We're hiring! Apply Now

Hovatek Forum DEVELOPMENT Android [Please help] Camon 18 Premier Boot Loop

[Please help] Camon 18 Premier Boot Loop

[Please help] Camon 18 Premier Boot Loop

Pages (2): 1 2 Next
ayubloaded
ayubloaded
ayubloaded
Techie Member
58
05-02-2023, 07:43 PM
#1



My Camon 18 Premiere starts bootlooping after I tried to root it with magisk with  the recovery.img. Please help. I'm getting CMD error when I tried to flash the Stock Rom with SP Flash Tool
justshez
justshez
justshez
Senior Member
2,505
07-02-2023, 11:26 AM
#2
(05-02-2023, 07:43 PM)ayubloaded My Camon 18 Premiere starts bootlooping after I tried to root it with magisk with  the recovery.img. Please help. I'm getting CMD error when I tried to flash the Stock Rom with SP Flash Tool
Flashback stock recovery.img in fastboot first, let see if that works
This post was last modified: 07-02-2023, 11:27 AM by justshez.
ayubloaded
ayubloaded
ayubloaded
Techie Member
58
07-02-2023, 01:21 PM
#3
I can't go into fastboot with the phone… The phone keeps turning off and on (Bootloop)
maxpayne
maxpayne
maxpayne
Intern
4,288
09-02-2023, 01:35 PM
#4
(07-02-2023, 01:21 PM)ayubloaded I can't go into fastboot with the phone… The phone keeps turning off and on (Bootloop)

Maybe you did not disable verified boot
Flash stock boot and recovery for your current build number with mtkclient https://www.hovatek.com/forum/thread-40866.html
This post was last modified: 09-02-2023, 01:36 PM by maxpayne.

Note!
We have a reply schedule for Free Support. Please upgrade to Private Support if you can't wait.
ayubloaded
ayubloaded
ayubloaded
Techie Member
58
09-02-2023, 02:23 PM
#5



(09-02-2023, 01:35 PM)maxpayne
(07-02-2023, 01:21 PM)ayubloaded I can't go into fastboot with the phone… The phone keeps turning off and on (Bootloop)

Maybe you did not disable verified boot
Flash stock boot and recovery for your current build number with mtkclient https://www.hovatek.com/forum/thread-40866.html
Yes I did not disable the verified boot
I keep getting errors with MTKClient when I tried to flash the boot with vbmeta
ayubloaded
ayubloaded
ayubloaded
Techie Member
58
09-02-2023, 02:43 PM
#6
MTKClient Error
When I tried to flash the boot.img using these commands;
python mtk w boot boot.img
python mtk r boot_a boot.img


...........
Port - Device detected Smile
Preloader -    CPU:                    MT6781(Helio G96)
Preloader -    HW version:            0x0
Preloader -    WDT:                    0x10007000
Preloader -    Uart:                  0x11002000
Preloader -    Brom payload addr:      0x100a00
Preloader -    DA payload addr:        0x201000
Preloader -    Var1:                  0x73
Preloader - Disabling Watchdog...
Preloader - HW code:                    0x1066
Preloader - Target config:              0xe5
Preloader -    SBC enabled:            True
Preloader -    SLA enabled:            False
Preloader -    DAA enabled:            True
Preloader -    SWJTAG enabled:        True
Preloader -    EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:  False
Preloader -    Root cert required:    False
Preloader -    Mem read auth:          True
Preloader -    Mem write auth:        True
Preloader -    Cmd 0xC8 blocked:      True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader -    HW subcode:            0x8a00
Preloader -    HW Ver:                0xca00
Preloader -    SW Ver:                0x0
Preloader - ME_ID:                      3E8A11A4DAB177ACC033252C2069E700
Preloader - SOC_ID:                    BD3DD1D65F6EC81999ACE54D6001D0FF4C41FFE476001BDD5A45F35125A76465
PLTools - Loading payload from mt6781_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\AYUB\Documents\ANDROID\mtkclient-main\mtkclient-main\mtkclient\payloads\mt6781_payload.bin
Port - Device detected Smile
DA_handler - Device is protected.
DA_handler - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - UFS FWVer:    0x0
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID:      H9HQ21AFAMADAR
DAXFlash - UFS CID:      ad014839485132314146414d41444152
DAXFlash - UFS LU0 Size: 0x3b96000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DRAM config needed for : ad014839485132314146414d41444152
DAXFlash - Sending emi data ...
DAXFlash
DAXFlash - [LIB]: Error on sending emi: unpack requires a buffer of 12 bytes
DA_handler
DA_handler - [LIB]: Error uploading da
DA_handler - Requesting available partitions ....
justshez
justshez
justshez
Senior Member
2,505
10-02-2023, 10:04 AM
#7
(09-02-2023, 02:43 PM)ayubloaded MTKClient Error
When I tried to flash the boot.img using these commands;
python mtk w boot boot.img
python mtk r boot_a boot.img


...........
Port - Device detected Smile
Preloader -    CPU:                    MT6781(Helio G96)
Preloader -    HW version:            0x0
Preloader -    WDT:                    0x10007000
Preloader -    Uart:                  0x11002000
Preloader -    Brom payload addr:      0x100a00
Preloader -    DA payload addr:        0x201000
Preloader -    Var1:                  0x73
Preloader - Disabling Watchdog...
Preloader - HW code:                    0x1066
Preloader - Target config:              0xe5
Preloader -    SBC enabled:            True
Preloader -    SLA enabled:            False
Preloader -    DAA enabled:            True
Preloader -    SWJTAG enabled:        True
Preloader -    EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:  False
Preloader -    Root cert required:    False
Preloader -    Mem read auth:          True
Preloader -    Mem write auth:        True
Preloader -    Cmd 0xC8 blocked:      True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader -    HW subcode:            0x8a00
Preloader -    HW Ver:                0xca00
Preloader -    SW Ver:                0x0
Preloader - ME_ID:                      3E8A11A4DAB177ACC033252C2069E700
Preloader - SOC_ID:                    BD3DD1D65F6EC81999ACE54D6001D0FF4C41FFE476001BDD5A45F35125A76465
PLTools - Loading payload from mt6781_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\AYUB\Documents\ANDROID\mtkclient-main\mtkclient-main\mtkclient\payloads\mt6781_payload.bin
Port - Device detected Smile
DA_handler - Device is protected.
DA_handler - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - UFS FWVer:    0x0
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID:      H9HQ21AFAMADAR
DAXFlash - UFS CID:      ad014839485132314146414d41444152
DAXFlash - UFS LU0 Size: 0x3b96000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DRAM config needed for : ad014839485132314146414d41444152
DAXFlash - Sending emi data ...
DAXFlash
DAXFlash - [LIB]: Error on sending emi: unpack requires a buffer of 12 bytes
DA_handler
DA_handler - [LIB]: Error uploading da
DA_handler - Requesting available partitions ....

Can you boot into recovery?
ayubloaded
ayubloaded
ayubloaded
Techie Member
58
10-02-2023, 10:11 AM
#8
(10-02-2023, 10:04 AM)Abdulakeem14
(09-02-2023, 02:43 PM)ayubloaded MTKClient Error
When I tried to flash the boot.img using these commands;
python mtk w boot boot.img
python mtk r boot_a boot.img


...........
Port - Device detected Smile
Preloader -    CPU:                    MT6781(Helio G96)
Preloader -    HW version:            0x0
Preloader -    WDT:                    0x10007000
Preloader -    Uart:                  0x11002000
Preloader -    Brom payload addr:      0x100a00
Preloader -    DA payload addr:        0x201000
Preloader -    Var1:                  0x73
Preloader - Disabling Watchdog...
Preloader - HW code:                    0x1066
Preloader - Target config:              0xe5
Preloader -    SBC enabled:            True
Preloader -    SLA enabled:            False
Preloader -    DAA enabled:            True
Preloader -    SWJTAG enabled:        True
Preloader -    EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:  False
Preloader -    Root cert required:    False
Preloader -    Mem read auth:          True
Preloader -    Mem write auth:        True
Preloader -    Cmd 0xC8 blocked:      True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader -    HW subcode:            0x8a00
Preloader -    HW Ver:                0xca00
Preloader -    SW Ver:                0x0
Preloader - ME_ID:                      3E8A11A4DAB177ACC033252C2069E700
Preloader - SOC_ID:                    BD3DD1D65F6EC81999ACE54D6001D0FF4C41FFE476001BDD5A45F35125A76465
PLTools - Loading payload from mt6781_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\AYUB\Documents\ANDROID\mtkclient-main\mtkclient-main\mtkclient\payloads\mt6781_payload.bin
Port - Device detected Smile
DA_handler - Device is protected.
DA_handler - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - UFS FWVer:    0x0
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID:      H9HQ21AFAMADAR
DAXFlash - UFS CID:      ad014839485132314146414d41444152
DAXFlash - UFS LU0 Size: 0x3b96000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DRAM config needed for : ad014839485132314146414d41444152
DAXFlash - Sending emi data ...
DAXFlash
DAXFlash - [LIB]: Error on sending emi: unpack requires a buffer of 12 bytes
DA_handler
DA_handler - [LIB]: Error uploading da
DA_handler - Requesting available partitions ....

Can you boot into recovery?

No sir
justshez
justshez
justshez
Senior Member
2,505
10-02-2023, 10:46 AM
#9
(10-02-2023, 10:11 AM)ayubloaded
(10-02-2023, 10:04 AM)Abdulakeem14
(09-02-2023, 02:43 PM)ayubloaded MTKClient Error
When I tried to flash the boot.img using these commands;
python mtk w boot boot.img
python mtk r boot_a boot.img


...........
Port - Device detected Smile
Preloader -    CPU:                    MT6781(Helio G96)
Preloader -    HW version:            0x0
Preloader -    WDT:                    0x10007000
Preloader -    Uart:                  0x11002000
Preloader -    Brom payload addr:      0x100a00
Preloader -    DA payload addr:        0x201000
Preloader -    Var1:                  0x73
Preloader - Disabling Watchdog...
Preloader - HW code:                    0x1066
Preloader - Target config:              0xe5
Preloader -    SBC enabled:            True
Preloader -    SLA enabled:            False
Preloader -    DAA enabled:            True
Preloader -    SWJTAG enabled:        True
Preloader -    EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:  False
Preloader -    Root cert required:    False
Preloader -    Mem read auth:          True
Preloader -    Mem write auth:        True
Preloader -    Cmd 0xC8 blocked:      True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader -    HW subcode:            0x8a00
Preloader -    HW Ver:                0xca00
Preloader -    SW Ver:                0x0
Preloader - ME_ID:                      3E8A11A4DAB177ACC033252C2069E700
Preloader - SOC_ID:                    BD3DD1D65F6EC81999ACE54D6001D0FF4C41FFE476001BDD5A45F35125A76465
PLTools - Loading payload from mt6781_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\AYUB\Documents\ANDROID\mtkclient-main\mtkclient-main\mtkclient\payloads\mt6781_payload.bin
Port - Device detected Smile
DA_handler - Device is protected.
DA_handler - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - UFS FWVer:    0x0
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID:      H9HQ21AFAMADAR
DAXFlash - UFS CID:      ad014839485132314146414d41444152
DAXFlash - UFS LU0 Size: 0x3b96000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DRAM config needed for : ad014839485132314146414d41444152
DAXFlash - Sending emi data ...
DAXFlash
DAXFlash - [LIB]: Error on sending emi: unpack requires a buffer of 12 bytes
DA_handler
DA_handler - [LIB]: Error uploading da
DA_handler - Requesting available partitions ....

Can you boot into recovery?

No sir

Disable secure boot using MTK Bypass @ https://www.hovatek.com/forum/thread-37957.html

Then Flash stock boot.img and recovery.img using SP Flash Tool @ https://www.hovatek.com/forum/thread-159.html
This post was last modified: 10-02-2023, 10:47 AM by justshez.
ayubloaded
ayubloaded
ayubloaded
Techie Member
58
10-02-2023, 06:16 PM
#10
(10-02-2023, 10:46 AM)Abdulakeem14
(10-02-2023, 10:11 AM)ayubloaded
(10-02-2023, 10:04 AM)Abdulakeem14
(09-02-2023, 02:43 PM)ayubloaded MTKClient Error
When I tried to flash the boot.img using these commands;
python mtk w boot boot.img
python mtk r boot_a boot.img


...........
Port - Device detected Smile
Preloader -    CPU:                    MT6781(Helio G96)
Preloader -    HW version:            0x0
Preloader -    WDT:                    0x10007000
Preloader -    Uart:                  0x11002000
Preloader -    Brom payload addr:      0x100a00
Preloader -    DA payload addr:        0x201000
Preloader -    Var1:                  0x73
Preloader - Disabling Watchdog...
Preloader - HW code:                    0x1066
Preloader - Target config:              0xe5
Preloader -    SBC enabled:            True
Preloader -    SLA enabled:            False
Preloader -    DAA enabled:            True
Preloader -    SWJTAG enabled:        True
Preloader -    EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:  False
Preloader -    Root cert required:    False
Preloader -    Mem read auth:          True
Preloader -    Mem write auth:        True
Preloader -    Cmd 0xC8 blocked:      True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader -    HW subcode:            0x8a00
Preloader -    HW Ver:                0xca00
Preloader -    SW Ver:                0x0
Preloader - ME_ID:                      3E8A11A4DAB177ACC033252C2069E700
Preloader - SOC_ID:                    BD3DD1D65F6EC81999ACE54D6001D0FF4C41FFE476001BDD5A45F35125A76465
PLTools - Loading payload from mt6781_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\AYUB\Documents\ANDROID\mtkclient-main\mtkclient-main\mtkclient\payloads\mt6781_payload.bin
Port - Device detected Smile
DA_handler - Device is protected.
DA_handler - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2136.bin
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - UFS FWVer:    0x0
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID:      H9HQ21AFAMADAR
DAXFlash - UFS CID:      ad014839485132314146414d41444152
DAXFlash - UFS LU0 Size: 0x3b96000000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DRAM config needed for : ad014839485132314146414d41444152
DAXFlash - Sending emi data ...
DAXFlash
DAXFlash - [LIB]: Error on sending emi: unpack requires a buffer of 12 bytes
DA_handler
DA_handler - [LIB]: Error uploading da
DA_handler - Requesting available partitions ....

Can you boot into recovery?

No sir

Disable secure boot using MTK Bypass @ https://www.hovatek.com/forum/thread-37957.html

Then Flash stock boot.img and recovery.img using SP Flash Tool @ https://www.hovatek.com/forum/thread-159.html

MTK Bypass is screen after I run the python main.py command

C:\Users\AYUB\Downloads\Compressed\bypass_utility-master\bypass_utility-master>python main.py
[2023-02-10 18:14:44.523442] Waiting for device
[2023-02-10 18:14:52.317385] Found device = 0e8d:2000
Pages (2): 1 2 Next
Users browsing this thread:
 1 Guest(s)
Users browsing this thread:
 1 Guest(s)
Join us
WhTlYt