Hovatek Forum MOBILE Android Qin F21 Pro: Brick
Try our Online TWRP Builder..its free!
Can't login? Please, reset your password.


Qin F21 Pro: Brick

Qin F21 Pro: Brick

herclogon
herclogon
herclogon
Enthusiastic Member
5
12-03-2023, 10:57 PM
#1



Hello,

Long story short, I have tried to root the phone using `boot.img` and `magisk`, but have got the brick. I have tried to restore whole flash image from the file (I did the same for the another phone with success) but in this particular case no luck. I can start the phone in BROM mode and flash partitions using `mtkclient  ` and `SP flash tool`, I have tried flash boot, preloader, other partitions but still have black screen, no charge, no any vibration on power on - brick.

I have read `MTK Software Repairs Training` course but I have no any special box'es yet. Could anyone suggest any ideas? I can't understand what is going on, and why the phone is not working. How to debug the reason? 

GPT details:


Code:

/mtk printgpt
MTK Flash/Exploit Client V1.6.0 (c) B.Kerler 2018-2022
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
........Port - Device detected
Preloader - CPU: MT6761/MT6762/MT3369/MT8766B(Helio A20/P22/A22/A25/G25)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x717
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
Preloader - Get Target info
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca01
Preloader - SW Ver: 0x200
DA_handler - Device is unprotected.
DA_handler - Device is in Preloader-Mode
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
xflashext
xflashext - [LIB]: Error on patching da1 version check...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - DRAM config needed for : 1501005248363441
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer:      0x0
DAXFlash - EMMC ID:        RH64AB
DAXFlash - EMMC CID:        1501005248363441420536511304760d
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size:  0x0
DAXFlash - EMMC GP2 Size:  0x0
DAXFlash - EMMC GP3 Size:  0x0
DAXFlash - EMMC GP4 Size:  0x0
DAXFlash - EMMC RPMB Size:  0x400000
DAXFlash - EMMC USER Size:  0xe8f800000
DAXFlash - HW-CODE        : 0x717
DAXFlash - HWSUB-CODE      : 0x8A00
DAXFlash - HW-VERSION      : 0xCA01
DAXFlash - SW-VERSION      : 0x200
DAXFlash - CHIP-EVOLUTION  : 0x0
DAXFlash - DA-VERSION      : 1.0
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - DA Extensions successfully added
GPT Table:
-------------
boot_para:          Offset 0x0000000000008000, Length 0x0000000000100000, Flags 0x00000000, UUID f57ad330-39c2-4488-b09b-00cb43c9ccd4, Type EFI_BASIC_DATA
para:                Offset 0x0000000000108000, Length 0x0000000000080000, Flags 0x00000000, UUID fe686d97-3544-4a41-21be-167e25b61b6f, Type EFI_BASIC_DATA
expdb:              Offset 0x0000000000188000, Length 0x0000000001400000, Flags 0x00000000, UUID 1cb143a8-b1a8-4b57-51b2-945c5119e8fe, Type EFI_BASIC_DATA
frp:                Offset 0x0000000001588000, Length 0x0000000000100000, Flags 0x00000000, UUID 3b9e343b-cdc8-4d7f-a69f-b6812e50ab62, Type EFI_BASIC_DATA
nvcfg:              Offset 0x0000000001688000, Length 0x0000000002000000, Flags 0x00000000, UUID 5f6a2c79-6617-4b85-02ac-c2975a14d2d7, Type EFI_BASIC_DATA
nvdata:              Offset 0x0000000003688000, Length 0x0000000004000000, Flags 0x00000000, UUID 4ae2050b-5db5-4ff7-d3aa-5730534be63d, Type EFI_BASIC_DATA
md_udc:              Offset 0x0000000007688000, Length 0x000000000169a000, Flags 0x00000000, UUID 1f9b0939-e16b-4bc9-bca5-dc2ee969d801, Type EFI_BASIC_DATA
metadata:            Offset 0x0000000008d22000, Length 0x0000000002000000, Flags 0x00000000, UUID d722c721-0dee-4cb8-838a-2c63cd1393c7, Type EFI_BASIC_DATA
protect1:            Offset 0x000000000ad22000, Length 0x0000000000800000, Flags 0x00000000, UUID e02179a8-ceb5-48a9-3188-4f1c9c5a8695, Type EFI_BASIC_DATA
protect2:            Offset 0x000000000b522000, Length 0x0000000000ade000, Flags 0x00000000, UUID 84b09a81-fad2-41ac-0e89-407c24975e74, Type EFI_BASIC_DATA
seccfg:              Offset 0x000000000c000000, Length 0x0000000000800000, Flags 0x00000000, UUID e8f0a5ef-8d1b-42ea-2a9c-835cd77de363, Type EFI_BASIC_DATA
sec1:                Offset 0x000000000c800000, Length 0x0000000000200000, Flags 0x00000000, UUID d5f0e175-a6e1-4db7-c094-f82ad032950b, Type EFI_BASIC_DATA
proinfo:            Offset 0x000000000ca00000, Length 0x0000000000300000, Flags 0x00000000, UUID 1d9056e1-e139-4fca-0b8c-b75fd74d81c6, Type EFI_BASIC_DATA
nvram:              Offset 0x000000000cd00000, Length 0x0000000004000000, Flags 0x00000000, UUID 7792210b-b6a8-45d5-91ad-3361ed14c608, Type EFI_BASIC_DATA
logo:                Offset 0x0000000010d00000, Length 0x0000000000b00000, Flags 0x00000000, UUID 138a6db9-1032-451d-e991-0fa38ff94fbb, Type EFI_BASIC_DATA
md1img_a:            Offset 0x0000000011800000, Length 0x0000000006400000, Flags 0x00000000, UUID 756d934c-50e3-4c91-46af-02d824169ca7, Type EFI_BASIC_DATA
spmfw_a:            Offset 0x0000000017c00000, Length 0x0000000000100000, Flags 0x00000000, UUID a3f3c267-5521-42dd-24a7-3bdec20c7c6f, Type EFI_BASIC_DATA
scp_a:              Offset 0x0000000017d00000, Length 0x0000000000100000, Flags 0x00000000, UUID 8c68cd2a-ccc9-4c5d-578b-34ae9b2dd481, Type EFI_BASIC_DATA
sspm_a:              Offset 0x0000000017e00000, Length 0x0000000000100000, Flags 0x00000000, UUID 6a5cebf8-54a7-4b89-1d8d-c5eb140b095b, Type EFI_BASIC_DATA
gz_a:                Offset 0x0000000017f00000, Length 0x0000000001000000, Flags 0x00000000, UUID a0d65bf8-e8de-4107-3494-1d318c843d37, Type EFI_BASIC_DATA
lk_a:                Offset 0x0000000018f00000, Length 0x0000000000100000, Flags 0x00000000, UUID 46f0c0bb-f227-4eb6-2fb8-66408e13e36d, Type EFI_BASIC_DATA
boot_a:              Offset 0x0000000019000000, Length 0x0000000002000000, Flags 0x00000000, UUID fbc2c131-6392-4217-1eb5-548a6edb03d0, Type EFI_BASIC_DATA
vendor_boot_a:      Offset 0x000000001b000000, Length 0x0000000004000000, Flags 0x00000000, UUID e195a981-e285-4734-2580-ec323e9589d9, Type EFI_BASIC_DATA
dtbo_a:              Offset 0x000000001f000000, Length 0x0000000000800000, Flags 0x00000000, UUID e29052f8-5d3a-4e97-b5ad-5f312ce6610a, Type EFI_BASIC_DATA
tee_a:              Offset 0x000000001f800000, Length 0x0000000000800000, Flags 0x00000000, UUID 9c3cabd7-a35d-4b45-578c-b80775426b35, Type EFI_BASIC_DATA
vbmeta_a:            Offset 0x0000000020000000, Length 0x0000000000800000, Flags 0x00000000, UUID e7099731-95a6-45a6-e5a1-1b6aba032cf1, Type EFI_BASIC_DATA
vbmeta_system_a:    Offset 0x0000000020800000, Length 0x0000000000800000, Flags 0x00000000, UUID 8273e1ab-846f-4468-99b9-ee2ea8e50a16, Type EFI_BASIC_DATA
vbmeta_vendor_a:    Offset 0x0000000021000000, Length 0x0000000000800000, Flags 0x00000000, UUID d26472f1-9ebc-421d-14ba-311296457c90, Type EFI_BASIC_DATA
md1img_b:            Offset 0x0000000021800000, Length 0x0000000006400000, Flags 0x00000000, UUID b72ccbe9-2055-46f4-67a1-4a069c201738, Type EFI_BASIC_DATA
spmfw_b:            Offset 0x0000000027c00000, Length 0x0000000000100000, Flags 0x00000000, UUID 9c1520f3-c2c5-4b89-4282-fe4c61208a9e, Type EFI_BASIC_DATA
scp_b:              Offset 0x0000000027d00000, Length 0x0000000000100000, Flags 0x00000000, UUID 902d5f3f-434a-4de7-8889-321e88c9b8aa, Type EFI_BASIC_DATA
sspm_b:              Offset 0x0000000027e00000, Length 0x0000000000100000, Flags 0x00000000, UUID bece74c8-d8e2-4863-fe9b-5b0b66bb920f, Type EFI_BASIC_DATA
gz_b:                Offset 0x0000000027f00000, Length 0x0000000001000000, Flags 0x00000000, UUID ff1342cf-b7be-44d5-5ea2-a435addd2702, Type EFI_BASIC_DATA
lk_b:                Offset 0x0000000028f00000, Length 0x0000000000100000, Flags 0x00000000, UUID a4da8f1b-fe07-433b-cb95-84a5f23e477b, Type EFI_BASIC_DATA
boot_b:              Offset 0x0000000029000000, Length 0x0000000002000000, Flags 0x00000000, UUID c2635e15-61aa-454e-409c-ebe1bdf19b9b, Type EFI_BASIC_DATA
vendor_boot_b:      Offset 0x000000002b000000, Length 0x0000000004000000, Flags 0x00000000, UUID 4d2d1290-36a3-4f5d-b4af-319f8ab6dcd8, Type EFI_BASIC_DATA
dtbo_b:              Offset 0x000000002f000000, Length 0x0000000000800000, Flags 0x00000000, UUID fdce12f0-a7eb-40f7-5083-960972e6cb57, Type EFI_BASIC_DATA
tee_b:              Offset 0x000000002f800000, Length 0x0000000000800000, Flags 0x00000000, UUID 0fbbafa2-4aa9-4490-8389-5329328505fd, Type EFI_BASIC_DATA
super:              Offset 0x0000000030000000, Length 0x0000000100000000, Flags 0x00000000, UUID a76e4b2f-31cb-40ba-6a82-c0cb0b73c856, Type EFI_BASIC_DATA
vbmeta_b:            Offset 0x0000000130000000, Length 0x0000000000800000, Flags 0x00000000, UUID f54ac030-7004-4d02-8194-bbf982036807, Type EFI_BASIC_DATA
vbmeta_system_b:    Offset 0x0000000130800000, Length 0x0000000000800000, Flags 0x00000000, UUID c4c310e2-4a7e-77d3-1848-61e2d8bb5e86, Type EFI_BASIC_DATA
vbmeta_vendor_b:    Offset 0x0000000131000000, Length 0x0000000000800000, Flags 0x00000000, UUID 3734710f-0f13-1ab9-4c73-12a08ec50837, Type EFI_BASIC_DATA
userdata:            Offset 0x0000000131800000, Length 0x0000000d5a4f8000, Flags 0x00000000, UUID 85a5b02f-3773-18b3-4910-718cde95107e, Type EFI_BASIC_DATA
otp:                Offset 0x0000000e8bcf8000, Length 0x0000000002b00000, Flags 0x00000000, UUID 6fce83a6-5273-4748-4511-c205ebb4b8ad, Type EFI_BASIC_DATA
flashinfo:          Offset 0x0000000e8e7f8000, Length 0x0000000001000000, Flags 0x00000000, UUID 3645e6a3-a7e3-19b2-4149-172c10190eef, Type EFI_BASIC_DATA
Total disk size:0x0000000e8f800000, sectors:0x000000000747c000
Abdulakeem14
Abdulakeem14
Abdulakeem14
Senior Member
1,757
13-03-2023, 05:03 PM
#2
(12-03-2023, 10:57 PM)herclogon Hello,

Long story short, I have tried to root the phone using `boot.img` and `magisk`, but have got the brick. I have tried to restore whole flash image from the file (I did the same for the another phone with success) but in this particular case no luck. I can start the phone in BROM mode and flash partitions using `mtkclient  ` and `SP flash tool`, I have tried flash boot, preloader, other partitions but still have black screen, no charge, no any vibration on power on - brick.

I have read `MTK Software Repairs Training` course but I have no any special box'es yet. Could anyone suggest any ideas? I can't understand what is going on, and why the phone is not working. How to debug the reason? 

GPT details:


Code:

/mtk printgpt
MTK Flash/Exploit Client V1.6.0 (c) B.Kerler 2018-2022
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
........Port - Device detected
Preloader - CPU: MT6761/MT6762/MT3369/MT8766B(Helio A20/P22/A22/A25/G25)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x717
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
Preloader - Get Target info
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca01
Preloader - SW Ver: 0x200
DA_handler - Device is unprotected.
DA_handler - Device is in Preloader-Mode
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
xflashext
xflashext - [LIB]: Error on patching da1 version check...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - DRAM config needed for : 1501005248363441
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer:      0x0
DAXFlash - EMMC ID:        RH64AB
DAXFlash - EMMC CID:        1501005248363441420536511304760d
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size:  0x0
DAXFlash - EMMC GP2 Size:  0x0
DAXFlash - EMMC GP3 Size:  0x0
DAXFlash - EMMC GP4 Size:  0x0
DAXFlash - EMMC RPMB Size:  0x400000
DAXFlash - EMMC USER Size:  0xe8f800000
DAXFlash - HW-CODE        : 0x717
DAXFlash - HWSUB-CODE      : 0x8A00
DAXFlash - HW-VERSION      : 0xCA01
DAXFlash - SW-VERSION      : 0x200
DAXFlash - CHIP-EVOLUTION  : 0x0
DAXFlash - DA-VERSION      : 1.0
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - DA Extensions successfully added
GPT Table:
-------------
boot_para:          Offset 0x0000000000008000, Length 0x0000000000100000, Flags 0x00000000, UUID f57ad330-39c2-4488-b09b-00cb43c9ccd4, Type EFI_BASIC_DATA
para:                Offset 0x0000000000108000, Length 0x0000000000080000, Flags 0x00000000, UUID fe686d97-3544-4a41-21be-167e25b61b6f, Type EFI_BASIC_DATA
expdb:              Offset 0x0000000000188000, Length 0x0000000001400000, Flags 0x00000000, UUID 1cb143a8-b1a8-4b57-51b2-945c5119e8fe, Type EFI_BASIC_DATA
frp:                Offset 0x0000000001588000, Length 0x0000000000100000, Flags 0x00000000, UUID 3b9e343b-cdc8-4d7f-a69f-b6812e50ab62, Type EFI_BASIC_DATA
nvcfg:              Offset 0x0000000001688000, Length 0x0000000002000000, Flags 0x00000000, UUID 5f6a2c79-6617-4b85-02ac-c2975a14d2d7, Type EFI_BASIC_DATA
nvdata:              Offset 0x0000000003688000, Length 0x0000000004000000, Flags 0x00000000, UUID 4ae2050b-5db5-4ff7-d3aa-5730534be63d, Type EFI_BASIC_DATA
md_udc:              Offset 0x0000000007688000, Length 0x000000000169a000, Flags 0x00000000, UUID 1f9b0939-e16b-4bc9-bca5-dc2ee969d801, Type EFI_BASIC_DATA
metadata:            Offset 0x0000000008d22000, Length 0x0000000002000000, Flags 0x00000000, UUID d722c721-0dee-4cb8-838a-2c63cd1393c7, Type EFI_BASIC_DATA
protect1:            Offset 0x000000000ad22000, Length 0x0000000000800000, Flags 0x00000000, UUID e02179a8-ceb5-48a9-3188-4f1c9c5a8695, Type EFI_BASIC_DATA
protect2:            Offset 0x000000000b522000, Length 0x0000000000ade000, Flags 0x00000000, UUID 84b09a81-fad2-41ac-0e89-407c24975e74, Type EFI_BASIC_DATA
seccfg:              Offset 0x000000000c000000, Length 0x0000000000800000, Flags 0x00000000, UUID e8f0a5ef-8d1b-42ea-2a9c-835cd77de363, Type EFI_BASIC_DATA
sec1:                Offset 0x000000000c800000, Length 0x0000000000200000, Flags 0x00000000, UUID d5f0e175-a6e1-4db7-c094-f82ad032950b, Type EFI_BASIC_DATA
proinfo:            Offset 0x000000000ca00000, Length 0x0000000000300000, Flags 0x00000000, UUID 1d9056e1-e139-4fca-0b8c-b75fd74d81c6, Type EFI_BASIC_DATA
nvram:              Offset 0x000000000cd00000, Length 0x0000000004000000, Flags 0x00000000, UUID 7792210b-b6a8-45d5-91ad-3361ed14c608, Type EFI_BASIC_DATA
logo:                Offset 0x0000000010d00000, Length 0x0000000000b00000, Flags 0x00000000, UUID 138a6db9-1032-451d-e991-0fa38ff94fbb, Type EFI_BASIC_DATA
md1img_a:            Offset 0x0000000011800000, Length 0x0000000006400000, Flags 0x00000000, UUID 756d934c-50e3-4c91-46af-02d824169ca7, Type EFI_BASIC_DATA
spmfw_a:            Offset 0x0000000017c00000, Length 0x0000000000100000, Flags 0x00000000, UUID a3f3c267-5521-42dd-24a7-3bdec20c7c6f, Type EFI_BASIC_DATA
scp_a:              Offset 0x0000000017d00000, Length 0x0000000000100000, Flags 0x00000000, UUID 8c68cd2a-ccc9-4c5d-578b-34ae9b2dd481, Type EFI_BASIC_DATA
sspm_a:              Offset 0x0000000017e00000, Length 0x0000000000100000, Flags 0x00000000, UUID 6a5cebf8-54a7-4b89-1d8d-c5eb140b095b, Type EFI_BASIC_DATA
gz_a:                Offset 0x0000000017f00000, Length 0x0000000001000000, Flags 0x00000000, UUID a0d65bf8-e8de-4107-3494-1d318c843d37, Type EFI_BASIC_DATA
lk_a:                Offset 0x0000000018f00000, Length 0x0000000000100000, Flags 0x00000000, UUID 46f0c0bb-f227-4eb6-2fb8-66408e13e36d, Type EFI_BASIC_DATA
boot_a:              Offset 0x0000000019000000, Length 0x0000000002000000, Flags 0x00000000, UUID fbc2c131-6392-4217-1eb5-548a6edb03d0, Type EFI_BASIC_DATA
vendor_boot_a:      Offset 0x000000001b000000, Length 0x0000000004000000, Flags 0x00000000, UUID e195a981-e285-4734-2580-ec323e9589d9, Type EFI_BASIC_DATA
dtbo_a:              Offset 0x000000001f000000, Length 0x0000000000800000, Flags 0x00000000, UUID e29052f8-5d3a-4e97-b5ad-5f312ce6610a, Type EFI_BASIC_DATA
tee_a:              Offset 0x000000001f800000, Length 0x0000000000800000, Flags 0x00000000, UUID 9c3cabd7-a35d-4b45-578c-b80775426b35, Type EFI_BASIC_DATA
vbmeta_a:            Offset 0x0000000020000000, Length 0x0000000000800000, Flags 0x00000000, UUID e7099731-95a6-45a6-e5a1-1b6aba032cf1, Type EFI_BASIC_DATA
vbmeta_system_a:    Offset 0x0000000020800000, Length 0x0000000000800000, Flags 0x00000000, UUID 8273e1ab-846f-4468-99b9-ee2ea8e50a16, Type EFI_BASIC_DATA
vbmeta_vendor_a:    Offset 0x0000000021000000, Length 0x0000000000800000, Flags 0x00000000, UUID d26472f1-9ebc-421d-14ba-311296457c90, Type EFI_BASIC_DATA
md1img_b:            Offset 0x0000000021800000, Length 0x0000000006400000, Flags 0x00000000, UUID b72ccbe9-2055-46f4-67a1-4a069c201738, Type EFI_BASIC_DATA
spmfw_b:            Offset 0x0000000027c00000, Length 0x0000000000100000, Flags 0x00000000, UUID 9c1520f3-c2c5-4b89-4282-fe4c61208a9e, Type EFI_BASIC_DATA
scp_b:              Offset 0x0000000027d00000, Length 0x0000000000100000, Flags 0x00000000, UUID 902d5f3f-434a-4de7-8889-321e88c9b8aa, Type EFI_BASIC_DATA
sspm_b:              Offset 0x0000000027e00000, Length 0x0000000000100000, Flags 0x00000000, UUID bece74c8-d8e2-4863-fe9b-5b0b66bb920f, Type EFI_BASIC_DATA
gz_b:                Offset 0x0000000027f00000, Length 0x0000000001000000, Flags 0x00000000, UUID ff1342cf-b7be-44d5-5ea2-a435addd2702, Type EFI_BASIC_DATA
lk_b:                Offset 0x0000000028f00000, Length 0x0000000000100000, Flags 0x00000000, UUID a4da8f1b-fe07-433b-cb95-84a5f23e477b, Type EFI_BASIC_DATA
boot_b:              Offset 0x0000000029000000, Length 0x0000000002000000, Flags 0x00000000, UUID c2635e15-61aa-454e-409c-ebe1bdf19b9b, Type EFI_BASIC_DATA
vendor_boot_b:      Offset 0x000000002b000000, Length 0x0000000004000000, Flags 0x00000000, UUID 4d2d1290-36a3-4f5d-b4af-319f8ab6dcd8, Type EFI_BASIC_DATA
dtbo_b:              Offset 0x000000002f000000, Length 0x0000000000800000, Flags 0x00000000, UUID fdce12f0-a7eb-40f7-5083-960972e6cb57, Type EFI_BASIC_DATA
tee_b:              Offset 0x000000002f800000, Length 0x0000000000800000, Flags 0x00000000, UUID 0fbbafa2-4aa9-4490-8389-5329328505fd, Type EFI_BASIC_DATA
super:              Offset 0x0000000030000000, Length 0x0000000100000000, Flags 0x00000000, UUID a76e4b2f-31cb-40ba-6a82-c0cb0b73c856, Type EFI_BASIC_DATA
vbmeta_b:            Offset 0x0000000130000000, Length 0x0000000000800000, Flags 0x00000000, UUID f54ac030-7004-4d02-8194-bbf982036807, Type EFI_BASIC_DATA
vbmeta_system_b:    Offset 0x0000000130800000, Length 0x0000000000800000, Flags 0x00000000, UUID c4c310e2-4a7e-77d3-1848-61e2d8bb5e86, Type EFI_BASIC_DATA
vbmeta_vendor_b:    Offset 0x0000000131000000, Length 0x0000000000800000, Flags 0x00000000, UUID 3734710f-0f13-1ab9-4c73-12a08ec50837, Type EFI_BASIC_DATA
userdata:            Offset 0x0000000131800000, Length 0x0000000d5a4f8000, Flags 0x00000000, UUID 85a5b02f-3773-18b3-4910-718cde95107e, Type EFI_BASIC_DATA
otp:                Offset 0x0000000e8bcf8000, Length 0x0000000002b00000, Flags 0x00000000, UUID 6fce83a6-5273-4748-4511-c205ebb4b8ad, Type EFI_BASIC_DATA
flashinfo:          Offset 0x0000000e8e7f8000, Length 0x0000000001000000, Flags 0x00000000, UUID 3645e6a3-a7e3-19b2-4149-172c10190eef, Type EFI_BASIC_DATA
Total disk size:0x0000000e8f800000, sectors:0x000000000747c000
Do you recall the build number of your device before rooting?
herclogon
herclogon
herclogon
Enthusiastic Member
5
14-03-2023, 07:46 AM
#3
(13-03-2023, 05:03 PM)Abdulakeem14 Do you recall the build number of your device before rooting?

Of course... No. ;( But I believe the number is printed on the phone, no? Please see the attachment.

Could I obtain the build number somehow after flash erasing? Is there any tool to debug the phone? To trace the reason.
Attached Files
.png
2023-03-14_09-38.png
Size: 929.22 KB / Downloads: 7
herclogon
herclogon
herclogon
Enthusiastic Member
5
14-03-2023, 09:17 AM
#4
(14-03-2023, 07:46 AM)herclogon
(13-03-2023, 05:03 PM)Abdulakeem14 Do you recall the build number of your device before rooting?

Of course... No. ;( But I believe the number is printed on the phone, no? Please see the attachment.

Could I obtain the build number somehow after flash erasing? Is there any tool to debug the phone? To trace the reason.

Additional image as URL, https://i.imgur.com/wU4tQe6.png
Abdulakeem14
Abdulakeem14
Abdulakeem14
Senior Member
1,757
16-03-2023, 05:35 AM
#5



(14-03-2023, 09:17 AM)herclogon
(14-03-2023, 07:46 AM)herclogon
(13-03-2023, 05:03 PM)Abdulakeem14 Do you recall the build number of your device before rooting?

Of course... No. ;( But I believe the number is printed on the phone, no? Please see the attachment.

Could I obtain the build number somehow after flash erasing? Is there any tool to debug the phone? To trace the reason.

Additional image as URL, https://i.imgur.com/wU4tQe6.png

Try the firmware @ https://www.mediafire.com/file/tl8hv77gl...k.zip/file
herclogon
herclogon
herclogon
Enthusiastic Member
5
16-03-2023, 08:47 AM
#6
Yes, I have tried also this one, but faced with some problerms:

1. It doesn't contain all partitions, just a part (Is it important? I erased whole flash previously)

https://i.imgur.com/Gbbk9sE.png

2. I got the errors on flashing:

Code:

ERROR : STATUS_SEC_IMG_TYPE_MISMATCH (-1073610710) , MSP ERROE CODE : 0x00.
[HINT]:
Verified boot is enabled.
Please download signed image(md_udc-verified.img) or disable verified boot.

https://i.imgur.com/PUqPEfo.png

Then, I tried to skip the partition with error, but got the next errors:

Code:

ERROR : STATUS_SEC_INSUFFICIENT_BUFFER (-1073610677) , MSP ERROE CODE : 0x00.
[HINT]:
Verified boot is enabled.
Please download signed image(logo-verified.img) or disable verified boot.

https://i.imgur.com/h3PLHHS.png

3. I also tried to flash the only preloader and boot_a from this firmware, these parts flashed with success.

https://i.imgur.com/Tial6T3.png

But the phone is still brick. ;( (no charge, black screen, no any vibration)


Best regards,
Dmitry.
herclogon
herclogon
herclogon
Enthusiastic Member
5
20-03-2023, 08:18 AM
#7
Hello guys,

So, I have some progress. I have bought one more phone and get the same one from my friend, thus I have three phones, let's call them differently to distinguish:

* f21_white - the brick, which I am trying to recover after unsuccessful flashing (white colored)
* f21_black - a new phone, also f21, working, factory reseted, locked boot (black colored)
* f21_green - friend's phone, also f21, working, with userdata, unlocked boot (white colored)

So, what I did:

I took all partitions from the phone `f21_black` using `mtkclient` and the command:

Code:

./mtk rl backup

the next step I wrote the all partitions to the phone `f21_white`:

Code:

./mtk wl backup


, and it became operational! Uhhhhhh! (at least any result after several days of trying). But If I try to do the same, with the phone `f21_green` (backup `f21_green` and restore to `f21_white`) - `f21_white` become brick. But... surprise, surprise... All these phones have the same model and build version:

The questions is: why if I backup and restore all partitions from the phone `f21_black`  to `f21_white` it works, but if I do the same with `f21_green` and `f21_white` - I get the brick? All these phones have the same model and build version.

The problems now:
* Because I cloned two phones they have the same IMEI, it must be changed or not?
* I can't unlock the phone, after 

Code:

./mtk da seccfg unlock

I get the error on boot:

Code:

dm-verity corruption

Your device is corrupt.
It can't be trusted and may not work properly. Press power button to continue. Or, device will power off in 5 s.


I pressed power button, any other buttons, but I get the boot loop anyway. I tried to flash the partition `vbmeta_a` with empty data, but with no luck. I did everything, step by step from the following article: https://www.jonayling.net/qin-f21-backup...-firmware/, but as result I always have `dm-verity corruption` error on boot.

Could you suggest something? Why partitions from one phone are not working for another one with the same model/build version? Could I unlock the phone somehow? I have tried several recipes from the internet but usually they are wrappers around `mtk da seccfg unlock`. I also tried `Mi Flash Unlock`, but it also can't unlock, starting then finishing with the error.

Please help.

Best regards,
Dmitry.
hovatek
hovatek
hovatek
Administrator
49,610
20-03-2023, 03:07 PM
#8
(20-03-2023, 08:18 AM)herclogon ....
Could you suggest something? Why partitions from one phone are not working for another one with the same model/build version? Could I unlock the phone somehow? I have tried several recipes from the internet but usually they are wrappers around `mtk da seccfg unlock`. I also tried `Mi Flash Unlock`, but it also can't unlock, starting then finishing with the error.

Please help.

Best regards,
Dmitry.

There are some variables I can point out in your test:

1. Just because two phones have the same build number doesn't always guarantee they're 100% identical. They could have slightly different hardware (like RAM or Internal storage). The build number just gives you more information about the software version the phone is running on. A manufacturer can give firmware of two variants of the same model (2+32 GB and 4+64 GB) the same build number even though they may use different lk.bin or boot.img for example.

2. The act of doing a full dump and flashing everything to another phone is generally a bad idea. This is because you're overwriting other core partitions which are unique to each phone and don't necessarily need to be flashed. A better approach is to do a scatter file type of backup then flash only few important partitions and leave the rest

3. f21_black has a locked bootloader while f21_green has an unlocked bootloader. seccfg (for bootloader unlock) is one partition that you don't just copy from one phone and flash to another. I think you should erase the seccfg, cache, metadata, userdata and md_udc partitions after flashing f21_green firmware then see if it boots

4. After flashing F21_black firmware, you should write back original IMEI of f21_white since changing of IMEI is illegal. You should also first erase the seccfg, cache, metadata, userdata and md_udc partitions before you try to unlock bootloader. Maybe that will help with the unlock error
This post was last modified: 20-03-2023, 03:18 PM by hovatek.

Note!
We have a reply schedule for Free Support. Please upgrade to Private Support if you can't wait.
Users browsing this thread:
 1 Guest(s)
Users browsing this thread:
 1 Guest(s)
YtWhTl
live chat
whatsapp telegram