Unconfigured Ad Widget

Collapse

Announcement

Collapse
No announcement yet.

Unlock bootloader of a P10 VTR-L09 via HCU

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Unlock bootloader of a P10 VTR-L09 via HCU

    Hi,
    I want to unlock the bootloader of a P10 VTR-L09 via HCU like in https://hcu-client.com/huawei-bootlo...via-testpoint/. HCU tells me to go into TP mode. So I try to enable the TP mode like in https://www.dc-unlocker.com/dcphoeni...le-software-tp via the ADB mode. I also installed the drivers, the device com port appears like in the screenshot. DC Phoenix is stuck and not responding anymore at "Looking for devices by ports". What could I do now? Have I installed the wrong drivers maybe?
    You do not have permission to view this gallery.
    This gallery has 1 photos.

  • #2
    Yes, seems so. Uninstall current drivers and install/reinstall Hisuite only. Just make sure it is not running on the computer or left minimized while trying to enable testpoint.
    >>Free Octohide VPN for Android, find it on Google Play Here<<

    Comment


    • #3
      That worked fine, thank you!
      Now I successfully unlocked the bootloader.
      Afterwards, I immediatly flashed the phone with OpenKirin, I forgot to get the phone out of the test point mode.
      When using DC Chain to do so now I get this log (information like IMEI redacted):

      DC Phoenix 0.0.0.164
      user: philiplb

      Device detected:
      COM7: HUAWEI USB COM 1.0 (COM7)
      BOOTLOADER selected to update:Kirin960_T2_A7.0_V4
      17.01.2022 22:04:06 Starting to write device...

      Process identifier:39377161

      Validating file...

      Writing bootloader...
      Step 1...
      Step 2...
      Step 3...

      Waiting for device REMOVAL/INSERTION...

      Waiting for fastboot device...

      USB Device REMOVAL
      Type: @oem114.inf,%qcomdevice00%;HUAWEI USB COM 1.0
      VidPid: VID_12D1&PID_3609
      Instance id: ...

      USB Device INSERTION
      Type: @oem111.inf,%hwfastboot%;Android Sooner Single ADB Interface
      VidPid: VID_18D1&PID_D00D
      Instance id: ....
      Device found: 6PQ7N1732300....


      Looking for a device in fastboot mode
      Device found: 6PQ7N1732300....


      Getting IMEI...
      Getting build number...
      Getting model ...
      Getting battery state...
      Getting backdoor info...
      Getting lock state info...
      Getting lock boot info...

      SN:...
      IMEI:...

      IMEI1:...

      MEID:...
      Build number: :VTR-L09 9.1.0.297(C02E12R1P9)
      Model: VTR-L09
      Vendor/Country: vodafone/de
      Battery state: 0
      OEM lock state info:
      FB LockState: UNLOCKED
      USER LockState: UNLOCKED
      OEM get bootinfo:
      unlocked

      Software written
      17.01.2022 22:04:47 Writing device finished OK

      17.01.2022 22:04:47 Starting to write device in FASTBOOT mode...

      Looking for a device in fastboot mode
      Device found: ...


      Getting IMEI...
      Getting build number...
      Getting model ...
      Getting battery state...
      Getting backdoor info...
      Getting lock state info...
      Getting lock boot info...

      SN:...
      IMEI:...

      IMEI1:...

      MEID:...
      Build number: :VTR-L09 9.1.0.297(C02E12R1P9)
      Model: VTR-L09
      Vendor/Country: vodafone/de
      Battery state: 0
      OEM lock state info:
      FB LockState: UNLOCKED
      USER LockState: UNLOCKED
      OEM get bootinfo:
      unlocked


      Process identifier:39377171

      Validating file...
      Getting lock state info...
      Getting ptable_lu3 parttion info...

      Getting xloader parttion info...
      XLOADER first block hash check FAIL
      XLOADER second block hash check FAIL
      XLOADER fastboot length check success
      XLOADER third block hash check FAIL
      Erasing MISC partition
      Partition MISC erased

      Erasing all ver .. .

      USB Device REMOVAL
      Type: @oem111.inf,%hwfastboot%;Android Sooner Single ADB Interface
      VidPid: VID_18D1&PID_D00D
      Instance id: ...

      USB Device INSERTION
      Type: @oem114.inf,%qcomdevice00%;HUAWEI USB COM 1.0
      VidPid: VID_12D1&PID_3609
      Instance id: ...
      Software written
      17.01.2022 22:05:13 Writing device finished OK
      The screen stays black and the device appears again in the port list as HUAWEI USB COM 1.0 (COM7). I also can't reboot it by pressing 20s the power button and volume down. Fastboot via holding volume down and connecting it does nothing, too. HCU still works. "fastboot reboot" is just waiting for a device.
      What would be my options now?

      Comment


      • #4
        Have you tried using "disable software testpoint" option on DC-phoenix?
        >>Free Octohide VPN for Android, find it on Google Play Here<<

        Comment


        • #5
          Hi,
          thanks! Yes, that's what I meant and that's where the log is coming from. I tried it like in https://www.dc-unlocker.com/dcphoeni...ware-testpoint

          Comment


          • #6
            It seems whatever you've flashed after unlocking the bootloader has modified the internal structure of the device, therefore you could only try to restore it by flashing board software and start from scratch and modify your phone in correct order - only after disabling software testpoint sadly.
            >>Free Octohide VPN for Android, find it on Google Play Here<<

            Comment


            • #7
              Okay, thx.
              What do you exactly mean with "board software"?
              And how do I get out of the Test Point mode? See the logs above.

              Comment


              • #8
                Board software means firmware/phone restore file that has "board software" words in its file name. Your only hope to exit testpoint now is by flashing it and repairing phone since you modified it at incorrect time and broke it.
                >>Free Octohide VPN for Android, find it on Google Play Here<<

                Comment


                • #9
                  Alright, I see. Where do I get that file from?
                  And thank you for your support!

                  Comment


                  • #10
                    You may find it on our support area https://www.dc-unlocker.com/firmware-catalog accessed from dc-phoenix as well as on the internet like xda forum maybe, original files work on DC-phoenix too.
                    >>Free Octohide VPN for Android, find it on Google Play Here<<

                    Comment


                    • #11
                      Hi,
                      thx. I might have found it, a set of .img-files and a xml. But how do I flash it now? Sry, this is all new to me.

                      Comment


                      • #12
                        If you found the original board software, you may flash it by selecting XML file on DC-phoenix in the firmware selection box.
                        >>Free Octohide VPN for Android, find it on Google Play Here<<

                        Comment

                        Working...
                        X