Mate 9 how to decrypt FBE encrypted files - Huawei Mate 9 Questions & Answers

Hi,
I’m using HUAWEI Mate 9 with a modified ROM EMUI 5.0 B173 (should be this one: https://forum.xda-developers.com/mate-9/development/hrt-kangvip-b173-root-t3567881). I also modified its kernel so the userdada partition was unencrypted.
Recently I performed an upgrade using a higher version ROM made by the same author. After installation, I rebooted my device and it seemed stuck in boot animation. So about 10 minutes later I forced power off it. Then it could boot successfully but failed to unlock even if I use the correct password.
Entering TWRP recovery, I find that some files in userdata partition (especially /data/media/0) was encrypted. So, I realized I forgot to modify the kernel before first boot and the device started to encrypt my data. This process didn’t finish before I forced power off.
I notice that mate 9 uses f2fs with file based encryption and the key seems exist in /data/unencrypted/key. When trying to copy encrypted files in recovery I get “Required key not available”. I duplicate userdata partition and mount on ubuntu, I still can’t access the encrypted files, got “access is denied”.
I use dump.f2fs to dump one of the encrypted files:
Code:
[email protected]:/media/sf_D_DRIVE/winmnt/seagate_p0/hwbk_img$ dump.f2fs -i22540 -d5 sdd46
Info: Debug level = 5
Info: Segments per section = 1
Info: Sections per zone = 1
Info: sector size = 512
Info: total sectors = 112771072 (55064 MB)
Info: MKFS version
"Linux version 4.1.18-g9fc1632 ([email protected]) (gcc version 4.9 20150123 (prerelease) (GCC) ) #1 SMP PREEMPT Sun Nov 27 05:22:40 CST 2016"
Info: FSCK version
from "Linux version 4.13.0-16-generic ([email protected]) (gcc version 7.2.0 (Ubuntu 7.2.0-8ubuntu2)) #19-Ubuntu SMP Wed Oct 11 18:35:14 UTC 2017"
to "Linux version 4.13.0-16-generic ([email protected]) (gcc version 7.2.0 (Ubuntu 7.2.0-8ubuntu2)) #19-Ubuntu SMP Wed Oct 11 18:35:14 UTC 2017"
Info: superblock features = 0 :
Info: superblock encrypt level = 0, salt = 00000000000000000000000000000000
+--------------------------------------------------------+
| Super block |
+--------------------------------------------------------+
magic [0xf2f52010 : 4076150800]
major_ver [0x 1 : 1]
volum_name []
minor_ver [0x 4 : 4]
log_sectorsize [0x 9 : 9]
log_sectors_per_block [0x 3 : 3]
log_blocksize [0x c : 12]
log_blocks_per_seg [0x 9 : 9]
segs_per_sec [0x 1 : 1]
secs_per_zone [0x 1 : 1]
checksum_offset [0x 0 : 0]
block_count [0x d71800 : 14096384]
section_count [0x 6adb : 27355]
segment_count [0x 6b8b : 27531]
segment_count_ckpt [0x 2 : 2]
segment_count_sit [0x 2 : 2]
segment_count_nat [0x 76 : 118]
segment_count_ssa [0x 36 : 54]
segment_count_main [0x 6adb : 27355]
segment0_blkaddr [0x 200 : 512]
cp_blkaddr [0x 200 : 512]
sit_blkaddr [0x 600 : 1536]
nat_blkaddr [0x a00 : 2560]
ssa_blkaddr [0x f600 : 62976]
main_blkaddr [0x 16200 : 90624]
root_ino [0x 3 : 3]
node_ino [0x 1 : 1]
meta_ino [0x 2 : 2]
cp_payload [0x 0 : 0]
version Linux version 4.13.0-16-generic ([email protected]) (gcc version 7.2.0 (Ubuntu 7.2.0-8ubuntu2)) #19-Ubuntu SMP Wed Oct 11 18:35:14 UTC 2017
Info: total FS sectors = 112771072 (55064 MB)
Info: CKPT version = 54f0f3
+--------------------------------------------------------+
| Checkpoint |
+--------------------------------------------------------+
checkpoint_ver [0x 54f0f3 : 5566707]
user_block_count [0x caac00 : 13282304]
valid_block_count [0x ad9b43 : 11377475]
rsvd_segment_count [0x 30 : 48]
overprov_segment_count [0x 585 : 1413]
free_segment_count [0x 5b5 : 1461]
alloc_type[CURSEG_HOT_NODE] [0x 0 : 0]
alloc_type[CURSEG_WARM_NODE] [0x 0 : 0]
alloc_type[CURSEG_COLD_NODE] [0x 0 : 0]
cur_node_segno[0] [0x 731 : 1841]
cur_node_segno[1] [0x 1ce : 462]
cur_node_segno[2] [0x 47f2 : 18418]
cur_node_blkoff[0] [0x 150 : 336]
cur_node_blkoff[1] [0x 18f : 399]
cur_node_blkoff[2] [0x 1d9 : 473]
alloc_type[CURSEG_HOT_DATA] [0x 0 : 0]
alloc_type[CURSEG_WARM_DATA] [0x 0 : 0]
alloc_type[CURSEG_COLD_DATA] [0x 0 : 0]
cur_data_segno[0] [0x 5e29 : 24105]
cur_data_segno[1] [0x 57f3 : 22515]
cur_data_segno[2] [0x 69d8 : 27096]
cur_data_blkoff[0] [0x 10d : 269]
cur_data_blkoff[1] [0x ec : 236]
cur_data_blkoff[2] [0x 143 : 323]
ckpt_flags [0x 45 : 69]
cp_pack_total_block_count [0x 7 : 7]
cp_pack_start_sum [0x 1 : 1]
valid_node_count [0x 5ba5f : 375391]
valid_inode_count [0x 52e43 : 339523]
next_free_nid [0x 677fb : 423931]
sit_ver_bitmap_bytesize [0x 40 : 64]
nat_ver_bitmap_bytesize [0x ec0 : 3776]
checksum_offset [0x ffc : 4092]
elapsed_time [0x 180674a : 25192266]
sit_nat_version_bitmap[0] [0x aa : 170]
[dump_node: 487] Node ID [0x580c]
[dump_node: 488] nat_entry.block_addr [0xb8c0da]
[dump_node: 489] nat_entry.version [0x3c]
[dump_node: 490] nat_entry.ino [0x580c]
[dump_node: 495] node_blk.footer.ino [0x580c]
[dump_node: 496] node_blk.footer.nid [0x580c]
[print_node_info: 272] Node ID [0x580c:22540] is inode
i_mode [0x 81b4 : 33204]
i_advise [0x 8c : 140]
i_uid [0x 3ff : 1023]
i_gid [0x 3ff : 1023]
i_links [0x 1 : 1]
i_size [0x 846f : 33903]
i_blocks [0x a : 10]
i_atime [0x5a426cab : 1514302635]
i_atime_nsec [0x148105ff : 343999999]
i_ctime [0x5a426cab : 1514302635]
i_ctime_nsec [0x1443fd00 : 340000000]
i_mtime [0x5a426cab : 1514302635]
i_mtime_nsec [0x1443fd00 : 340000000]
i_generation [0x2994fc72 : 697629810]
i_current_depth [0x 1 : 1]
i_xattr_nid [0x 0 : 0]
i_flags [0x 0 : 0]
i_inline [0x 1 : 1]
i_pino [0x 57f8 : 22520]
i_dir_level [0x 0 : 0]
i_namelen [0x 10 : 16]
i_name [_tFCOBeqt18rfIvqv,bWVYCAAAAAAAAA]
i_ext: fofs:0 blkaddr:70c345 len:9
i_addr[ofs] [0x 70c345 : 7390021]
i_addr[ofs + 1] [0x 70c346 : 7390022]
i_addr[ofs + 2] [0x 70c347 : 7390023]
i_addr[ofs + 3] [0x 70c348 : 7390024]
i_addr[0x3] points data block [0x70c348]
i_addr[0x4] points data block [0x70c349]
i_addr[0x5] points data block [0x70c34a]
i_addr[0x6] points data block [0x70c34b]
i_addr[0x7] points data block [0x70c34c]
i_addr[0x8] points data block [0x70c34d]
i_nid[0] [0x 0 : 0]
i_nid[1] [0x 0 : 0]
i_nid[2] [0x 0 : 0]
i_nid[3] [0x 0 : 0]
i_nid[4] [0x 0 : 0]
xattr: e_name_index:6 e_name:selinux e_name_len:7 e_value_size:33 e_value:
753A6F626A6563745F723A6D656469615F72775F646174615F66696C653A733000
xattr: e_name_index:9 e_name:c e_name_len:1 e_value_size:108 e_value:
format: 2
contents_encryption_mode: 0x1
filenames_encryption_mode: 0x4
flags: 0x0
master_key_descriptor: E1294EA7636FEEE7
nonce: 9D116EADE49818CF9C86693F0F7779A4
File is encrypted
Info: checkpoint state = 45 : compacted_summary unmount
Done.
Now I'm trying to get my files back.
Any idea how to decrypt these files?
Thanks.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}

Hi @zxy_xda, did you success? I am currently in fairly similar situation. I have an image in my linux box, and trying to decrypt it. I also know my password, but I do not really find enough information how to decrypt.

jvybihal said:
Hi @zxy_xda, did you success? I am currently in fairly similar situation. I have an image in my linux box, and trying to decrypt it. I also know my password, but I do not really find enough information how to decrypt.
Click to expand...
Click to collapse
Hi @jvybihal, I've figured out how to retrieve the encrypted files. If you still wish to decrypt them, please see my post https://forum.xda-developers.com/mate-9/how-to/mate-9-how-to-retrieve-encrypted-files-t3894561

Related

[Q] How to unlock Huawei Ideos X1 Gaga ??

hello guys ,
I have a Huawei Ideos X1 Gaga locked at mobinil Egypt ,
I really need to unlock it but don't know how , any rom or app to crack it ?
thanks ,
hema999
hema999 said:
hello guys ,
I have a Huawei Ideos X1 Gaga locked at mobinil Egypt ,
I really need to unlock it but don't know how , any rom or app to crack it ?
thanks ,
hema999
Click to expand...
Click to collapse
I can help you! do unlock huawei for 20 min!
contact:
ICQ - 4817-888-61
Email - [email protected]
V_Kontakte - vk.com/unlock911
I'm currently researching UNLOCKING the QUALCOMM based HUAWEI u8180 aka ideos aka a blast from the CLIQ past. I don't have any cross compilers otherwise I think yakk's old method would work. Right now I'm chasing down the QCRILHOOK_NV_READ from the PERSONALIZATION matches as I grep through the entire phone. Not the most efficient. Been working on this one almost as long as the S G S 3 Int IMEI fix, which is almost done thanks to some other tweaked out individuals here...
So am I on the path to MSM/Qualcomm unlocking righteousness? Or doth I fade into the darkness...
so follows my trail from /dev/log/radio :
P
ÀÏÇý2¼P—ÕÀ8RILC[RIL qcril_cm.c 3583] Received phonesvc event : CM_PH_EVENT_INFO (69644)
JÏÇý2¼P—ÕÀ8RILC[RIL qcril_event.c 402] Queued event CM_PH_EVENT_INFO (5536 bytes)
DÀ8Ïñý2¼P—ÕÀ8RILC[RIL qcril_event.c 288] qcril_event_main(): 1 items on queue
HÀ8Ïñý2¼P—ÕÀ8RILC[RIL qcril_event.c 309] De-queued event CM_PH_EVENT_INFO (69644)
CÀ8Ïñý2¼P—ÕÀ8RILC[RIL qcril.c 2444] AMSS=>RIL [ label = "CM_PH_EVENT_INFO" ];EÀ8Ïñý2¼P—ÕÀ8RILC[RIL qcril.c 2453] RIL <--- CM_PH_EVENT_INFO (69644) --- AMSS
6À8Ïñý2¼P—ÕÀ8RILC[RIL qcril_cm.c 3797] GW subscription disabled
8À8Ïñý2¼P—ÕÀ8RILC[RIL qcril_cm.c 3809] CDMA subscription disabled
ÂÀ8Ïñý2¼P—ÕÀ8RILC[RIL qcril_cm.c 3832] Oprt mode: 5, Mode pref: 19, GW acq order: 2, Band pref: 562949960237440, Roam pref: 255, Network sel mode: 0, plmn[0]=255, plmn[1]=255, plmn[2]=255, rtre control: 2”À8Ïñý2¼P—ÕÀ8RILC[RIL qcril_reqlist.c 206] Found ReqList entry : RIL_REQUEST_QUERY_NETWORK_SELECTION_MODE (45), token id 35, pending CM_PH_EVENT_INFO (69644)
OÀ8Ïñý2¼P—ÕÀ8RILC[RIL qcril_cm.c 4102] Reply to RIL --> Automatic network selection mode
rÀ8Ïñý2¼P—ÕÀ8RILC[RIL qcril_reqlist.c 160] Found ReqList entry : RIL_REQUEST_QUERY_NETWORK_SELECTION_MODE (45), token id 35
OÀ8Ïñý2¼P—ÕÀ8RILC[RIL qcril_reqlist.c 599] Deleted ReqList entry : token id 35 [0x2f9a8]
:À8Ïñý2¼P™rY9RILC[RIL qcril_reqlist.c 1061] ReqList entries : Empty
}À8Ïñý2¼P™rY9RILC[RIL qcril.c 3879] RIL=>Android [ label = "RIL_REQUEST_QUERY_NETWORK_SELECTION_MODE - Automatic, Token 35, Success" ];ŒÀ8Ïñý2¼P™rY9RILC[RIL qcril.c 3884] UI <--- RIL_REQUEST_QUERY_NETWORK_SELECTION_MODE (45) Complete --- RIL [Token 35, RIL_E_SUCCESS, Len 4 Automatic]
RÀ8Ïñý2¼P™rY9RILC[RIL qcril.c 2481] Exit qcril_process_event() : CM_PH_EVENT_INFO, err_no 0
>À8Ïñý2¼P™rY9RILC[RIL qcril_event.c 271] qcril_event_main(): Waiting...
/
Àn•ý2¼P™rY9RILJ[0035]< QUERY_NETWORK_SELECTION_MODE {0}^Ànnþ2¼PæGSMWrong network type: 0^Ànnþ2¼PæGSMWrong network type: 0
^Ànnþ2¼PæGSMPoll ServiceState done: oldSS=[1 home Unknown CSS not supported -1 -1RoamInd: -1DefRoamInd: -1EmergOnly: false] newSS=[1 home Unknown CSS not supported -1 -1RoamInd: -1DefRoamInd: -1EmergOnly: false] oldGprs=1 newGprs=1 oldType=unknown newType=unknown/nn,3¼PfoGSM[IccCard] Network Despersonalization: 886.nn,3¼PfoRILJ[0036]> ENTER_NETWORK_DEPERSONALIZATIONt
ÀÏð,3¼PfoRILC[RIL qcril.c 2285] UI --- RIL_REQUEST_ENTER_NETWORK_DEPERSONALIZATION (8) ---> RIL [token id 36, data len 4]
l
ÀÏð,3¼PfoRILC[RIL qcril.c 2304] Android=>RIL [ label = "RIL_REQUEST_ENTER_NETWORK_DEPERSONALIZATION - Token 36" ];JÏð,3¼PöRILC[RIL qcril_mmgsdi_sec.c 851] qcril_mmgsdi_request_enter_perso_key
3
ÀÏð,3¼PöRILC[RIL qcril_mmgsdi_sec.c 870] e_card_mode = 1G
ÀÏð,3¼PöRILC[RIL qcril_reqlist.c 169] Not found ReqList entry : token id 36
ˆ
ÀÏð,3¼PöRILC[RIL qcril_reqlist.c 400] Event RIL_REQUEST_ENTER_NETWORK_DEPERSONALIZATION (8) pending receipt of <none>, token id 36 [0x2f9b8]
5
ÀÏð,3¼PöRILC[RIL qcril_reqlist.c 1065] ReqList entries :
c
ÀÏð,3¼PöRILC[RIL qcril_reqlist.c 1071] RIL_REQUEST_ENTER_NETWORK_DEPERSONALIZATION (8), token id 36
x
ÀÏð,3¼PöRILC[RIL qcril_mmgsdi_sec.c 948] RIL --- gsdi_perso_deactivate_feature_indicator() ---> AMSS [perso_feature 0 (0x0)]
S
ÀÏð,3¼PöQCRIL_MSC "RIL"=>"AMSS" [ label = "gsdi_perso_deactivate_feature_indicator()"];
(
ÀÏð,3¼PöRILC[RIL qcril_mmgsdi.c 1763] data:
'
ÀÏð,3¼PöRILC[RIL qcril_mmgsdi.c 1773] 0x38, '
ÀÏð,3¼PöRILC[RIL qcril_mmgsdi.c 1773] 0x38, '
ÀÏð,3¼PöRILC[RIL qcril_mmgsdi.c 1773] 0x36, "
ÀÏð,3¼PöRILC[RIL qcril_mmgsdi.c 1780]
L
ÀÏó,3¼P꾆RILC[RIL qcril_mmgsdi.c 1221] qcril_mmgsdi_gsdi_command_callback, cmd:17
UÏó,3¼P꾆RILC[RIL qcril_event.c 402] Queued event MMGSDI_GSDI_COMMAND_CALLBACK (336 bytes)
D†Ïñ,3¼P꾆RILC[RIL qcril_event.c 288] qcril_event_main(): 1 items on queue
U†Ïñ,3¼P꾆RILC[RIL qcril_event.c 309] De-queued event MMGSDI_GSDI_COMMAND_CALLBACK (196613)
O†Ïñ,3¼P꾆RILC[RIL qcril.c 2444] AMSS=>RIL [ label = "MMGSDI_GSDI_COMMAND_CALLBACK" ];R†Ïñ,3¼P꾆RILC[RIL qcril.c 2453] RIL <--- MMGSDI_GSDI_COMMAND_CALLBACK (196613) --- AMSS
t†Ïñ,3¼P꾆RILC[RIL qcril_mmgsdi.c 4987] qcril_mmgsdi_process_gsdi_command_callback: QCRIL_EVT_MMGSDI_GSDI_COMMAND_CALLBACK
:†Ïñ,3¼P꾆RILC[RIL qcril_mmgsdi.c 5008] GSDI_PERSO_DEACT_IND_RSP
rÏñ,3¼P꾆RILC[RIL qcril_mmgsdi_sec.c 256] qcril_mmgsdi_sec_process_perso_deact_cnf: status = 0x23, perso_feature = 0x0
vÏñ,3¼P꾆RILC[RIL qcril_mmgsdi.c 261] GSDI_INCORRECT_CODE/PERSO_CHECK_FAILEd/PERSO_INVALID_CK 0x23 -> MMGSDI_INCORRECT_CODE
NÏñ,3¼P꾆RILC[RIL qcril_mmgsdi.c 177] mmgsdi status 0x7 -> RIL_E_PASSWORD_INCORRECT
tÏñ,3¼P꾆RILC[RIL qcril_reqlist.c 160] Found ReqList entry : RIL_REQUEST_ENTER_NETWORK_DEPERSONALIZATION (8), token id 36
tÏñ,3¼P꾆RILC[RIL qcril_reqlist.c 160] Found ReqList entry : RIL_REQUEST_ENTER_NETWORK_DEPERSONALIZATION (8), token id 36
OÏñ,3¼P꾆RILC[RIL qcril_reqlist.c 599] Deleted ReqList entry : token id 36 [0x2f9b8]
:Ïñ,3¼P꾆RILC[RIL qcril_reqlist.c 1061] ReqList entries : Empty
Ïñ,3¼P꾆RILC[RIL qcril.c 3824] RIL=>Android [ label = "RIL_REQUEST_ENTER_NETWORK_DEPERSONALIZATION, Token 36, Password Incorrect" ];‚Ïñ,3¼P꾆RILC[RIL qcril.c 3827] UI <--- RIL_REQUEST_ENTER_NETWORK_DEPERSONALIZATION (8) Complete --- RIL [Token 36, Password Incorrect]
^Ïñ,3¼P꾆RILC[RIL qcril.c 2481] Exit qcril_process_event() : MMGSDI_GSDI_COMMAND_CALLBACK, err_no 0
>Ïñ,3¼P꾆RILC[RIL qcril_event.c 271] qcril_event_main(): Waiting...
yÿÿn•,3¼P꾆RILJ[0036]< ENTER_NETWORK_DEPERSONALIZATION error: com.android.internal.telephony.CommandException: PASSWORD_INCORRECT†nn,3¼PzløRILJ[0037]> GET_SIM_STATUSc
ÀÏð,3¼P%k‘RILC[RIL qcril.c 2285] UI --- RIL_REQUEST_GET_SIM_STATUS (1) ---> RIL [token id 37, data len 0]
[
ÀÏð,3¼P%k‘RILC[RIL qcril.c 2304] Android=>RIL [ label = "RIL_REQUEST_GET_SIM_STATUS - Token 37" ];M
ÀÏð,3¼P%k‘RILC[RIL qcril_mmgsdi_common.c 2747] qcril_mmgsdi_request_get_sim_status
G
ÀÏð,3¼P%k‘RILC[RIL qcril_reqlist.c 169] Not found ReqList entry : token id 37
w
ÀÏð,3¼P%k‘RILC[RIL qcril_reqlist.c 400] Event RIL_REQUEST_GET_SIM_STATUS (1) pending receipt of <none>, token id 37 [0x2f9a8]
5
ÀÏð,3¼P%k‘RILC[RIL qcril_reqlist.c 1065] ReqList entries :
R
ÀÏð,3¼P%k‘RILC[RIL qcril_reqlist.c 1071] RIL_REQUEST_GET_SIM_STATUS (1), token id 37
C
ÀÏð,3¼P%k‘RILC[RIL qcril_mmgsdi.c 173] mmgsdi status 0x0 -> RIL_E_SUCCESS
c
ÀÏð,3¼P%k‘RILC[RIL qcril_reqlist.c 160] Found ReqList entry : RIL_REQUEST_GET_SIM_STATUS (1), token id 37
c
ÀÏð,3¼P%k‘RILC[RIL qcril_reqlist.c 160] Found ReqList entry : RIL_REQUEST_GET_SIM_STATUS (1), token id 37
O
ÀÏð,3¼P%k‘RILC[RIL qcril_reqlist.c 599] Deleted ReqList entry : token id 37 [0x2f9a8]
:
ÀÏð,3¼P%k‘RILC[RIL qcril_reqlist.c 1061] ReqList entries : Empty
r
ÀÏð,3¼P%k‘RILC[RIL qcril.c 3879] RIL=>Android [ label = "RIL_REQUEST_GET_SIM_STATUS - Card Present, Token 37, Success" ];‚
Unlock in easy way !!!
To unlock Huawei Ideos X1 Gaga ,Visit Unlock-zone.com. For which you have to provide IMEI number. After that get the code through mail and unlock it.

[GT-P6210 WIFI]bootloader output & default settings & Native ubuntu running

I recently installed ubuntu on GT-P6210, it works fine until i tried to port some drivers from Linaro Origen source, as I couldnt see anything from bootloaders and kernel, it's hard to get off the reboot loop,
So I made a serial cable, thanks for Technomancer's post here:http://forum.xda-developers.com/showthread.php?t=1010314
and the following are those outputs from bootloaders, maybe it's helpful to someone:
Welcome to Samsung Primitive Bootloader.
build time: Jan 5 2012 22:13:07
current time: 0/1/3 0:9:30
[set_mmc_ocr] Sector Mode
[hsmmc_init] MMC card is detected
Product Name : MAG4FA
<display_card_info:1009> ext_csd
<display_card_info:1011>card_size: 15028
Total Card Size: 15029 MByte
mmc_init: card initialization completed!
pbl found bootable sbl in #49152.
jump to sbl 0x4d400000.
init_fuel_gauge - Start!!
init_fuel_gauge - CGAIN=0x3cd5
check_battery_type: fuel_temp = 34, adc_temp = 40
set_fuel_gauge_parameter: battery_type = 1
init_fuel_gauge - Already initialized!! (SDI type)
fuel_gauge_test_read - addr(0x00), data(0x0000)
fuel_gauge_test_read - addr(0x01), data(0xff00)
fuel_gauge_test_read - addr(0x02), data(0x7f80)
fuel_gauge_test_read - addr(0x03), data(0xff01)
fuel_gauge_test_read - addr(0x04), data(0x0000)
fuel_gauge_test_read - addr(0x05), data(0x1e4c)
fuel_gauge_test_read - addr(0x06), data(0x5f6c)
fuel_gauge_test_read - addr(0x07), data(0x4d58)
fuel_gauge_test_read - addr(0x08), data(0x224c)
fuel_gauge_test_read - addr(0x09), data(0xca7a)
fuel_gauge_test_read - addr(0x0a), data(0xf5f3)
fuel_gauge_test_read - addr(0x0b), data(0xec06)
fuel_gauge_test_read - addr(0x0d), data(0x48e6)
fuel_gauge_test_read - addr(0x0e), data(0x5f5f)
fuel_gauge_test_read - addr(0x0f), data(0x1e4d)
fuel_gauge_test_read - addr(0x10), data(0x1fc0)
fuel_gauge_test_read - addr(0x11), data(0x0bfb)
fuel_gauge_test_read - addr(0x12), data(0x7d5a)
fuel_gauge_test_read - addr(0x14), data(0x021f)
fuel_gauge_test_read - addr(0x16), data(0x2055)
fuel_gauge_test_read - addr(0x17), data(0x0d70)
fuel_gauge_test_read - addr(0x18), data(0x290a)
fuel_gauge_test_read - addr(0x19), data(0xc859)
fuel_gauge_test_read - addr(0x1a), data(0x2716)
fuel_gauge_test_read - addr(0x1b), data(0xd099)
fuel_gauge_test_read - addr(0x1c), data(0x23e9)
fuel_gauge_test_read - addr(0x1d), data(0x2210)
fuel_gauge_test_read - addr(0x1e), data(0x0520)
fuel_gauge_test_read - addr(0x1f), data(0x1def)
fuel_gauge_test_read - addr(0x21), data(0x0092)
fuel_gauge_test_read - addr(0x23), data(0x2934)
fuel_gauge_test_read - addr(0x24), data(0x1400)
fuel_gauge_test_read - addr(0x25), data(0x2305)
fuel_gauge_test_read - addr(0x27), data(0x6d46)
fuel_gauge_test_read - addr(0x29), data(0x87a4)
fuel_gauge_test_read - addr(0x2a), data(0x506b)
fuel_gauge_test_read - addr(0x2b), data(0x0010)
fuel_gauge_test_read - addr(0x2c), data(0xe3e1)
fuel_gauge_test_read - addr(0x2d), data(0x290e)
fuel_gauge_test_read - addr(0x2e), data(0x3cd5)
fuel_gauge_test_read - addr(0x2f), data(0x0000)
fuel_gauge_test_read - addr(0x32), data(0x0800)
fuel_gauge_test_read - addr(0x33), data(0x0000)
fuel_gauge_test_read - addr(0x36), data(0x0100)
fuel_gauge_test_read - addr(0x37), data(0x05e0)
fuel_gauge_test_read - addr(0x38), data(0x0089)
fuel_gauge_test_read - addr(0x39), data(0x132a)
fuel_gauge_test_read - addr(0x3a), data(0x1458)
fuel_gauge_test_read - addr(0x3b), data(0x057f)
fuel_gauge_test_read - addr(0x3d), data(0x1008)
fuel_gauge_test_read - addr(0x3f), data(0xe000)
fuel_gauge_test_read - addr(0xfb), data(0xcd7e)
fuel_gauge_test_read - addr(0xff), data(0x47ae)
fuel_gauge_read_vfsoc : VFSOC(71), data(0x47ae)
fuel_gauge_read_vcell : VCELL(4052), data(0xca9c)
calculate_sdi_table_soc: Get table SOC in case of not charging!!
calculate_sdi_table_soc: vcell(4052), table_soc(91)
[VFSOC_Patch] differ(3), table_soc(91), vfsoc(71)
fuel_gauge_read_vfsoc : VFSOC(71), data(0x47ae)
fuel_gauge_read_vcell : VCELL(4052), data(0xca9c)
calculate_sdi_table_soc: Get table SOC in case of not charging!!
calculate_sdi_table_soc: vcell(4052), table_soc(91)
[VFSOC_Patch] differ(3), table_soc(91), vfsoc(71)
fuel_gauge_read_vfsoc : VFSOC(71), data(0x47ae)
fuel_gauge_read_vcell : VCELL(4052), data(0xca9c)
fuel_gauge_read_soc : SOC(95), data(0x5f6c)
calculate_sdi_table_soc: Get table SOC in case of not charging!!
calculate_sdi_table_soc: vcell(4052), table_soc(91)
fuel_gauge_read_vfsoc : VFSOC(71), data(0x47ae)
fuel_gauge_read_soc : SOC(95), data(0x5f6c)
fuel_gauge_read_soc : SOC(95), data(0x5f6c)
init_microusb_ic: MUIC: CONTROL1:0x3f
init_microusb_ic: MUIC: CONTROL1:0x3f
init_microusb_ic: MUIC: CONTROL2:0x3a
init_microusb_ic: MUIC: CONTROL2:0x3a
Secondary Bootloader v3.1 version.
Copyright (C) 2011 System S/W Group. Samsung Electronics Co., Ltd.
Board: P4 REV 02 / Jan 5 2012 22:13:13
current time: 0/1/3 0:9:31
booting code=0x0
[set_mmc_ocr] Sector Mode
[hsmmc_init] MMC card is detected
Product Name : MAG4FA
CID:150100 4d414734 4641196e c10e81f
<display_card_info:1043> ext_csd
<display_card_info:1045>card_size: 15028
Total Card Size: 15029 MByte
Total Sector Count: 30777344
MoviNand Initialization Complete!
===== PARTITION INFORMATION =====
ID : GANG (0x0)
DEVICE : MMC
FIRST UNIT : 0
NO. UNITS : 0
=================================
ID : BOOT (0x1)
DEVICE : MMC
FIRST UNIT : 0
NO. UNITS : 0
=================================
ID : EFS (0x4)
DEVICE : MMC
FIRST UNIT : 8192
NO. UNITS : 40960
=================================
ID : SBL1 (0x2)
DEVICE : MMC
FIRST UNIT : 49152
NO. UNITS : 2560
=================================
ID : SBL2 (0x3)
DEVICE : MMC
FIRST UNIT : 53248
NO. UNITS : 2560
=================================
ID : PARAM (0x5)
DEVICE : MMC
FIRST UNIT : 57344
NO. UNITS : 16384
=================================
ID : KERNEL (0x6)
DEVICE : MMC
FIRST UNIT : 73728
NO. UNITS : 16384
=================================
ID : RECOVERY (0x7)
DEVICE : MMC
FIRST UNIT : 90112
NO. UNITS : 16384
=================================
ID : CACHE (0x8)
DEVICE : MMC
FIRST UNIT : 106496
NO. UNITS : 409600
=================================
ID : FACTORYFS (0xa)
DEVICE : MMC
FIRST UNIT : 516096
NO. UNITS : 1572864
=================================
ID : DATAFS (0xb)
DEVICE : MMC
FIRST UNIT : 2088960
NO. UNITS : 27615232
=================================
ID : HIDDEN (0xc)
DEVICE : MMC
FIRST UNIT : 29704192
NO. UNITS : 1048576
=================================
ID : FOTA (0xd)
DEVICE : MMC
FIRST UNIT : 30752768
NO. UNITS : 16384
=================================
loke_init: j4fs_open..fsd_reclaim 1287: MST is not recognized(mst.magic=0x72726624)
fsd_reclaim 1288: MST is not recognized
fsd_reclaim 1603: Error(nErr=0x00000000)
fsd_reclaim 1608: j4fs_rw_start is set to default value(128KB)
j4fs_open 154: Error(nErr=0x40000000)
failed
init_ddi_data: usable ddi data.
j4fs_read_file_bootloader 356: j4fs panic
nps status file does not exist..
nps status is incorrect!! set default status.(completed)
nps status=0x504d4f43
PMIC_IRQSRC = 0x00
PMIC_IRQ1 = 0x00
PMIC_IRQ2 = 0x08
PMIC_IRQ3 = 0x00
PMIC_IRQ4 = 0x11
PMIC_STATUS1 = 0x00
PMIC_STATUS2 = 0x16
PMIC_STATUS3 = 0x03
PMIC_STATUS4 = 0x00
bootloader base address=0x4d400000
LPDDR0 1st. cached=0x40000000, size=0xe400000
LPDDR0 non-cached=0x4e400000, size=0xa00000
LPDDR0 2nd. cached=0x4ee00000, size=0x1200000
RST_STAT = 0x20000000
get_hwrev() = 11
board_process_platform: MAGIC 0 at 40004000!
check_reboot: INFORM3 = 12345670
save param.blk, size: 5268
j4fs_write_file_bootloader 185: j4fs panic
mbcctrl = d4
mbcctrl = 14
mbcctrl = 14
fuel_gauge_read_vcell : VCELL(4051), data(0xca98)
pm_check_low_battery: Now, Start Booting...
check_30pin_cable: ch4. ADC value = 4095
check_30pin_cable: ch4. ADC value = 4088
check_30pin_cable: ch4. ADC value = 4093
microusb_get_attached_device: STATUS1:0x3f, 2:0x00
hw_pm_status: chg_status = 0, INFORM2 = 12345678
AST_POWERON..
......kernel is non signed binary.
div:15, FB_SOURCE_CLOCK:800000000, FB_PIXEL_CLOCK:53988360
mDNIe is enabled
check_lcdtype : adc=1135, lctype=1
Autoboot (0 seconds) in progress, press any key to stop
boot_kernel: debug level low!
checkbit (00000000)
......kernel (id 0) is non signed binary.
ATAG_CORE: 5 54410001 0 0 0
MEMCONFIG: 20e01323 20e01323
ATAG_MEM: 4 54410002 10000000 40000000
ATAG_MEM: 4 54410002 10000000 50000000
ATAG_MEM: 4 54410002 10000000 60000000
ATAG_MEM: 4 54410002 10000000 70000000
ATAG_SERIAL: 4 54410006 c10e81f 4641196e
ATAG_REVISION: 3 54410007 b
ATAG_CMDLINE: 47 54410009 'console=ttySAC2,115200 loglevel=4 sec_debug.enable=0 sec_debug.enable_user=0 c1_watchdog.sec_pet=5 [email protected] s3cfb.bootloaderfb=0x5ec00000 lcdtype=1 consoleblank=0 lpj=3981312 vmalloc=144m an'
ATAG_NONE: 0 0
Starting kernel at 0x40008000...
default env settings:
SBL> printenv
PARAM Rev 1.3
SERIAL_SPEED : 7
LOAD_RAMDISK : 0
BOOT_DELAY : 0
LCD_LEVEL : 97
SWITCH_SEL : 1
PHONE_DEBUG_ON : 0
LCD_DIM_LEVEL : 0
LCD_DIM_TIME : 6
MELODY_MODE : 1
REBOOT_MODE : 0
NATION_SEL : 0
LANGUAGE_SEL : 0
SET_DEFAULT_PARAM : 0
FLASH_LOCK_STATUS : 1
PARAM_INT_14 : 0
VERSION : I9000XXIL
CMDLINE : console=ttySAC2,115200 loglevel=4
DELTA_LOCATION : /mnt/rsv
PARAM_STR_3 :
PARAM_STR_4 :
Can you provide a how-to install ubuntu on the gtab? or provide a link to which instructions you followed to install it? Thanks
bdds13 said:
Can you provide a how-to install ubuntu on the gtab? or provide a link to which instructions you followed to install it? Thanks
Click to expand...
Click to collapse
2 steps:
ubuntu rootfs on tf card;
flash the attached zImage file with:
heimdall flash --kernel zImage
Fyi, if you can build a kernel with sec_log support, you can get this bootloader info as well (on /proc/last_kmsg). I backported sec_log to the hc kernel from the galaxys2 ics source at a couple of points, it is pretty straightforward.
locerra said:
Fyi, if you can build a kernel with sec_log support, you can get this bootloader info as well (on /proc/last_kmsg). I backported sec_log to the hc kernel from the galaxys2 ics source at a couple of points, it is pretty straightforward.
Click to expand...
Click to collapse
thanks, I just had a look, it's on in my kernel, will check the messages in /proc
jackqin said:
I recently installed ubuntu on GT-P6210, it works fine until i tried to port some drivers from Linaro Origen source
Click to expand...
Click to collapse
Can you provide any details as to what was working and what wasn't? Hardware wise?
Thanks
SirFunk said:
Can you provide any details as to what was working and what wasn't? Hardware wise?
Thanks
Click to expand...
Click to collapse
I just needed framebuffer console, so I didn't get to X interface, for now, I can say multi-touch device is working, coz I saw touch events.
most other devices should work, since the kernel is from Gary's working one, and I did some minor modifications to let Linux boot.
I'll work on it and try to put together a rather complete rootfs, and update my progress here.

Nokia 5230: help me to unlock it

IMEI : 356267042608971
Conf key : 8000000000000000
Provider key : 2140700000000000
Provider : Movistar (DCT3);Spain
Counters : Key 0 [3] , Fbus 0 [10]
Blocks : 2
LOCK STATUS :
=============================
BLK : 1
Lock1:Close
BLK : 2
Lock1:Close
=============================
LOCKS : Closed
=============================
CRT308 Backup Created...
User code : Crypted
UserDataExLevel : Low [Gallery]
Done!

MBW vodacom kicka 4 plus won't boot , what could be the problem

What could be the problem ..
Operation : Identify [ v2.18 ]
Mode : FLASH
1. Make sure device is powered off. Power off, if need. Wait 20 seconds after
2. Insert USB cable in phone
Waiting for device connection ...
PTFN : MediaTek USB Port (COM7)
MODE : BOOTROM
PORT : 7
Waiting BOOT ack ...
BROM : Skip ACK verify
BROM : Init BROM
BROM init passed!
CHIP : MT6580 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000
TYPE : LEGACY MTK
BROM : MEID : 84E1311723E5F72DDF767B7B831BD757
BROM : SecLevel : 0x00000000
BROM : SecMode : PLAIN [+PRL]
BROM : BROM|BL : 0x05|0xFE
BROM : BOOTROM
MODE : 0_base : BASE_v2044 | Manual : Enabled
AGENT : Look for suitable BootChain in DA ...
AGENT : MTK_AllInOne_DA_SP.bin
AGENT : Found MT6580
AGENT : MTK_DOWNLOAD_AGENT
BROM : Sending 1st DA ...
BROM : DA sent
BROM :Transfer control to DA ...
DA : AGENT started!
NAND : DEVICE NOT FOUND
NAND : 000000000000000000000000
eMMC : OK
eMMC : 45000170414934456E0101344F2524D7
DAInf: 4 : 2 : 156
DA : EXT_RAM NOT initialized!
eMMC : OK
eMMC : 70010045453449413401016ED724254F
NAND : DEVICE NOT FOUND
NAND : 000000000000000000000000
DRAM : 0x0178
EMI : DEV : MT6752
EMI : SRC : preloader_k80hd_bsp_fwv_512m.bin
EMI : CNT : 0003
EMI : [00] : ID : 700100454534454134 : VEN : KINGSTON | DEV : EE4EA4 : RAM : [ 512.00 MB ]
EMI : [01] : ID : C80111344D45594D41 : VEN : UNKNOWN | DEV : 4MEYMA : RAM : [ 512.00 MB ]
EMI : [02] : ID : 700100454534494134 : VEN : KINGSTON | DEV : EE4IA4 : RAM : [ 512.00 MB ]
EMI : Init EMI from PRELOADER
INIT : 0xBC : DRAM [ 0x00000000 : [ 0 B ] ]
DRAM : DRAM: 0x20000000 [ 512.00 MB ]
DA : DRAM ready!
DA : BOOT to 2nd DA ...
DA : Receiving HW info
EMMC: 70010045453449413401016ED724254F
EMMC: VEN : KINGSTON | OEM : 01 | DEV : EE4IA4
EMMC:
BOOT1 : 0x00200000 [ 2.00 MB ]
BOOT2 : 0x00200000 [ 2.00 MB ]
RPMB : 0x00080000 [ 512.00 KB ]
USER : 0xE2000000 [ 3.53 GB ]
SRAM: 0x00020000 [ 128.00 KB ]
DRAM: 0x20000000 [ 512.00 MB ]
CHIP : MT6580 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000 , EVOL : 0x0000
RNID : C936D9FF3A84D90E7B2010FA5212EA26
STATUS : BLANK FLASH
BSTYLE : EMMC FLASH BOOT
DA : USB : FULL-SPEED
DA : USB : Change Port Speed
PTFN : MediaTek DA USB VCOM (Android) (COM9)
MODE : PRELOADER PORT
PORT : 9
Boot done!
Patch Level : O11019
Display ID : O11019 release-keys
Ver. CodeName : REL
Ver. Release : 8.1.0
Sec. Patch : 2019-09-05
Build Time : 23.08.2019
Product Model : Kicka_4_Plus
Product Brand : MobiWire
Product Name : Kicka_4_Plus
Product Device : Kicka_4_Plus
Product Manfct : MobiWire
Product Info : k80hd_bsp_fwv_512m
Board Platform : mt6580
Product Board : VP402_Mobiwire_Kicka4Plus
USERDATA : FILESYSTEM : F2FS with FDE ( Full Disk Encryption ***)
Done!
Elapsed: 00:00:30
Operation : HW Test [ v1.58 ]
1. Power Off Phone , Remove battery , Insert back
2. Insert USB cable. In some cases require hold BootKey
Wait for phone...
Phone found! [ 1 ]
Sync...
Inital Boot Ok!
BB_CPU_PID : 6580
BB_CPU_NME : [MediaTek] MT6580_S00
BB_CPU_EXT : 0xCA00 , 0x8A00 , 0x0000
Processing BROM stage
Settings for BROM configured!
SecCfgVal : 0x00000000
BromVer : 0x00FF
BLVersion : 0x0001
PreLoader : Active [ Boot with PL ]
BootLdrSS : NORMAL with PRELOADER
Processing DA stage
DA Select done, will use MTK_AllInOne_DA_v3.3001.2018-04-25.11:26_437806
Sending and initialize DA ...
Running DA ver.4.2 on BBID : 0x9C
NAND Flash : NOT INSTALLED
eMMC Flash : 70010045453449413401016ED724254F
Initialize Memory ...
DRAM already initialized by Preloader
DAgent sent , init HW now
eMMC FlashIC initialized
[eMMC] : FLASH_VEN : 0x70 , OEM : 0100
[eMMC] : FLASH_INF : [KINGSTON] , 4AI4E
[eMMC] : FLASH_CID : 70010045453449413401016ED724254F
[eMMC] : FLASH_BRT : 0x00200000 , 0x00200000 , 0x00080000
[eMMC] : FLASH_LEN : 0x00000000E2000000
[eMMC] : FLASH_UCP : 3616 MiB [eMMC 4 GiB]
DEV RID : 0x4EA014B2FFD936C90ED9843AFA10207B
INT RAM : 0x00020000
EXT RAM : 0x20000000 [512 MiB]
BOOT TYPE : EMMC_FLASH_BOOT
SOC VERIFY : C1
Boot Ok!
Processing Miscellaneous test
MSC : BatteryLevel : 3009 mV
[Processing] FlashMemory Read-Write test
[eMMC] : [KINGSTON] , 4AI4E , 0xE2000000 , 3616 MiB
[eMMC] : CID : 70010045453449413401016ED724254F
[eMMC] : MODE : SQ-WR
[PASSED] : eMMC RW Check #1 Ok!
[eMMC] : MODE : RA-WR
[PASSED] : eMMC RW Check #2 Ok!
[eMMC RO CHECK] : eMMC Ok! READ-WRITE Passed!
[Processing] RAM Read-Write test
[DRAM] : 0x20000000 , 512 MiB
[DRAM] : ADDRESS BUS test
[PASSED] : Bus Count : 0x1C
[DRAM] : DATA BUS test
[PASSED] : Bus Count : 0x1F
[DRAM] : PATTERN test
[PASSED] : PATTERN Ok
[DRAM] : INCDEC test
[PASSED] : INCDEC Ok
All Done!
Done!
Elapsed: 00:01:40
Reconnect Power/Cable!

Mi Stick stuck on boot logo (bricked?)

Hello everybody.
A couple of years ago I bought a Mi Stick for my mother, to use connected to an old LED tv she had. She used just 3 o 4 times tops with a Netflix account my brother shared with her. The device was practically new. My brother stopped paying Netflix a couple of months ago so she stopped using the device altogether so I disconnected it. But yesterday she told me my brother started paying Netflix again and told me to connect the MiStick to her TV again. Surprisingly, the device is now stuck on the boot logo:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
I'm really angry because the device had very little use and especially because I live in third world ****hole: a new MiStick costs almost 4 times more now. It's not like I have couple of dollars getting dust on a drawer somewhere and I can go buy another one.
Anyway, I know it's possible to flash/unbrick a MiBox, I did it some time ago. Anybody knows if it's possible to the same with the Mi Stick??? I googled about it but I didn't find anything.
Thank you for your time.
hello, my Mi TV Stick MDZ-24-AA also unfortunately hangs all the time on the logo, checked on various cables and on a decent power supply
through the remote control (arrow + OK) does not want to enter the bootloader
I have purchased PL2303HX converter
According to the instructions from https://forum.xda-developers.com/t/help-pleas...-no-power-led-no-video.4452819/#post-87044521
and partially supported by Ruslan's film
With a backup downloaded from https://disk-yandex-ru.translate.goog/d/aL5Xo...en&_x_tr_hl=en&_x_tr_pto=wapp&_x_tr_hist=true
Using Putty and ADB
I went through the entire installation process
Unfortunately, my mi stick still hangs on the logo: / What could be the cause? Is my mi stick still salvageable?
kedzior.kedzior said:
I have purchased PL2303HX converter
Using Putty and ...
I went through the entire installation process
Unfortunately, my mi stick still hangs on the logo
Click to expand...
Click to collapse
With the PL2303HX connected to the uart while the device is booting (to a hung state), what is shown in the uart log while the device is trying to boot?
Are you able to get a prompt over the uart as shown in the video?
Functioner said:
With the PL2303HX connected to the uart while the device is booting (to a hung state), what is shown in the uart log while the device is trying to boot?
Are you able to get a prompt over the uart as shown in the video?
Click to expand...
Click to collapse
GXL:BL1:9ac50e:bb16dc;FEAT:BDFD71BC:0;POC:3;RCY:0;EMMC:0;READ:0;0.0;0.0;CHK:0;
TE: 138335
BL2 Built : 10:18:52, Sep 14 2020. gxl g9f162b4-dirty - [email protected]
set vcck to 1120 mv
set vddee to 1000 mv
id=3
DDR4 board
CPU clk: 1200MHz
DDR scramble enabled
DDR4 chl: Rank0+1 @ 1056MHz - FAIL
DDR4 chl: Rank0 @ 1056MHz
bist_test rank: 0 19 05 2e 28 16 3a 17 02 2d 2b 1d 3a 17 02 2c 2c 1c 3d 18 02 2f 27 16 38 706 - PASS
Rank0: 1024MB(auto)-2T-18
AddrBus test pass!
eMMC boot @ 0
sw8 s
emmc switch 3 ok
BL2: rpmb counter: 0x00000020
emmc switch 0 ok
Load fip header from eMMC, src: 0x0000c200, des: 0x01400000, size: 0x00004000, part: 0
aml log : R1024 check pass!
New fip structure!
Load bl30 from eMMC, src: 0x00010200, des: 0x01700000, size: 0x0000d600, part: 0
aml log : R1024 check pass!
Load bl31 from eMMC, src: 0x00020200, des: 0x01700000, size: 0x0002b400, part: 0
aml log : R1024 check pass!
Load bl32 from eMMC, src: 0x0004c200, des: 0x01700000, size: 0x0003e200, part: 0
aml log : R1024 check pass!
Load bl33 from eMMC, src: 0x0008c200, des: 0x01700000, size: 0x00080e00, part: 0
aml log : R1024 check pass!
NOTICE: BL3-1: v1.0(release):129a6bc
NOTICE: BL3-1: Built : 17:09:37, Apr 25 2019
[BL31]: GXL CPU setup!
NOTICE: BL3-1: GXL secure boot!
NOTICE: BL3-1: BL33 decompress pass
mpu_config_enable:system pre init ok
dmc sec lock
[Image: gxl_v1.1.3377-2941e55e3 2020-07-08 17:19:09 [email protected]]
OPS=0xb4
21 0d b4 00 6b a3 4a 05 e8 35 9e 81 38 16 4f b7
[0.733983 Inits done]
secure task start!
high task start!
low task start!
INFO: BL3-2: ATOS-V2.4-239-g48b8c37d #1 Wed Feb 5 09:34:09 UTC 2020 arm
INFO: BL3-2: Chip: GXL Rev: D (21 - B0:2)
INFO: BL3-2: crypto engine DMA
INFO: BL3-2: secure time TEE
INFO: BL3-2: CONFIG_DEVICE_SECURE 0xb200000e
U-Boot 2015.01-g2e3e77d-dirty (Nov 07 2020 - 00:20:15), Build: jenkins-aquaman-664
DRAM: 1 GiB
Relocation Offset is: 36e80000
gpio: pin gpiodv_24 (gpio 43) value is 1
register usb cfg[0][1] = 0000000037f4c4f8
[CANVAS]canvas init
MMC: aml_priv->desc_buf = 0x0000000033e80ab0
aml_priv->desc_buf = 0x0000000033e82df0
SDIO Port B: 0, SDIO Port C: 1
co-phase 0x2, tx-dly 0, clock 400000
co-phase 0x2, tx-dly 0, clock 400000
co-phase 0x2, tx-dly 0, clock 400000
emmc/sd response timeout, cmd8, status=0x1ff2800
emmc/sd response timeout, cmd55, status=0x1ff2800
co-phase 0x2, tx-dly 0, clock 400000
co-phase 0x2, tx-dly 0, clock 40000000
[mmc_startup] mmc refix success
init_part() 297: PART_TYPE_AML
[mmc_init] mmc init success
aml log : R1024 check pass!
start dts,buffer=0000000033e85640,dt_addr=0000000033e85640
get_partition_from_dts() 71: ret 0
parts: 17
00: logo 0000000000800000 1
01: recovery 0000000001800000 1
02: misc 0000000000800000 1
03: dtbo 0000000000800000 1
04: cri_data 0000000000800000 2
05: param 0000000001000000 2
06: boot 0000000001000000 1
set has_boot_slot = 0
07: rsv 0000000001000000 1
08: tee 0000000002000000 1
09: vendor 0000000006400000 1
10: odm 0000000001400000 1
11: metadata 0000000001000000 1
12: vbmeta 0000000000200000 1
13: system 000000005ac00000 1
14: product 0000000006a00000 1
15: cache 0000000010000000 2
16: data ffffffffffffffff 4
init_part() 297: PART_TYPE_AML
eMMC/TSD partition table have been checked OK!
crc32_s:0x1577dad == storage crc_pattern:0x1577dad!!!
crc32_s:0xee152b83 == storage crc_pattern:0xee152b83!!!
crc32_s:0x7fd3b243 == storage crc_pattern:0x7fd3b243!!!
mmc env offset: 0x17400000
In: serial
Out: serial
Err: serial
reboot_mode=cold_boot
[store]To run cmd[emmc dtb_read 0x1000000 0x40000]
_verify_dtb_checksum()-2755: calc 6955a20f, store 6955a20f
_verify_dtb_checksum()-2755: calc 6955a20f, store 6955a20f
dtb_read()-2972: total valid 2
update_old_dtb()-2953: do nothing
aml log : R1024 check pass!
vpu: clk_level in dts: 7
vpu: set clk: 666667000Hz, readback: 666666667Hz(0x300)
vpu: vpu_clk_gate_init_off finish
vpp: vpp_init
hpd_state=0
vpp: vpp_matrix_update: 2
cvbs performance type = 6, table = 0
cvbs_config_hdmipll_gxl
cvbs_set_vid2_clk
the HHI_VDAC_CNTL0 =b0001
the HHI_VDAC_CNTL0 =b0200
the HHI_VDAC_CNTL1 =0
the HHI_VDAC_CNTL1 =8
amlkey_init() enter!
[EFUSE_MSG]keynum is 4
[BL31]: tee size: 0
[BL31]: tee size: 0
[BL31]: tee size: 0
[BL31]: tee size: 0
[KM]Error:f[key_manage_query_size]L507:key[region] not programed yet
CONFIG_AVB2: avb2
Start read misc partition datas!
info->magic =
info->version_major = 1
info->version_minor = 0
info->slots[0].priority = 15
info->slots[0].tries_remaining = 7
info->slots[0].successful_boot = 0
info->slots[1].priority = 14
info->slots[1].tries_remaining = 7
info->slots[1].successful_boot = 0
info->crc32 = -1075449479
active slot = 0
wipe_data=successful
wipe_cache=successful
upgrade_step=2
reboot_mode:::: cold_boot
[OSD]load fb addr from dts:/meson-fb
[OSD]fb_addr for logo: 0x3f800000
[OSD]load fb addr from dts:/meson-fb
[OSD]fb_addr for logo: 0x3f800000
[OSD]VPP_OFIFO_SIZE:0xfff00fff
[CANVAS]addr=0x3f800000 width=5760, height=2160
[OSD]osd_hw.free_dst_data: 0,719,0,575
Command: bcb uboot-command
Start read misc partition datas!
BCB hasn't any datas,exit!
do_monitor_bt_cmdline
gpio: pin GPIOX_17 (gpio 17) value is 0
gpio: pin GPIOX_17 (gpio 17) value is 1
gpio: pin GPIOX_18 (gpio 18) value is 1
hw_config_start:state = 3
bt_cmdline: fw downloaded
no recovery mod!
gpio: pin GPIOX_8 (gpio 8) value is 1
Hit Enter or space or Ctrl+C key to stop autoboot -- : 0
CONFIG_SYSTEM_AS_ROOT: systemroot
system_mode: 1
CONFIG_AVB2: avb2
active_slot: normal avb2: 1
Err imgread(L328):Fmt unsupported!genFmt 0x0 != 0x3
InUsbBurn
[MSG]sof
Set Addr 4
Get DT cfg
Get DT cfg
Get DT cfg
set CFG
Get DT cfg
Get DT cfg
Get DT cfg
Get DT cfg
waitIdentifyTime(751) > timeout(750)
(Re)start USB...
USB0: USB3.0 XHCI init start
Register 2000140 NbrPorts 2
Starting the controller
USB XHCI 1.00
scanning bus 0 for devices... 1 USB Device(s) found
scanning usb for storage devices... 0 Storage Device(s) found
** Bad device usb 0 **
** Bad device usb 0 **
active_slot: normal
Err imgread(L328):Fmt unsupported!genFmt 0x0 != 0x3
gxl_aquaman_v1#
kedzior.kedzior said:
Err imgread(L328):Fmt unsupported!genFmt 0x0 != 0x3
Click to expand...
Click to collapse
The above error might be an issue.
at the prompt:
gxl_aquaman_v1#
type:
printenv
and post the output.
Functioner said:
The above error might be an issue.
at the prompt:
gxl_aquaman_v1#
type:
printenv
and post the output.
Click to expand...
Click to collapse
gxl_aquaman_v1#printenv
1080p60hz_deepcolor=444,12bit
480p60hz_deepcolor=rgb,8bit
EnableSelinux=permissive
active_slot=normal
avb2=1
baudrate=115200
bcb_cmd=get_avb_mode;get_valid_slot;
boardid=3
boot_part=boot
bootargs=init=/init console=ttyS0,115200 no_console_suspend earlycon=aml_uart,0xc81004c0 ramoops.pstore_en=1 ramoops.record_size=0x8000 ramoops.console_size=0x4000 ro rootwait skip_initramfs reboot_mode_android=normal androidboot.selinux=permissive logo=osd1,loaded,0x3d800000,576cvbs maxcpus=4 vout=576cvbs,enable hdmimode=1080p60hz frac_rate_policy=1 cvbsmode=576cvbs hdmitx=,444,12bit cvbsdrv=0 androidboot.firstboot=0 jtag=apao androidboot.veritymode=enforcing androidboot.hardware=amlogic androidboot.btmacaddr=00:00:00:00:00:00 androidboot.wifimac=00:00:00:00:00:00 androidboot.wificountrycode=US androidboot.bootloader= androidboot.serialno=26919800002433906 androidboot.boardid=3 androidboot.region=none androidboot.reboot_mode=cold_boot page_trace=on androidboot.rpmb_state=0 aml_dt= recovery_part={recovery_part} recovery_offset={recovery_offset} aml_dt= recovery_part={recovery_part} recovery_offset={recovery_offset}
bootcmd=run storeboot
bootdelay=1
bootup_offset=0x1133b50
bootup_size=0x5eec7a
btmac=00:00:00:00:00:00
cmdline_keys=keyman init 0x1234; setkeys;
colorattribute=444,12bit
cvbs_drv=0
cvbsmode=576cvbs
display_bpp=24
display_color_bg=0
display_color_fg=0xffff
display_color_index=24
display_height=576
display_layer=osd1
display_width=720
dtb_mem_addr=0x1000000
factory_reset_poweroff_protect=echo wipe_data=${wipe_data}; echo wipe_cache=${wipe_cache};if test ${wipe_data} = failed; then run init_display; run storeargs;if usb start 0; then run recovery_from_udisk;fi;run recovery_from_flash;fi; if test ${wipe_cache} = failed; then run init_display; run storeargs;if usb start 0; then run recovery_from_udisk;fi;run recovery_from_flash;fi;
fb_addr=0x3d800000
fb_height=1080
fb_width=1920
fdt_high=0x20000000
firstboot=0
frac_rate_policy=1
fs_type=ro rootwait skip_initramfs
hdmimode=1080p60hz
identifyWaitTime=750
init_display=get_rebootmode;echo reboot_mode:::: ${reboot_mode};if test ${reboot_mode} = quiescent; then setenv reboot_mode_android quiescent;run storeargs;setenv bootargs ${bootargs} androidboot.quiescent=1;osd open;osd clear;else if test ${reboot_mode} = recovery_quiescent; then setenv reboot_mode_android quiescent;run storeargs;setenv bootargs ${bootargs} androidboot.quiescent=1;osd open;osd clear;else setenv reboot_mode_android normal;run storeargs;osd open;osd clear;imgread pic logo bootup $loadaddr;bmp display $bootup_offset;bmp scale; fi;fi;
initargs=init=/init console=ttyS0,115200 no_console_suspend earlycon=aml_uart,0xc81004c0 ramoops.pstore_en=1 ramoops.record_size=0x8000 ramoops.console_size=0x4000
jtag=apao
loadaddr=1080000
lock=10001000
maxcpus=4
outputmode=576cvbs
page_trace=on
preboot=run cmdline_keys;run bcb_cmd; run factory_reset_poweroff_protect;run upgrade_check;run init_display;run storeargs;bcb uboot-command;run switch_bootmode;
reboot_mode=cold_boot
reboot_mode_android=normal
recovery_from_flash=get_valid_slot;echo active_slot: ${active_slot};if test ${active_slot} = normal; then setenv bootargs ${bootargs} aml_dt=${aml_dt} recovery_part={recovery_part} recovery_offset={recovery_offset};if itest ${upgrade_step} == 3; then if ext4load mmc 1:2 ${dtb_mem_addr} /recovery/dtb.img; then echo cache dtb.img loaded; fi;if ext4load mmc 1:2 ${loadaddr} /recovery/recovery.img; then echo cache recovery.img loaded; wipeisb; bootm ${loadaddr}; fi;else fi;if imgread kernel ${recovery_part} ${loadaddr} ${recovery_offset}; then wipeisb; bootm ${loadaddr}; fi;else setenv bootargs ${bootargs} aml_dt=${aml_dt} recovery_part=${boot_part} recovery_offset=${recovery_offset};if imgread kernel ${boot_part} ${loadaddr}; then bootm ${loadaddr}; fi;fi;
recovery_from_udisk=setenv bootargs ${bootargs} aml_dt=${aml_dt} recovery_part={recovery_part} recovery_offset={recovery_offset};if fatload usb 0 ${loadaddr} aml_autoscript; then autoscr ${loadaddr}; fi;if fatload usb 0 ${loadaddr} recovery.img; then if fatload usb 0 ${dtb_mem_addr} dtb.img; then echo udisk dtb.img loaded; fi;wipeisb; bootm ${loadaddr};fi;
recovery_offset=0
recovery_part=recovery
region=none
rpmb_state=0
sdc_burning=sdc_burn ${sdcburncfg}
sdcburncfg=aml_sdc_burn.ini
serialno=26919800002433906
sn2=3236393139383030303032343333393036
stderr=serial
stdin=serial
stdout=serial
storeargs=get_rebootmode;setenv bootargs ${initargs} ${fs_type} reboot_mode_android=${reboot_mode_android} androidboot.selinux=${EnableSelinux} logo=${display_layer},loaded,${fb_addr},${outputmode} maxcpus=${maxcpus} vout=${outputmode},enable hdmimode=${hdmimode} frac_rate_policy=${frac_rate_policy} cvbsmode=${cvbsmode} hdmitx=${cecconfig},${colorattribute} cvbsdrv=${cvbs_drv} androidboot.firstboot=${firstboot} jtag=${jtag}; setenv bootargs ${bootargs} androidboot.veritymode=enforcing androidboot.hardware=amlogic androidboot.btmacaddr=${btmac} androidboot.wifimac=${wifimac} androidboot.wificountrycode=${wifi_ccode} androidboot.bootloader=${bootloader} androidboot.serialno=${serialno} androidboot.boardid=${boardid} androidboot.region=${region} androidboot.reboot_mode=${reboot_mode};setenv bootargs ${bootargs} page_trace=${page_trace};setenv bootargs ${bootargs} androidboot.rpmb_state=${rpmb_state};
storeboot=get_system_as_root_mode;echo system_mode: ${system_mode};if test ${system_mode} = 1; then setenv fs_type ro rootwait skip_initramfs;run storeargs;fi;get_valid_slot;get_avb_mode;echo active_slot: ${active_slot} avb2: ${avb2};if test ${active_slot} != normal; then setenv bootargs ${bootargs} androidboot.slot_suffix=${active_slot};fi;if test ${avb2} = 0; then if test ${active_slot} = _a; then setenv bootargs ${bootargs} root=/dev/mmcblk0p23;else if test ${active_slot} = _b; then setenv bootargs ${bootargs} root=/dev/mmcblk0p24;fi;fi;fi;if imgread kernel ${boot_part} ${loadaddr}; then bootm ${loadaddr}; fi;run update;
switch_bootmode=get_rebootmode;if test ${reboot_mode} = factory_reset; then setenv reboot_mode_android normal;run storeargs;run recovery_from_flash;else if test ${reboot_mode} = update; then setenv reboot_mode_android normal;run storeargs;run update;else if test ${reboot_mode} = quiescent; then setenv reboot_mode_android quiescent;run storeargs;setenv bootargs ${bootargs} androidboot.quiescent=1;else if test ${reboot_mode} = recovery_quiescent; then setenv reboot_mode_android quiescent;run storeargs;setenv bootargs ${bootargs} androidboot.quiescent=1;run recovery_from_flash;else if test ${reboot_mode} = cold_boot; then setenv reboot_mode_android normal;run storeargs;else if test ${reboot_mode} = fastboot; then setenv reboot_mode_android normal;run storeargs;fastboot;fi;fi;fi;fi;fi;fi;if monitor_bt_cmdline; then run update; fi;
system_mode=1
try_auto_burn=update 700 750;
update=run try_auto_burn; if usb start 0; then run recovery_from_udisk;fi;run recovery_from_flash;
upgrade_check=echo upgrade_step=${upgrade_step}; if itest ${upgrade_step} == 3; then run init_display; run storeargs; run update;else fi;
upgrade_step=2
usb_burning=update 1000
wifi_ccode=US
wifimac=00:00:00:00:00:00
wipe_cache=successful
wipe_data=successful
Environment size: 7334/65532 bytes
I'm not sure if imgread is being called by the normal boot process, or a recovery process because the device failed to boot.
At the uart prompt type:
imgread dtb boot 0x1000000
imgread kernel boot 0x1080000
bootm 0x1080000
and post the output.
If it's the same error as before, the boot partition might not be flashed with the correct image.
gxl_aquaman_v1#imgread dtb boot 0x1000000
Err imgread(L220):Fmt unsupported! only support 0x3
gxl_aquaman_v1#imgread kernel boot 0x1080000
Err imgread(L328):Fmt unsupported!genFmt 0x0 != 0x3
gxl_aquaman_v1#imgread kernel boot 0x1080000
Err imgread(L328):Fmt unsupported!genFmt 0x0 != 0x3
gxl_aquaman_v1#<INTERRUPT>
gxl_aquaman_v1#bootm 0x1080000
aml log : Sig Check 1830
kedzior.kedzior said:
gxl_aquaman_v1#imgread dtb boot 0x1000000
Err imgread(L220):Fmt unsupported! only support 0x3
Click to expand...
Click to collapse
Are you able to flash the boot partition with the boot image again?
Which version of the firmware did you flash?
Are you able to flash the boot partition with the boot image again?
Yes
Which version of the firmware did you flash?
https://disk.yandex.ru/d/aL5XolrdAbTJ0g How to check it?
Other than this one I have no other
Did you flash it with fastboot or burn mode?
According to the instructions from the post https://forum.xda-developers.com/t/help-please-mdz-24-aa-no-power-led-no-video.4452819/post-87044521
but one of the commands "fastboot oem unlock" not working
"astboot flashing unlock" worked
"fastboot flashing unlock_critical" worked
I notice from the environment that the bootloader is currently locked.
The russian guy in the video mentioned that it is important to keep the older version of the bootloader, because the newer version could lock you out.
What I would try is starting fastboot, and then using the ota source files, flashing all of the partitions again, except NOT the bootloader.
What you could try first is just flashing the boot partition again from whatever firmware you used the last time.
Unfortunately, I do not have the previous works version :/
kedzior.kedzior said:
https://disk.yandex.ru/d/aL5XolrdAbTJ0g How to check it?
Click to expand...
Click to collapse
I will check that version, and will also check which version is the newest version.
At the uart prompt, type:
get_bootloaderversion
and post the version.
Functioner said:
At the uart prompt, type:
get_bootloaderversion
and post the version.
Click to expand...
Click to collapse
gxl_aquaman_v1#get_bootloaderversion
Nieznane polecenie 'get_bootloaderversion' - spróbuj 'help'
C:\adb>fastboot getvar version-bootloader
version-bootloader: U-Boot 2015.01-g2e3e77d-dirty
Finished. Total time: 0.003s
The version of the firmware in backup-Restore.rar from the above yandex link is r293:
Xiaomi/aquaman/aquaman:9/PI/293:user/release-keys
This is quite old. It's from May 26 2020.
If you flashed the tee image from that download, it could have corrupted your device.
thank you very much for your help and your time. I will continue to try to bring my stick back to life
kedzior.kedzior said:
thank you very much for your help and your time. I will continue to try to bring my stick back to life
Click to expand...
Click to collapse
sure, good luck.

Categories

Resources