Need Help ASAP.... LG g3 (Ls990 written on board) D851 was installed - G3 Q&A, Help & Troubleshooting

DiDn't know anything about it first ...accidently bricked my phone..and now i was trying to diagnose from smartbootdiag.. and got that log i need your help and guideline to revive my lg g3..here is the log..
.
.>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM3)
>> Ready to access the target board...
>> BootLoader File : LGUS990_AUCL_USC.mbn
>> 1. Model : LGUS990 , 2. Suffix : AUCL , 3. Operator : USC
>> Bootloader : LGUS990_AUCL_USC.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGUS990_AUCL_USC.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0EC2E1C1
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0EC2E1C1
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=46
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002f849
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002fef3
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0003344e
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00034a9f
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00034e04
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x00034eab
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x00034f35
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x00034f91
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x00034fc7
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x000350a1
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x00103112
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x00106cd7
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x0010a86c
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x0010a8d1
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x0010ae6f
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x0010af5d
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x0010fe49
>> LOG_CODE :: 0xef5d1301 [ DECODED : 0x005d1301 ]
>> TIMESTAMP :: 0x0011c97b
>> LOG_CODE :: 0xef5d1500 [ DECODED : 0x005d1500 ]
>> TIMESTAMP :: 0x0011c9bb
>> LOG_CODE :: 0xef5d1600 [ DECODED : 0x005d1600 ]
>> TIMESTAMP :: 0x0011ca06
>> LOG_CODE :: 0xef01080e [ DECODED : 0x0001080e ]
>> TIMESTAMP :: 0x0012243a
>> LOG_CODE :: 0xef1d0300 [ DECODED : 0x001d0300 ]
>> TIMESTAMP :: 0x0012250c
>> LOG_CODE :: 0xef010810 [ DECODED : 0x00010810 ]
>> TIMESTAMP :: 0x0017cfd9
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x0017d0d6
>> LOG_CODE :: 0xef0b000f [ DECODED : 0x000b000f ]
>> TIMESTAMP :: 0x00182128
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0018263b
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x00182709
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x00183ee3
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x00183f4b
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00184296
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x001842c9
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0018436c
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x001843a2
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x0018448c
>> LOG_CODE :: 0xef010604 [ DECODED : 0x00010604 ]
>> TIMESTAMP :: 0x0019d65a
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0019db6b
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x0019dc38
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0019f3e4
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x0019f443
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x0019f79e
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x0019f7d1
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0019f873
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x0019f8a9
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x001b307d
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x19d87b7c
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x19db3715
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GPT_IS_PRIMARY_ERR
1> PBL_SDCC_LOG_GPT_GOT_SBL_ENTRY_ERR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_LOADER_LOG_IMG_HDR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_AP_SW_REV
1> [PBL_LOG_SECBOOT] SECBOOT INVALID MSM HW ID
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2017-03-12 21:03:23...successfully Completed.
>> Saved Log File(LOG_LGUS990_AUCL_USC_20170312_210323.txt) successfully.
..need help ASAP
my whatsapp number is
+923218546026
facebook com slash asad22sid

Related

I killed LG G3

Hello
Sorry for my English. I am from Russia and I communicate through google translate. In this forum, strong people. We have, on our Russian, could not help.
I was hoping that I can restore your phone from any situation. But it was not there ...
I decided to flash the by LG G3 firmware from LG G4. With this program FlashTool i started to fill firmware. After a few minutes it was 99% and so I waited a very long time. Just showed 99%
I realized that the firmware not get up. I pulled the cord and stuck the battery. After that phone is not included.
First I checked the program SmartBootDiagv1.3.1, It turned out to be all okay.
Code:
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM3)
>> Ready to access the target board...
>> BootLoader File : LGD850_AATT_ATT.mbn
>> 1. Model : LGD850 , 2. Suffix : AATT , 3. Operator : ATT
>> Bootloader : LGD850_AATT_ATT.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGD850_AATT_ATT.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0ADC7C38
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0ADC7C38
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=23
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x000300af
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0003074a
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x00033c84
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x000352d7
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00035627
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000356d0
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x00035772
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x000357d5
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x0003580a
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x000358ce
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x0024586b
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x0024952e
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x0024d0eb
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x0024d14f
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x00251ce4
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x00251dd9
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x0026a66f
>> LOG_CODE :: 0xef5d1301 [ DECODED : 0x005d1301 ]
>> TIMESTAMP :: 0x0027c659
>> LOG_CODE :: 0xef5d1500 [ DECODED : 0x005d1500 ]
>> TIMESTAMP :: 0x0027c688
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x0027c70e
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x002a8e5a
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x0b49bbf6
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x0b4c77da
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GPT_IS_PRIMARY_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2015-09-14 15:24:11...successfully Completed.
>> Saved Log File(LOG_LGD850_AATT_ATT_20150914_152411.txt) successfully.
But the program BoardDiag 2.99 wants to see my phone Press the button in different ways, but to nothing lead...
What could be your advice. Help please.
Pic programms:
oi59.tinypic.com/nqv53o.jpg
oi59.tinypic.com/fatws8.jpg
up
up
Just wait, mine took several hours

D855 Black Screen of Death? No boot, no dl, no led but 9008

Hello,
my G3 seems to be death.
No root, no download mode, no led. Connecting with pc->device manager shows qualcomm 9008.
I tried the xda-guide with boarddiag but i only get error that device not seems to be in flashloader mode.
I tried orcam s guide but it doesnt work for me.
With LG Booting Diagnosis Tool i get following LOG:
>> ---------------------------- Start Logging ----------------------------
>> Ready to access the target board...
>> USB Status : RELINK HS-USB QDLoader 9008 (COM41)
>> Ready to access the target board...
>> USB Status : RELINK HS-USB QDLoader 9008 (COM41)
>> Ready to access the target board...
>> BootLoader File : All EU Global_XXXX_XXXX.mbn
>> 1. Model : All EU Global , 2. Suffix : XXXX , 3. Operator : XXXX
>> Bootloader : All EU Global_XXXX_XXXX.mbn
>> AP Chip : MSM8974_G3 , BootLoader : All EU Global_XXXX_XXXX.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0B48F49D
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0B48F49D
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=24
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002bfb7
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002c65c
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0002fbac
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x000311ee
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00031544
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000315f4
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x0003168d
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x000316fe
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x00031734
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x00031801
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x000ff945
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x00103635
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x00107308
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x0010736d
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x00117ce6
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x00117dcf
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x001345e3
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x00141cd5
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x00141d09
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x00148247
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x001482a6
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x001749a8
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x15253d5d
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x1527f93a
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2016-03-02 20:36:45...successfully Completed.
>> Saved Log File(LOG_All EU Global_XXXX_XXXX_20160302_203645.txt) successfully.
Click to expand...
Click to collapse
Any further ideas?
Whats ur pc read when plugged in
---------- Post added at 07:22 AM ---------- Previous post was at 07:19 AM ----------
U may have to do the pin short to wipe the partition thats damaged in the bootstack when u ground the pins out it resets one of them
Pin s sh o rte d : qu a lc o mm 900 8
Pins unshorted android usb serial port
Sent from my GT-S5830i using XDA Free mobile app

d851 motherboard in d855 what kdz to use

Hi guys i brought a used lg g3 d855 and i was trying to flash the stock tot or kdz but lg flash tool was giving me erorrs ..... Till i discovered that my d855 have a d851 motherboard so should i flash the d851 kdz/tot/roms in it .....?????
Yes, you've to flash the rom according to your motherboard model.
Kashif Hashmi said:
Yes, you've to flash the rom according to your motherboard model.
Click to expand...
Click to collapse
Thanx man so i will flash the d851 then ?
Yes
Kashif Hashmi said:
Yes
Click to expand...
Click to collapse
Thanx one last thing would having a d851 motherboard in a d855 phone cause me any problems in the futur ...?? Thanx man i really apreciate your reply
a bricked lg g2 said:
Thanx one last thing would having a d851 motherboard in a d855 phone cause me any problems in the futur ...?? Thanx man i really apreciate your reply
Click to expand...
Click to collapse
No, It will not cause you any problem in future.
Kashif Hashmi said:
No, It will not cause you any problem in future.
Click to expand...
Click to collapse
Thanx
Kashif Hashmi said:
No, It will not cause you any problem in future.
Click to expand...
Click to collapse
Hi man i need your help again i tried to flash my d855 with the d851 tot because of the motherboard and it giving erorr "model changed " i tried woth the lgup dll too plz hlp am stuck in download mode
a bricked lg g2 said:
Hi man i need your help again i tried to flash my d855 with the d851 tot because of the motherboard and it giving erorr "model changed " i tried woth the lgup dll too plz hlp am stuck in download mode
Click to expand...
Click to collapse
Hi.You must edit the d851 tot file .check this out....
http://forum.xda-developers.com/lg-g3/general/service-disabled-current-version-t3403232
Kashif Hashmi said:
Yes, you've to flash the rom according to your motherboard model.
Click to expand...
Click to collapse
how did you know that you have the d851 motherboard ?
ktkhaled said:
how did you know that you have the d851 motherboard ?
Click to expand...
Click to collapse
Open the phone and it is written in the motherboard
a bricked lg g2 said:
Open the phone and it is written in the motherboard
Click to expand...
Click to collapse
Hey, have you solved the problem? i have the same situation and without knowledge of that i've flashed d855 tot firmware and now im with hard brick, maybe this can solve my problem.
adrianbravom said:
Hey, have you solved the problem? i have the same situation and without knowledge of that i've flashed d855 tot firmware and now im with hard brick, maybe this can solve my problem.
Click to expand...
Click to collapse
Yes i solved my prob and yours can be solved but i need more info about your phone what the model number written behind the phone down the battery ? and what model of the motherboard you have ? And then make sur that you can boot to download mode ? If all that is done!! Then the fix is really easy........... Srry for the bad eng
adrianbravom said:
Hey, have you solved the problem? i have the same situation and without knowledge of that i've flashed d855 tot firmware and now im with hard brick, maybe this can solve my problem.
Click to expand...
Click to collapse
You can unbrick it easily within 30 minutes.just use the shortening of pins method .search for hard bricked lg g3.you will find that in g3 sprint section.
a bricked lg g2 said:
Yes i solved my prob and yours can be solved but i need more info about your phone what the model number written behind the phone down the battery ? and what model of the motherboard you have ? And then make sur that you can boot to download mode ? If all that is done!! Then the fix is really easy........... Srry for the bad eng
Click to expand...
Click to collapse
That's the problem, behind my phone says that it's a D855, but in the motherboard says D851, and i can't start download mode because i'm hardbricked
Jahanzaibawan said:
You can unbrick it easily within 30 minutes.just use the shortening of pins method .search for hard bricked lg g3.you will find that in g3 sprint section.
Click to expand...
Click to collapse
Yeah i followed the guides with no success, because behind my phone says that it's a D855 but the motherboard D851 so i don't know what to do
adrianbravom said:
That's the problem, behind my phone says that it's a D855, but in the motherboard says D851, and i can't start download mode because i'm hardbricked
Yeah i followed the guides with no success, because behind my phone says that it's a D855 but the motherboard D851 so i don't know what to do
Click to expand...
Click to collapse
Use d851 tot to flash your phone.that method can unbrick Hard brick.
i've used the d851 tot in BoardDiag with no success again, i'm getting Qualcomm QDLoader driver so i think i dont need to short te pins, also i've used the smart boot diagnosis tool and identificate the phone as d851 and it run and says that it no have problem ( before i've used the d855 option with error results ), but when i use the boardDiag tool it says PMIC not connected, so i dont know what to do, i've flashed a d855 rom with the dll that doesn't check registers before via lg flash tools, that has caused me the hardbrick, and when i openned the phone i've read in the motherboard D851... si i think this is a frankenstain phone, here is a screenshot:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
What yout think that can be happening?, ive tried both, modified .tot file with hex editor and no modified file, both with no success.
Here's my log
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM5)
>> Ready to access the target board...
>> BootLoader File : LGD851_ATMO_TMUS.mbn
>> 1. Model : LGD851 , 2. Suffix : ATMO , 3. Operator : TMUS
>> Bootloader : LGD851_ATMO_TMUS.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGD851_ATMO_TMUS.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0CCCC72F
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000262
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310262
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0CCCC72F
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000262
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=46
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002fd72
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x00030417
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0003395d
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00034faa
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x000352f4
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000353a3
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x0003543f
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x000354a2
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x000354d9
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x0003559d
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x000b9238
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x000bce0c
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x000c0969
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x000c09cc
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x000c0f58
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x000c1047
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x000c5f46
>> LOG_CODE :: 0xef5d1301 [ DECODED : 0x005d1301 ]
>> TIMESTAMP :: 0x000d2a63
>> LOG_CODE :: 0xef5d1500 [ DECODED : 0x005d1500 ]
>> TIMESTAMP :: 0x000d2a99
>> LOG_CODE :: 0xef5d1600 [ DECODED : 0x005d1600 ]
>> TIMESTAMP :: 0x000d2ae9
>> LOG_CODE :: 0xef01080e [ DECODED : 0x0001080e ]
>> TIMESTAMP :: 0x000d83ea
>> LOG_CODE :: 0xef1d0300 [ DECODED : 0x001d0300 ]
>> TIMESTAMP :: 0x000d84ab
>> LOG_CODE :: 0xef010810 [ DECODED : 0x00010810 ]
>> TIMESTAMP :: 0x00133283
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x0013339c
>> LOG_CODE :: 0xef0b000f [ DECODED : 0x000b000f ]
>> TIMESTAMP :: 0x001383f6
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0013890a
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x001389d6
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0013a1db
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x0013a240
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x0013a59b
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x0013a5d6
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0013a67a
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x0013a6ae
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x0013a794
>> LOG_CODE :: 0xef010604 [ DECODED : 0x00010604 ]
>> TIMESTAMP :: 0x001538f1
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x00153e08
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x00153ed4
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x001556b7
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x00155706
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00155a58
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x00155a8b
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00155b2d
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x00155b61
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x0016930a
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x06ff34ab
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x0701f019
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GPT_IS_PRIMARY_ERR
1> PBL_SDCC_LOG_GPT_GOT_SBL_ENTRY_ERR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_LOADER_LOG_IMG_HDR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_AP_SW_REV
1> [PBL_LOG_SECBOOT] SECBOOT INVALID MSM HW ID
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2016-07-23 21:00:26...successfully Completed.
>> Saved Log File(LOG_LGD851_ATMO_TMUS_20160723_210026.txt) successfully.
Thanks for your help and sorry for my english.
Broaddiag cant fix the the D851 because the dev didnt upload the msm8975AC modele with it , you have 2 choices , either you take it to a repair shop and get it fixed with a JTAG box , or someone fix it to you with teamviewer.
Jyed said:
Broaddiag cant fix the the D851 because the dev didnt upload the msm8975AC modele with it , you have 2 choices , either you take it to a repair shop and get it fixed with a JTAG box , or someone fix it to you with teamviewer.
Click to expand...
Click to collapse
@Jyed and who can do the teanviewer fix ?

LG G3 -Qualcomm HS-UDB QDLoader 9008-Hard brick

when i upgrade my LG G3 to android M,it went dead.No boot/ led/download mode.Only shows Qualcomm HS-UDB QDLoader 9008 port 7, when connected to laptop.Itried to recover it using SmartBootDiagv1.3.1 tool,,
main problem is my phone model.A sticker where we place battery shows it is D855 made in korea but at top and and in loud speaker piece it is written as D850 0627.Still i tried this tool.. D850 model stopped at sending hello request 10 then time out
this is it. Failed to get response for Hello request.
>> failed to response for Hello & Security.
>> no response to target device.
>> failed to connect to flash bootloader.
>> AP Chip is not working normally.
For LGD851_ATMO_TMUS model only showing any progress.please see the log
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM6)
>> Ready to access the target board...
>> BootLoader File : LGD851_ATMO_TMUS.mbn
>> 1. Model : LGD851 , 2. Suffix : ATMO , 3. Operator : TMUS
>> Bootloader : LGD851_ATMO_TMUS.mbn
>> AP Chip : MSM8974_G3 , BootLoader : LGD851_ATMO_TMUS.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0B4F9DA7
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000262
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310262
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0B4F9DA7
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000262
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=46
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002fbaa
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x00030277
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x000337e5
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00034e2c
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00035176
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x0003522b
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x000352c8
>> LOG_CODE :: 0xef0f0300 [ DECODED : 0x000f0300 ]
>> TIMESTAMP :: 0x0003532b
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x00035361
>> LOG_CODE :: 0xef5d0200 [ DECODED : 0x005d0200 ]
>> TIMESTAMP :: 0x00035427
>> LOG_CODE :: 0xef5d0406 [ DECODED : 0x005d0406 ]
>> TIMESTAMP :: 0x000d1d02
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x000d589a
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x000d9461
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x000d94c3
>> LOG_CODE :: 0xef5d0c00 [ DECODED : 0x005d0c00 ]
>> TIMESTAMP :: 0x000d9a52
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x000d9b42
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x000dea42
>> LOG_CODE :: 0xef5d1301 [ DECODED : 0x005d1301 ]
>> TIMESTAMP :: 0x000eb851
>> LOG_CODE :: 0xef5d1500 [ DECODED : 0x005d1500 ]
>> TIMESTAMP :: 0x000eb886
>> LOG_CODE :: 0xef5d1600 [ DECODED : 0x005d1600 ]
>> TIMESTAMP :: 0x000eb8d6
>> LOG_CODE :: 0xef01080e [ DECODED : 0x0001080e ]
>> TIMESTAMP :: 0x000f134e
>> LOG_CODE :: 0xef1d0300 [ DECODED : 0x001d0300 ]
>> TIMESTAMP :: 0x000f1415
>> LOG_CODE :: 0xef010810 [ DECODED : 0x00010810 ]
>> TIMESTAMP :: 0x0014c34c
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x0014c462
>> LOG_CODE :: 0xef0b000f [ DECODED : 0x000b000f ]
>> TIMESTAMP :: 0x00151494
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x001519a6
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x00151a73
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0015327c
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x001532c1
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00153629
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x0015365b
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x00153701
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x00153736
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x00153828
>> LOG_CODE :: 0xef010604 [ DECODED : 0x00010604 ]
>> TIMESTAMP :: 0x0016c9d1
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0016cedf
>> LOG_CODE :: 0xef010801 [ DECODED : 0x00010801 ]
>> TIMESTAMP :: 0x0016cfac
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0016e78e
>> LOG_CODE :: 0xef010803 [ DECODED : 0x00010803 ]
>> TIMESTAMP :: 0x0016e7e2
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x0016eb2e
>> LOG_CODE :: 0xef010805 [ DECODED : 0x00010805 ]
>> TIMESTAMP :: 0x0016eb60
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0016ebff
>> LOG_CODE :: 0xef010807 [ DECODED : 0x00010807 ]
>> TIMESTAMP :: 0x0016ec34
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x001823af
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x180b7fb0
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x180e3b53
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_FAST_BOOT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDCC_LOG_DETECT_PORT_ACCESS_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_READ_DATA_ERR
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GPT_IS_PRIMARY_ERR
1> PBL_SDCC_LOG_GPT_GOT_SBL_ENTRY_ERR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_LOADER_LOG_IMG_HDR
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_AP_SW_REV
1> [PBL_LOG_SECBOOT] SECBOOT INVALID MSM HW ID
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2016-08-01 18:48:41...successfully Completed.
>> Saved Log File(LOG_LGD851_ATMO_TMUS_20160801_184841.txt) successfully.
I also used BoardDiag_v2.99a and BoardDiag3.99c tool (run in admn. mode-driver signing off).Used extracted tot's of D850 and D851 .Still no success.it shows no response from device check PMIC first and if problem not corrected replace AP chip or some times it shows "Device was not found in dload trying flash programmer". .Only smartboot tool showing some response
What to do next?????Please advice. Pls help to recover my G3.Thanks in advance
Please try to remove battery from the phone. After 10 seconds, reset the battery to the phone. To press and hold the volume up button for 20 seconds and not to release it. Then connect your phone to PC with USB cable. And check if the phone can enter into download mode. If not, retry above process.
According to your observed Boarddiag response, your phone driver in PC device manager should be shown as LGE Androidnet USB port, should not be Qualcomm HS-USB QDLoader 9008 mode. Because my D858HK was in this status. I needed open the phone to short the qualcomm test point as mentioned in many forum threads in order to make the phone entering to the Qualcomm HS-USB QDLoader 9008 mode for unbricking by Boarddiag.
t2060079 said:
Please try to remove battery from the phone. After 10 seconds, reset the battery to the phone. To press and hold the volume up button for 20 seconds and not to release it. Then connect your phone to PC with USB cable. And check if the phone can enter into download mode. If not, retry above process.
According to your observed Boarddiag response, your phone driver in PC device manager should be shown as LGE Androidnet USB port, should not be Qualcomm HS-USB QDLoader 9008 mode. Because my D858HK was in this status. I needed open the phone to short the qualcomm test point as mentioned in many forum threads in order to make the phone entering to the Qualcomm HS-USB QDLoader 9008 mode for unbricking by Boarddiag.
Click to expand...
Click to collapse
Thanks for replying.The connected device shown as relink hs usb qd loader 9008 first..then some how (i think when i installed qualcomm driver) it changed to Qualcomm HS-USB QDLoader 9008 with shorting any points.
Just open up your phone and see the exact model number written on your phone board.and then use boardiag by willcracker to flash the firmware.you can seek help from the thread.
http://forum.xda-developers.com/sprint-lg-g3/general/guide-fix-hard-brick-recovery-guide-t3132359
If your phone in QDLoader 9008 mode really, no need to short the qualcomm test point. Directly to use boarddiag tool to restore the partitions for unbricking the phone.
Yes .I found my board model.It is D851. I Opened back cover and it is written on main board
I used BoardDiag but got "Failed to open partition from EMMC".
anyone know a solution?
Today I opened the back cover.it has a ?*D851 main board. That s y it shows some progress with (only with) ?*d851 in smartboot tool.tht s it. But can u study the log and explain wat is wrong with it??*
I tried d851 tot extract to flas but responce is no response from device check pmic first then replace ap…
My phone dont have any prblm when it died. I flashed android M d855 kdz and it went dead. Model number D855 written on a sticker where imei number is written .that s y I flashesd d855 kdz. Now after opening board, I see that my device is d851
Patching with model D851 by Smart Boot Diag Tool seems completion successfully. Can your phone enter download mode by holding volume up button and connect the USB cable to your PC?
Last time, I failed to unbrick my D858HK with Smart Boot Diag Tool. Finally, I adopted BoardDiag tool to make my phone restoration to live.
The specific D851 requires a unique hex file in order to flash correctly in 9008 mode, since the SKU itself has different fuses on the SoC.
I have created the solution just a couple of days ago in here and put a guide here: http://forum.xda-developers.com/tmobile-lg-g3/help/lg-g3-d851-unbrick-qualcomm-9008-t3430221
Woww. That worked man.. :laugh::laugh: Thank u so much.
YOUR WORK IS REALLY AMAZING. Thanks a lot
My G3 booted and flash tot and dll. Checking for any errors.
haris182 said:
I used BoardDiag but got "Failed to open partition from EMMC".
anyone know a solution?
Click to expand...
Click to collapse
same issue for me. on lg d855
any solution guys?
here is log
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM14)
>> Ready to access the target board...
>> BootLoader File : All EU Global_XXXX_XXXX.mbn
>> 1. Model : All EU Global , 2. Suffix : XXXX , 3. Operator : XXXX
>> Bootloader : All EU Global_XXXX_XXXX.mbn
>> AP Chip : MSM8974_G3 , BootLoader : All EU Global_XXXX_XXXX.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0FF90131
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0FF90131
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=11
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002bea8
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002c53e
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0002fa67
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x000310b6
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x000313ff
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000314a0
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x00031515
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x0003155c
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x00044c53
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x08084edd
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x080b0add
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2020-08-03 01:47:06...successfully Completed.
>> Saved Log File(LOG_All EU Global_XXXX_XXXX_20200803_014706.txt) successfully.

"Boot verification failed" need help.

Hi
i using LG-D855 32GB SEA (with V21A_00 firmware), i using LG PC Suite to update to MM 30A firmware but failed many time always stuck @ 49%, so i go to lg-firmware-rom.com, key in the IMEI code and download the latest D85530a_00_0528.kdz firmware and use LG Flash Tool 2014 to Flash it. still failed and then i unplug the USB cable and remove the battery. ( turn out the firmware i download is corrupted, so i download few more times to make sure the file MD5 is same to make sure no error)
but the problem is now my phone show "Boot verification failed" and then black screen, when i connect to PC , nothing come up @ device manager. so i try use download mode to connect to PC, now device manager show "QHSUSB_BULK" after some google search, i install QDLoader HS-USB Driver, now it show "Qualcomm HS-USB QDLoader 9008 (COM4)"
i find this http://www.androidbrick.com/unbrick-recover-your-dead-lg-g3-g2-all-variants/# , and try the SmartBootDiagv1.3.1.exe, it can detect my phone @ com4, but after select the "ALL EU Global XXX-XXX" the program run some test, then auto Disconect the phone and reconnect. here is the log :
>> ---------------------------- Start Logging ----------------------------
>> USB Status : Qualcomm HS-USB QDLoader 9008 (COM4)
>> Ready to access the target board...
>> BootLoader File : All EU Global_XXXX_XXXX.mbn
>> 1. Model : All EU Global , 2. Suffix : XXXX , 3. Operator : XXXX
>> Bootloader : All EU Global_XXXX_XXXX.mbn
>> AP Chip : MSM8974_G3 , BootLoader : All EU Global_XXXX_XXXX.mbn
>> Trying Connection To Device with sahara protocol for AP Chip.
>> Successfully Connection To Device with sahara protocol for AP Chip.
>> connected with Sahara Protocol successfully.
>> Loading flash to SYS_IMEM.
>> Loading 0 Kbytes to SYS_IMEM.
>> Loading 4 Kbytes to SYS_IMEM.
>> Loading 8 Kbytes to SYS_IMEM.
>> Loading 12 Kbytes to SYS_IMEM.
>> Loading 16 Kbytes to SYS_IMEM.
>> Loading 20 Kbytes to SYS_IMEM.
>> Loading 24 Kbytes to SYS_IMEM.
>> Loading 28 Kbytes to SYS_IMEM.
>> Loading 32 Kbytes to SYS_IMEM.
>> Loading 36 Kbytes to SYS_IMEM.
>> Loading 40 Kbytes to SYS_IMEM.
>> Loading 44 Kbytes to SYS_IMEM.
>> Loading 45 Kbytes to SYS_IMEM.
>> Successfully Loaded to SYS_IMEM.(Total 45 Kbytes)
>> Flash Image was normally loaded to SYS_IMEM.
>> Checking for device status.
>> [Verifying Hello Protocol]
>> Sending Hello request 0 time(s).
>> SendSync EHOST_HELLO_RSP OK.
>> Hello Response OK.
>> Got Hello response for Hello request.
>> [Verifying Security Protocol]
>> Security Response OK.
>> Connected to flash bootloader.
1> ----------------------------------------------------------------------
>> PBL SOFTWARE HISTORY
1> ----------------------------------------------------------------------
>> 1.Smart Boot Diagnosis Tool v1.3.1 <Analysis Tool for Booting failure>
>> 2.PBL_VERSION_NUMBER [fc021834] = 1c6c6162
1> ----------------------------------------------------------------------
1> ----------------------------------------------------------------------
>> SECURE_BOOT_INFORMATION
1> ----------------------------------------------------------------------
>> [QFPROM - AP Anti-rollback Region of OEM Region ]
>> QFPROM_AP_ANTIROLLBACK_1 [0xFC4B80B8] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_2 [0xFC4B80BC] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_3 [0xFC4B80C0] = 0x00000000
>> QFPROM_AP_ANTIROLLBACK_4 [0xFC4B80C4] = 0x00000000
1> ----------------------------------------------------------------------
>> QFPROM_DEVICE_SN_1 [0xFC4B81F0] = 0x0D1487D9
>> QFPROM_DEVICE_SN_2 [0xFC4B81F4] = 0x8800000B
1> ----------------------------------------------------------------------
>> QFPROM_MSA_ANTIROLLBACK_1 [0xFC4B80C8] = 0x00000000
>> QFPROM_MSA_ANTIROLLBACK_2 [0xFC4B80CC] = 0x00000000
1> ----------------------------------------------------------------------
>> [QFPROM QFuse INFO]
>> QFPROM_OEM_ID_LSB [0xFC4B80F0] = 0x00310000
>> QFPROM_OEM_ID_MSB [0xFC4B80F4] = 0x00000000
>> QFPROM_SECURE_BOOT_ENABLE_LSB [0xFC4B83F8] = 0x00202020
>> QFPROM_SECURE_BOOT_ENABLE_MSB [0xFC4B83FC] = 0x00000000
>> QFPROM_JTAG_DISABLE_LSB [0xFC4B80E8] = 0x3FC000C0
>> QFPROM_JTAG_DISABLE_MSB [0xFC4B80EC] = 0x040001FE
1> ----------------------------------------------------------------------
>> JTAG_ID [0xFC4BE0E0] = 0x107B40E1
>> OEM_ID [0xFC4BE0E4] = 0x00310000
>> SERIAL_NUM_MSB [0xFC4B81F4] = 0x8800000B
>> SERIAL_NUM_LSB [0xFC4B81F0] = 0x0D1487D9
>> [SECURITY INFO]
>> OEM_CONFIG_ROW0_LSB_ADDR [0xFC4B80E8] = 0x3FC000C0
>> OEM_CONFIG_ROW0_MSB_ADDR [0xFC4B80EC] = 0x040001FE
>> OEM_CONFIG_ROW1_LSB_ADDR [0xFC4B80F0] = 0x00310000
>> OEM_CONFIG_ROW1_MSB_ADDR [0xFC4B80F4] = 0x00000000
>> FEAT_CONFIG_ROW0_LSB_ADDR [0xFC4B80F8] = 0x00B08010
>> FEAT_CONFIG_ROW0_MSB_ADDR [0xFC4B80FC] = 0x00000000
>> FEAT_CONFIG_ROW1_LSB_ADDR [0xFC4B8100] = 0x00000001
>> FEAT_CONFIG_ROW1_MSB_ADDR [0xFC4B8104] = 0x0004785F
1> ----------------------------------------------------------------------
>> Start Address : 0xfc102140
>> End Address : 0xfc102c80
1> ----------------------------------------------------------------------
>> PBL_APPS LOG
1> ----------------------------------------------------------------------
>> PBL_LOG_COUNT=22
>> LOG_CODE :: 0xef010800 [ DECODED : 0x00010800 ]
>> TIMESTAMP :: 0x0002bdf4
>> LOG_CODE :: 0xef0f0203 [ DECODED : 0x000f0203 ]
>> TIMESTAMP :: 0x0002c49e
>> LOG_CODE :: 0xef010802 [ DECODED : 0x00010802 ]
>> TIMESTAMP :: 0x0002f9a5
>> LOG_CODE :: 0xef010804 [ DECODED : 0x00010804 ]
>> TIMESTAMP :: 0x00030fef
>> LOG_CODE :: 0xef010806 [ DECODED : 0x00010806 ]
>> TIMESTAMP :: 0x0003133a
>> LOG_CODE :: 0xef010808 [ DECODED : 0x00010808 ]
>> TIMESTAMP :: 0x000313e0
>> LOG_CODE :: 0xef01080a [ DECODED : 0x0001080a ]
>> TIMESTAMP :: 0x0003147a
>> LOG_CODE :: 0xef01080c [ DECODED : 0x0001080c ]
>> TIMESTAMP :: 0x000314bd
>> LOG_CODE :: 0xef5d0201 [ DECODED : 0x005d0201 ]
>> TIMESTAMP :: 0x000315be
>> LOG_CODE :: 0xef5d0405 [ DECODED : 0x005d0405 ]
>> TIMESTAMP :: 0x00278a44
>> LOG_CODE :: 0xef5d0600 [ DECODED : 0x005d0600 ]
>> TIMESTAMP :: 0x0027c595
>> LOG_CODE :: 0xef5d0700 [ DECODED : 0x005d0700 ]
>> TIMESTAMP :: 0x00280079
>> LOG_CODE :: 0xef0f0400 [ DECODED : 0x000f0400 ]
>> TIMESTAMP :: 0x002800e1
>> LOG_CODE :: 0xef5d0a00 [ DECODED : 0x005d0a00 ]
>> TIMESTAMP :: 0x0028609b
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x002860f8
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x0028e92f
>> LOG_CODE :: 0xef5d1000 [ DECODED : 0x005d1000 ]
>> TIMESTAMP :: 0x0028e962
>> LOG_CODE :: 0xef5d1100 [ DECODED : 0x005d1100 ]
>> TIMESTAMP :: 0x002966f8
>> LOG_CODE :: 0xef5d1600 [ DECODED : 0x005d1600 ]
>> TIMESTAMP :: 0x00296733
>> LOG_CODE :: 0xef0f0600 [ DECODED : 0x000f0600 ]
>> TIMESTAMP :: 0x002a9e8f
>> LOG_CODE :: 0xef0f0500 [ DECODED : 0x000f0500 ]
>> TIMESTAMP :: 0x14e1346b
>> LOG_CODE :: 0xefa00502 [ DECODED : 0x00a00502 ]
>> TIMESTAMP :: 0x14e3f052
1> ----------------------------------------------------------------------
>> < PBL DUMP LOG >
1> ----------------------------------------------------------------------
>> 1> PBL_GENERAL_LOG_FUNC_EXEC
1> PBL_FUSE_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_GENERAL_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDC_LOG_DEFAULT
1> PBL_SDCC_LOG_GOT_RCA_ERR
1> PBL_SDCC_LOG_GOT_CSD_ERR
1> PBL_FUSE_SDCC_MCLK_BOOT_FREQ
1> PBL_SDCC_LOG_DATA_TRANSFER_MODE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDCC_LOG_DETECT_GPT_ERR
1> PBL_SDCC_LOG_GPT_VALIDATE_ERR
1> PBL_SDCC_LOG_GPT_GOT_SBL_ENTRY_ERR
1> PBL_FUSE_USB_ENUM_TIMEOUT
1> PBL_FUSE_AP_SW_REV
1> PBL_AUTHENTICATION_LOG_DEFAULT
>> Logged Time : 2016-08-09 22:43:00...successfully Completed.
>> Saved Log File(LOG_All EU Global_XXXX_XXXX_20160809_224300.txt) successfully.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
So i found this Thread http://forum.xda-developers.com/sprint-lg-g3/general/guide-fix-hard-brick-recovery-guide-t3132359
but i can't find the TOT file (V21A_00) cause i always download the KDZ file.
so what can i do now? please help .
thanks.
Here are tot for d855
http://storagecow.eu/index.php?dir=Xda/LG+G3/Stock/D855/D855+TOTs/
Jahanzaibawan said:
Here are tot for d855
http://storagecow.eu/index.php?dir=Xda/LG+G3/Stock/D855/D855+TOTs/
Click to expand...
Click to collapse
thanks, but the page all is 10B, 10e version, and i need 21A , because that is the one i use before, and the thread say that need to be the same ver. i search so many website, and didn't find any 21A tot file. only KDZ.
ok. i download LGD855AT-00-V10b-HKG-XX-JUL-01-2014-32G+0.tot to use.. turn out it's ok.. so now phone FIX.... thanks everyone.

Categories

Resources