Qin F21 Pro: Brick
Qin F21 Pro: Brick
/mtk printgpt
MTK Flash/Exploit Client V1.6.0 (c) B.Kerler 2018-2022
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
........Port - Device detected
Preloader - CPU: MT6761/MT6762/MT3369/MT8766B(Helio A20/P22/A22/A25/G25)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x717
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
Preloader - Get Target info
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca01
Preloader - SW Ver: 0x200
DA_handler - Device is unprotected.
DA_handler - Device is in Preloader-Mode
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
xflashext
xflashext - [LIB]: Error on patching da1 version check...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - DRAM config needed for : 1501005248363441
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: RH64AB
DAXFlash - EMMC CID: 1501005248363441420536511304760d
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x400000
DAXFlash - EMMC USER Size: 0xe8f800000
DAXFlash - HW-CODE : 0x717
DAXFlash - HWSUB-CODE : 0x8A00
DAXFlash - HW-VERSION : 0xCA01
DAXFlash - SW-VERSION : 0x200
DAXFlash - CHIP-EVOLUTION : 0x0
DAXFlash - DA-VERSION : 1.0
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - DA Extensions successfully added
GPT Table:
-------------
boot_para: Offset 0x0000000000008000, Length 0x0000000000100000, Flags 0x00000000, UUID f57ad330-39c2-4488-b09b-00cb43c9ccd4, Type EFI_BASIC_DATA
para: Offset 0x0000000000108000, Length 0x0000000000080000, Flags 0x00000000, UUID fe686d97-3544-4a41-21be-167e25b61b6f, Type EFI_BASIC_DATA
expdb: Offset 0x0000000000188000, Length 0x0000000001400000, Flags 0x00000000, UUID 1cb143a8-b1a8-4b57-51b2-945c5119e8fe, Type EFI_BASIC_DATA
frp: Offset 0x0000000001588000, Length 0x0000000000100000, Flags 0x00000000, UUID 3b9e343b-cdc8-4d7f-a69f-b6812e50ab62, Type EFI_BASIC_DATA
nvcfg: Offset 0x0000000001688000, Length 0x0000000002000000, Flags 0x00000000, UUID 5f6a2c79-6617-4b85-02ac-c2975a14d2d7, Type EFI_BASIC_DATA
nvdata: Offset 0x0000000003688000, Length 0x0000000004000000, Flags 0x00000000, UUID 4ae2050b-5db5-4ff7-d3aa-5730534be63d, Type EFI_BASIC_DATA
md_udc: Offset 0x0000000007688000, Length 0x000000000169a000, Flags 0x00000000, UUID 1f9b0939-e16b-4bc9-bca5-dc2ee969d801, Type EFI_BASIC_DATA
metadata: Offset 0x0000000008d22000, Length 0x0000000002000000, Flags 0x00000000, UUID d722c721-0dee-4cb8-838a-2c63cd1393c7, Type EFI_BASIC_DATA
protect1: Offset 0x000000000ad22000, Length 0x0000000000800000, Flags 0x00000000, UUID e02179a8-ceb5-48a9-3188-4f1c9c5a8695, Type EFI_BASIC_DATA
protect2: Offset 0x000000000b522000, Length 0x0000000000ade000, Flags 0x00000000, UUID 84b09a81-fad2-41ac-0e89-407c24975e74, Type EFI_BASIC_DATA
seccfg: Offset 0x000000000c000000, Length 0x0000000000800000, Flags 0x00000000, UUID e8f0a5ef-8d1b-42ea-2a9c-835cd77de363, Type EFI_BASIC_DATA
sec1: Offset 0x000000000c800000, Length 0x0000000000200000, Flags 0x00000000, UUID d5f0e175-a6e1-4db7-c094-f82ad032950b, Type EFI_BASIC_DATA
proinfo: Offset 0x000000000ca00000, Length 0x0000000000300000, Flags 0x00000000, UUID 1d9056e1-e139-4fca-0b8c-b75fd74d81c6, Type EFI_BASIC_DATA
nvram: Offset 0x000000000cd00000, Length 0x0000000004000000, Flags 0x00000000, UUID 7792210b-b6a8-45d5-91ad-3361ed14c608, Type EFI_BASIC_DATA
logo: Offset 0x0000000010d00000, Length 0x0000000000b00000, Flags 0x00000000, UUID 138a6db9-1032-451d-e991-0fa38ff94fbb, Type EFI_BASIC_DATA
md1img_a: Offset 0x0000000011800000, Length 0x0000000006400000, Flags 0x00000000, UUID 756d934c-50e3-4c91-46af-02d824169ca7, Type EFI_BASIC_DATA
spmfw_a: Offset 0x0000000017c00000, Length 0x0000000000100000, Flags 0x00000000, UUID a3f3c267-5521-42dd-24a7-3bdec20c7c6f, Type EFI_BASIC_DATA
scp_a: Offset 0x0000000017d00000, Length 0x0000000000100000, Flags 0x00000000, UUID 8c68cd2a-ccc9-4c5d-578b-34ae9b2dd481, Type EFI_BASIC_DATA
sspm_a: Offset 0x0000000017e00000, Length 0x0000000000100000, Flags 0x00000000, UUID 6a5cebf8-54a7-4b89-1d8d-c5eb140b095b, Type EFI_BASIC_DATA
gz_a: Offset 0x0000000017f00000, Length 0x0000000001000000, Flags 0x00000000, UUID a0d65bf8-e8de-4107-3494-1d318c843d37, Type EFI_BASIC_DATA
lk_a: Offset 0x0000000018f00000, Length 0x0000000000100000, Flags 0x00000000, UUID 46f0c0bb-f227-4eb6-2fb8-66408e13e36d, Type EFI_BASIC_DATA
boot_a: Offset 0x0000000019000000, Length 0x0000000002000000, Flags 0x00000000, UUID fbc2c131-6392-4217-1eb5-548a6edb03d0, Type EFI_BASIC_DATA
vendor_boot_a: Offset 0x000000001b000000, Length 0x0000000004000000, Flags 0x00000000, UUID e195a981-e285-4734-2580-ec323e9589d9, Type EFI_BASIC_DATA
dtbo_a: Offset 0x000000001f000000, Length 0x0000000000800000, Flags 0x00000000, UUID e29052f8-5d3a-4e97-b5ad-5f312ce6610a, Type EFI_BASIC_DATA
tee_a: Offset 0x000000001f800000, Length 0x0000000000800000, Flags 0x00000000, UUID 9c3cabd7-a35d-4b45-578c-b80775426b35, Type EFI_BASIC_DATA
vbmeta_a: Offset 0x0000000020000000, Length 0x0000000000800000, Flags 0x00000000, UUID e7099731-95a6-45a6-e5a1-1b6aba032cf1, Type EFI_BASIC_DATA
vbmeta_system_a: Offset 0x0000000020800000, Length 0x0000000000800000, Flags 0x00000000, UUID 8273e1ab-846f-4468-99b9-ee2ea8e50a16, Type EFI_BASIC_DATA
vbmeta_vendor_a: Offset 0x0000000021000000, Length 0x0000000000800000, Flags 0x00000000, UUID d26472f1-9ebc-421d-14ba-311296457c90, Type EFI_BASIC_DATA
md1img_b: Offset 0x0000000021800000, Length 0x0000000006400000, Flags 0x00000000, UUID b72ccbe9-2055-46f4-67a1-4a069c201738, Type EFI_BASIC_DATA
spmfw_b: Offset 0x0000000027c00000, Length 0x0000000000100000, Flags 0x00000000, UUID 9c1520f3-c2c5-4b89-4282-fe4c61208a9e, Type EFI_BASIC_DATA
scp_b: Offset 0x0000000027d00000, Length 0x0000000000100000, Flags 0x00000000, UUID 902d5f3f-434a-4de7-8889-321e88c9b8aa, Type EFI_BASIC_DATA
sspm_b: Offset 0x0000000027e00000, Length 0x0000000000100000, Flags 0x00000000, UUID bece74c8-d8e2-4863-fe9b-5b0b66bb920f, Type EFI_BASIC_DATA
gz_b: Offset 0x0000000027f00000, Length 0x0000000001000000, Flags 0x00000000, UUID ff1342cf-b7be-44d5-5ea2-a435addd2702, Type EFI_BASIC_DATA
lk_b: Offset 0x0000000028f00000, Length 0x0000000000100000, Flags 0x00000000, UUID a4da8f1b-fe07-433b-cb95-84a5f23e477b, Type EFI_BASIC_DATA
boot_b: Offset 0x0000000029000000, Length 0x0000000002000000, Flags 0x00000000, UUID c2635e15-61aa-454e-409c-ebe1bdf19b9b, Type EFI_BASIC_DATA
vendor_boot_b: Offset 0x000000002b000000, Length 0x0000000004000000, Flags 0x00000000, UUID 4d2d1290-36a3-4f5d-b4af-319f8ab6dcd8, Type EFI_BASIC_DATA
dtbo_b: Offset 0x000000002f000000, Length 0x0000000000800000, Flags 0x00000000, UUID fdce12f0-a7eb-40f7-5083-960972e6cb57, Type EFI_BASIC_DATA
tee_b: Offset 0x000000002f800000, Length 0x0000000000800000, Flags 0x00000000, UUID 0fbbafa2-4aa9-4490-8389-5329328505fd, Type EFI_BASIC_DATA
super: Offset 0x0000000030000000, Length 0x0000000100000000, Flags 0x00000000, UUID a76e4b2f-31cb-40ba-6a82-c0cb0b73c856, Type EFI_BASIC_DATA
vbmeta_b: Offset 0x0000000130000000, Length 0x0000000000800000, Flags 0x00000000, UUID f54ac030-7004-4d02-8194-bbf982036807, Type EFI_BASIC_DATA
vbmeta_system_b: Offset 0x0000000130800000, Length 0x0000000000800000, Flags 0x00000000, UUID c4c310e2-4a7e-77d3-1848-61e2d8bb5e86, Type EFI_BASIC_DATA
vbmeta_vendor_b: Offset 0x0000000131000000, Length 0x0000000000800000, Flags 0x00000000, UUID 3734710f-0f13-1ab9-4c73-12a08ec50837, Type EFI_BASIC_DATA
userdata: Offset 0x0000000131800000, Length 0x0000000d5a4f8000, Flags 0x00000000, UUID 85a5b02f-3773-18b3-4910-718cde95107e, Type EFI_BASIC_DATA
otp: Offset 0x0000000e8bcf8000, Length 0x0000000002b00000, Flags 0x00000000, UUID 6fce83a6-5273-4748-4511-c205ebb4b8ad, Type EFI_BASIC_DATA
flashinfo: Offset 0x0000000e8e7f8000, Length 0x0000000001000000, Flags 0x00000000, UUID 3645e6a3-a7e3-19b2-4149-172c10190eef, Type EFI_BASIC_DATA
Total disk size:0x0000000e8f800000, sectors:0x000000000747c000
(12-03-2023, 10:57 PM)herclogon Hello,Do you recall the build number of your device before rooting?
Long story short, I have tried to root the phone using `boot.img` and `magisk`, but have got the brick. I have tried to restore whole flash image from the file (I did the same for the another phone with success) but in this particular case no luck. I can start the phone in BROM mode and flash partitions using `mtkclient ` and `SP flash tool`, I have tried flash boot, preloader, other partitions but still have black screen, no charge, no any vibration on power on - brick.
I have read `MTK Software Repairs Training` course but I have no any special box'es yet. Could anyone suggest any ideas? I can't understand what is going on, and why the phone is not working. How to debug the reason?
GPT details:
Code:/mtk printgpt
MTK Flash/Exploit Client V1.6.0 (c) B.Kerler 2018-2022
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
If it is already connected and on, hold power for 10 seconds to reset.
........Port - Device detected
Preloader - CPU: MT6761/MT6762/MT3369/MT8766B(Helio A20/P22/A22/A25/G25)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0x25
Preloader - Disabling Watchdog...
Preloader - HW code: 0x717
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
Preloader - Get Target info
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca01
Preloader - SW Ver: 0x200
DA_handler - Device is unprotected.
DA_handler - Device is in Preloader-Mode
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
xflashext - Patching da1 ...
Mtk - Patched "Patched loader msg" in preloader
xflashext
xflashext - [LIB]: Error on patching da1 version check...
Mtk - Patched "Patched loader msg" in preloader
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
DAXFlash - Successfully received DA sync
DAXFlash - DRAM config needed for : 1501005248363441
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer: 0x0
DAXFlash - EMMC ID: RH64AB
DAXFlash - EMMC CID: 1501005248363441420536511304760d
DAXFlash - EMMC Boot1 Size: 0x400000
DAXFlash - EMMC Boot2 Size: 0x400000
DAXFlash - EMMC GP1 Size: 0x0
DAXFlash - EMMC GP2 Size: 0x0
DAXFlash - EMMC GP3 Size: 0x0
DAXFlash - EMMC GP4 Size: 0x0
DAXFlash - EMMC RPMB Size: 0x400000
DAXFlash - EMMC USER Size: 0xe8f800000
DAXFlash - HW-CODE : 0x717
DAXFlash - HWSUB-CODE : 0x8A00
DAXFlash - HW-VERSION : 0xCA01
DAXFlash - SW-VERSION : 0x200
DAXFlash - CHIP-EVOLUTION : 0x0
DAXFlash - DA-VERSION : 1.0
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - DA Extensions successfully added
GPT Table:
-------------
boot_para: Offset 0x0000000000008000, Length 0x0000000000100000, Flags 0x00000000, UUID f57ad330-39c2-4488-b09b-00cb43c9ccd4, Type EFI_BASIC_DATA
para: Offset 0x0000000000108000, Length 0x0000000000080000, Flags 0x00000000, UUID fe686d97-3544-4a41-21be-167e25b61b6f, Type EFI_BASIC_DATA
expdb: Offset 0x0000000000188000, Length 0x0000000001400000, Flags 0x00000000, UUID 1cb143a8-b1a8-4b57-51b2-945c5119e8fe, Type EFI_BASIC_DATA
frp: Offset 0x0000000001588000, Length 0x0000000000100000, Flags 0x00000000, UUID 3b9e343b-cdc8-4d7f-a69f-b6812e50ab62, Type EFI_BASIC_DATA
nvcfg: Offset 0x0000000001688000, Length 0x0000000002000000, Flags 0x00000000, UUID 5f6a2c79-6617-4b85-02ac-c2975a14d2d7, Type EFI_BASIC_DATA
nvdata: Offset 0x0000000003688000, Length 0x0000000004000000, Flags 0x00000000, UUID 4ae2050b-5db5-4ff7-d3aa-5730534be63d, Type EFI_BASIC_DATA
md_udc: Offset 0x0000000007688000, Length 0x000000000169a000, Flags 0x00000000, UUID 1f9b0939-e16b-4bc9-bca5-dc2ee969d801, Type EFI_BASIC_DATA
metadata: Offset 0x0000000008d22000, Length 0x0000000002000000, Flags 0x00000000, UUID d722c721-0dee-4cb8-838a-2c63cd1393c7, Type EFI_BASIC_DATA
protect1: Offset 0x000000000ad22000, Length 0x0000000000800000, Flags 0x00000000, UUID e02179a8-ceb5-48a9-3188-4f1c9c5a8695, Type EFI_BASIC_DATA
protect2: Offset 0x000000000b522000, Length 0x0000000000ade000, Flags 0x00000000, UUID 84b09a81-fad2-41ac-0e89-407c24975e74, Type EFI_BASIC_DATA
seccfg: Offset 0x000000000c000000, Length 0x0000000000800000, Flags 0x00000000, UUID e8f0a5ef-8d1b-42ea-2a9c-835cd77de363, Type EFI_BASIC_DATA
sec1: Offset 0x000000000c800000, Length 0x0000000000200000, Flags 0x00000000, UUID d5f0e175-a6e1-4db7-c094-f82ad032950b, Type EFI_BASIC_DATA
proinfo: Offset 0x000000000ca00000, Length 0x0000000000300000, Flags 0x00000000, UUID 1d9056e1-e139-4fca-0b8c-b75fd74d81c6, Type EFI_BASIC_DATA
nvram: Offset 0x000000000cd00000, Length 0x0000000004000000, Flags 0x00000000, UUID 7792210b-b6a8-45d5-91ad-3361ed14c608, Type EFI_BASIC_DATA
logo: Offset 0x0000000010d00000, Length 0x0000000000b00000, Flags 0x00000000, UUID 138a6db9-1032-451d-e991-0fa38ff94fbb, Type EFI_BASIC_DATA
md1img_a: Offset 0x0000000011800000, Length 0x0000000006400000, Flags 0x00000000, UUID 756d934c-50e3-4c91-46af-02d824169ca7, Type EFI_BASIC_DATA
spmfw_a: Offset 0x0000000017c00000, Length 0x0000000000100000, Flags 0x00000000, UUID a3f3c267-5521-42dd-24a7-3bdec20c7c6f, Type EFI_BASIC_DATA
scp_a: Offset 0x0000000017d00000, Length 0x0000000000100000, Flags 0x00000000, UUID 8c68cd2a-ccc9-4c5d-578b-34ae9b2dd481, Type EFI_BASIC_DATA
sspm_a: Offset 0x0000000017e00000, Length 0x0000000000100000, Flags 0x00000000, UUID 6a5cebf8-54a7-4b89-1d8d-c5eb140b095b, Type EFI_BASIC_DATA
gz_a: Offset 0x0000000017f00000, Length 0x0000000001000000, Flags 0x00000000, UUID a0d65bf8-e8de-4107-3494-1d318c843d37, Type EFI_BASIC_DATA
lk_a: Offset 0x0000000018f00000, Length 0x0000000000100000, Flags 0x00000000, UUID 46f0c0bb-f227-4eb6-2fb8-66408e13e36d, Type EFI_BASIC_DATA
boot_a: Offset 0x0000000019000000, Length 0x0000000002000000, Flags 0x00000000, UUID fbc2c131-6392-4217-1eb5-548a6edb03d0, Type EFI_BASIC_DATA
vendor_boot_a: Offset 0x000000001b000000, Length 0x0000000004000000, Flags 0x00000000, UUID e195a981-e285-4734-2580-ec323e9589d9, Type EFI_BASIC_DATA
dtbo_a: Offset 0x000000001f000000, Length 0x0000000000800000, Flags 0x00000000, UUID e29052f8-5d3a-4e97-b5ad-5f312ce6610a, Type EFI_BASIC_DATA
tee_a: Offset 0x000000001f800000, Length 0x0000000000800000, Flags 0x00000000, UUID 9c3cabd7-a35d-4b45-578c-b80775426b35, Type EFI_BASIC_DATA
vbmeta_a: Offset 0x0000000020000000, Length 0x0000000000800000, Flags 0x00000000, UUID e7099731-95a6-45a6-e5a1-1b6aba032cf1, Type EFI_BASIC_DATA
vbmeta_system_a: Offset 0x0000000020800000, Length 0x0000000000800000, Flags 0x00000000, UUID 8273e1ab-846f-4468-99b9-ee2ea8e50a16, Type EFI_BASIC_DATA
vbmeta_vendor_a: Offset 0x0000000021000000, Length 0x0000000000800000, Flags 0x00000000, UUID d26472f1-9ebc-421d-14ba-311296457c90, Type EFI_BASIC_DATA
md1img_b: Offset 0x0000000021800000, Length 0x0000000006400000, Flags 0x00000000, UUID b72ccbe9-2055-46f4-67a1-4a069c201738, Type EFI_BASIC_DATA
spmfw_b: Offset 0x0000000027c00000, Length 0x0000000000100000, Flags 0x00000000, UUID 9c1520f3-c2c5-4b89-4282-fe4c61208a9e, Type EFI_BASIC_DATA
scp_b: Offset 0x0000000027d00000, Length 0x0000000000100000, Flags 0x00000000, UUID 902d5f3f-434a-4de7-8889-321e88c9b8aa, Type EFI_BASIC_DATA
sspm_b: Offset 0x0000000027e00000, Length 0x0000000000100000, Flags 0x00000000, UUID bece74c8-d8e2-4863-fe9b-5b0b66bb920f, Type EFI_BASIC_DATA
gz_b: Offset 0x0000000027f00000, Length 0x0000000001000000, Flags 0x00000000, UUID ff1342cf-b7be-44d5-5ea2-a435addd2702, Type EFI_BASIC_DATA
lk_b: Offset 0x0000000028f00000, Length 0x0000000000100000, Flags 0x00000000, UUID a4da8f1b-fe07-433b-cb95-84a5f23e477b, Type EFI_BASIC_DATA
boot_b: Offset 0x0000000029000000, Length 0x0000000002000000, Flags 0x00000000, UUID c2635e15-61aa-454e-409c-ebe1bdf19b9b, Type EFI_BASIC_DATA
vendor_boot_b: Offset 0x000000002b000000, Length 0x0000000004000000, Flags 0x00000000, UUID 4d2d1290-36a3-4f5d-b4af-319f8ab6dcd8, Type EFI_BASIC_DATA
dtbo_b: Offset 0x000000002f000000, Length 0x0000000000800000, Flags 0x00000000, UUID fdce12f0-a7eb-40f7-5083-960972e6cb57, Type EFI_BASIC_DATA
tee_b: Offset 0x000000002f800000, Length 0x0000000000800000, Flags 0x00000000, UUID 0fbbafa2-4aa9-4490-8389-5329328505fd, Type EFI_BASIC_DATA
super: Offset 0x0000000030000000, Length 0x0000000100000000, Flags 0x00000000, UUID a76e4b2f-31cb-40ba-6a82-c0cb0b73c856, Type EFI_BASIC_DATA
vbmeta_b: Offset 0x0000000130000000, Length 0x0000000000800000, Flags 0x00000000, UUID f54ac030-7004-4d02-8194-bbf982036807, Type EFI_BASIC_DATA
vbmeta_system_b: Offset 0x0000000130800000, Length 0x0000000000800000, Flags 0x00000000, UUID c4c310e2-4a7e-77d3-1848-61e2d8bb5e86, Type EFI_BASIC_DATA
vbmeta_vendor_b: Offset 0x0000000131000000, Length 0x0000000000800000, Flags 0x00000000, UUID 3734710f-0f13-1ab9-4c73-12a08ec50837, Type EFI_BASIC_DATA
userdata: Offset 0x0000000131800000, Length 0x0000000d5a4f8000, Flags 0x00000000, UUID 85a5b02f-3773-18b3-4910-718cde95107e, Type EFI_BASIC_DATA
otp: Offset 0x0000000e8bcf8000, Length 0x0000000002b00000, Flags 0x00000000, UUID 6fce83a6-5273-4748-4511-c205ebb4b8ad, Type EFI_BASIC_DATA
flashinfo: Offset 0x0000000e8e7f8000, Length 0x0000000001000000, Flags 0x00000000, UUID 3645e6a3-a7e3-19b2-4149-172c10190eef, Type EFI_BASIC_DATA
Total disk size:0x0000000e8f800000, sectors:0x000000000747c000
(13-03-2023, 05:03 PM)Abdulakeem14 Do you recall the build number of your device before rooting?
(14-03-2023, 07:46 AM)herclogon(13-03-2023, 05:03 PM)Abdulakeem14 Do you recall the build number of your device before rooting?
Of course... No. ;( But I believe the number is printed on the phone, no? Please see the attachment.
Could I obtain the build number somehow after flash erasing? Is there any tool to debug the phone? To trace the reason.
(14-03-2023, 09:17 AM)herclogon(14-03-2023, 07:46 AM)herclogon(13-03-2023, 05:03 PM)Abdulakeem14 Do you recall the build number of your device before rooting?
Of course... No. ;( But I believe the number is printed on the phone, no? Please see the attachment.
Could I obtain the build number somehow after flash erasing? Is there any tool to debug the phone? To trace the reason.
Additional image as URL, https://i.imgur.com/wU4tQe6.png
ERROR : STATUS_SEC_IMG_TYPE_MISMATCH (-1073610710) , MSP ERROE CODE : 0x00.
[HINT]:
Verified boot is enabled.
Please download signed image(md_udc-verified.img) or disable verified boot.
ERROR : STATUS_SEC_INSUFFICIENT_BUFFER (-1073610677) , MSP ERROE CODE : 0x00.
[HINT]:
Verified boot is enabled.
Please download signed image(logo-verified.img) or disable verified boot.
./mtk rl backup
./mtk wl backup
./mtk da seccfg unlock
dm-verity corruption
Your device is corrupt.
It can't be trusted and may not work properly. Press power button to continue. Or, device will power off in 5 s.
(20-03-2023, 08:18 AM)herclogon ....
Could you suggest something? Why partitions from one phone are not working for another one with the same model/build version? Could I unlock the phone somehow? I have tried several recipes from the internet but usually they are wrappers around `mtk da seccfg unlock`. I also tried `Mi Flash Unlock`, but it also can't unlock, starting then finishing with the error.
Please help.
Best regards,
Dmitry.
(25-11-2024, 06:17 PM)yass98 I'm in the same situation, however, I still have the IMEI of my F21 Pro,
Is there any downloable files to use to unbrick the phone ? I guess I need the .bin files to be flashed through MTK Client.
Thank you