Is this JF log ok? Benq Drive won't return into vendor mode
Posted: Tue Sep 29, 2009 5:59 am
Below is the JF log of me having just updated my firmware to ixtreme 1.6. Everything seemed ok, I read, auto-loaded, then wrote back. Then I read again just to confirm that the drive now has 1.6, sent outro, and it just sat there looking at me blankly.
Since then, it won't go back into vendor mode. I'm using a HP dc5700 intel chipset, portio32 is installed and running.
Any thoughts?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.62 Beta
Session Started Tue Sep 29 11:24:14 2009
This is a 32 bit process running on 2 x 32 bit CPUs
PortIO is installed and running.
Found 4 I/O Ports.
Found 3 Com Ports.
Found 4 windows drives C: E: F: G:
Found 0 CD/DVD drives
Getting Status from port 0x1218
Invalid Status 0x50
Getting Status from port 0x1218
Invalid Status 0x50
Sending Magic Keys to Drive on port 0x0x1218
..........................................
Done!
Sending Vendor Intro
Requesting Device ID
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
Getting Status from port 0x1218
Serial flash found with Status 0x73
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Benq Dump file saved to E:\Benq iXtreme v1.4\8x\BENQ-OFW1.bin
Loading MTK_Flash source file
Inquiry string found
Identify string found
DVD key found @ 0xE030 key is AEDE692A3... Good key
Firmware is Benq OSIG: PBDS VAD6038-64930C
Firmware spoofed as: SATA DVD-ROM 6243
Firmware type is: iXtreme v1.4-8x
Auto-Loading target file E:\JungleFlasher v0.1.62 inc FW Pack\firmware\ix16-benq.bin
Target File MD5 hash is: f36c85c5bfba325b283417f8643d7c27
Genuine Benq iXtreme 1.6
Inquiry string found
Identify string found
DVD key found @ 0xE030 key is 77777777777777777777777777777777
Firmware is Benq OSIG: PBDS VAD6038-64930C
Firmware type is: iXtreme v1.60-12x-FINAL-VAD6038
Spoofing Target
DVD Key copied to target
Inquiry string copied from Source to Target
Inquiry string also copied to banks 1, 2, 3 for Benq
Identify string copied from Source to Target
Identify string also copied to banks 1, 2, 3 for Benq
Target spoofed as: SATA DVD-ROM 6243
0xFF00 area copied for Benq to Benq
Target f/w saved as: E:\Benq iXtreme v1.4\8x\Benq_CFW1.bin
Getting Status from port 0x1218
SPi flash found with Status 0x73
Sending Chip Erase to Port 0x1218
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Write verified OK !
Getting Status from port 0x1218
Serial flash found with Status 0x73
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Benq Dump file saved to E:\Benq iXtreme v1.4\8x\BENQ-OFW.verify.bin
Loading MTK_Flash source file
Inquiry string found
Identify string found
DVD key found @ 0xE030 key is AEDE692A3... Good key
Firmware is Benq OSIG: PBDS VAD6038-64930C
Firmware spoofed as: SATA DVD-ROM 6243
Firmware type is: iXtreme v1.60-12x-FINAL-VAD6038
Auto-Loading target file E:\JungleFlasher v0.1.62 inc FW Pack\firmware\ix16-benq.bin
Target File MD5 hash is: f36c85c5bfba325b283417f8643d7c27
Genuine Benq iXtreme 1.6
Inquiry string found
Identify string found
DVD key found @ 0xE030 key is 77777777777777777777777777777777
Firmware is Benq OSIG: PBDS VAD6038-64930C
Firmware type is: iXtreme v1.60-12x-FINAL-VAD6038
Spoofing Target
DVD Key copied to target
Inquiry string copied from Source to Target
Inquiry string also copied to banks 1, 2, 3 for Benq
Identify string copied from Source to Target
Identify string also copied to banks 1, 2, 3 for Benq
Target spoofed as: SATA DVD-ROM 6243
0xFF00 area copied for Benq to Benq
Sending Vendor Outro to port 0x1218
Since then, it won't go back into vendor mode. I'm using a HP dc5700 intel chipset, portio32 is installed and running.
Any thoughts?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.62 Beta
Session Started Tue Sep 29 11:24:14 2009
This is a 32 bit process running on 2 x 32 bit CPUs
PortIO is installed and running.
Found 4 I/O Ports.
Found 3 Com Ports.
Found 4 windows drives C: E: F: G:
Found 0 CD/DVD drives
Getting Status from port 0x1218
Invalid Status 0x50
Getting Status from port 0x1218
Invalid Status 0x50
Sending Magic Keys to Drive on port 0x0x1218
..........................................
Done!
Sending Vendor Intro
Requesting Device ID
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
Getting Status from port 0x1218
Serial flash found with Status 0x73
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Benq Dump file saved to E:\Benq iXtreme v1.4\8x\BENQ-OFW1.bin
Loading MTK_Flash source file
Inquiry string found
Identify string found
DVD key found @ 0xE030 key is AEDE692A3... Good key
Firmware is Benq OSIG: PBDS VAD6038-64930C
Firmware spoofed as: SATA DVD-ROM 6243
Firmware type is: iXtreme v1.4-8x
Auto-Loading target file E:\JungleFlasher v0.1.62 inc FW Pack\firmware\ix16-benq.bin
Target File MD5 hash is: f36c85c5bfba325b283417f8643d7c27
Genuine Benq iXtreme 1.6
Inquiry string found
Identify string found
DVD key found @ 0xE030 key is 77777777777777777777777777777777
Firmware is Benq OSIG: PBDS VAD6038-64930C
Firmware type is: iXtreme v1.60-12x-FINAL-VAD6038
Spoofing Target
DVD Key copied to target
Inquiry string copied from Source to Target
Inquiry string also copied to banks 1, 2, 3 for Benq
Identify string copied from Source to Target
Identify string also copied to banks 1, 2, 3 for Benq
Target spoofed as: SATA DVD-ROM 6243
0xFF00 area copied for Benq to Benq
Target f/w saved as: E:\Benq iXtreme v1.4\8x\Benq_CFW1.bin
Getting Status from port 0x1218
SPi flash found with Status 0x73
Sending Chip Erase to Port 0x1218
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Write verified OK !
Getting Status from port 0x1218
Serial flash found with Status 0x73
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Benq Dump file saved to E:\Benq iXtreme v1.4\8x\BENQ-OFW.verify.bin
Loading MTK_Flash source file
Inquiry string found
Identify string found
DVD key found @ 0xE030 key is AEDE692A3... Good key
Firmware is Benq OSIG: PBDS VAD6038-64930C
Firmware spoofed as: SATA DVD-ROM 6243
Firmware type is: iXtreme v1.60-12x-FINAL-VAD6038
Auto-Loading target file E:\JungleFlasher v0.1.62 inc FW Pack\firmware\ix16-benq.bin
Target File MD5 hash is: f36c85c5bfba325b283417f8643d7c27
Genuine Benq iXtreme 1.6
Inquiry string found
Identify string found
DVD key found @ 0xE030 key is 77777777777777777777777777777777
Firmware is Benq OSIG: PBDS VAD6038-64930C
Firmware type is: iXtreme v1.60-12x-FINAL-VAD6038
Spoofing Target
DVD Key copied to target
Inquiry string copied from Source to Target
Inquiry string also copied to banks 1, 2, 3 for Benq
Identify string copied from Source to Target
Identify string also copied to banks 1, 2, 3 for Benq
Target spoofed as: SATA DVD-ROM 6243
0xFF00 area copied for Benq to Benq
Sending Vendor Outro to port 0x1218