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGD851_ATMO_TMUS.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0C3CDA50
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000262
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310262
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0C3CDA50
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000262
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=20
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002ee6a
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002f50a
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x00032a25
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00034086
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x000343c9
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x00034468
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x0003450d
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x00034570
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x000345a6
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x00034681
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x000b821f
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x000bbe37
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x000bf98a
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x000bf9ee
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x000bff8b
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x000c0067
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x000c4f47
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x000f163b
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x28ec52ca
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x28ef0ee9
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2015-04-19 12:39:24...successfully Completed.
>> Saved Log File(LOG_LGD851_ATMO_TMUS_20150419_123924.txt) successfully.
Click to expand...
Click to collapse
help me please

Isramartinz said:
help me please
Click to expand...
Click to collapse
brother, you on same boat as mine?

noteespirit said:
brother, you on same boat as mine?
Click to expand...
Click to collapse
yeees! in the same boat
any solution?

no body is replying, and i havent succeeded yet. so far there is no solution for qualcomm 9008 hard brick mode.

i guess there are some chances, fingers crossed.
noteespirit said:
After i tried a program (swapper2) i got the flash partition table destroyed. When i tried it i gave me some errors but i could not guess it could be so dangerous for our E730.
Nothing happened at that moment, just the program gave me error,so i uninstalled it, but when i restarted the phone later it died totally.
No powerbutton
No screen
No led
No recovery
No emergency mode
Nothing at all, i pulled out the battery and waited few time but nothing changed, my e730 was died.
I tried some of the key combinations but none worked, i thought i had lost it.
Reading about on the net i found a procedure to try:
pull out the battery
press the volume down
attach the usb cable
This procedure starts the Modem Download Mode, on Ubuntu looking at the dmesg i could see something like this:
Bus 001 Device 011: ID 05c6:9008 Qualcomm, Inc. Gobi Wireless Modem (QDL mode)
Jul 29 03:46:05 unknown kernel: [ 3020.332185] usb 1-6: new high speed USB device using ehci_hcd and address 11
Jul 29 03:46:05 unknown kernel: [ 3020.466258] qcserial 1-6:1.0: Qualcomm USB modem converter detected
Jul 29 03:46:05 unknown kernel: [ 3020.466446] usb 1-6: Qualcomm USB modem converter now attached to ttyUSB1
So the E730 was not dead at all! there was still something alive, so i started to see what the QDL mode can do.
Basically it is written on a rom of the soc, so it is uncancellable, and it allow to rewrite some of the internal flash with the QPST program.
Then, in case of a hard brick this is what you need before to send the phone to assistance:
A pc with Windows XP SP3 (don't bother me if your W7/W7 x64/W8 don't work,use XP)
QPST program http://d-h.st/JIr (if this is not a free tool i will remove the link)
KDZ http://forum.xda-dev...505&postcount=1
a KDZ image of your country/brand http://www.lg-phone-...ex.php?id_mod=7
LGExtract http://forum.xda-dev...d.php?t=1566532
DZdecrypt http://d-h.st/2jl (credits to BIGB0SS from COPS)
QDL drivers http://d-h.st/RmY (32 bit only)
winrar
EMMCBLD.HEX http://d-h.st/IU8
Pics about the procedure http://d-h.st/bOG
Do not connect the dead 730 right now, prepare first the recovery structure
i assume you know how to use the command prompt in windows,lgextract and lzdecrypt are command line only tools.
make a folder and copy there lgextract.exe, dzdecrypt.exe,EMMCBLD.HEX and the .kdz file
use lgextract to unpack the kdz file, lgextract -kdz V10A_00.kdz (this is the name of MINE .kdz, yours could be different)
you will obtain a .cab file, open it with winrar and extract all its content in the same dir
then use dzdecrypt on the .DZ file, dzdecrypt v10a_0914.dz
This will give you a bunch of files, we have almost all the needed. Just one file is missing the phone image file. The phone image file must be in .HEX format and i was unable to find one for the E730, i used a generic msm7x30 and it seem to fit our phone.
Next step is to create the partition.mbn file, the KDZ image only contain a partition.bin which is not in the format QPST wants.
To create it a hexeditor is needed, select the 512bytes at the start and save it as partition.mbn if you run troubles with a hexeditor there is a partition.mbn file to download on page 2.
Now we can install the QPST program, once it finish remove the battery and start the QDL mode on
the phone. As windows detect the phone it ask for drivers, and once finished it will add the phone in the device manager, go there and look the virtual COM port assigned.
Start QPST, starting the QPST CONFIGURATION program, the first thing we have to do is to add the virtual com port where the phone is attached, then from the menu "Start Client" we have to start the "Software Download" program.
As the program start we have to set the flash type in the program settings (PIC1) be sure to select MSM7x30 (eMMC)
See PIC2, here we have to point the program to the folder where we have extracted our KDZ, click Browse and seek for it, choose the EMMCBLD.HEX file.
Then on "Multi-Image" tab browse again and select the same recovery folder. (PIC3)
on "Boot system" we have to choose "Sec Boot 2.0" and clicking on "Advance" button you should see as in the PIC4
BEWARE, pic 4 is wrong, there is not fsbl.mbn on the kdz firmware image, so you have to uncheck the flag.
when all is set press "Start" button and pray. the program show you a log in the installation directory, so if something goes wrong try to look there.
This will rewrite the partition table,the phone image and resurrect the emergency mode.
When it finish, detach the phone and insert the battery, try to start it on emergency mode pressing both volume keys and power on
If emergency mode appear it will show you the yellow screen, now is time to use KDZ to revive our device. There are good guides on how to use KDZ, seek for them.
I assume no responsability if something goes wrong and you brick definitely your phone, try this at your own risk.
Please do not try this if your phone is still able to turn on or show the Emergency mode, it mean the partition table is not corrupted and you don't need this procedure.
N.B. this guide is only for E730 and possibly for E739, it will not work with other phones or i don't know how to adapt it for other phones. Please avoid to send me im's because i can't help you.
Click to expand...
Click to collapse

Maybe this works http://forum.xda-developers.com/showthread.php?t=3072091
Verstuurd vanaf mijn HTC One_M8 met Tapatalk

Hakem said:
Maybe this works http://forum.xda-developers.com/showthread.php?t=3072091
Verstuurd vanaf mijn HTC One_M8 met Tapatalk
Click to expand...
Click to collapse
Thanks so much for replying, but as you see the logs above are created from same tool. The tool marks everything as ok. And didnt perform any action

Did you try to put it in download mode and then connecting it, even if the screen doesn't turn on maybe it actually goes into download mode. Also can you change the COM9 to COM41 with windows device manager? Maybe then you can just flash dll with lg flashtool..

Klyupp said:
Did you try to put it in download mode and then connecting it, even if the screen doesn't turn on maybe it actually goes into download mode. Also can you change the COM9 to COM41 with windows device manager? Maybe then you can just flash dll with lg flashtool..
Click to expand...
Click to collapse
Tried that but all fails. Device didnt go in download mode and i cant able to flash through lg flash tool

noteespirit said:
Tried that but all fails. Device didnt go in download mode and i cant able to flash through lg flash tool
Click to expand...
Click to collapse
Then I'm afraid JTag is your only option.. (=fully hard bricked[emoji24])

Klyupp said:
Then I'm afraid JTag is your only option.. (=fully hard bricked[emoji24])
Click to expand...
Click to collapse
JTag through octupus/octoplus/ medusa??? which one is successfull??

Octoplus and medusa are same, just look update logs if D851 in supported list..

can this method fix d851 ?

Were you guys able to fix your problem?
I am in the same mess and Boarddiag doesnt seems to work.
I just dont know what to do:crying:
Any ideas or recommendations?

Related

[Q] D855 hard brick Qualcomm 9008

in this morning i tried to go back to stock lollipop from CloudyG3 2.2 after seeing you can actually root stock now and tried the kdz method posted somewhere here. unfortunately the software (LG Flash tool crashed <<i hit the roof when i saw this software was unstable>> in the middle of the process and my phone is now bricked cant access anything not even download mode). nevertheless i saw there are some methods to reset the motherboard(i believe?1??!?!) MSM8974AC especially Smart Boot Diag tool but somehow it doesnt work for me . in the log.txt i have this >> [ I dont know if it helps]
It's not the first time i brick it but i've managed to unbrick it several times but now i think there's no hope.
---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM8)
>> Ready to access the target board...
>> BootLoader File : All EU Global_XXXX_XXXX.mbn
>> 1. Model : All EU Global , 2. Suffix : XXXX , 3. Operator : XXXX
>> Bootloader : All EU Global_XXXX_XXXX.mbn
>> AP Chip : MSM8974_G3 , BootLoader : All EU Global_XXXX_XXXX.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0C42B2CB
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0C42B2CB
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=12
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002bcfb
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002c387
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0002f8eb
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00030f34
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00031286
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x0003132f
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x000313df
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x00031423
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x0003150f
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x0005dc58
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x08d833d0
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x08daeffd
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2015-04-03 18:37:38...successfully Completed.
>> Saved Log File(LOG_All EU Global_XXXX_XXXX_20150403_183738.txt) successfully.
Can anyone help me or give me some suggestions please? ( i dont want to send it to lg service at the moment because i think warranty is void and even if they repair it it would take 1-2 months ) i'll send it however if i have no other choice.
I FOUND THE SOLUTION IN THIS TOPIC : http://forum.xda-developers.com/lg-g3/general/unbrick-lg-g3-qhsusbbulk-qualcomm-9008-t3072091
many thanks to @willcracker Dont forget to donate to this guy!

I killed LG G3

Hello
Sorry for my English. I am from Russia and I communicate through google translate. In this forum, strong people. We have, on our Russian, could not help.
I was hoping that I can restore your phone from any situation. But it was not there ...
I decided to flash the by LG G3 firmware from LG G4. With this program FlashTool i started to fill firmware. After a few minutes it was 99% and so I waited a very long time. Just showed 99%
I realized that the firmware not get up. I pulled the cord and stuck the battery. After that phone is not included.
First I checked the program SmartBootDiagv1.3.1, It turned out to be all okay.
Code:
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM3)
>> Ready to access the target board...
>> BootLoader File : LGD850_AATT_ATT.mbn
>> 1. Model : LGD850 , 2. Suffix : AATT , 3. Operator : ATT
>> Bootloader : LGD850_AATT_ATT.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGD850_AATT_ATT.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0ADC7C38
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0ADC7C38
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=23
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x000300af
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0003074a
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x00033c84
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x000352d7
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00035627
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000356d0
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x00035772
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x000357d5
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x0003580a
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x000358ce
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x0024586b
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x0024952e
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x0024d0eb
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x0024d14f
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x00251ce4
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x00251dd9
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x0026a66f
>> LOG_CODE :: 0xef5d1301 [ DECODED : 0x005d1301 ]
>> TIMESTAMP :: 0x0027c659
>> LOG_CODE :: 0xef5d1500 [ DECODED : 0x005d1500 ]
>> TIMESTAMP :: 0x0027c688
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x0027c70e
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x002a8e5a
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x0b49bbf6
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x0b4c77da
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GPT_IS_PRIMARY_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2015-09-14 15:24:11...successfully Completed.
>> Saved Log File(LOG_LGD850_AATT_ATT_20150914_152411.txt) successfully.
But the program BoardDiag 2.99 wants to see my phone Press the button in different ways, but to nothing lead...
What could be your advice. Help please.
Pic programms:
oi59.tinypic.com/nqv53o.jpg
oi59.tinypic.com/fatws8.jpg
up
up
Just wait, mine took several hours

D855 Black Screen of Death? No boot, no dl, no led but 9008

Hello,
my G3 seems to be death.
No root, no download mode, no led. Connecting with pc->device manager shows qualcomm 9008.
I tried the xda-guide with boarddiag but i only get error that device not seems to be in flashloader mode.
I tried orcam s guide but it doesnt work for me.
With LG Booting Diagnosis Tool i get following LOG:
>> ---------------------------- Start Logging ----------------------------
>> Ready to access the target board...
>> USB Status : RELINK HS-USB QDLoader 9008 (COM41)
>> Ready to access the target board...
>> USB Status : RELINK HS-USB QDLoader 9008 (COM41)
>> Ready to access the target board...
>> BootLoader File : All EU Global_XXXX_XXXX.mbn
>> 1. Model : All EU Global , 2. Suffix : XXXX , 3. Operator : XXXX
>> Bootloader : All EU Global_XXXX_XXXX.mbn
>> AP Chip : MSM8974_G3 , BootLoader : All EU Global_XXXX_XXXX.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0B48F49D
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0B48F49D
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=24
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002bfb7
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002c65c
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0002fbac
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x000311ee
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00031544
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000315f4
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x0003168d
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x000316fe
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x00031734
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x00031801
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x000ff945
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x00103635
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x00107308
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x0010736d
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x00117ce6
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x00117dcf
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x001345e3
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x00141cd5
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x00141d09
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x00148247
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x001482a6
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x001749a8
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x15253d5d
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x1527f93a
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2016-03-02 20:36:45...successfully Completed.
>> Saved Log File(LOG_All EU Global_XXXX_XXXX_20160302_203645.txt) successfully.
Click to expand...
Click to collapse
Any further ideas?
Whats ur pc read when plugged in
---------- Post added at 07:22 AM ---------- Previous post was at 07:19 AM ----------
U may have to do the pin short to wipe the partition thats damaged in the bootstack when u ground the pins out it resets one of them
Pin s sh o rte d : qu a lc o mm 900 8
Pins unshorted android usb serial port
Sent from my GT-S5830i using XDA Free mobile app

LG G3 -Qualcomm HS-UDB QDLoader 9008-Hard brick

when i upgrade my LG G3 to android M,it went dead.No boot/ led/download mode.Only shows Qualcomm HS-UDB QDLoader 9008 port 7, when connected to laptop.Itried to recover it using SmartBootDiagv1.3.1 tool,,
main problem is my phone model.A sticker where we place battery shows it is D855 made in korea but at top and and in loud speaker piece it is written as D850 0627.Still i tried this tool.. D850 model stopped at sending hello request 10 then time out
this is it. Failed to get response for Hello request.
>> failed to response for Hello & Security.
>> no response to target device.
>> failed to connect to flash bootloader.
>> AP Chip is not working normally.
For LGD851_ATMO_TMUS model only showing any progress.please see the log
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM6)
>> Ready to access the target board...
>> BootLoader File : LGD851_ATMO_TMUS.mbn
>> 1. Model : LGD851 , 2. Suffix : ATMO , 3. Operator : TMUS
>> Bootloader : LGD851_ATMO_TMUS.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGD851_ATMO_TMUS.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0B4F9DA7
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000262
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310262
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0B4F9DA7
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000262
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=46
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002fbaa
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x00030277
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x000337e5
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00034e2c
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00035176
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x0003522b
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x000352c8
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x0003532b
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x00035361
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x00035427
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x000d1d02
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x000d589a
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x000d9461
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x000d94c3
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x000d9a52
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x000d9b42
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x000dea42
>> LOG_CODE :: 0xef5d1301 [ DECODED : 0x005d1301 ]
>> TIMESTAMP :: 0x000eb851
>> LOG_CODE :: 0xef5d1500 [ DECODED : 0x005d1500 ]
>> TIMESTAMP :: 0x000eb886
>> LOG_CODE :: 0xef5d1600 [ DECODED : 0x005d1600 ]
>> TIMESTAMP :: 0x000eb8d6
>> LOG_CODE :: 0xef01080e [ DECODED : 0x0001080e ]
>> TIMESTAMP :: 0x000f134e
>> LOG_CODE :: 0xef1d0300 [ DECODED : 0x001d0300 ]
>> TIMESTAMP :: 0x000f1415
>> LOG_CODE :: 0xef010810 [ DECODED : 0x00010810 ]
>> TIMESTAMP :: 0x0014c34c
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x0014c462
>> LOG_CODE :: 0xef0b000f [ DECODED : 0x000b000f ]
>> TIMESTAMP :: 0x00151494
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x001519a6
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x00151a73
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0015327c
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x001532c1
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00153629
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x0015365b
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00153701
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x00153736
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x00153828
>> LOG_CODE :: 0xef010604 [ DECODED : 0x00010604 ]
>> TIMESTAMP :: 0x0016c9d1
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0016cedf
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x0016cfac
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0016e78e
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x0016e7e2
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x0016eb2e
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x0016eb60
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0016ebff
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x0016ec34
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x001823af
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x180b7fb0
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x180e3b53
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GPT_IS_PRIMARY_ERR
1> PBL_SDCC_LOG_GPT_GOT_SBL_ENTRY_ERR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_LOADER_LOG_IMG_HDR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_AP_SW_REV
1> [PBL_LOG_SECBOOT] SECBOOT INVALID MSM HW ID
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2016-08-01 18:48:41...successfully Completed.
>> Saved Log File(LOG_LGD851_ATMO_TMUS_20160801_184841.txt) successfully.
I also used BoardDiag_v2.99a and BoardDiag3.99c tool (run in admn. mode-driver signing off).Used extracted tot's of D850 and D851 .Still no success.it shows no response from device check PMIC first and if problem not corrected replace AP chip or some times it shows "Device was not found in dload trying flash programmer". .Only smartboot tool showing some response
What to do next?????Please advice. Pls help to recover my G3.Thanks in advance
Please try to remove battery from the phone. After 10 seconds, reset the battery to the phone. To press and hold the volume up button for 20 seconds and not to release it. Then connect your phone to PC with USB cable. And check if the phone can enter into download mode. If not, retry above process.
According to your observed Boarddiag response, your phone driver in PC device manager should be shown as LGE Androidnet USB port, should not be Qualcomm HS-USB QDLoader 9008 mode. Because my D858HK was in this status. I needed open the phone to short the qualcomm test point as mentioned in many forum threads in order to make the phone entering to the Qualcomm HS-USB QDLoader 9008 mode for unbricking by Boarddiag.
t2060079 said:
Please try to remove battery from the phone. After 10 seconds, reset the battery to the phone. To press and hold the volume up button for 20 seconds and not to release it. Then connect your phone to PC with USB cable. And check if the phone can enter into download mode. If not, retry above process.
According to your observed Boarddiag response, your phone driver in PC device manager should be shown as LGE Androidnet USB port, should not be Qualcomm HS-USB QDLoader 9008 mode. Because my D858HK was in this status. I needed open the phone to short the qualcomm test point as mentioned in many forum threads in order to make the phone entering to the Qualcomm HS-USB QDLoader 9008 mode for unbricking by Boarddiag.
Click to expand...
Click to collapse
Thanks for replying.The connected device shown as relink hs usb qd loader 9008 first..then some how (i think when i installed qualcomm driver) it changed to Qualcomm HS-USB QDLoader 9008 with shorting any points.
Just open up your phone and see the exact model number written on your phone board.and then use boardiag by willcracker to flash the firmware.you can seek help from the thread.
http://forum.xda-developers.com/sprint-lg-g3/general/guide-fix-hard-brick-recovery-guide-t3132359
If your phone in QDLoader 9008 mode really, no need to short the qualcomm test point. Directly to use boarddiag tool to restore the partitions for unbricking the phone.
Yes .I found my board model.It is D851. I Opened back cover and it is written on main board
I used BoardDiag but got "Failed to open partition from EMMC".
anyone know a solution?
Today I opened the back cover.it has a ?*D851 main board. That s y it shows some progress with (only with) ?*d851 in smartboot tool.tht s it. But can u study the log and explain wat is wrong with it??*
I tried d851 tot extract to flas but responce is no response from device check pmic first then replace ap…
My phone dont have any prblm when it died. I flashed android M d855 kdz and it went dead. Model number D855 written on a sticker where imei number is written .that s y I flashesd d855 kdz. Now after opening board, I see that my device is d851
Patching with model D851 by Smart Boot Diag Tool seems completion successfully. Can your phone enter download mode by holding volume up button and connect the USB cable to your PC?
Last time, I failed to unbrick my D858HK with Smart Boot Diag Tool. Finally, I adopted BoardDiag tool to make my phone restoration to live.
The specific D851 requires a unique hex file in order to flash correctly in 9008 mode, since the SKU itself has different fuses on the SoC.
I have created the solution just a couple of days ago in here and put a guide here: http://forum.xda-developers.com/tmobile-lg-g3/help/lg-g3-d851-unbrick-qualcomm-9008-t3430221
Woww. That worked man.. :laugh::laugh: Thank u so much.
YOUR WORK IS REALLY AMAZING. Thanks a lot
My G3 booted and flash tot and dll. Checking for any errors.
haris182 said:
I used BoardDiag but got "Failed to open partition from EMMC".
anyone know a solution?
Click to expand...
Click to collapse
same issue for me. on lg d855
any solution guys?
here is log
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM14)
>> Ready to access the target board...
>> BootLoader File : All EU Global_XXXX_XXXX.mbn
>> 1. Model : All EU Global , 2. Suffix : XXXX , 3. Operator : XXXX
>> Bootloader : All EU Global_XXXX_XXXX.mbn
>> AP Chip : MSM8974_G3 , BootLoader : All EU Global_XXXX_XXXX.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0FF90131
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0FF90131
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=11
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002bea8
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002c53e
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0002fa67
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x000310b6
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x000313ff
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000314a0
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x00031515
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x0003155c
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x00044c53
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x08084edd
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x080b0add
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2020-08-03 01:47:06...successfully Completed.
>> Saved Log File(LOG_All EU Global_XXXX_XXXX_20200803_014706.txt) successfully.

"Boot verification failed" need help.

Hi
i using LG-D855 32GB SEA (with V21A_00 firmware), i using LG PC Suite to update to MM 30A firmware but failed many time always stuck @ 49%, so i go to lg-firmware-rom.com, key in the IMEI code and download the latest D85530a_00_0528.kdz firmware and use LG Flash Tool 2014 to Flash it. still failed and then i unplug the USB cable and remove the battery. ( turn out the firmware i download is corrupted, so i download few more times to make sure the file MD5 is same to make sure no error)
but the problem is now my phone show "Boot verification failed" and then black screen, when i connect to PC , nothing come up @ device manager. so i try use download mode to connect to PC, now device manager show "QHSUSB_BULK" after some google search, i install QDLoader HS-USB Driver, now it show "Qualcomm HS-USB QDLoader 9008 (COM4)"
i find this http://www.androidbrick.com/unbrick-recover-your-dead-lg-g3-g2-all-variants/# , and try the SmartBootDiagv1.3.1.exe, it can detect my phone @ com4, but after select the "ALL EU Global XXX-XXX" the program run some test, then auto Disconect the phone and reconnect. here is the log :
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM4)
>> Ready to access the target board...
>> BootLoader File : All EU Global_XXXX_XXXX.mbn
>> 1. Model : All EU Global , 2. Suffix : XXXX , 3. Operator : XXXX
>> Bootloader : All EU Global_XXXX_XXXX.mbn
>> AP Chip : MSM8974_G3 , BootLoader : All EU Global_XXXX_XXXX.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0D1487D9
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0D1487D9
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=22
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002bdf4
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002c49e
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0002f9a5
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00030fef
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0003133a
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000313e0
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x0003147a
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x000314bd
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x000315be
>> LOG_CODE :: 0xef5d0405 [ DECODED : 0x005d0405 ]
>> TIMESTAMP :: 0x00278a44
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x0027c595
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x00280079
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x002800e1
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x0028609b
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x002860f8
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x0028e92f
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x0028e962
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x002966f8
>> LOG_CODE :: 0xef5d1600 [ DECODED : 0x005d1600 ]
>> TIMESTAMP :: 0x00296733
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x002a9e8f
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x14e1346b
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x14e3f052
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDCC_LOG_GPT_GOT_SBL_ENTRY_ERR
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2016-08-09 22:43:00...successfully Completed.
>> Saved Log File(LOG_All EU Global_XXXX_XXXX_20160809_224300.txt) successfully.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
So i found this Thread http://forum.xda-developers.com/sprint-lg-g3/general/guide-fix-hard-brick-recovery-guide-t3132359
but i can't find the TOT file (V21A_00) cause i always download the KDZ file.
so what can i do now? please help .
thanks.
Here are tot for d855
http://storagecow.eu/index.php?dir=Xda/LG+G3/Stock/D855/D855+TOTs/
Jahanzaibawan said:
Here are tot for d855
http://storagecow.eu/index.php?dir=Xda/LG+G3/Stock/D855/D855+TOTs/
Click to expand...
Click to collapse
thanks, but the page all is 10B, 10e version, and i need 21A , because that is the one i use before, and the thread say that need to be the same ver. i search so many website, and didn't find any 21A tot file. only KDZ.
ok. i download LGD855AT-00-V10b-HKG-XX-JUL-01-2014-32G+0.tot to use.. turn out it's ok.. so now phone FIX.... thanks everyone.

Categories

Resources