Unbricking "Service Required Code Corrupt"

fedde7

Member
May 29, 2013
13
4
0
Hello people how they are doing, i was working in my studio in repair a phone with this problem, what I'm au have not tried it, will be tomorrow when I get back to the workshop.
I think the mistake from us is that the file "ifwi" and "dnx" are android 4.0.4 and equipment already in jelly bean, well we should just take a 4.1.2 firmware and copy the new "ifwi" and "dnx ", but here's the problem the 4.1.2 firmware do not bring these files.
Well, checking the first jelly bean OTA file that was released for our phone (vodafone OTA europe) I found that this brings two zip with new "ifwi" and "dnx" and then looking at the script I noticed with this update:



Therefore modify the launcher. Bat (in the order of the OTA) and I am in the following way:



The zip "unbrick" plus the add new Intel Drivers developers. In this way we would have:
1. - Install IntelAndroidDrvSetup1.1.5.exe
2. - Install xFSTK-SoC-Driver-Setup-1.0.3.exe
3. - Run the. Bat


http://d-h.st/70y

Good luck people ..!
thanks for your work men, but the brick still bricked u.u
 

max_choco

Senior Member
thanks for your work men, but the brick still bricked u.u
Look, I've been trying to remove the warning sign unloking bootloader was following a guide for the XT912 and flash the image that should replace the ulogo I stay in "service code corrupt" but I start, I mean I'm of ulogo only the poster, this makes me think that this poster "service code corrupt" is when a wrong boot partition, eg "ifwi" and "dnx".
Well, we're stuck in the problem, and I think (are simple thoughts in search of solution) that is damaged aprticion "ifwi" or "dnx". I think the partition is damaged "gpt_signed" or maybe "bos_signed". Could be the "PDS" damaging the phone? (this happened in the Atrix and is a headache). regards
 

leandeganis

Senior Member
Feb 4, 2012
300
169
0
Buenos AIres
Maybe someone execute the script i will atach and send me the log that gives in console (mark all, ctrl + C,on pastebin ctrl + V) This should help me to know how fail
Code:
XFSTK Downloader Solo 1.1.0a
Copyright (c) 2011 Intel Corporation
.Intel SoC Device Detection Found
Parsing Commandline....
Registering Status Callback....
.Initiating Download Process....
..XFSTK-LOG--virtual bool MedfieldDownloader::SetDevice(IGenericDevice*)
XFSTK-LOG--virtual bool MedfieldDownloader::UpdateTarget()
XFSTK-LOG--void MedfieldDownloader::Init()
XFSTK-LOG--virtual bool MedfieldUSB20Device::eek:pen()
XFSTK-LOG--USB Device found - Externally Specified for MT
XFSTK-LOG--Bulk OUT endpoint in  : 0x01
XFSTK-LOG--Bulk IN endpoint in  : 0x81
XFSTK-LOG--void MedfieldDownloader::do_update(MedfieldOptions*)
XFSTK-LOG--void MedfieldDownloader::do_update(char*, char*, char*, char*, char*, uint32)
XFSTK-LOG--void MedfieldDownloader::do_update(char*, char*, char*, char*, char*, uint32)(dnx, ifwi, BLANK.bin, BLANK.bin, dnx, 0x80000000)  b_continue_to_OS=0
XFSTK-LOG--uint32 MedfieldDownloader::get_Opp_Code()
XFSTK-LOG--Sending DnER...
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) DnER
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->DnER
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - DxxM(4)
XFSTK-LOG--void MedfieldDownloader::_log_ack(long long unsigned int)
XFSTK-LOG--void MedfieldDownloader::_check_file(char*)
XFSTK-LOG--void MedfieldDownloader::_check_file(char*)
XFSTK-LOG--dnx size:66528 bytes
XFSTK-LOG--int MedfieldDownloader::firmware_upgrade_routine(char*, char*, uint32)
XFSTK-LOG--dnx size:66528 bytes
XFSTK-LOG--ifwi size:1937660 bytes
XFSTK-STATUS--FW: Firmware download begining...
XFSTK-LOG--allocating buffers for FW images...
XFSTK-LOG--allocating buffers for primary/secondary security FW images...
20690197494632664
XFSTK-LOG--loading buffers for FW images...
XFSTK-LOG--loading buffers for primary/secondary security FW images...
XFSTK-LOG--loading buffers for FUPH...
XFSTK-LOG--sending 6 DWORDS of DnxFW size and checksum...
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) Ó♥☺
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->Ó♥☺
XFSTK-PROGRESS--0
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - DXBL(4)
XFSTK-STATUS--FW: Sending DnX ...
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--8
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - RTBD(4)
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) DBDS
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->DBDS
XFSTK-LOG--int MedfieldDownloader::read_in_pipe(unsigned char*, uint32)
XFSTK-LOG--Read - HLT0(4)
XFSTK-PROGRESS--8
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - RUPHS(8)
XFSTK-STATUS--FW: Sending FW Update Profile Hdr Size...
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) $
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->$
XFSTK-PROGRESS--16
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - RUPH(4)
XFSTK-STATUS--FW: Sending FW Update Profile Hdr...
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--25
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - DMI¤+j─Ãb*  ªEcÀ(4)
XFSTK-STATUS--FW: Sending MIP...
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--33
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - LOFW(4)
XFSTK-STATUS--FW: Sending first 128k...
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--41
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - HIFW(4)
XFSTK-STATUS--FW: Sending second 128k...
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--50
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - PSFW100(8)
XFSTK-STATUS--FW: Sending Primary Security FW 1 Chunk 2
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--58
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - PSFW101(8)
XFSTK-STATUS--FW: Sending Primary Security FW 1 Chunk 1
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--66
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - PSFW102(8)
XFSTK-STATUS--FW: Sending Primary Security FW 1 Chunk 0
XFSTK-LOG--Allocation done

XFSTK-LOG--Writing the Bytes

XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--75
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - SSFW00(8)
XFSTK-STATUS--FW: Sending secondary security fw  Chunk 0
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--83
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - PSFW200(8)
XFSTK-STATUS--FW: Sending Primary Security FW 2 Chunk 0
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--91
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - VEDFW00(8)
XFSTK-LOG--sending VED FW Chunk 0
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--91
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - SuCP═════════════(4)
XFSTK-STATUS--FW: Sending ROM Patch Chunk 0
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--100
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - DMIP
&Ç?(4)
XFSTK-STATUS--FW: Sending MIP...
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--108
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - LOFW♦←H☺D"³Ç♦◄♦☻╔(4)
XFSTK-STATUS--FW: Sending first 128k...
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--116
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - HIFWT[óº☻5RÛòÌoõ´(4)
XFSTK-STATUS--FW: Sending second 128k...
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--125
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - PSFW100(8)
XFSTK-STATUS--FW: Sending Primary Security FW 1 Chunk 2
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--133
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - PSFW101(8)
XFSTK-STATUS--FW: Sending Primary Security FW 1 Chunk 1
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--141
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - PSFW102(8)
XFSTK-STATUS--FW: Sending Primary Security FW 1 Chunk 0
XFSTK-LOG--Allocation done

XFSTK-LOG--Writing the Bytes

XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--150
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - SSFW00(8)
XFSTK-STATUS--FW: Sending secondary security fw  Chunk 0
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--158
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - PSFW200(8)
XFSTK-STATUS--FW: Sending Primary Security FW 2 Chunk 0
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--166
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - VEDFW00(8)
XFSTK-LOG--sending VED FW Chunk 0
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--166
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - SuCP═════════════(4)
XFSTK-STATUS--FW: Sending ROM Patch Chunk 0
XFSTK-LOG--int MedfieldDownloader::write_out_pipe(unsigned char*, uint32) __BINARY__
XFSTK-LOG--virtual bool MedfieldUSB20Device::Write(void*, unsigned int) --->__BINARY__
XFSTK-PROGRESS--175
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - HLT$═════════════(4)
XFSTK-STATUS--FW: Firmware update comepleted...
XFSTK-PROGRESS--100
XFSTK-PROGRESS--100
XFSTK-LOG--bool MedfieldDownloader::isfwdone()
XFSTK-STATUS--Firmware download completed.
XFSTK-LOG--virtual bool MedfieldDownloader::Cleanup()
Presione una tecla para continuar . . .
 
  • Like
Reactions: Boss442

Boss442

Senior Member
Jul 19, 2012
428
551
0
24
Mar Del Plata
Code:
XFSTK Downloader Solo 1.1.0a
Copyright (c) 2011 Intel Corporation
.Intel SoC Device Detection Found
Parsing Commandline....
Registering Status Callback....
.Initiating Download Process....
..XFSTK-LOG--virtual bool MedfieldDownloader::SetDevice(IGenericDevice*)
XFSTK-PROGRESS--175
XFSTK-LOG--long long unsigned int MedfieldDownloader::read_in_ack()
XFSTK-LOG--GetAck - HLT$═════════════(4)
XFSTK-STATUS--FW: Firmware update comepleted...
XFSTK-PROGRESS--100
XFSTK-PROGRESS--100
XFSTK-LOG--bool MedfieldDownloader::isfwdone()
XFSTK-STATUS--Firmware download completed.
XFSTK-LOG--virtual bool MedfieldDownloader::Cleanup()
Presione una tecla para continuar . . .
Seems like flash good, so the phone accept the ifwi & dnx good.

I try flashing the IFWI & DNX Brazilian JB Ota files but dont work
Some can upload the personal argentina ota? if someone upload this can try flashing it
 

borg17a

Senior Member
Aug 18, 2010
258
27
0
Nice tool. But didn't work. Damn! I want my phone back!

Damn number 20690197494632664!

Reminds me of the code in LOST!

Greetz from Germany!
 

Attachments

peter971215

Member
Jun 27, 2013
29
0
0
palermo
HI guys! I have a problem.
i have downgraded with this rom:http://http://forum.xda-developers.c....php?t=2294653

and after i tried to flash two rom with rsd lite:
CFC_signed_customer_8.7.1I-110_IFW-31_RTGB.xml

CFC_8.7.1I-110_IFW-39_S7_UCASMI01E1017.0R_USASMIICSRTGB_P042_A005_S1F F_fb.xml

and the phone give me these error in the photo..
now the phone is locked , in the screen is write: service required code corrupt
and the green led .. can help me please?
 

Dark2150

Member
Feb 12, 2007
19
1
0
Can you point to the correct 'unbrick' that you used ... and document the process?
I've tried several ... with no success. And I'm glad you unbricked yours!!!
1) I'd found the ICS firmware of the same operator that JB had on sbf.droid-developers.org
(JB 9.8.2I-50_SML-28_AmericaMovil_PR -> Claro Puerto Rico -> 8.7.1I-110_SML-20_PR_LATAM..)
The same operator because of CID.

2a) flashboot flash boot, recovery, radio, system, cdrom. After that XT890 was Intel_logo bootlooped.
2b) flashboot flash gpt, motoboot; flashboot erase userdata . Obtained brick with greenled.

3) I'd downloaded the stuff from the head. Drivers installed (xFSTK-SoC-Driver-Setup-1.0.3.exe). Copied unbrick.bat to the unbrick folder.

4) XT890 to UBB with pressed Camera-button, (Greenled blinked and Windows reported that drivers for new device successfully been installed)

5) unbrick.bat

So I obtained the fully-workable downgraded phone.

I'm not responsible for any damage if you'll repeat this.

==========================================

Confirmation. After upgrade to official JB with help of RSDLite and incremental downgrade to ICS, Only flashing of the motoboot causes a greenled brick.

Obtained Service Required Code Corrupt after reflashing of gpt alone.
 
Last edited:
Apr 10, 2012
38
2
0
..................

5) unbrick.bat

So I obtained the fully-workable downgraded phone.

I'm not responsible for any damage if you'll repeat this.

==========================================

Confirmation. After upgrade to official JB with help of RSDLite and incremental downgrade to ICS, Only flashing of the motoboot causes a greenled brick.

Obtained Service Required Code Corrupt after reflashing of gpt alone.
====================
Didnt work for me.

I got 'dnx' and 'iwfi' file from 'CFC_9.8.2I-50_SMI-29_S7_USASMIJBRTGB.xml'
Placed those files in the c:\unbrick\ subdirectory
Ran the unbrick.bat and got the following output:
XFSTK Downloader Solo 1.1.0a
Copyright (c) 2011 Intel Corporation
.Intel SoC Device Detection Found
Parsing Commandline....
Registering Status Callback....
.Initiating Download Process....
...........................20690197494632664
.................................................................
.. (the dots appear for 29 lines of output0

Then on the phone displays: "Service Required Code Corrupt"
 
Last edited:

tomcat383

Member
Dec 1, 2010
20
0
0
Got the same problem as itsmeinarizona , any help ? i am not getting anything on the phone itself .no "Service Required Code Corrupt" error no nothing ..
 
Last edited:

ssistema21

New member
Dec 28, 2013
1
0
0
Good day ... I have the same problem of "code corrupt" and searching I found this tool to flash mode ... in medfield used for the lenovo K900 also recognizes the razr and i already installed the drivers probe. the problem is that the firmware does not recognize that they are in all the forums. serious matter to find a rom that could serve us. look on YouTube as flash K900 with mft and do the same process ..... this is the program



ManufacturingFlashTool_Setup_6.0.2.exe



iSocUSB-Driver-Setup-1.0.2.exe



any developer who can help or tell us if you can fix with this program ....