I killed LG G3 - G3 Q&A, Help & Troubleshooting

Hello
Sorry for my English. I am from Russia and I communicate through google translate. In this forum, strong people. We have, on our Russian, could not help.
I was hoping that I can restore your phone from any situation. But it was not there ...
I decided to flash the by LG G3 firmware from LG G4. With this program FlashTool i started to fill firmware. After a few minutes it was 99% and so I waited a very long time. Just showed 99%
I realized that the firmware not get up. I pulled the cord and stuck the battery. After that phone is not included.
First I checked the program SmartBootDiagv1.3.1, It turned out to be all okay.
Code:
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM3)
>> Ready to access the target board...
>> BootLoader File : LGD850_AATT_ATT.mbn
>> 1. Model : LGD850 , 2. Suffix : AATT , 3. Operator : ATT
>> Bootloader : LGD850_AATT_ATT.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGD850_AATT_ATT.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0ADC7C38
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0ADC7C38
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=23
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x000300af
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0003074a
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x00033c84
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x000352d7
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00035627
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000356d0
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x00035772
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x000357d5
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x0003580a
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x000358ce
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x0024586b
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x0024952e
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x0024d0eb
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x0024d14f
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x00251ce4
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x00251dd9
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x0026a66f
>> LOG_CODE :: 0xef5d1301 [ DECODED : 0x005d1301 ]
>> TIMESTAMP :: 0x0027c659
>> LOG_CODE :: 0xef5d1500 [ DECODED : 0x005d1500 ]
>> TIMESTAMP :: 0x0027c688
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x0027c70e
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x002a8e5a
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x0b49bbf6
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x0b4c77da
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GPT_IS_PRIMARY_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2015-09-14 15:24:11...successfully Completed.
>> Saved Log File(LOG_LGD850_AATT_ATT_20150914_152411.txt) successfully.
But the program BoardDiag 2.99 wants to see my phone Press the button in different ways, but to nothing lead...
What could be your advice. Help please.
Pic programms:
oi59.tinypic.com/nqv53o.jpg
oi59.tinypic.com/fatws8.jpg

up

up

Just wait, mine took several hours

Related

[q] lg g3 vs985 qhsusb_bulk

Hi everyone,
LG G3 with black screen when connecting to usb it shows QSHUSB_BULK in device manager
I managed to install driver for it on my 32bit computer
Got linux
Got Mac
Got Windows 32/64
Just need the answer for how do I unbrick this phone?!
maybe there is some debrick sd for it?
UPDATE:
I got my hands on LG Smart Boot Diagnostic Tool
and the device shuts down when the process starts
LOG:
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM42)
>> Ready to access the target board...
>> BootLoader File : LGVS985_AVRZ_VRZ.mbn
>> 1. Model : LGVS985 , 2. Suffix : AVRZ , 3. Operator : VRZ
>> Bootloader : LGVS985_AVRZ_VRZ.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGVS985_AVRZ_VRZ.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0DFB2858
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0DFB2858
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=12
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002bbdd
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002c282
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0002f7ef
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00030e39
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00031188
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x00031236
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x000312c8
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x00031308
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x00031403
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x0005db72
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x1ebc8d2d
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x1ebf491d
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2015-07-13 20:15:10...successfully Completed.
>> Saved Log File(LOG_LGVS985_AVRZ_VRZ_20150713_201510.txt) successfully.
Click to expand...
Click to collapse

D855 Black Screen of Death? No boot, no dl, no led but 9008

Hello,
my G3 seems to be death.
No root, no download mode, no led. Connecting with pc->device manager shows qualcomm 9008.
I tried the xda-guide with boarddiag but i only get error that device not seems to be in flashloader mode.
I tried orcam s guide but it doesnt work for me.
With LG Booting Diagnosis Tool i get following LOG:
>> ---------------------------- Start Logging ----------------------------
>> Ready to access the target board...
>> USB Status : RELINK HS-USB QDLoader 9008 (COM41)
>> Ready to access the target board...
>> USB Status : RELINK HS-USB QDLoader 9008 (COM41)
>> Ready to access the target board...
>> BootLoader File : All EU Global_XXXX_XXXX.mbn
>> 1. Model : All EU Global , 2. Suffix : XXXX , 3. Operator : XXXX
>> Bootloader : All EU Global_XXXX_XXXX.mbn
>> AP Chip : MSM8974_G3 , BootLoader : All EU Global_XXXX_XXXX.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0B48F49D
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0B48F49D
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=24
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002bfb7
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002c65c
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0002fbac
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x000311ee
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00031544
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000315f4
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x0003168d
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x000316fe
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x00031734
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x00031801
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x000ff945
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x00103635
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x00107308
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x0010736d
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x00117ce6
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x00117dcf
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x001345e3
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x00141cd5
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x00141d09
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x00148247
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x001482a6
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x001749a8
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x15253d5d
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x1527f93a
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2016-03-02 20:36:45...successfully Completed.
>> Saved Log File(LOG_All EU Global_XXXX_XXXX_20160302_203645.txt) successfully.
Click to expand...
Click to collapse
Any further ideas?
Whats ur pc read when plugged in
---------- Post added at 07:22 AM ---------- Previous post was at 07:19 AM ----------
U may have to do the pin short to wipe the partition thats damaged in the bootstack when u ground the pins out it resets one of them
Pin s sh o rte d : qu a lc o mm 900 8
Pins unshorted android usb serial port
Sent from my GT-S5830i using XDA Free mobile app

LG G3 -Qualcomm HS-UDB QDLoader 9008-Hard brick

when i upgrade my LG G3 to android M,it went dead.No boot/ led/download mode.Only shows Qualcomm HS-UDB QDLoader 9008 port 7, when connected to laptop.Itried to recover it using SmartBootDiagv1.3.1 tool,,
main problem is my phone model.A sticker where we place battery shows it is D855 made in korea but at top and and in loud speaker piece it is written as D850 0627.Still i tried this tool.. D850 model stopped at sending hello request 10 then time out
this is it. Failed to get response for Hello request.
>> failed to response for Hello & Security.
>> no response to target device.
>> failed to connect to flash bootloader.
>> AP Chip is not working normally.
For LGD851_ATMO_TMUS model only showing any progress.please see the log
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM6)
>> Ready to access the target board...
>> BootLoader File : LGD851_ATMO_TMUS.mbn
>> 1. Model : LGD851 , 2. Suffix : ATMO , 3. Operator : TMUS
>> Bootloader : LGD851_ATMO_TMUS.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGD851_ATMO_TMUS.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0B4F9DA7
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000262
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310262
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0B4F9DA7
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000262
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=46
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002fbaa
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x00030277
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x000337e5
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00034e2c
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00035176
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x0003522b
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x000352c8
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x0003532b
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x00035361
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x00035427
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x000d1d02
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x000d589a
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x000d9461
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x000d94c3
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x000d9a52
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x000d9b42
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x000dea42
>> LOG_CODE :: 0xef5d1301 [ DECODED : 0x005d1301 ]
>> TIMESTAMP :: 0x000eb851
>> LOG_CODE :: 0xef5d1500 [ DECODED : 0x005d1500 ]
>> TIMESTAMP :: 0x000eb886
>> LOG_CODE :: 0xef5d1600 [ DECODED : 0x005d1600 ]
>> TIMESTAMP :: 0x000eb8d6
>> LOG_CODE :: 0xef01080e [ DECODED : 0x0001080e ]
>> TIMESTAMP :: 0x000f134e
>> LOG_CODE :: 0xef1d0300 [ DECODED : 0x001d0300 ]
>> TIMESTAMP :: 0x000f1415
>> LOG_CODE :: 0xef010810 [ DECODED : 0x00010810 ]
>> TIMESTAMP :: 0x0014c34c
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x0014c462
>> LOG_CODE :: 0xef0b000f [ DECODED : 0x000b000f ]
>> TIMESTAMP :: 0x00151494
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x001519a6
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x00151a73
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0015327c
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x001532c1
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00153629
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x0015365b
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00153701
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x00153736
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x00153828
>> LOG_CODE :: 0xef010604 [ DECODED : 0x00010604 ]
>> TIMESTAMP :: 0x0016c9d1
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0016cedf
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x0016cfac
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0016e78e
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x0016e7e2
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x0016eb2e
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x0016eb60
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0016ebff
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x0016ec34
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x001823af
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x180b7fb0
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x180e3b53
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GPT_IS_PRIMARY_ERR
1> PBL_SDCC_LOG_GPT_GOT_SBL_ENTRY_ERR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_LOADER_LOG_IMG_HDR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_AP_SW_REV
1> [PBL_LOG_SECBOOT] SECBOOT INVALID MSM HW ID
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2016-08-01 18:48:41...successfully Completed.
>> Saved Log File(LOG_LGD851_ATMO_TMUS_20160801_184841.txt) successfully.
I also used BoardDiag_v2.99a and BoardDiag3.99c tool (run in admn. mode-driver signing off).Used extracted tot's of D850 and D851 .Still no success.it shows no response from device check PMIC first and if problem not corrected replace AP chip or some times it shows "Device was not found in dload trying flash programmer". .Only smartboot tool showing some response
What to do next?????Please advice. Pls help to recover my G3.Thanks in advance
Please try to remove battery from the phone. After 10 seconds, reset the battery to the phone. To press and hold the volume up button for 20 seconds and not to release it. Then connect your phone to PC with USB cable. And check if the phone can enter into download mode. If not, retry above process.
According to your observed Boarddiag response, your phone driver in PC device manager should be shown as LGE Androidnet USB port, should not be Qualcomm HS-USB QDLoader 9008 mode. Because my D858HK was in this status. I needed open the phone to short the qualcomm test point as mentioned in many forum threads in order to make the phone entering to the Qualcomm HS-USB QDLoader 9008 mode for unbricking by Boarddiag.
t2060079 said:
Please try to remove battery from the phone. After 10 seconds, reset the battery to the phone. To press and hold the volume up button for 20 seconds and not to release it. Then connect your phone to PC with USB cable. And check if the phone can enter into download mode. If not, retry above process.
According to your observed Boarddiag response, your phone driver in PC device manager should be shown as LGE Androidnet USB port, should not be Qualcomm HS-USB QDLoader 9008 mode. Because my D858HK was in this status. I needed open the phone to short the qualcomm test point as mentioned in many forum threads in order to make the phone entering to the Qualcomm HS-USB QDLoader 9008 mode for unbricking by Boarddiag.
Click to expand...
Click to collapse
Thanks for replying.The connected device shown as relink hs usb qd loader 9008 first..then some how (i think when i installed qualcomm driver) it changed to Qualcomm HS-USB QDLoader 9008 with shorting any points.
Just open up your phone and see the exact model number written on your phone board.and then use boardiag by willcracker to flash the firmware.you can seek help from the thread.
http://forum.xda-developers.com/sprint-lg-g3/general/guide-fix-hard-brick-recovery-guide-t3132359
If your phone in QDLoader 9008 mode really, no need to short the qualcomm test point. Directly to use boarddiag tool to restore the partitions for unbricking the phone.
Yes .I found my board model.It is D851. I Opened back cover and it is written on main board
I used BoardDiag but got "Failed to open partition from EMMC".
anyone know a solution?
Today I opened the back cover.it has a ?*D851 main board. That s y it shows some progress with (only with) ?*d851 in smartboot tool.tht s it. But can u study the log and explain wat is wrong with it??*
I tried d851 tot extract to flas but responce is no response from device check pmic first then replace ap…
My phone dont have any prblm when it died. I flashed android M d855 kdz and it went dead. Model number D855 written on a sticker where imei number is written .that s y I flashesd d855 kdz. Now after opening board, I see that my device is d851
Patching with model D851 by Smart Boot Diag Tool seems completion successfully. Can your phone enter download mode by holding volume up button and connect the USB cable to your PC?
Last time, I failed to unbrick my D858HK with Smart Boot Diag Tool. Finally, I adopted BoardDiag tool to make my phone restoration to live.
The specific D851 requires a unique hex file in order to flash correctly in 9008 mode, since the SKU itself has different fuses on the SoC.
I have created the solution just a couple of days ago in here and put a guide here: http://forum.xda-developers.com/tmobile-lg-g3/help/lg-g3-d851-unbrick-qualcomm-9008-t3430221
Woww. That worked man.. :laugh::laugh: Thank u so much.
YOUR WORK IS REALLY AMAZING. Thanks a lot
My G3 booted and flash tot and dll. Checking for any errors.
haris182 said:
I used BoardDiag but got "Failed to open partition from EMMC".
anyone know a solution?
Click to expand...
Click to collapse
same issue for me. on lg d855
any solution guys?
here is log
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM14)
>> Ready to access the target board...
>> BootLoader File : All EU Global_XXXX_XXXX.mbn
>> 1. Model : All EU Global , 2. Suffix : XXXX , 3. Operator : XXXX
>> Bootloader : All EU Global_XXXX_XXXX.mbn
>> AP Chip : MSM8974_G3 , BootLoader : All EU Global_XXXX_XXXX.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0FF90131
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0FF90131
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=11
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002bea8
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002c53e
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0002fa67
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x000310b6
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x000313ff
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000314a0
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x00031515
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x0003155c
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x00044c53
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x08084edd
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x080b0add
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2020-08-03 01:47:06...successfully Completed.
>> Saved Log File(LOG_All EU Global_XXXX_XXXX_20200803_014706.txt) successfully.

"Boot verification failed" need help.

Hi
i using LG-D855 32GB SEA (with V21A_00 firmware), i using LG PC Suite to update to MM 30A firmware but failed many time always stuck @ 49%, so i go to lg-firmware-rom.com, key in the IMEI code and download the latest D85530a_00_0528.kdz firmware and use LG Flash Tool 2014 to Flash it. still failed and then i unplug the USB cable and remove the battery. ( turn out the firmware i download is corrupted, so i download few more times to make sure the file MD5 is same to make sure no error)
but the problem is now my phone show "Boot verification failed" and then black screen, when i connect to PC , nothing come up @ device manager. so i try use download mode to connect to PC, now device manager show "QHSUSB_BULK" after some google search, i install QDLoader HS-USB Driver, now it show "Qualcomm HS-USB QDLoader 9008 (COM4)"
i find this http://www.androidbrick.com/unbrick-recover-your-dead-lg-g3-g2-all-variants/# , and try the SmartBootDiagv1.3.1.exe, it can detect my phone @ com4, but after select the "ALL EU Global XXX-XXX" the program run some test, then auto Disconect the phone and reconnect. here is the log :
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM4)
>> Ready to access the target board...
>> BootLoader File : All EU Global_XXXX_XXXX.mbn
>> 1. Model : All EU Global , 2. Suffix : XXXX , 3. Operator : XXXX
>> Bootloader : All EU Global_XXXX_XXXX.mbn
>> AP Chip : MSM8974_G3 , BootLoader : All EU Global_XXXX_XXXX.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0D1487D9
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0D1487D9
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=22
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002bdf4
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002c49e
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0002f9a5
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00030fef
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0003133a
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000313e0
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x0003147a
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x000314bd
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x000315be
>> LOG_CODE :: 0xef5d0405 [ DECODED : 0x005d0405 ]
>> TIMESTAMP :: 0x00278a44
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x0027c595
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x00280079
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x002800e1
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x0028609b
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x002860f8
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x0028e92f
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x0028e962
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x002966f8
>> LOG_CODE :: 0xef5d1600 [ DECODED : 0x005d1600 ]
>> TIMESTAMP :: 0x00296733
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x002a9e8f
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x14e1346b
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x14e3f052
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDCC_LOG_GPT_GOT_SBL_ENTRY_ERR
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2016-08-09 22:43:00...successfully Completed.
>> Saved Log File(LOG_All EU Global_XXXX_XXXX_20160809_224300.txt) successfully.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
So i found this Thread http://forum.xda-developers.com/sprint-lg-g3/general/guide-fix-hard-brick-recovery-guide-t3132359
but i can't find the TOT file (V21A_00) cause i always download the KDZ file.
so what can i do now? please help .
thanks.
Here are tot for d855
http://storagecow.eu/index.php?dir=Xda/LG+G3/Stock/D855/D855+TOTs/
Jahanzaibawan said:
Here are tot for d855
http://storagecow.eu/index.php?dir=Xda/LG+G3/Stock/D855/D855+TOTs/
Click to expand...
Click to collapse
thanks, but the page all is 10B, 10e version, and i need 21A , because that is the one i use before, and the thread say that need to be the same ver. i search so many website, and didn't find any 21A tot file. only KDZ.
ok. i download LGD855AT-00-V10b-HKG-XX-JUL-01-2014-32G+0.tot to use.. turn out it's ok.. so now phone FIX.... thanks everyone.

Need Help ASAP.... LG g3 (Ls990 written on board) D851 was installed

DiDn't know anything about it first ...accidently bricked my phone..and now i was trying to diagnose from smartbootdiag.. and got that log i need your help and guideline to revive my lg g3..here is the log..
.
.>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM3)
>> Ready to access the target board...
>> BootLoader File : LGUS990_AUCL_USC.mbn
>> 1. Model : LGUS990 , 2. Suffix : AUCL , 3. Operator : USC
>> Bootloader : LGUS990_AUCL_USC.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGUS990_AUCL_USC.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0EC2E1C1
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0EC2E1C1
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=46
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002f849
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002fef3
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0003344e
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00034a9f
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00034e04
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x00034eab
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x00034f35
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x00034f91
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x00034fc7
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x000350a1
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x00103112
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x00106cd7
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x0010a86c
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x0010a8d1
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x0010ae6f
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x0010af5d
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x0010fe49
>> LOG_CODE :: 0xef5d1301 [ DECODED : 0x005d1301 ]
>> TIMESTAMP :: 0x0011c97b
>> LOG_CODE :: 0xef5d1500 [ DECODED : 0x005d1500 ]
>> TIMESTAMP :: 0x0011c9bb
>> LOG_CODE :: 0xef5d1600 [ DECODED : 0x005d1600 ]
>> TIMESTAMP :: 0x0011ca06
>> LOG_CODE :: 0xef01080e [ DECODED : 0x0001080e ]
>> TIMESTAMP :: 0x0012243a
>> LOG_CODE :: 0xef1d0300 [ DECODED : 0x001d0300 ]
>> TIMESTAMP :: 0x0012250c
>> LOG_CODE :: 0xef010810 [ DECODED : 0x00010810 ]
>> TIMESTAMP :: 0x0017cfd9
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x0017d0d6
>> LOG_CODE :: 0xef0b000f [ DECODED : 0x000b000f ]
>> TIMESTAMP :: 0x00182128
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0018263b
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x00182709
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x00183ee3
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x00183f4b
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00184296
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x001842c9
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0018436c
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x001843a2
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x0018448c
>> LOG_CODE :: 0xef010604 [ DECODED : 0x00010604 ]
>> TIMESTAMP :: 0x0019d65a
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0019db6b
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x0019dc38
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0019f3e4
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x0019f443
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x0019f79e
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x0019f7d1
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0019f873
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x0019f8a9
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x001b307d
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x19d87b7c
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x19db3715
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GPT_IS_PRIMARY_ERR
1> PBL_SDCC_LOG_GPT_GOT_SBL_ENTRY_ERR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_LOADER_LOG_IMG_HDR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_AP_SW_REV
1> [PBL_LOG_SECBOOT] SECBOOT INVALID MSM HW ID
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2017-03-12 21:03:23...successfully Completed.
>> Saved Log File(LOG_LGUS990_AUCL_USC_20170312_210323.txt) successfully.
..need help ASAP
my whatsapp number is
+923218546026
facebook com slash asad22sid

Categories

Resources