hi
can you help me?
560796d0fae04fae9b9abb1dcee970ed
DUMP SBK VIA USB
Chip UID
15d8ca2df2bfe0f
please, gracias <3
560796d0fae04fae9b9abb1dcee970ed
DUMP SBK VIA USB
Chip UID
15d8ca2df2bfe0f
please, gracias <3
Output.
# cat /AndroidRoot/cpuinfo
Processor : ARMv7 Processor rev 9 (v7l)
processor : 0
BogoMIPS : 1993.93
processor : 1
BogoMIPS : 1993.93
processor : 2
BogoMIPS : 1993.93
processor : 3
BogoMIPS : 1993.93
Features : swp half thumb fastmult vfp edsp neon vfpv3 tls
CPU implementer : 0x41
CPU architecture: 7
CPU variant : 0x2
CPU part : 0xc09
CPU revision : 9
Hardware : grouper
Revision : 0000
Serial : 15d8ca2df2bfe0f
# ./mknvfblob -W -K 560796d0fae04fae9b9abb1dcee970ed --blob test.blob --bctin n7.bct --bctr testr.bct --bctc testc.bct --blin bootloader.grouper.XBT --blout test.ebt
mknvfblob
---------
Encrypting BL 'bootloader.grouper.XBT' to 'test.ebt'...done.
Generating encrypted recovery BCT from 'n7.bct' to 'testr.bct'...done.
Generating encrypted create BCT from 'n7.bct' to 'testc.bct'...done.
Generating blob file 'test.blob'...done.
Adding create BCT to blob file [wheelie]...done.
Adding recovery BCT to blob file [wheelie]...done.
Adding bootloader to blob file [wheelie]...done.
Adding odmdata to blob file [wheelie]...done.
Adding chip id to blob file [wheelie]...done.
Output.
# cat /AndroidRoot/cpuinfo
Processor : ARMv7 Processor rev 9 (v7l)
processor : 0
BogoMIPS : 1993.93
processor : 1
BogoMIPS : 1993.93
processor : 2
BogoMIPS : 1993.93
processor : 3
BogoMIPS : 1993.93
Features : swp half thumb fastmult vfp edsp neon vfpv3 tls
CPU implementer : 0x41
CPU architecture: 7
CPU variant : 0x2
CPU part : 0xc09
CPU revision : 9
Hardware : grouper
Revision : 0000
Serial : 15d2856b2380a09
# ./mknvfblob -W -K d6bad4547601448bb2b6d3fb67e8080b --blob test.blob --bctin n7.bct --bctr testr.bct --bctc testc.bct --blin bootloader.grouper.XBT --blout test.ebt
mknvfblob
---------
Encrypting BL 'bootloader.grouper.XBT' to 'test.ebt'...done.
Generating encrypted recovery BCT from 'n7.bct' to 'testr.bct'...done.
Generating encrypted create BCT from 'n7.bct' to 'testc.bct'...done.
Generating blob file 'test.blob'...done.
Adding create BCT to blob file [wheelie]...done.
Adding recovery BCT to blob file [wheelie]...done.
Adding bootloader to blob file [wheelie]...done.
Adding odmdata to blob file [wheelie]...done.
Adding chip id to blob file [wheelie]...done.
Thank you so much!Output.
Code:# cat /AndroidRoot/cpuinfo Processor : ARMv7 Processor rev 9 (v7l) processor : 0 BogoMIPS : 1993.93 processor : 1 BogoMIPS : 1993.93 processor : 2 BogoMIPS : 1993.93 processor : 3 BogoMIPS : 1993.93 Features : swp half thumb fastmult vfp edsp neon vfpv3 tls CPU implementer : 0x41 CPU architecture: 7 CPU variant : 0x2 CPU part : 0xc09 CPU revision : 9 Hardware : grouper Revision : 0000 Serial : 15d2856b2380a09 # ./mknvfblob -W -K d6bad4547601448bb2b6d3fb67e8080b --blob test.blob --bctin n7.bct --bctr testr.bct --bctc testc.bct --blin bootloader.grouper.XBT --blout test.ebt mknvfblob --------- Encrypting BL 'bootloader.grouper.XBT' to 'test.ebt'...done. Generating encrypted recovery BCT from 'n7.bct' to 'testr.bct'...done. Generating encrypted create BCT from 'n7.bct' to 'testc.bct'...done. Generating blob file 'test.blob'...done. Adding create BCT to blob file [wheelie]...done. Adding recovery BCT to blob file [wheelie]...done. Adding bootloader to blob file [wheelie]...done. Adding odmdata to blob file [wheelie]...done. Adding chip id to blob file [wheelie]...done.
Output.
# cat cpuinfo
Processor : ARMv7 Processor rev 9 (v7l)
processor : 0
BogoMIPS : 1993.93
processor : 1
BogoMIPS : 1993.93
processor : 2
BogoMIPS : 1993.93
processor : 3
BogoMIPS : 1993.93
Features : swp half thumb fastmult vfp edsp neon vfpv3 tls
CPU implementer : 0x41
CPU architecture: 7
CPU variant : 0x2
CPU part : 0xc09
CPU revision : 9
Hardware : grouper
Revision : 0000
Serial : 15d4a5f1f1ffc0c
#./mknvfblob -W -K 8e5cbc2c2324407ebf144fa443a31ba8 --blob test.blob --bctin n7.bct --bctr testr.bct --bctc testc.bct --blin bootloader.grouper.XBT --blout test.ebt
mknvfblob
---------
Encrypting BL 'bootloader.grouper.XBT' to 'test.ebt'...done.
Generating encrypted recovery BCT from 'n7.bct' to 'testr.bct'...done.
Generating encrypted create BCT from 'n7.bct' to 'testc.bct'...done.
Generating blob file 'test.blob'...done.
Adding create BCT to blob file [wheelie]...done.
Adding recovery BCT to blob file [wheelie]...done.
Adding bootloader to blob file [wheelie]...done.
Adding odmdata to blob file [wheelie]...done.
Adding chip id to blob file [wheelie]...done.
Thank you !Output.
Code:# cat cpuinfo Processor : ARMv7 Processor rev 9 (v7l) processor : 0 BogoMIPS : 1993.93 processor : 1 BogoMIPS : 1993.93 processor : 2 BogoMIPS : 1993.93 processor : 3 BogoMIPS : 1993.93 Features : swp half thumb fastmult vfp edsp neon vfpv3 tls CPU implementer : 0x41 CPU architecture: 7 CPU variant : 0x2 CPU part : 0xc09 CPU revision : 9 Hardware : grouper Revision : 0000 Serial : 15d4a5f1f1ffc0c #./mknvfblob -W -K 8e5cbc2c2324407ebf144fa443a31ba8 --blob test.blob --bctin n7.bct --bctr testr.bct --bctc testc.bct --blin bootloader.grouper.XBT --blout test.ebt mknvfblob --------- Encrypting BL 'bootloader.grouper.XBT' to 'test.ebt'...done. Generating encrypted recovery BCT from 'n7.bct' to 'testr.bct'...done. Generating encrypted create BCT from 'n7.bct' to 'testc.bct'...done. Generating blob file 'test.blob'...done. Adding create BCT to blob file [wheelie]...done. Adding recovery BCT to blob file [wheelie]...done. Adding bootloader to blob file [wheelie]...done. Adding odmdata to blob file [wheelie]...done. Adding chip id to blob file [wheelie]...done.
Output.
# cat /AndroidRoot/cpuinfo
Processor : ARMv7 Processor rev 9 (v7l)
processor : 0
BogoMIPS : 1993.93
processor : 1
BogoMIPS : 1993.93
processor : 2
BogoMIPS : 1993.93
processor : 3
BogoMIPS : 1993.93
Features : swp half thumb fastmult vfp edsp neon vfpv3 tls
CPU implementer : 0x41
CPU architecture: 7
CPU variant : 0x2
CPU part : 0xc09
CPU revision : 9
Hardware : grouper
Revision : 0000
Serial : 15d24bc781ff808
# ./mknvfblob -W -K 2d240596de1742869b49fe3991d79684 --blob test.blob --bctin n7.bct --bctr testr.bct --bctc testc.bct --blin bootloader.grouper.XBT --blout test.ebt
mknvfblob
---------
Encrypting BL 'bootloader.grouper.XBT' to 'test.ebt'...done.
Generating encrypted recovery BCT from 'n7.bct' to 'testr.bct'...done.
Generating encrypted create BCT from 'n7.bct' to 'testc.bct'...done.
Generating blob file 'test.blob'...done.
Adding create BCT to blob file [wheelie]...done.
Adding recovery BCT to blob file [wheelie]...done.
Adding bootloader to blob file [wheelie]...done.
Adding odmdata to blob file [wheelie]...done.
Adding chip id to blob file [wheelie]...done.
sending file: testr.bct
- 6128/6128 bytes sent
testr.bct sent successfully
command failure: bootloader download failed (bad data)
bootloader status: device failure (code: 2) message: flags: 0
waiting for bootloader to initialize
Output.
Code:# cat cpuinfo Processor : ARMv7 Processor rev 9 (v7l) processor : 0 BogoMIPS : 1993.93 processor : 1 BogoMIPS : 1993.93 processor : 2 BogoMIPS : 1993.93 processor : 3 BogoMIPS : 1993.93 Features : swp half thumb fastmult vfp edsp neon vfpv3 tls CPU implementer : 0x41 CPU architecture: 7 CPU variant : 0x2 CPU part : 0xc09 CPU revision : 9 Hardware : grouper Revision : 0000 Serial : 15d4a5f1f1ffc0c #./mknvfblob -W -K 8e5cbc2c2324407ebf144fa443a31ba8 --blob test.blob --bctin n7.bct --bctr testr.bct --bctc testc.bct --blin bootloader.grouper.XBT --blout test.ebt mknvfblob --------- Encrypting BL 'bootloader.grouper.XBT' to 'test.ebt'...done. Generating encrypted recovery BCT from 'n7.bct' to 'testr.bct'...done. Generating encrypted create BCT from 'n7.bct' to 'testc.bct'...done. Generating blob file 'test.blob'...done. Adding create BCT to blob file [wheelie]...done. Adding recovery BCT to blob file [wheelie]...done. Adding bootloader to blob file [wheelie]...done. Adding odmdata to blob file [wheelie]...done. Adding chip id to blob file [wheelie]...done.
Output.
# cat cpuinfo
Processor : ARMv7 Processor rev 9 (v7l)
processor : 0
BogoMIPS : 1993.93
processor : 1
BogoMIPS : 1993.93
processor : 2
BogoMIPS : 1993.93
processor : 3
BogoMIPS : 1993.93
Features : swp half thumb fastmult vfp edsp neon vfpv3 tls
CPU implementer : 0x41
CPU architecture: 7
CPU variant : 0x2
CPU part : 0xc09
CPU revision : 9
Hardware : grouper
Revision : 0000
Serial : 15d262e7c10160f
# ./mknvfblob -W -K 68dfb2acf37345daa480b454048505ea --blob test.blob --bctin n7.bct --bctr testr.bct --bctc testc.bct --blin bootloader.grouper.XBT --blout test.ebt
mknvfblob
---------
Encrypting BL 'bootloader.grouper.XBT' to 'test.ebt'...done.
Generating encrypted recovery BCT from 'n7.bct' to 'testr.bct'...done.
Generating encrypted create BCT from 'n7.bct' to 'testc.bct'...done.
Generating blob file 'test.blob'...done.
Adding create BCT to blob file [wheelie]...done.
Adding recovery BCT to blob file [wheelie]...done.
Adding bootloader to blob file [wheelie]...done.
Adding odmdata to blob file [wheelie]...done.
Adding chip id to blob file [wheelie]...done.
If the storage eMMc asking for password, that is probably a worn or too old eMMC ( unable to write) the Assus pad ME172V also asking that password, when the pad has been repaired (recovered) successfully by micro SD card inserting special recover procedures performed so many times, then one day the restore procedure screen asking for password, it never happened before, then logo just on forever. Try to look at the eMMC replacement, if that is the cause! Good luck!Thanks...I have already unbricked...but now the problem is that it goes to apx when turned off...it is shown in device manager as adb bridge but can't access in adb devices...it is also password protected...so I can't go to settings etc ..any help...I flashed boot image,bootloader etc in apx mode...after that it started as normal but faced this problem...It is not mine...It was brought by someone to repair...I will ask password and try to reset from settings... let's see.
I have already rectified it. Thank you.If the storage eMMc asking for password, that is probably a worn or too old eMMC ( unable to write) the Assus pad ME172V also asking that password, when the pad has been repaired (recovered) successfully by micro SD card inserting special recover procedures performed so many times, then one day the restore procedure screen asking for password, it never happened before, then logo just on forever. Try to look at the eMMC replacement, if that is the cause! Good luck!
Output.Chip UID: 15d4a5f01040e0e
SBK: f78a47a0817b43a9a6e07514412b2cf3
# cat /AndroidRoot/cpuinfo
Processor : ARMv7 Processor rev 9 (v7l)
processor : 0
BogoMIPS : 1993.93
processor : 1
BogoMIPS : 1993.93
processor : 2
BogoMIPS : 1993.93
processor : 3
BogoMIPS : 1993.93
Features : swp half thumb fastmult vfp edsp neon vfpv3 tls
CPU implementer : 0x41
CPU architecture: 7
CPU variant : 0x2
CPU part : 0xc09
CPU revision : 9
Hardware : grouper
Revision : 0000
Serial : 15d4a5f01040e0e
# ./mknvfblob -W -K f78a47a0817b43a9a6e07514412b2cf3 --blob test.blob --bctin n7.bct --bctr testr.bct --bctc testc.bct --blin bootloader.grouper.XBT --blout test.ebt
mknvfblob
---------
Encrypting BL 'bootloader.grouper.XBT' to 'test.ebt'...done.
Generating encrypted recovery BCT from 'n7.bct' to 'testr.bct'...done.
Generating encrypted create BCT from 'n7.bct' to 'testc.bct'...done.
Generating blob file 'test.blob'...done.
Adding create BCT to blob file [wheelie]...done.
Adding recovery BCT to blob file [wheelie]...done.
Adding bootloader to blob file [wheelie]...done.
Adding odmdata to blob file [wheelie]...done.
Adding chip id to blob file [wheelie]...done.
You are so kind, thanks a lot! I am going to work on this malfunction Nexus 7, there are a lot of people's Nexus 7 being saved by you within so many years in here!Output.
Code:# cat /AndroidRoot/cpuinfo Processor : ARMv7 Processor rev 9 (v7l) processor : 0 BogoMIPS : 1993.93 processor : 1 BogoMIPS : 1993.93 processor : 2 BogoMIPS : 1993.93 processor : 3 BogoMIPS : 1993.93 Features : swp half thumb fastmult vfp edsp neon vfpv3 tls CPU implementer : 0x41 CPU architecture: 7 CPU variant : 0x2 CPU part : 0xc09 CPU revision : 9 Hardware : grouper Revision : 0000 Serial : 15d4a5f01040e0e # ./mknvfblob -W -K f78a47a0817b43a9a6e07514412b2cf3 --blob test.blob --bctin n7.bct --bctr testr.bct --bctc testc.bct --blin bootloader.grouper.XBT --blout test.ebt mknvfblob --------- Encrypting BL 'bootloader.grouper.XBT' to 'test.ebt'...done. Generating encrypted recovery BCT from 'n7.bct' to 'testr.bct'...done. Generating encrypted create BCT from 'n7.bct' to 'testc.bct'...done. Generating blob file 'test.blob'...done. Adding create BCT to blob file [wheelie]...done. Adding recovery BCT to blob file [wheelie]...done. Adding bootloader to blob file [wheelie]...done. Adding odmdata to blob file [wheelie]...done. Adding chip id to blob file [wheelie]...done.
Output.SBK : 4b0ec989167f4beb996ff9d88bdc0022
Chip UID : 15d07874d3ff807
# cat cpuinfo
Processor : ARMv7 Processor rev 9 (v7l)
processor : 0
BogoMIPS : 1993.93
processor : 1
BogoMIPS : 1993.93
processor : 2
BogoMIPS : 1993.93
processor : 3
BogoMIPS : 1993.93
Features : swp half thumb fastmult vfp edsp neon vfpv3 tls
CPU implementer : 0x41
CPU architecture: 7
CPU variant : 0x2
CPU part : 0xc09
CPU revision : 9
Hardware : grouper
Revision : 0000
Serial : 15d07874d3ff807
# ./mknvfblob -W -K 4b0ec989167f4beb996ff9d88bdc0022 --blob test.blob --bctin n7.bct --bctr testr.bct --bctc testc.bct --blin bootloader.grouper.XBT --blout test.ebt
mknvfblob
---------
Encrypting BL 'bootloader.grouper.XBT' to 'test.ebt'...done.
Generating encrypted recovery BCT from 'n7.bct' to 'testr.bct'...done.
Generating encrypted create BCT from 'n7.bct' to 'testc.bct'...done.
Generating blob file 'test.blob'...done.
Adding create BCT to blob file [wheelie]...done.
Adding recovery BCT to blob file [wheelie]...done.
Adding bootloader to blob file [wheelie]...done.
Adding odmdata to blob file [wheelie]...done.
Adding chip id to blob file [wheelie]...done.
sudo apt-get install python-usb python3-usb
pip install pyusb
sudo ./fusee-launcher.py –tty dump-sbk-via-usb.bin
05f4a5d01'
Stack snapshot: b'0000000000000000100000003c9f0040'
EndpointStatus_stack_addr: 0x40009f3c
ProcessSetupPacket SP: 0x40009f30
InnerMemcpy LR stack addr: 0x40009f20
overwrite_len: 0x00004f20
overwrite_payload_off: 0x00004de0
payload_first_length: 0x00004de0
overwrite_payload_off: 0x00004de0
payload_second_length: 0x0000c7b0
b'00a0004000300040e04d0000b0c70000'
Setting rcm msg size to 0x00030064
RCM payload (len_insecure): b'64000300'
Setting ourselves up to smash the stack...
Payload offset of intermezzo: 0x00000074
overwrite_payload_off: 0x00004de0
overwrite_len: 0x00004f20
payload_overwrite_len: 0x00004e5c
overwrite_payload_off: 0x00004de0
smash_padding: 0x00000000
overwrite_payload_off: 0x00004de0
Uploading payload...
txing 73728 bytes total
txing 4096 bytes (0 already sent) to buf[0] 0x40003000
txing 4096 bytes (4096 already sent) to buf[1] 0x40005000
txing 4096 bytes (8192 already sent) to buf[0] 0x40003000
txing 4096 bytes (12288 already sent) to buf[1] 0x40005000
txing 4096 bytes (16384 already sent) to buf[0] 0x40003000
txing 4096 bytes (20480 already sent) to buf[1] 0x40005000
txing 4096 bytes (24576 already sent) to buf[0] 0x40003000
txing 4096 bytes (28672 already sent) to buf[1] 0x40005000
txing 4096 bytes (32768 already sent) to buf[0] 0x40003000
txing 4096 bytes (36864 already sent) to buf[1] 0x40005000
txing 4096 bytes (40960 already sent) to buf[0] 0x40003000
txing 4096 bytes (45056 already sent) to buf[1] 0x40005000
txing 4096 bytes (49152 already sent) to buf[0] 0x40003000
txing 4096 bytes (53248 already sent) to buf[1] 0x40005000
txing 4096 bytes (57344 already sent) to buf[0] 0x40003000
txing 4096 bytes (61440 already sent) to buf[1] 0x40005000
txing 4096 bytes (65536 already sent) to buf[0] 0x40003000
txing 4096 bytes (69632 already sent) to buf[1] 0x40005000
txing 4096 bytes total
txing 4096 bytes (0 already sent) to buf[0] 0x40003000
Smashing the stack...
sending status request with length 0x00004f20
The USB device stopped responding-- sure smells like we've smashed its stack. :)
Launch complete!
b'4445414442454546'
DEADBEEF
b'3030303030303030'
00000000
b'3030303030303030'
00000000
b'3034303030303930'
04000090
b'4634314330433241'
F41C0C2A
b'3133333731333337'
13371337
b'3535353535353535'
55555555
b'3430303033303030'
40003000
b'3430303035303030'
40005000
b'4141414141414141'
AAAAAAAA
b'3131313131313131'
11111111
b'3030303030303236'
00000026
b'3232323232323232'
22222222
b'68656c6c6f2c20776f726c640a00'
hello, world
b'e57de3bab6cb499d874d5772cb219f0101042c20'
Traceback (most recent call last):
File "./fusee-launcher.py", line 823, in <module>
buf = switch.read(USB_XFER_MAX)
File "./fusee-launcher.py", line 530, in read
return self.backend.read(length)
File "./fusee-launcher.py", line 134, in read
return bytes(self.dev.read(0x81, length, 3000))
File "/usr/local/lib/python3.6/dist-packages/usb/core.py", line 988, in read
self.__get_timeout(timeout))
File "/usr/local/lib/python3.6/dist-packages/usb/_debug.py", line 60, in do_trace
return f(*args, **named_args)
File "/usr/local/lib/python3.6/dist-packages/usb/backend/libusb1.py", line 833, in bulk_read
timeout)
File "/usr/local/lib/python3.6/dist-packages/usb/backend/libusb1.py", line 936, in __read
_check(retval)
File "/usr/local/lib/python3.6/dist-packages/usb/backend/libusb1.py", line 595, in _check
raise USBError(_strerror(ret), ret, _libusb_errno[ret])
usb.core.USBError: [Errno 110] Operation timed out
hello, world
b'e57de3bab6cb499d874d5772cb219f0101042c20'
e57de3bab6cb499d874d5772cb219f01
./wheelie --blob blob.bin
Wheelie 0.1 - Preflight for nvflash.
Copyright (c) 2011-2012 androidroot.mobi
========================================
[=] Chip UID: 0x98254853062001158
[-] Incorrect SBK or SBK type selected. nverror: 0x4.
98254853062001158
adb shell
su
mkdir /AndroidRoot
cat /proc/cpuinfo > /AndroidRoot/cpuinfo
adb pull /AndroidRoot
Processor : ARMv7 Processor rev 9 (v7l)
processor : 0
BogoMIPS : 1993.93
processor : 1
BogoMIPS : 1993.93
processor : 2
BogoMIPS : 1993.93
processor : 3
BogoMIPS : 1993.93
Features : swp half thumb fastmult vfp edsp neon vfpv3 tls
CPU implementer : 0x41
CPU architecture: 7
CPU variant : 0x2
CPU part : 0xc09
CPU revision : 9
Hardware : grouper
Revision : 0000
Serial : 015d4a5f202c0401
adb push AndroidRoot /
cd /AndroidRoot
chmod 777 ./mknvfblob
./mknvfblob -W -K <your SBK> --blob /AndroidRoot/test.blob --bctin /AndroidRoot/n7.bct --bctr /AndroidRoot/testr.bct --bctc /AndroidRoot/testc.bct --blin /AndroidRoot/bootloader.grouper.XBT --blout /AndroidRoot/test.ebt
sudo ./nvflash --bl test.ebt --bct testr.bct --blob test.blob
command error: no command found
./nvflash --setbct --create --configfile <your flash.cfg> --bl test.ebt --bct testr.bct --blob test.blob
Nvflash v1.13.87205 started
Using blob v1.13.00000
chip uid from BR is: 0x0000000000000000015d2bc285340e0f
rcm version 0X30001
System Information:
chip name: unknown
chip id: 0x30 major: 1 minor: 3
chip sku: 0x83
chip uid: 0x0000000000000000015d2bc285340e0f
macrovision: disabled
hdcp: enabled
jtag: disabled
sbk burned: true
dk burned: true
boot device: emmc
operating mode: 4
device config strap: 1
device config fuse: 17
sdram config strap: 0
sending file: recovery.bct
- 6128/6128 bytes sent
recovery.bct sent successfully
downloading bootloader -- load address: 0x80108000 entry point: 0x80108000
sending file: bootloader.ebt
- 2146912/2146912 bytes sent
bootloader.ebt sent successfully
waiting for bootloader to initialize
bootloader downloaded successfully
sudo ./nvflash --resume --download 8 boot.img
sudo ./nvflash --resume --download 4 bootloader.img
sudo ./nvflash --resume --go
fastboot boot flatline_grouper.img
sudo ./nvflash --resume --download 8 boot.img --go
In my case, this command also gives me the nverror 0x4 but it also did something to my Nexus 7 as it was required for the next step.When you get this error :
after this command :Code:Nvflash v1.10.76762 started Using blob v1.13.00000 chip uid from BR is: 0x0000000000000000015d4a5f202c0401 rcm version 0X30001 System Information: chip name: unknown chip id: 0x30 major: 1 minor: 3 chip sku: 0x83 chip uid: 0x0000000000000000015d4a5f202c0401 macrovision: disabled hdcp: enabled jtag: disabled sbk burned: true dk burned: true boot device: emmc operating mode: 4 device config strap: 2 device config fuse: 17 sdram config strap: 1 sending file: testr.bct - 6128/6128 bytes sent testr.bct sent successfully downloading bootloader -- load address: 0x80108000 entry point: 0x80108000 sending file: test.ebt - 2146896/2146896 bytes sent test.ebt sent successfully waiting for bootloader to initialize bootloader downloaded successfully setting device: 0 3 failed executing command 11 NvError 0x120002 command failure: create failed (bad data) bootloader status: specified device is invalid (code: 6) message: nverror:0x4 (0x4) flags: 0
Probably you have broken your internal storage!Code:./nvflash --configfile flash.cfg --create --bct testr.bct --setbct --bl test.ebt --blob test.blob --sync
You can probably flash:
Bootloader image (bootloader.img)
Kernel image (boot.img)
Recovery image (recovery.img aka TWRP)
But you CAN'T flash a new system via TWRP or fastboot, because the bootloader or the recovery was unable to connect to the partitions table.
You can try this command to erase bad blocks:
Reboot to APX mode and try the above command again.Code:./nvflash --resume --configfile flash.cfg --obliterate
But, broken internal storage is pretty much unrepairable.
There is some possibility of disassembly your device and overheat your memory IC, but this method is not easy and need more technical skill.
And in my case this did not help.
python.exe fusee-launcher.py --tty dump-sbk-via-usb.bin
Yes, I have successfully unbrick my Nexus 7 WITHOUT any type of blob file i have generated before.Hi, enderzip...
I've been keeping track of the recent developments regarding bricked Nexus 7's, APX mode and nvFlash, here on XDA. There's currently quite a few threads on this topic.
As I understand it, you've been motivated by a desire to recover data from your bootloader bricked Nexus 7. So my question is simple...
'Have you been successful?'
Have you actually resurrected a bricked Nexus 7 with no functioning bootloader AND with no originally created flatline wheelie blobs?
If so, you have done what I thought could not be done! I tip my hat to you, with your tenacity and your technical understanding of the complex issues involved.
If I had a Linux system myself, I'd be half-minded to dig out my old Nexus 7, deliberately bugger up the bootloader, and follow your instructions for the sheer technical challenge!
--------------------------------------
Some general thoughts...
The Nexus 7 is old (c.2012), and likely not many people use it anymore, but that's not what's important here. What is important is the persistence, the huge technical ability, and the sheer bloody minded refusal ~ by some ~ to let their Nexus 7 die... to go into what the poet Dylan Thomas called that 'good night'...
"Do not go gentle into that good night,
Old age should burn and rave at close of day;
Rage, rage against the dying of the light."
https://poets.org/poem/do-not-go-gentle-good-night
And in so doing, mayhap enderzip and others, have provided potential clues for other devices, other hardware, other phones or tablets, when faced with similar hard brick problems. One can but hope.
The above post by enderzip is technically way beyond me, and I have no immediate use for it, but it's a fundamental distillation of everything XDA stands for - namely, experimentation and creativity.
It's basically, amazing!
Thanks enderzip
Rgrds,
Ged.
Output.SBK : 4b0ec989167f4beb996ff9d88bdc0022
Chip UID : 15d07874d3ff807
# cat cpuinfo
Processor : ARMv7 Processor rev 9 (v7l)
processor : 0
BogoMIPS : 1993.93
processor : 1
BogoMIPS : 1993.93
processor : 2
BogoMIPS : 1993.93
processor : 3
BogoMIPS : 1993.93
Features : swp half thumb fastmult vfp edsp neon vfpv3 tls
CPU implementer : 0x41
CPU architecture: 7
CPU variant : 0x2
CPU part : 0xc09
CPU revision : 9
Hardware : grouper
Revision : 0000
Serial : 15d07874d3ff807
# ./mknvfblob -W -K 4b0ec989167f4beb996ff9d88bdc0022 --blob test.blob --bctin n7.bct --bctr testr.bct --bctc testc.bct --blin bootloader.grouper.XBT --blout test.ebt
mknvfblob
---------
Encrypting BL 'bootloader.grouper.XBT' to 'test.ebt'...done.
Generating encrypted recovery BCT from 'n7.bct' to 'testr.bct'...done.
Generating encrypted create BCT from 'n7.bct' to 'testc.bct'...done.
Generating blob file 'test.blob'...done.
Adding create BCT to blob file [wheelie]...done.
Adding recovery BCT to blob file [wheelie]...done.
Adding bootloader to blob file [wheelie]...done.
Adding odmdata to blob file [wheelie]...done.
Adding chip id to blob file [wheelie]...done.