Hi guys i brought a used lg g3 d855 and i was trying to flash the stock tot or kdz but lg flash tool was giving me erorrs ..... Till i discovered that my d855 have a d851 motherboard so should i flash the d851 kdz/tot/roms in it .....?????
Yes, you've to flash the rom according to your motherboard model.
Kashif Hashmi said:
Yes, you've to flash the rom according to your motherboard model.
Click to expand...
Click to collapse
Thanx man so i will flash the d851 then ?
Yes
Kashif Hashmi said:
Yes
Click to expand...
Click to collapse
Thanx one last thing would having a d851 motherboard in a d855 phone cause me any problems in the futur ...?? Thanx man i really apreciate your reply
a bricked lg g2 said:
Thanx one last thing would having a d851 motherboard in a d855 phone cause me any problems in the futur ...?? Thanx man i really apreciate your reply
Click to expand...
Click to collapse
No, It will not cause you any problem in future.
Kashif Hashmi said:
No, It will not cause you any problem in future.
Click to expand...
Click to collapse
Thanx
Kashif Hashmi said:
No, It will not cause you any problem in future.
Click to expand...
Click to collapse
Hi man i need your help again i tried to flash my d855 with the d851 tot because of the motherboard and it giving erorr "model changed " i tried woth the lgup dll too plz hlp am stuck in download mode
a bricked lg g2 said:
Hi man i need your help again i tried to flash my d855 with the d851 tot because of the motherboard and it giving erorr "model changed " i tried woth the lgup dll too plz hlp am stuck in download mode
Click to expand...
Click to collapse
Hi.You must edit the d851 tot file .check this out....
http://forum.xda-developers.com/lg-g3/general/service-disabled-current-version-t3403232
Kashif Hashmi said:
Yes, you've to flash the rom according to your motherboard model.
Click to expand...
Click to collapse
how did you know that you have the d851 motherboard ?
ktkhaled said:
how did you know that you have the d851 motherboard ?
Click to expand...
Click to collapse
Open the phone and it is written in the motherboard
a bricked lg g2 said:
Open the phone and it is written in the motherboard
Click to expand...
Click to collapse
Hey, have you solved the problem? i have the same situation and without knowledge of that i've flashed d855 tot firmware and now im with hard brick, maybe this can solve my problem.
adrianbravom said:
Hey, have you solved the problem? i have the same situation and without knowledge of that i've flashed d855 tot firmware and now im with hard brick, maybe this can solve my problem.
Click to expand...
Click to collapse
Yes i solved my prob and yours can be solved but i need more info about your phone what the model number written behind the phone down the battery ? and what model of the motherboard you have ? And then make sur that you can boot to download mode ? If all that is done!! Then the fix is really easy........... Srry for the bad eng
adrianbravom said:
Hey, have you solved the problem? i have the same situation and without knowledge of that i've flashed d855 tot firmware and now im with hard brick, maybe this can solve my problem.
Click to expand...
Click to collapse
You can unbrick it easily within 30 minutes.just use the shortening of pins method .search for hard bricked lg g3.you will find that in g3 sprint section.
a bricked lg g2 said:
Yes i solved my prob and yours can be solved but i need more info about your phone what the model number written behind the phone down the battery ? and what model of the motherboard you have ? And then make sur that you can boot to download mode ? If all that is done!! Then the fix is really easy........... Srry for the bad eng
Click to expand...
Click to collapse
That's the problem, behind my phone says that it's a D855, but in the motherboard says D851, and i can't start download mode because i'm hardbricked
Jahanzaibawan said:
You can unbrick it easily within 30 minutes.just use the shortening of pins method .search for hard bricked lg g3.you will find that in g3 sprint section.
Click to expand...
Click to collapse
Yeah i followed the guides with no success, because behind my phone says that it's a D855 but the motherboard D851 so i don't know what to do
adrianbravom said:
That's the problem, behind my phone says that it's a D855, but in the motherboard says D851, and i can't start download mode because i'm hardbricked
Yeah i followed the guides with no success, because behind my phone says that it's a D855 but the motherboard D851 so i don't know what to do
Click to expand...
Click to collapse
Use d851 tot to flash your phone.that method can unbrick Hard brick.
i've used the d851 tot in BoardDiag with no success again, i'm getting Qualcomm QDLoader driver so i think i dont need to short te pins, also i've used the smart boot diagnosis tool and identificate the phone as d851 and it run and says that it no have problem ( before i've used the d855 option with error results ), but when i use the boardDiag tool it says PMIC not connected, so i dont know what to do, i've flashed a d855 rom with the dll that doesn't check registers before via lg flash tools, that has caused me the hardbrick, and when i openned the phone i've read in the motherboard D851... si i think this is a frankenstain phone, here is a screenshot:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
What yout think that can be happening?, ive tried both, modified .tot file with hex editor and no modified file, both with no success.
Here's my log
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM5)
>> Ready to access the target board...
>> BootLoader File : LGD851_ATMO_TMUS.mbn
>> 1. Model : LGD851 , 2. Suffix : ATMO , 3. Operator : TMUS
>> Bootloader : LGD851_ATMO_TMUS.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGD851_ATMO_TMUS.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0CCCC72F
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000262
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310262
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0CCCC72F
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000262
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=46
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002fd72
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x00030417
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0003395d
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00034faa
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x000352f4
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000353a3
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x0003543f
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x000354a2
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x000354d9
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x0003559d
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x000b9238
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x000bce0c
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x000c0969
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x000c09cc
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x000c0f58
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x000c1047
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x000c5f46
>> LOG_CODE :: 0xef5d1301 [ DECODED : 0x005d1301 ]
>> TIMESTAMP :: 0x000d2a63
>> LOG_CODE :: 0xef5d1500 [ DECODED : 0x005d1500 ]
>> TIMESTAMP :: 0x000d2a99
>> LOG_CODE :: 0xef5d1600 [ DECODED : 0x005d1600 ]
>> TIMESTAMP :: 0x000d2ae9
>> LOG_CODE :: 0xef01080e [ DECODED : 0x0001080e ]
>> TIMESTAMP :: 0x000d83ea
>> LOG_CODE :: 0xef1d0300 [ DECODED : 0x001d0300 ]
>> TIMESTAMP :: 0x000d84ab
>> LOG_CODE :: 0xef010810 [ DECODED : 0x00010810 ]
>> TIMESTAMP :: 0x00133283
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x0013339c
>> LOG_CODE :: 0xef0b000f [ DECODED : 0x000b000f ]
>> TIMESTAMP :: 0x001383f6
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0013890a
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x001389d6
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0013a1db
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x0013a240
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x0013a59b
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x0013a5d6
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0013a67a
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x0013a6ae
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x0013a794
>> LOG_CODE :: 0xef010604 [ DECODED : 0x00010604 ]
>> TIMESTAMP :: 0x001538f1
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x00153e08
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x00153ed4
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x001556b7
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x00155706
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00155a58
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x00155a8b
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00155b2d
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x00155b61
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x0016930a
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x06ff34ab
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x0701f019
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GPT_IS_PRIMARY_ERR
1> PBL_SDCC_LOG_GPT_GOT_SBL_ENTRY_ERR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_LOADER_LOG_IMG_HDR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_AP_SW_REV
1> [PBL_LOG_SECBOOT] SECBOOT INVALID MSM HW ID
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2016-07-23 21:00:26...successfully Completed.
>> Saved Log File(LOG_LGD851_ATMO_TMUS_20160723_210026.txt) successfully.
Thanks for your help and sorry for my english.
Broaddiag cant fix the the D851 because the dev didnt upload the msm8975AC modele with it , you have 2 choices , either you take it to a repair shop and get it fixed with a JTAG box , or someone fix it to you with teamviewer.
Jyed said:
Broaddiag cant fix the the D851 because the dev didnt upload the msm8975AC modele with it , you have 2 choices , either you take it to a repair shop and get it fixed with a JTAG box , or someone fix it to you with teamviewer.
Click to expand...
Click to collapse
@Jyed and who can do the teanviewer fix ?
Related
So i flashed the wrong version of rom and it is hard bricked now. no lights at all, no screen on, no recovery and no download mode.
tried many things, but nothing could be able to fix the issue. when plugging into pc it shows LGE AndroidNet USB Serial Port. screenshot attached.
Any help in this regard is highly appreciated, please!
http://s21.postimg.org/42wvuidnr/image.jpg
i have short tested and put the motherboard into qualcomm dloader 9008. but when i disconnects it went to again for LG AndroidNet serial port.
board diagnostics is not working. continously getting error of dload trying to flash programmer. any body can help me please?
LG BOOT DIAGNOSIS TOOL IS SHOWING EVERYTHING OK. STILL PC RECOGNIZES AS QUALCOMM 9008 (WITHOUT BATTERY) AND AS UN RECOGNIZED DEVICE (WITH BATTERY).
HERE ARE LG BOOT DIANOSIS TOOL LOGS:
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM15)
>> Ready to access the target board...
>> BootLoader File : LGD851_ATMO_TMUS.mbn
>> 1. Model : LGD851 , 2. Suffix : ATMO , 3. Operator : TMUS
>> Bootloader : LGD851_ATMO_TMUS.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGD851_ATMO_TMUS.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0C3CDA50
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000262
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310262
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0C3CDA50
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000262
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=20
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002ee6a
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002f50a
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x00032a25
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00034086
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x000343c9
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x00034468
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x0003450d
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x00034570
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x000345a6
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x00034681
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x000b821f
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x000bbe37
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x000bf98a
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x000bf9ee
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x000bff8b
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x000c0067
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x000c4f47
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x000f163b
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x28ec52ca
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x28ef0ee9
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2015-04-19 12:39:24...successfully Completed.
>> Saved Log File(LOG_LGD851_ATMO_TMUS_20150419_123924.txt) successfully.
LG G3 Qualcomm HS-USB QDLoader 9008
noteespirit said:
LG BOOT DIAGNOSIS TOOL IS SHOWING EVERYTHING OK. STILL PC RECOGNIZES AS QUALCOMM 9008 (WITHOUT BATTERY) AND AS UN RECOGNIZED DEVICE (WITH BATTERY).
HERE ARE LG BOOT DIANOSIS TOOL LOGS:
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM15)
>> Ready to access the target board...
>> BootLoader File : LGD851_ATMO_TMUS.mbn
>> 1. Model : LGD851 , 2. Suffix : ATMO , 3. Operator : TMUS
>> Bootloader : LGD851_ATMO_TMUS.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGD851_ATMO_TMUS.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0C3CDA50
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000262
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310262
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0C3CDA50
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000262
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=20
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002ee6a
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002f50a
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x00032a25
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00034086
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x000343c9
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x00034468
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x0003450d
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x00034570
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x000345a6
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x00034681
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x000b821f
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x000bbe37
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x000bf98a
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x000bf9ee
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x000bff8b
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x000c0067
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x000c4f47
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x000f163b
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x28ec52ca
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x28ef0ee9
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2015-04-19 12:39:24...successfully Completed.
>> Saved Log File(LOG_LGD851_ATMO_TMUS_20150419_123924.txt) successfully.
Click to expand...
Click to collapse
help me please
Isramartinz said:
help me please
Click to expand...
Click to collapse
brother, you on same boat as mine?
noteespirit said:
brother, you on same boat as mine?
Click to expand...
Click to collapse
yeees! in the same boat
any solution?
no body is replying, and i havent succeeded yet. so far there is no solution for qualcomm 9008 hard brick mode.
i guess there are some chances, fingers crossed.
noteespirit said:
After i tried a program (swapper2) i got the flash partition table destroyed. When i tried it i gave me some errors but i could not guess it could be so dangerous for our E730.
Nothing happened at that moment, just the program gave me error,so i uninstalled it, but when i restarted the phone later it died totally.
No powerbutton
No screen
No led
No recovery
No emergency mode
Nothing at all, i pulled out the battery and waited few time but nothing changed, my e730 was died.
I tried some of the key combinations but none worked, i thought i had lost it.
Reading about on the net i found a procedure to try:
pull out the battery
press the volume down
attach the usb cable
This procedure starts the Modem Download Mode, on Ubuntu looking at the dmesg i could see something like this:
Bus 001 Device 011: ID 05c6:9008 Qualcomm, Inc. Gobi Wireless Modem (QDL mode)
Jul 29 03:46:05 unknown kernel: [ 3020.332185] usb 1-6: new high speed USB device using ehci_hcd and address 11
Jul 29 03:46:05 unknown kernel: [ 3020.466258] qcserial 1-6:1.0: Qualcomm USB modem converter detected
Jul 29 03:46:05 unknown kernel: [ 3020.466446] usb 1-6: Qualcomm USB modem converter now attached to ttyUSB1
So the E730 was not dead at all! there was still something alive, so i started to see what the QDL mode can do.
Basically it is written on a rom of the soc, so it is uncancellable, and it allow to rewrite some of the internal flash with the QPST program.
Then, in case of a hard brick this is what you need before to send the phone to assistance:
A pc with Windows XP SP3 (don't bother me if your W7/W7 x64/W8 don't work,use XP)
QPST program http://d-h.st/JIr (if this is not a free tool i will remove the link)
KDZ http://forum.xda-dev...505&postcount=1
a KDZ image of your country/brand http://www.lg-phone-...ex.php?id_mod=7
LGExtract http://forum.xda-dev...d.php?t=1566532
DZdecrypt http://d-h.st/2jl (credits to BIGB0SS from COPS)
QDL drivers http://d-h.st/RmY (32 bit only)
winrar
EMMCBLD.HEX http://d-h.st/IU8
Pics about the procedure http://d-h.st/bOG
Do not connect the dead 730 right now, prepare first the recovery structure
i assume you know how to use the command prompt in windows,lgextract and lzdecrypt are command line only tools.
make a folder and copy there lgextract.exe, dzdecrypt.exe,EMMCBLD.HEX and the .kdz file
use lgextract to unpack the kdz file, lgextract -kdz V10A_00.kdz (this is the name of MINE .kdz, yours could be different)
you will obtain a .cab file, open it with winrar and extract all its content in the same dir
then use dzdecrypt on the .DZ file, dzdecrypt v10a_0914.dz
This will give you a bunch of files, we have almost all the needed. Just one file is missing the phone image file. The phone image file must be in .HEX format and i was unable to find one for the E730, i used a generic msm7x30 and it seem to fit our phone.
Next step is to create the partition.mbn file, the KDZ image only contain a partition.bin which is not in the format QPST wants.
To create it a hexeditor is needed, select the 512bytes at the start and save it as partition.mbn if you run troubles with a hexeditor there is a partition.mbn file to download on page 2.
Now we can install the QPST program, once it finish remove the battery and start the QDL mode on
the phone. As windows detect the phone it ask for drivers, and once finished it will add the phone in the device manager, go there and look the virtual COM port assigned.
Start QPST, starting the QPST CONFIGURATION program, the first thing we have to do is to add the virtual com port where the phone is attached, then from the menu "Start Client" we have to start the "Software Download" program.
As the program start we have to set the flash type in the program settings (PIC1) be sure to select MSM7x30 (eMMC)
See PIC2, here we have to point the program to the folder where we have extracted our KDZ, click Browse and seek for it, choose the EMMCBLD.HEX file.
Then on "Multi-Image" tab browse again and select the same recovery folder. (PIC3)
on "Boot system" we have to choose "Sec Boot 2.0" and clicking on "Advance" button you should see as in the PIC4
BEWARE, pic 4 is wrong, there is not fsbl.mbn on the kdz firmware image, so you have to uncheck the flag.
when all is set press "Start" button and pray. the program show you a log in the installation directory, so if something goes wrong try to look there.
This will rewrite the partition table,the phone image and resurrect the emergency mode.
When it finish, detach the phone and insert the battery, try to start it on emergency mode pressing both volume keys and power on
If emergency mode appear it will show you the yellow screen, now is time to use KDZ to revive our device. There are good guides on how to use KDZ, seek for them.
I assume no responsability if something goes wrong and you brick definitely your phone, try this at your own risk.
Please do not try this if your phone is still able to turn on or show the Emergency mode, it mean the partition table is not corrupted and you don't need this procedure.
N.B. this guide is only for E730 and possibly for E739, it will not work with other phones or i don't know how to adapt it for other phones. Please avoid to send me im's because i can't help you.
Click to expand...
Click to collapse
Maybe this works http://forum.xda-developers.com/showthread.php?t=3072091
Verstuurd vanaf mijn HTC One_M8 met Tapatalk
Hakem said:
Maybe this works http://forum.xda-developers.com/showthread.php?t=3072091
Verstuurd vanaf mijn HTC One_M8 met Tapatalk
Click to expand...
Click to collapse
Thanks so much for replying, but as you see the logs above are created from same tool. The tool marks everything as ok. And didnt perform any action
Did you try to put it in download mode and then connecting it, even if the screen doesn't turn on maybe it actually goes into download mode. Also can you change the COM9 to COM41 with windows device manager? Maybe then you can just flash dll with lg flashtool..
Klyupp said:
Did you try to put it in download mode and then connecting it, even if the screen doesn't turn on maybe it actually goes into download mode. Also can you change the COM9 to COM41 with windows device manager? Maybe then you can just flash dll with lg flashtool..
Click to expand...
Click to collapse
Tried that but all fails. Device didnt go in download mode and i cant able to flash through lg flash tool
noteespirit said:
Tried that but all fails. Device didnt go in download mode and i cant able to flash through lg flash tool
Click to expand...
Click to collapse
Then I'm afraid JTag is your only option.. (=fully hard bricked[emoji24])
Klyupp said:
Then I'm afraid JTag is your only option.. (=fully hard bricked[emoji24])
Click to expand...
Click to collapse
JTag through octupus/octoplus/ medusa??? which one is successfull??
Octoplus and medusa are same, just look update logs if D851 in supported list..
can this method fix d851 ?
Were you guys able to fix your problem?
I am in the same mess and Boarddiag doesnt seems to work.
I just dont know what to do:crying:
Any ideas or recommendations?
Hello,
my G3 seems to be death.
No root, no download mode, no led. Connecting with pc->device manager shows qualcomm 9008.
I tried the xda-guide with boarddiag but i only get error that device not seems to be in flashloader mode.
I tried orcam s guide but it doesnt work for me.
With LG Booting Diagnosis Tool i get following LOG:
>> ---------------------------- Start Logging ----------------------------
>> Ready to access the target board...
>> USB Status : RELINK HS-USB QDLoader 9008 (COM41)
>> Ready to access the target board...
>> USB Status : RELINK HS-USB QDLoader 9008 (COM41)
>> Ready to access the target board...
>> BootLoader File : All EU Global_XXXX_XXXX.mbn
>> 1. Model : All EU Global , 2. Suffix : XXXX , 3. Operator : XXXX
>> Bootloader : All EU Global_XXXX_XXXX.mbn
>> AP Chip : MSM8974_G3 , BootLoader : All EU Global_XXXX_XXXX.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0B48F49D
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0B48F49D
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=24
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002bfb7
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002c65c
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0002fbac
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x000311ee
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00031544
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000315f4
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x0003168d
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x000316fe
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x00031734
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x00031801
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x000ff945
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x00103635
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x00107308
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x0010736d
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x00117ce6
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x00117dcf
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x001345e3
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x00141cd5
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x00141d09
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x00148247
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x001482a6
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x001749a8
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x15253d5d
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x1527f93a
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2016-03-02 20:36:45...successfully Completed.
>> Saved Log File(LOG_All EU Global_XXXX_XXXX_20160302_203645.txt) successfully.
Click to expand...
Click to collapse
Any further ideas?
Whats ur pc read when plugged in
---------- Post added at 07:22 AM ---------- Previous post was at 07:19 AM ----------
U may have to do the pin short to wipe the partition thats damaged in the bootstack when u ground the pins out it resets one of them
Pin s sh o rte d : qu a lc o mm 900 8
Pins unshorted android usb serial port
Sent from my GT-S5830i using XDA Free mobile app
when i upgrade my LG G3 to android M,it went dead.No boot/ led/download mode.Only shows Qualcomm HS-UDB QDLoader 9008 port 7, when connected to laptop.Itried to recover it using SmartBootDiagv1.3.1 tool,,
main problem is my phone model.A sticker where we place battery shows it is D855 made in korea but at top and and in loud speaker piece it is written as D850 0627.Still i tried this tool.. D850 model stopped at sending hello request 10 then time out
this is it. Failed to get response for Hello request.
>> failed to response for Hello & Security.
>> no response to target device.
>> failed to connect to flash bootloader.
>> AP Chip is not working normally.
For LGD851_ATMO_TMUS model only showing any progress.please see the log
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM6)
>> Ready to access the target board...
>> BootLoader File : LGD851_ATMO_TMUS.mbn
>> 1. Model : LGD851 , 2. Suffix : ATMO , 3. Operator : TMUS
>> Bootloader : LGD851_ATMO_TMUS.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGD851_ATMO_TMUS.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0B4F9DA7
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000262
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310262
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0B4F9DA7
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000262
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=46
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002fbaa
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x00030277
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x000337e5
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00034e2c
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00035176
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x0003522b
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x000352c8
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x0003532b
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x00035361
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x00035427
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x000d1d02
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x000d589a
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x000d9461
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x000d94c3
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x000d9a52
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x000d9b42
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x000dea42
>> LOG_CODE :: 0xef5d1301 [ DECODED : 0x005d1301 ]
>> TIMESTAMP :: 0x000eb851
>> LOG_CODE :: 0xef5d1500 [ DECODED : 0x005d1500 ]
>> TIMESTAMP :: 0x000eb886
>> LOG_CODE :: 0xef5d1600 [ DECODED : 0x005d1600 ]
>> TIMESTAMP :: 0x000eb8d6
>> LOG_CODE :: 0xef01080e [ DECODED : 0x0001080e ]
>> TIMESTAMP :: 0x000f134e
>> LOG_CODE :: 0xef1d0300 [ DECODED : 0x001d0300 ]
>> TIMESTAMP :: 0x000f1415
>> LOG_CODE :: 0xef010810 [ DECODED : 0x00010810 ]
>> TIMESTAMP :: 0x0014c34c
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x0014c462
>> LOG_CODE :: 0xef0b000f [ DECODED : 0x000b000f ]
>> TIMESTAMP :: 0x00151494
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x001519a6
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x00151a73
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0015327c
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x001532c1
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00153629
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x0015365b
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00153701
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x00153736
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x00153828
>> LOG_CODE :: 0xef010604 [ DECODED : 0x00010604 ]
>> TIMESTAMP :: 0x0016c9d1
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0016cedf
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x0016cfac
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0016e78e
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x0016e7e2
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x0016eb2e
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x0016eb60
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0016ebff
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x0016ec34
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x001823af
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x180b7fb0
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x180e3b53
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GPT_IS_PRIMARY_ERR
1> PBL_SDCC_LOG_GPT_GOT_SBL_ENTRY_ERR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_LOADER_LOG_IMG_HDR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_AP_SW_REV
1> [PBL_LOG_SECBOOT] SECBOOT INVALID MSM HW ID
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2016-08-01 18:48:41...successfully Completed.
>> Saved Log File(LOG_LGD851_ATMO_TMUS_20160801_184841.txt) successfully.
I also used BoardDiag_v2.99a and BoardDiag3.99c tool (run in admn. mode-driver signing off).Used extracted tot's of D850 and D851 .Still no success.it shows no response from device check PMIC first and if problem not corrected replace AP chip or some times it shows "Device was not found in dload trying flash programmer". .Only smartboot tool showing some response
What to do next?????Please advice. Pls help to recover my G3.Thanks in advance
Please try to remove battery from the phone. After 10 seconds, reset the battery to the phone. To press and hold the volume up button for 20 seconds and not to release it. Then connect your phone to PC with USB cable. And check if the phone can enter into download mode. If not, retry above process.
According to your observed Boarddiag response, your phone driver in PC device manager should be shown as LGE Androidnet USB port, should not be Qualcomm HS-USB QDLoader 9008 mode. Because my D858HK was in this status. I needed open the phone to short the qualcomm test point as mentioned in many forum threads in order to make the phone entering to the Qualcomm HS-USB QDLoader 9008 mode for unbricking by Boarddiag.
t2060079 said:
Please try to remove battery from the phone. After 10 seconds, reset the battery to the phone. To press and hold the volume up button for 20 seconds and not to release it. Then connect your phone to PC with USB cable. And check if the phone can enter into download mode. If not, retry above process.
According to your observed Boarddiag response, your phone driver in PC device manager should be shown as LGE Androidnet USB port, should not be Qualcomm HS-USB QDLoader 9008 mode. Because my D858HK was in this status. I needed open the phone to short the qualcomm test point as mentioned in many forum threads in order to make the phone entering to the Qualcomm HS-USB QDLoader 9008 mode for unbricking by Boarddiag.
Click to expand...
Click to collapse
Thanks for replying.The connected device shown as relink hs usb qd loader 9008 first..then some how (i think when i installed qualcomm driver) it changed to Qualcomm HS-USB QDLoader 9008 with shorting any points.
Just open up your phone and see the exact model number written on your phone board.and then use boardiag by willcracker to flash the firmware.you can seek help from the thread.
http://forum.xda-developers.com/sprint-lg-g3/general/guide-fix-hard-brick-recovery-guide-t3132359
If your phone in QDLoader 9008 mode really, no need to short the qualcomm test point. Directly to use boarddiag tool to restore the partitions for unbricking the phone.
Yes .I found my board model.It is D851. I Opened back cover and it is written on main board
I used BoardDiag but got "Failed to open partition from EMMC".
anyone know a solution?
Today I opened the back cover.it has a ?*D851 main board. That s y it shows some progress with (only with) ?*d851 in smartboot tool.tht s it. But can u study the log and explain wat is wrong with it??*
I tried d851 tot extract to flas but responce is no response from device check pmic first then replace ap…
My phone dont have any prblm when it died. I flashed android M d855 kdz and it went dead. Model number D855 written on a sticker where imei number is written .that s y I flashesd d855 kdz. Now after opening board, I see that my device is d851
Patching with model D851 by Smart Boot Diag Tool seems completion successfully. Can your phone enter download mode by holding volume up button and connect the USB cable to your PC?
Last time, I failed to unbrick my D858HK with Smart Boot Diag Tool. Finally, I adopted BoardDiag tool to make my phone restoration to live.
The specific D851 requires a unique hex file in order to flash correctly in 9008 mode, since the SKU itself has different fuses on the SoC.
I have created the solution just a couple of days ago in here and put a guide here: http://forum.xda-developers.com/tmobile-lg-g3/help/lg-g3-d851-unbrick-qualcomm-9008-t3430221
Woww. That worked man.. :laugh::laugh: Thank u so much.
YOUR WORK IS REALLY AMAZING. Thanks a lot
My G3 booted and flash tot and dll. Checking for any errors.
haris182 said:
I used BoardDiag but got "Failed to open partition from EMMC".
anyone know a solution?
Click to expand...
Click to collapse
same issue for me. on lg d855
any solution guys?
here is log
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM14)
>> Ready to access the target board...
>> BootLoader File : All EU Global_XXXX_XXXX.mbn
>> 1. Model : All EU Global , 2. Suffix : XXXX , 3. Operator : XXXX
>> Bootloader : All EU Global_XXXX_XXXX.mbn
>> AP Chip : MSM8974_G3 , BootLoader : All EU Global_XXXX_XXXX.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0FF90131
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0FF90131
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=11
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002bea8
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002c53e
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0002fa67
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x000310b6
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x000313ff
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000314a0
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x00031515
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x0003155c
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x00044c53
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x08084edd
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x080b0add
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2020-08-03 01:47:06...successfully Completed.
>> Saved Log File(LOG_All EU Global_XXXX_XXXX_20200803_014706.txt) successfully.
Hi
i using LG-D855 32GB SEA (with V21A_00 firmware), i using LG PC Suite to update to MM 30A firmware but failed many time always stuck @ 49%, so i go to lg-firmware-rom.com, key in the IMEI code and download the latest D85530a_00_0528.kdz firmware and use LG Flash Tool 2014 to Flash it. still failed and then i unplug the USB cable and remove the battery. ( turn out the firmware i download is corrupted, so i download few more times to make sure the file MD5 is same to make sure no error)
but the problem is now my phone show "Boot verification failed" and then black screen, when i connect to PC , nothing come up @ device manager. so i try use download mode to connect to PC, now device manager show "QHSUSB_BULK" after some google search, i install QDLoader HS-USB Driver, now it show "Qualcomm HS-USB QDLoader 9008 (COM4)"
i find this http://www.androidbrick.com/unbrick-recover-your-dead-lg-g3-g2-all-variants/# , and try the SmartBootDiagv1.3.1.exe, it can detect my phone @ com4, but after select the "ALL EU Global XXX-XXX" the program run some test, then auto Disconect the phone and reconnect. here is the log :
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM4)
>> Ready to access the target board...
>> BootLoader File : All EU Global_XXXX_XXXX.mbn
>> 1. Model : All EU Global , 2. Suffix : XXXX , 3. Operator : XXXX
>> Bootloader : All EU Global_XXXX_XXXX.mbn
>> AP Chip : MSM8974_G3 , BootLoader : All EU Global_XXXX_XXXX.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0D1487D9
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0D1487D9
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=22
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002bdf4
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002c49e
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0002f9a5
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00030fef
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0003133a
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000313e0
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x0003147a
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x000314bd
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x000315be
>> LOG_CODE :: 0xef5d0405 [ DECODED : 0x005d0405 ]
>> TIMESTAMP :: 0x00278a44
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x0027c595
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x00280079
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x002800e1
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x0028609b
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x002860f8
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x0028e92f
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x0028e962
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x002966f8
>> LOG_CODE :: 0xef5d1600 [ DECODED : 0x005d1600 ]
>> TIMESTAMP :: 0x00296733
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x002a9e8f
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x14e1346b
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x14e3f052
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDCC_LOG_GPT_GOT_SBL_ENTRY_ERR
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2016-08-09 22:43:00...successfully Completed.
>> Saved Log File(LOG_All EU Global_XXXX_XXXX_20160809_224300.txt) successfully.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
So i found this Thread http://forum.xda-developers.com/sprint-lg-g3/general/guide-fix-hard-brick-recovery-guide-t3132359
but i can't find the TOT file (V21A_00) cause i always download the KDZ file.
so what can i do now? please help .
thanks.
Here are tot for d855
http://storagecow.eu/index.php?dir=Xda/LG+G3/Stock/D855/D855+TOTs/
Jahanzaibawan said:
Here are tot for d855
http://storagecow.eu/index.php?dir=Xda/LG+G3/Stock/D855/D855+TOTs/
Click to expand...
Click to collapse
thanks, but the page all is 10B, 10e version, and i need 21A , because that is the one i use before, and the thread say that need to be the same ver. i search so many website, and didn't find any 21A tot file. only KDZ.
ok. i download LGD855AT-00-V10b-HKG-XX-JUL-01-2014-32G+0.tot to use.. turn out it's ok.. so now phone FIX.... thanks everyone.
DiDn't know anything about it first ...accidently bricked my phone..and now i was trying to diagnose from smartbootdiag.. and got that log i need your help and guideline to revive my lg g3..here is the log..
.
.>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM3)
>> Ready to access the target board...
>> BootLoader File : LGUS990_AUCL_USC.mbn
>> 1. Model : LGUS990 , 2. Suffix : AUCL , 3. Operator : USC
>> Bootloader : LGUS990_AUCL_USC.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGUS990_AUCL_USC.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0EC2E1C1
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0EC2E1C1
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=46
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002f849
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002fef3
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0003344e
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00034a9f
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00034e04
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x00034eab
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x00034f35
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x00034f91
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x00034fc7
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x000350a1
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x00103112
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x00106cd7
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x0010a86c
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x0010a8d1
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x0010ae6f
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x0010af5d
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x0010fe49
>> LOG_CODE :: 0xef5d1301 [ DECODED : 0x005d1301 ]
>> TIMESTAMP :: 0x0011c97b
>> LOG_CODE :: 0xef5d1500 [ DECODED : 0x005d1500 ]
>> TIMESTAMP :: 0x0011c9bb
>> LOG_CODE :: 0xef5d1600 [ DECODED : 0x005d1600 ]
>> TIMESTAMP :: 0x0011ca06
>> LOG_CODE :: 0xef01080e [ DECODED : 0x0001080e ]
>> TIMESTAMP :: 0x0012243a
>> LOG_CODE :: 0xef1d0300 [ DECODED : 0x001d0300 ]
>> TIMESTAMP :: 0x0012250c
>> LOG_CODE :: 0xef010810 [ DECODED : 0x00010810 ]
>> TIMESTAMP :: 0x0017cfd9
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x0017d0d6
>> LOG_CODE :: 0xef0b000f [ DECODED : 0x000b000f ]
>> TIMESTAMP :: 0x00182128
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0018263b
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x00182709
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x00183ee3
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x00183f4b
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00184296
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x001842c9
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0018436c
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x001843a2
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x0018448c
>> LOG_CODE :: 0xef010604 [ DECODED : 0x00010604 ]
>> TIMESTAMP :: 0x0019d65a
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0019db6b
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x0019dc38
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0019f3e4
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x0019f443
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x0019f79e
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x0019f7d1
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0019f873
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x0019f8a9
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x001b307d
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x19d87b7c
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x19db3715
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GPT_IS_PRIMARY_ERR
1> PBL_SDCC_LOG_GPT_GOT_SBL_ENTRY_ERR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_LOADER_LOG_IMG_HDR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_AP_SW_REV
1> [PBL_LOG_SECBOOT] SECBOOT INVALID MSM HW ID
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2017-03-12 21:03:23...successfully Completed.
>> Saved Log File(LOG_LGUS990_AUCL_USC_20170312_210323.txt) successfully.
..need help ASAP
my whatsapp number is
+923218546026
facebook com slash asad22sid