Closed macio525 closed 8 years ago
WARNING
Hello, fellow QPST users.
QPST 2.7 Build 4.2.2 is a fake version with keylogger. Some a$$hole downloaded latest public QPST build (4.0.2) and decompiled MSI installer package, then edited all "4.0.2" to "4.2.2", added "fake changelog", added keylogger (qualcomm.exe), then repackaged and spread around web!
http://forum.xda-developers.com/showpost.php?p=49729779&postcount=7
which country are you in? in which country was the phone bought?
Poland
im downloading one of the firmwares to see what is inside. i will be another 30 minutes
are you able to enter QDLOAD? it seems to be necessary for QPST.
with the phone completely off: Connect your phone to PC through a USB cable pressing VOL- --- If VOL- doesn't work try several combinations, like VOL+/USB cable or VOL-/VOL+/USB ---
apparently if the battery gets fully discharged in this state, then it is even more complicated to continue.
your phone has a MSM8916 chip, i think.
why do you think you need this file? prog_emmc_firehose_8909.mbn
the zip only has these firmware files: -rw-r--r-- 1 rod rod 441900 Aug 23 2013 emmc_appsboot.mbn -rw-r--r-- 1 rod rod 1048576 Aug 23 2013 misc.bin -rw-r--r-- 1 rod rod 49759744 Aug 23 2013 NON-HLOS.bin -rw-r--r-- 1 rod rod 159596 Aug 23 2013 rpm.mbn -rw-r--r-- 1 rod rod 246996 Aug 23 2013 sbl1.mbn -rw-r--r-- 1 rod rod 523304 Aug 23 2013 tz.mbn
nothing related to the GPT i think. it seems you will have to copy the GPT (the start and end of the eMMC) from another identical phone (i don't know if you will be able to read an write using qualcomm tools, no idea) or else take it to a repair shop to have it reflashed. i'm very sorry.
Qualcomm Snapdragon 210 MSM8909
but i still see boot logo(splash partition)
test point ideas?
no idea. i dont know why you want a test point for. i'm not familiar with qualcomm chips. do you want to put the device in bulk mode?
the ones near the batt connector seem to be the micro USB port.
SDA/SCL etc are probably an i2c bus of some sort, to whatever was connected there. (touch sensor?)
then there is that nice BOOT pin....
are you supposed to ground it? i'm afraid you might break your hardware if you continue. whatever you do, use a resistor to connect the pins to ground (or whatever). something above 10K should probably be safe.
if you are able to switch to bulk mode, DONT WRITE ANYTHING! you need data taken from a working devices that is exactly the same model.
boot could be a boot selection pin. the easiest test you can do is ground it and with the pin grounded and the device off, connect the device to the PC and see if there are any changes in how it recognizes it.
otherwise you can connect it to a power source pad, but you can destroy the soc if u connect it to the wrong voltage.
ALWAYS USE A RESISTOR IN SERIES to protect the soc. connect the soc pin to power or ground through the resistor: one side of the resistor to boot, the other to ground or Vdd. a good value for the resistor is 10K ohm.
take ESD precautions: touch the phone's ground before touching any other trace. avoid carpets and dry air (turn off the A/C).
you can also try the other pin if you want afterwards.
the SDA/SCL dont look like JTAG, they could be breakout pins of the nearby connector just like in the case of the USB. or maybe they are dual mode, who knows, its anybodys guess.
i try connect it to ground with battery and still recognize it as HS_USB 900E without battey nothing happens
When i connect ground + DM it disconnects other devices for a 0.5 sec from PC. Without connected other devices to PC nothing happens.
don't continue. i think you just shortcircuited a usb line. i suppoese you can only do that if you are NOT using a resistor as i said before that you ahould. you can very really destroy the hardware that way. you need to take the device to service for a reflash.
suspicious strings found in bootloader:
$ strings emmc_appsboot.mbn | grep -i gpt | grep -i sign
GPT: Primary and backup signatures invalid
GPT: Primary signature invalid cannot write GPT
GPT: Backup signature invalid cannot write GPT
device assumed to use GPT signature checking.
Huawei Y560-L01 TWRP 3.0.2-0 unofficial TWRP
Kernel: 3.10.49-g5997823-00001-gcef6b5d release221@yep #1
CM 13: CM 13
Stocks partitions.
Dump: DUMP