QUOTE(fiveten @ Jun 30 2009, 07:14 AM)
![*](http://174.120.39.164/forums/style_images/1/post_snapback.gif)
Hello all,
I have a hitachi drive v46 I got off ebay. I am having trouble flashing my key and FW to the drive.
1) JF sees the drive
2) I can put it in mode b and verify it
3) I get errors no matter what option I pick for flashing
Here is the log from JF any help would be appreciated
JF LOG:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~
JungleFlasher 0.1.62 Beta
Session Started Mon Jun 29 22:53:50 2009
This is a 32 bit process running on 2 x 32 bit CPUs
PortIO is installed and running.
Found 6 I/O Ports.
Found 1 Com Ports.
Found 5 windows drives C: D: E: F: J:
Found 1 CD/DVD drives E:
Drive, answers normal Windows Inquiry 12 0 0 0 24 0
0000: 05 80 00 32 5B 00 00 00 - 48 4C 2D 44 54 2D 53 54 ...2[...HL-DT-ST
0010: 44 56 44 2D 52 4F 4D 20 - 47 44 52 33 31 32 30 4C DVD-ROM GDR3120L
0020: 30 30 34 36 0046
Mode-B Done!
Scanning for hardware changes
Found drive C: - Hard Drive.
Found drive D: - Hard Drive.
Found drive E: - CD/DVD.
Found drive F: - Hard Drive.
Found drive J: - Removable.
No Hitachi drives were found!
Dumping f/w of Hitachi 0046/0047 by Ram Upload Method via WIN32 API
UnLocked!
................................
Dumped in 579mS
Hitachi Dump file saved to D:\modding\xbox360\Software\JungleFlasher.0.1.62.Beta\JungleFlasher v0.1.62 Beta\firmware\Hit-OFW.bin
Loading Hitachi Dump to Source Buffer
Loading target file D:modding\xbox360\Software\JungleFlasher.0.1.62.Beta\JungleFlasher v0.1.62 Beta\firmware\Hit_CFW.bin
Target File MD5 hash is: 66f5f331cc94c0d72c6098d3962def88
Inquiry string found
Identify string found
Firmware is rev 0046
DVD key found @ 0x4F00 key is 0F823267933EF944E3794E33CE5A2E8E
Firmware is Hitachi OSIG: HL-DT-STDVD-ROM GDR3120L0046
Firmware spoofed as: PLDS DG-16D2S 7485
Firmware type is: iXtreme:1.51:v46S-12x
Flashing Hacked f/w to Hitachi 0046/0047 by Ram Upload Method via WIN32 API
UnLocked!
Dumping Flash:................................
Hitachi Dump file saved to D:\modding\xbox360\Software\JungleFlasher.0.1.62.Beta\JungleFlasher v0.1.62 Beta\firmware\Hit-OFW.bin
Loading Hitachi Dump to Source Buffer
D:\modding\xbox360\Software\JungleFlasher.0.1.62.Beta\JungleFlasher v0.1.62 Beta
Flashing Keys to Hitachi 0046/0047 by Ram Upload Method via WIN32 API
UnLocked!
Dumping Flash:................................
Hitachi Dump file saved to D:\Temp\modding\xbox360\Software\JungleFlasher.0.1.62.Beta\JungleFlasher v0.1.62 Beta\firmware\Hit-OFW.bin
Loading Hitachi Dump to Target Buffer
Firmware type is:
Flashing Keys to Hitachi 0046/0047 by Ram Upload Method via WIN32 API
UnLocked!
Dumping Flash:................................
Hitachi Dump file saved to D:\modding\xbox360\Software\JungleFlasher.0.1.62.Beta\JungleFlasher v0.1.62 Beta\firmware\Hit-OFW.bin
Loading Hitachi Dump to Target Buffer
Firmware type is:
Spoofing Target
DVD Keys are already the same
Inquiry string copied from Source to Target
Identify string copied from Source to Target
1 Sector Differences Found
Flash Stability Test
Flashing Sector 9003F000
Flash Code Execute Failed!
Dumping Sector 9003F000:....
Read back mis-compare, Restore Aborted
Flashing Spoof ID's to Hitachi 0046/0047 by Ram Upload Method via WIN32 API
UnLocked!
Dumping Flash:................................
Hitachi Dump file saved to D:\modding\xbox360\hardware\Drives\lite-on\LiteOn DG-16D2S\d608cg90181200pac\Hit-OFW.bin
Loading Hitachi Dump to Target Buffer
Firmware type is:
Spoofing Target
DVD Keys are already the same
Inquiry string copied from Source to Target
Identify string copied from Source to Target
Target spoofed as: HL-DT-STDVD-ROM GDR3120L0046
1 Sector Differences Found
Flash Stability Test
Flashing Sector 9003F000
Flash Code Execute Failed!
Dumping Sector 9003F000:....
Read back mis-compare, Restore Aborted
Flashing Hacked f/w to Hitachi 0046/0047 by Ram Upload Method via WIN32 API
UnLocked!
Dumping Flash:................................
Hitachi Dump file saved to D:\modding\xbox360\hardware\Drives\lite-on\LiteOn DG-16D2S\d608cg90181200pac\Hit-OFW.bin
Loading Hitachi Dump to Source Buffer
D:\Temp\modding\xbox360\Software\JungleFlasher.0.1.62.Beta\JungleFlasher v0.1.62 Beta
Restoring Stock f/w to Hitachi 0046/0047 by Ram Upload Method via WIN32 API
UnLocked!
Dumping Flash:................................Restore Aborted
Fixing Checksum of Hitachi 0046/0047 by Ram Upload Method via WIN32 API
UnLocked!
................................
Calculated Checksum 0xA5A5D030
Actual Checksum 0x30303030
Flash Stability Test
Flashing Sector 9003F000
Flash Code Execute Failed!
Dumping Sector 9003F000:....
Read back mis-compare, Restore Aborted
END LOG:
I have tried most options reads my hit. fw it thinks it is corrupt so it haults.
Does anyone know whats up?
use the system with via card , delete via drivers, activate portio hitachi ,check in dvdkey that card has status 39 , select portio instead of win api ,use ram upload method try that, sometimes using winapi windows pokes it nose in too much.