[Please help] Camon 18 Premier Boot Loop
[Please help] Camon 18 Premier Boot Loop
(05-02-2023, 07:43 PM)ayubloaded My Camon 18 Premiere starts bootlooping after I tried to root it with magisk with the recovery.img. Please help. I'm getting CMD error when I tried to flash the Stock Rom with SP Flash ToolFlashback stock recovery.img in fastboot first, let see if that works
(07-02-2023, 01:21 PM)ayubloaded I can't go into fastboot with the phone… The phone keeps turning off and on (Bootloop)
(09-02-2023, 01:35 PM)maxpayneYes I did not disable the verified boot(07-02-2023, 01:21 PM)ayubloaded I can't go into fastboot with the phone… The phone keeps turning off and on (Bootloop)
Maybe you did not disable verified boot
Flash stock boot and recovery for your current build number with mtkclient https://www.hovatek.com/forum/thread-40866.html
(09-02-2023, 02:43 PM)ayubloaded MTKClient Error
When I tried to flash the boot.img using these commands;
python mtk w boot boot.img
python mtk r boot_a boot.img
...........
Port - Device detected
Preloader - CPU: MT6781(Helio G96)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - Var1: 0x73
Preloader - Disabling Watchdog...
Preloader - HW code: 0x1066
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: 3E8A11A4DAB177ACC033252C2069E700
Preloader - SOC_ID: BD3DD1D65F6EC81999ACE54D6001D0FF4C41FFE476001BDD5A45F35125A76465
PLTools - Loading payload from mt6781_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\AYUB\Documents\ANDROID\mtkclient-main\mtkclient-main\mtkclient\payloads\mt6781_payload.bin
Port - Device detected
DA_handler - Device is protected.
DA_handler - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - UFS FWVer: 0x0
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID: H9HQ21AFAMADAR
DAXFlash - UFS CID: ad014839485132314146414d41444152
DAXFlash - UFS LU0 Size: 0x3b96000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DRAM config needed for : ad014839485132314146414d41444152
DAXFlash - Sending emi data ...
DAXFlash
DAXFlash - [LIB]: Error on sending emi: unpack requires a buffer of 12 bytes
DA_handler
DA_handler - [LIB]: Error uploading da
DA_handler - Requesting available partitions ....
(10-02-2023, 10:04 AM)Abdulakeem14(09-02-2023, 02:43 PM)ayubloaded MTKClient Error
When I tried to flash the boot.img using these commands;
python mtk w boot boot.img
python mtk r boot_a boot.img
...........
Port - Device detected
Preloader - CPU: MT6781(Helio G96)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - Var1: 0x73
Preloader - Disabling Watchdog...
Preloader - HW code: 0x1066
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: 3E8A11A4DAB177ACC033252C2069E700
Preloader - SOC_ID: BD3DD1D65F6EC81999ACE54D6001D0FF4C41FFE476001BDD5A45F35125A76465
PLTools - Loading payload from mt6781_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\AYUB\Documents\ANDROID\mtkclient-main\mtkclient-main\mtkclient\payloads\mt6781_payload.bin
Port - Device detected
DA_handler - Device is protected.
DA_handler - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - UFS FWVer: 0x0
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID: H9HQ21AFAMADAR
DAXFlash - UFS CID: ad014839485132314146414d41444152
DAXFlash - UFS LU0 Size: 0x3b96000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DRAM config needed for : ad014839485132314146414d41444152
DAXFlash - Sending emi data ...
DAXFlash
DAXFlash - [LIB]: Error on sending emi: unpack requires a buffer of 12 bytes
DA_handler
DA_handler - [LIB]: Error uploading da
DA_handler - Requesting available partitions ....
Can you boot into recovery?
(10-02-2023, 10:11 AM)ayubloaded(10-02-2023, 10:04 AM)Abdulakeem14(09-02-2023, 02:43 PM)ayubloaded MTKClient Error
When I tried to flash the boot.img using these commands;
python mtk w boot boot.img
python mtk r boot_a boot.img
...........
Port - Device detected
Preloader - CPU: MT6781(Helio G96)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - Var1: 0x73
Preloader - Disabling Watchdog...
Preloader - HW code: 0x1066
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: 3E8A11A4DAB177ACC033252C2069E700
Preloader - SOC_ID: BD3DD1D65F6EC81999ACE54D6001D0FF4C41FFE476001BDD5A45F35125A76465
PLTools - Loading payload from mt6781_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\AYUB\Documents\ANDROID\mtkclient-main\mtkclient-main\mtkclient\payloads\mt6781_payload.bin
Port - Device detected
DA_handler - Device is protected.
DA_handler - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - UFS FWVer: 0x0
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID: H9HQ21AFAMADAR
DAXFlash - UFS CID: ad014839485132314146414d41444152
DAXFlash - UFS LU0 Size: 0x3b96000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DRAM config needed for : ad014839485132314146414d41444152
DAXFlash - Sending emi data ...
DAXFlash
DAXFlash - [LIB]: Error on sending emi: unpack requires a buffer of 12 bytes
DA_handler
DA_handler - [LIB]: Error uploading da
DA_handler - Requesting available partitions ....
Can you boot into recovery?
No sir
(10-02-2023, 10:46 AM)Abdulakeem14(10-02-2023, 10:11 AM)ayubloaded(10-02-2023, 10:04 AM)Abdulakeem14(09-02-2023, 02:43 PM)ayubloaded MTKClient Error
When I tried to flash the boot.img using these commands;
python mtk w boot boot.img
python mtk r boot_a boot.img
...........
Port - Device detected
Preloader - CPU: MT6781(Helio G96)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - Var1: 0x73
Preloader - Disabling Watchdog...
Preloader - HW code: 0x1066
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: 3E8A11A4DAB177ACC033252C2069E700
Preloader - SOC_ID: BD3DD1D65F6EC81999ACE54D6001D0FF4C41FFE476001BDD5A45F35125A76465
PLTools - Loading payload from mt6781_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\AYUB\Documents\ANDROID\mtkclient-main\mtkclient-main\mtkclient\payloads\mt6781_payload.bin
Port - Device detected
DA_handler - Device is protected.
DA_handler - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - UFS FWVer: 0x0
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID: H9HQ21AFAMADAR
DAXFlash - UFS CID: ad014839485132314146414d41444152
DAXFlash - UFS LU0 Size: 0x3b96000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DRAM config needed for : ad014839485132314146414d41444152
DAXFlash - Sending emi data ...
DAXFlash
DAXFlash - [LIB]: Error on sending emi: unpack requires a buffer of 12 bytes
DA_handler
DA_handler - [LIB]: Error uploading da
DA_handler - Requesting available partitions ....
Can you boot into recovery?
No sir
Disable secure boot using MTK Bypass @ https://www.hovatek.com/forum/thread-37957.html
Then Flash stock boot.img and recovery.img using SP Flash Tool @ https://www.hovatek.com/forum/thread-159.html