• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Groups
  • Search
  • Register
  • Login
UBports Robot Logo UBports Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Groups
  • Search
  • Register
  • Login

Rephone (Gigaset GS5/Volla22) won't boot anymore

Scheduled Pinned Locked Moved Volla Phone 22
7 Posts 4 Posters 1.4k Views 1 Watching
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F Offline
      flinke-vent
      last edited by 28 Sept 2023, 10:12

      Hi,
      I have a rephone and tried to install vollaos by ubports-installer. Ubports-installer "said" Installation went well, but now the smartphone does not boot anymore. No recovery mode and no fastboot mode. tried everything, no chance. sp-flash tool detects chip MT6768, but I need firmware for rephone or for Gigaset GS5 . I can’t find it on the web. Firmware for Volla 22 does not contain the urgently needed scatter.txt. need help:anguished_face: :anxious_face_with_sweat: :astonished_face:

      L L 2 Replies Last reply 7 Oct 2023, 13:50 Reply Quote 0
      • L Offline
        lispy @flinke-vent
        last edited by 7 Oct 2023, 13:50

        @flinke-vent I am having the exact same issue. I used ubport-installer 0.10.0 on a Rephone and all I get is a white charging LED. No vibrations on longpresses, no fastboot, no nothing. Where did I mess up? I tried it with Volla22 wich should work on Rephone accoring to this: https://forum.sailfishos.org/t/volla-installation-guide/16658

        L 1 Reply Last reply 7 Oct 2023, 15:50 Reply Quote 0
        • L Offline
          lispy @lispy
          last edited by 7 Oct 2023, 15:50

          Some output from mtkclient

          Port - Device detected :)
          Preloader - 	CPU:			MT6768/MT6769(Helio P65/G85 k68v1)
          Preloader - 	HW version:		0x0
          Preloader - 	WDT:			0x10007000
          Preloader - 	Uart:			0x11002000
          Preloader - 	Brom payload addr:	0x100a00
          Preloader - 	DA payload addr:	0x201000
          Preloader - 	CQ_DMA addr:		0x10212000
          Preloader - 	Var1:			0x25
          Preloader - Disabling Watchdog...
          Preloader - HW code:			0x707
          Preloader - Target config:		0xe0
          Preloader - 	SBC enabled:		False
          Preloader - 	SLA enabled:		False
          Preloader - 	DAA enabled:		False
          Preloader - 	SWJTAG enabled:		False
          Preloader - 	EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:	False
          Preloader - 	Root cert required:	False
          Preloader - 	Mem read auth:		True
          Preloader - 	Mem write auth:		True
          Preloader - 	Cmd 0xC8 blocked:	True
          Preloader - Get Target info
          Preloader - BROM mode detected.
          Preloader - 	HW subcode:		0x8a00
          Preloader - 	HW Ver:			0xca00
          Preloader - 	SW Ver:			0x0
          Preloader - ME_ID:			1B48AD47B284C534F53316D6C5F3AC62
          Preloader - SOC_ID:			C3002168C34FCB653FC9F08789B4714DA6D5BD43713DD0A6E25D5E5CC28D126D
          DA_handler - Device is unprotected.
          DA_handler - Device is in BROM-Mode. Bypassing security.
          PLTools - Loading payload from mt6768_payload.bin, 0x264 bytes
          PLTools - Kamakiri / DA Run
          Kamakiri - Trying kamakiri2..
          Kamakiri - Done sending payload...
          PLTools - Successfully sent payload: /usr/lib/python3.11/site-packages/mtkclient/payloads/mt6768_payload.bin
          Port - Device detected :)
          DA_handler
          DA_handler - [LIB]: Device is in BROM mode. No preloader given, trying to dump preloader from ram.
          Successfully extracted preloader for this device to: preloader_k69v1_64_k419.bin
          DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2228.bin
          xflashext - Patching da1 ...
          Mtk - Patched "Patched loader msg" in preloader
          Mtk - Patched "hash_check" in preloader
          xflashext
          xflashext - [LIB]: Error on patching da1 version check...
          Mtk - Patched "Patched loader msg" in preloader
          Mtk - Patched "get_vfy_policy" in preloader
          xflashext - Patching da2 ...
          DAXFlash - Successfully uploaded stage 1, jumping ..
          Preloader - Jumping to 0x200000
          Preloader - Jumping to 0x200000: ok.
          DAXFlash - Successfully received DA sync
          DAXFlash - Sending emi data ...
          DAXFlash - DRAM setup passed.
          DAXFlash - Sending emi data succeeded.
          DAXFlash - Uploading stage 2...
          DAXFlash - Upload data was accepted. Jumping to stage 2...
          DAXFlash - Successfully uploaded stage 2
          DAXFlash - EMMC FWVer:      0x0
          DAXFlash - EMMC ID:         3V6CAB
          DAXFlash - EMMC CID:        15010033563643414202e81a6ab69871
          DAXFlash - EMMC Boot1 Size: 0x400000
          DAXFlash - EMMC Boot2 Size: 0x400000
          DAXFlash - EMMC GP1 Size:   0x0
          DAXFlash - EMMC GP2 Size:   0x0
          DAXFlash - EMMC GP3 Size:   0x0
          DAXFlash - EMMC GP4 Size:   0x0
          DAXFlash - EMMC RPMB Size:  0x1000000
          DAXFlash - EMMC USER Size:  0x1d1ec00000
          DAXFlash - HW-CODE         : 0x707
          DAXFlash - HWSUB-CODE      : 0x8A00
          DAXFlash - HW-VERSION      : 0xCA00
          DAXFlash - SW-VERSION      : 0x0
          DAXFlash - CHIP-EVOLUTION  : 0x1
          DAXFlash - DA-VERSION      : 1.0
          DAXFlash - Extensions were accepted. Jumping to extensions...
          DAXFlash - DA Extensions successfully added
          
          GPT Table:
          -------------
          proinfo:             Offset 0x0000000000008000, Length 0x0000000000300000, Flags 0x00000000, UUID f57ad330-39c2-4488-b09b-00cb43c9ccd4, Type EFI_BASIC_DATA
          misc:                Offset 0x0000000000308000, Length 0x0000000000080000, Flags 0x00000000, UUID fe686d97-3544-4a41-21be-167e25b61b6f, Type EFI_BASIC_DATA
          para:                Offset 0x0000000000388000, Length 0x0000000000080000, Flags 0x00000000, UUID 1cb143a8-b1a8-4b57-51b2-945c5119e8fe, Type EFI_BASIC_DATA
          expdb:               Offset 0x0000000000408000, Length 0x0000000001400000, Flags 0x00000000, UUID 3b9e343b-cdc8-4d7f-a69f-b6812e50ab62, Type EFI_BASIC_DATA
          frp:                 Offset 0x0000000001808000, Length 0x0000000000100000, Flags 0x00000000, UUID 5f6a2c79-6617-4b85-02ac-c2975a14d2d7, Type EFI_BASIC_DATA
          vbmeta_a:            Offset 0x0000000001908000, Length 0x0000000000800000, Flags 0x00000000, UUID 4ae2050b-5db5-4ff7-d3aa-5730534be63d, Type EFI_BASIC_DATA
          vbmeta_system_a:     Offset 0x0000000002108000, Length 0x0000000000800000, Flags 0x00000000, UUID 1f9b0939-e16b-4bc9-bca5-dc2ee969d801, Type EFI_BASIC_DATA
          vbmeta_vendor_a:     Offset 0x0000000002908000, Length 0x0000000000800000, Flags 0x00000000, UUID d722c721-0dee-4cb8-838a-2c63cd1393c7, Type EFI_BASIC_DATA
          vbmeta_b:            Offset 0x0000000003108000, Length 0x0000000000800000, Flags 0x00000000, UUID e02179a8-ceb5-48a9-3188-4f1c9c5a8695, Type EFI_BASIC_DATA
          vbmeta_system_b:     Offset 0x0000000003908000, Length 0x0000000000800000, Flags 0x00000000, UUID 84b09a81-fad2-41ac-0e89-407c24975e74, Type EFI_BASIC_DATA
          vbmeta_vendor_b:     Offset 0x0000000004108000, Length 0x0000000000800000, Flags 0x00000000, UUID e8f0a5ef-8d1b-42ea-2a9c-835cd77de363, Type EFI_BASIC_DATA
          md_udc:              Offset 0x0000000004908000, Length 0x000000000169a000, Flags 0x00000000, UUID d5f0e175-a6e1-4db7-c094-f82ad032950b, Type EFI_BASIC_DATA
          metadata:            Offset 0x0000000005fa2000, Length 0x0000000002000000, Flags 0x00000000, UUID 1d9056e1-e139-4fca-0b8c-b75fd74d81c6, Type EFI_BASIC_DATA
          nvcfg:               Offset 0x0000000007fa2000, Length 0x0000000002000000, Flags 0x00000000, UUID 7792210b-b6a8-45d5-91ad-3361ed14c608, Type EFI_BASIC_DATA
          nvdata:              Offset 0x0000000009fa2000, Length 0x0000000004000000, Flags 0x00000000, UUID 138a6db9-1032-451d-e991-0fa38ff94fbb, Type EFI_BASIC_DATA
          persist:             Offset 0x000000000dfa2000, Length 0x0000000003000000, Flags 0x00000000, UUID 756d934c-50e3-4c91-46af-02d824169ca7, Type EFI_BASIC_DATA
          protect1:            Offset 0x0000000010fa2000, Length 0x0000000000800000, Flags 0x00000000, UUID a3f3c267-5521-42dd-24a7-3bdec20c7c6f, Type EFI_BASIC_DATA
          protect2:            Offset 0x00000000117a2000, Length 0x000000000085e000, Flags 0x00000000, UUID 8c68cd2a-ccc9-4c5d-578b-34ae9b2dd481, Type EFI_BASIC_DATA
          seccfg:              Offset 0x0000000012000000, Length 0x0000000000800000, Flags 0x00000000, UUID 6a5cebf8-54a7-4b89-1d8d-c5eb140b095b, Type EFI_BASIC_DATA
          md1img_a:            Offset 0x0000000012800000, Length 0x0000000008000000, Flags 0x00000000, UUID a0d65bf8-e8de-4107-3494-1d318c843d37, Type EFI_BASIC_DATA
          spmfw_a:             Offset 0x000000001a800000, Length 0x0000000000100000, Flags 0x00000000, UUID 46f0c0bb-f227-4eb6-2fb8-66408e13e36d, Type EFI_BASIC_DATA
          scp_a:               Offset 0x000000001a900000, Length 0x0000000000600000, Flags 0x00000000, UUID fbc2c131-6392-4217-1eb5-548a6edb03d0, Type EFI_BASIC_DATA
          sspm_a:              Offset 0x000000001af00000, Length 0x0000000000100000, Flags 0x00000000, UUID e195a981-e285-4734-2580-ec323e9589d9, Type EFI_BASIC_DATA
          gz_a:                Offset 0x000000001b000000, Length 0x0000000001000000, Flags 0x00000000, UUID e29052f8-5d3a-4e97-b5ad-5f312ce6610a, Type EFI_BASIC_DATA
          lk_a:                Offset 0x000000001c000000, Length 0x0000000000200000, Flags 0x00000000, UUID 9c3cabd7-a35d-4b45-578c-b80775426b35, Type EFI_BASIC_DATA
          boot_a:              Offset 0x000000001c200000, Length 0x0000000002000000, Flags 0x00000000, UUID e7099731-95a6-45a6-e5a1-1b6aba032cf1, Type EFI_BASIC_DATA
          vendor_boot_a:       Offset 0x000000001e200000, Length 0x0000000004000000, Flags 0x00000000, UUID 8273e1ab-846f-4468-99b9-ee2ea8e50a16, Type EFI_BASIC_DATA
          dtbo_a:              Offset 0x0000000022200000, Length 0x0000000000800000, Flags 0x00000000, UUID d26472f1-9ebc-421d-14ba-311296457c90, Type EFI_BASIC_DATA
          tee_a:               Offset 0x0000000022a00000, Length 0x0000000000600000, Flags 0x00000000, UUID b72ccbe9-2055-46f4-67a1-4a069c201738, Type EFI_BASIC_DATA
          sec1:                Offset 0x0000000023000000, Length 0x0000000000200000, Flags 0x00000000, UUID 9c1520f3-c2c5-4b89-4282-fe4c61208a9e, Type EFI_BASIC_DATA
          boot_para:           Offset 0x0000000023200000, Length 0x0000000001a00000, Flags 0x00000000, UUID 902d5f3f-434a-4de7-8889-321e88c9b8aa, Type EFI_BASIC_DATA
          nvram:               Offset 0x0000000024c00000, Length 0x0000000004000000, Flags 0x00000000, UUID bece74c8-d8e2-4863-fe9b-5b0b66bb920f, Type EFI_BASIC_DATA
          logo:                Offset 0x0000000028c00000, Length 0x0000000000c00000, Flags 0x00000000, UUID ff1342cf-b7be-44d5-5ea2-a435addd2702, Type EFI_BASIC_DATA
          md1img_b:            Offset 0x0000000029800000, Length 0x0000000008000000, Flags 0x00000000, UUID a4da8f1b-fe07-433b-cb95-84a5f23e477b, Type EFI_BASIC_DATA
          spmfw_b:             Offset 0x0000000031800000, Length 0x0000000000100000, Flags 0x00000000, UUID c2635e15-61aa-454e-409c-ebe1bdf19b9b, Type EFI_BASIC_DATA
          scp_b:               Offset 0x0000000031900000, Length 0x0000000000600000, Flags 0x00000000, UUID 4d2d1290-36a3-4f5d-b4af-319f8ab6dcd8, Type EFI_BASIC_DATA
          sspm_b:              Offset 0x0000000031f00000, Length 0x0000000000100000, Flags 0x00000000, UUID fdce12f0-a7eb-40f7-5083-960972e6cb57, Type EFI_BASIC_DATA
          gz_b:                Offset 0x0000000032000000, Length 0x0000000001000000, Flags 0x00000000, UUID 0fbbafa2-4aa9-4490-8389-5329328505fd, Type EFI_BASIC_DATA
          lk_b:                Offset 0x0000000033000000, Length 0x0000000000200000, Flags 0x00000000, UUID a76e4b2f-31cb-40ba-6a82-c0cb0b73c856, Type EFI_BASIC_DATA
          boot_b:              Offset 0x0000000033200000, Length 0x0000000002000000, Flags 0x00000000, UUID f54ac030-7004-4d02-8194-bbf982036807, Type EFI_BASIC_DATA
          vendor_boot_b:       Offset 0x0000000035200000, Length 0x0000000004000000, Flags 0x00000000, UUID c4c310e2-4a7e-77d3-1848-61e2d8bb5e86, Type EFI_BASIC_DATA
          dtbo_b:              Offset 0x0000000039200000, Length 0x0000000000800000, Flags 0x00000000, UUID 3734710f-0f13-1ab9-4c73-12a08ec50837, Type EFI_BASIC_DATA
          tee_b:               Offset 0x0000000039a00000, Length 0x0000000000600000, Flags 0x00000000, UUID 85a5b02f-3773-18b3-4910-718cde95107e, Type EFI_BASIC_DATA
          super:               Offset 0x000000003a000000, Length 0x0000000200000000, Flags 0x00000000, UUID 6fce83a6-5273-4748-4511-c205ebb4b8ad, Type EFI_BASIC_DATA
          userdata:            Offset 0x000000023a000000, Length 0x0000001ae10f8000, Flags 0x00000000, UUID 3645e6a3-a7e3-19b2-4149-172c10190eef, Type EFI_BASIC_DATA
          otp:                 Offset 0x0000001d1b0f8000, Length 0x0000000002b00000, Flags 0x00000000, UUID f60b92b4-0e2f-91b6-4afb-2d0b643bab4b, Type EFI_BASIC_DATA
          flashinfo:           Offset 0x0000001d1dbf8000, Length 0x0000000001000000, Flags 0x00000000, UUID d05cedfe-20b7-68b3-f259-4fe25317f2fc, Type EFI_BASIC_DATA
          
          Total disk size:0x0000001d1ec00000, sectors:0x000000000e8f6000
          
          1 Reply Last reply Reply Quote 0
          • K Offline
            Keneda
            last edited by Keneda 10 Jul 2023, 17:36 7 Oct 2023, 17:17

            What you need are the files you can use with MTK flashing tool, which are different from files needed with UBP installer (not only scatter file is important here).

            Sadly, that's not Hallowelt that will give it to you, they only give those files to Volla devices purchasers that need to restore bricked devices.

            Your only hope is someone that purchased V22 phone and that had a bricking issue and got those files, willing to give those to you.

            Volla devices have different partitioning than their Gigaset twins, which lead to the issue you have when trying to install UT on it with UBP installer.

            Maybe ask for help on sailfish forum in meantime, installing UT for Volla on GS5 or alike is not supported for some reasons here.

            @lispy
            I see you asked for help on it.
            And from what I understand you tried to install UT directly on your device, when on the sailfish forum, they tell to install Volla OS first.
            But even, what works for installing Sailfish, may not for installing UT.

            2015-2023 : Meizu MX4 ☠️⚰️✝️
            2023-2024 : Nexus 5 ☠️⚰️✝️
            2024-***** : FPOS Fairphone 5 waiting UT for freedom 😉
            🇲🇫🇬🇧

            L 1 Reply Last reply 7 Oct 2023, 18:55 Reply Quote 1
            • L Offline
              lispy @Keneda
              last edited by lispy 10 Jul 2023, 18:56 7 Oct 2023, 18:55

              @Keneda Wow, thanks for the great answer. This is really messy. I am pretty shocked how bad everything gets once you leave the area of Opensource. 😉

              Nevertheless, I will try to contact these guys, they reflash Volla Firmware on Volla.
              They should have what is needed to restore a rephone with Volla OS, although it's not listed on their services page. But maybe, just maybe I can convince them.
              https://phone-service.de/r/volla/#

              Source: https://github.com/ubports/ubports-installer/issues/3450

              1 Reply Last reply Reply Quote 0
              • L Offline
                Luzeruz @flinke-vent
                last edited by 15 Jul 2024, 14:23

                @flinke-vent , is this an original Volla Phone or a Gigaset Device, cause its not allowed to flash non original Volla Devices with VollaOS (EULA) ?

                K 1 Reply Last reply 15 Jul 2024, 14:59 Reply Quote 0
                • K Offline
                  Keneda @Luzeruz
                  last edited by Keneda 15 Jul 2024, 14:59

                  @Luzeruz said in Rephone (Gigaset GS5/Volla22) won't boot anymore:

                  cause its not allowed to flash non original Volla Devices

                  Here is open source world, where user liberty is MANDATORY.
                  If some entity wants to restrain user liberty, then user should dump it to the void.

                  What a user that flash a GS5 with UT or VollaOS should not hope is support from Volla, but Volla has no interest in forbid anything to anyone.

                  Ubports installer allow to flash any device with any software, and it is like that on purpose.

                  Some people that want récent hardware with UT on it don't have the money to afford a 450€ V22.

                  Any Volla 22 is a Gigaset GS5 with specific skin, specific codename, and specific partitioning.

                  I bought GS5 Lite phones (running Android) for almost all my family, those are GS5 less glossy and more cheap (170€), and are very good devices for very good price, made in Germany.

                  2015-2023 : Meizu MX4 ☠️⚰️✝️
                  2023-2024 : Nexus 5 ☠️⚰️✝️
                  2024-***** : FPOS Fairphone 5 waiting UT for freedom 😉
                  🇲🇫🇬🇧

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post