Dragon863 / EchoCLI

A python command line tool for rooting your Amazon Echo dot 2nd generation
98 stars 12 forks source link

short the device #3

Closed frostworx closed 1 year ago

frostworx commented 1 year ago

Hi there, First of all, thanks for this promising project! :)

I bought an echo dot2 just to try it and it arrived earlier today. Unfortunately, I have to admit that I'm a bit lost already with rooting the devices. It could be opened up easily, but I'm not sure how to follow those instructions:

INFO: Please short the device as shown in the image at https://dragon863.github.io/blog/mainboard.jpg

My first guess to simply ground it somewhere while plugging it into usb was apparently wrong (would have been too easy :)) so I'm afraid I'll have to communicate through the tiny pins shown here:

https://forum.xda-developers.com/t/amazon-echo-dot-2-locked-hardware.3512349/#post-77059942

right?

The url to the "set of slides" below the picture is 404 btw, but the good old wayback machine has a copy:

https://web.archive.org/web/20190926005232/https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1498230402.pdf

Would be great if you had a pointer into the right direction on how to short the device (still have (low) hopes that high precision soldering is not required :))

frostworx commented 1 year ago

@viraniac I'll provide you the requested data as soon as the device boots again. It refuses to do anything since I closed it just right now, sorry :)

viraniac commented 1 year ago

@viraniac I'll provide you the requested data as soon as the device boots again. It refuses to do anything since I closed it just right now, sorry :)

you are using mtkclient to boot right? Once rooted, device will never boot without it until you restore or update it. Updating will unroot the device

frostworx commented 1 year ago

@viraniac I'll provide you the requested data as soon as the device boots again. It refuses to do anything since I closed it just right now, sorry :)

you are using mtkclient to boot right? Once rooted, device will never boot without it

yes, plug the device in while holding the "dot" button, then run mtk plstage --preloader=preloader_no_hdr.bin (which seems to work) then wait for some light and/or adb device which both don't appear. It worked twice before I closed the device, so I assume reopening it again is a good next step :)

viraniac commented 1 year ago

No need to hold dot button now. Its only required if you want to start it into fastboot mode. Thats what we use to set fos_flags

viraniac commented 1 year ago

just run mtk plstage --preloader=preloader_no_hdr.bin and plug the device it will boot

frostworx commented 1 year ago

oh sorry, good to know anyway the problem likely simply was that I overwrote your preloader_no_hdr.bin while attempting to root my 2nd dot device... sorry for the noise

viraniac commented 1 year ago

makes sense. I haven't deleted that file yet, you can redownload from the previously shared link

frostworx commented 1 year ago

thanks, I kept a backup though :) adb works fine now, but my system seems to be a bit limited. there is no strings or find for example.

just pulling /dev/block/mmcblk0p16, which is the device node

/dev/block/platform/mtk-msdc.0/by-name using adb pull, no idea if this is meant to be successful, as it already has 1gb. if it works, I'll get your string from the copy.

grep version.name /system/*.prop returns ro.build.version.name=Fire OS 5.5.5.4 (680766420)

viraniac commented 1 year ago

Interesting. So the version I suggested yesterday for the preloader for restoration is your actual version. Thats a nice coincidence :)

frostworx commented 1 year ago

before I paste the whole stdout, should I worry about publishing any possible device specific data returned by the grep?

I guess the 1s31zyz7dcc2d.cloudfront.net urls returned are already known anyway, right? :)

viraniac commented 1 year ago

before I paste the whole stdout, should I worry about publishing any possible device specific data returned by the grep?

you can clean it up if you want and only share the urls.

I guess the 1s31zyz7dcc2d.cloudfront.net urls returned are already known anyway, right? :)

Depends on how they end. the interesting bit is not domain name what comes after

frostworx commented 1 year ago

thanks for your patience :)

here we go:

# strings mmcblk0p16 | grep "https.*.biscuit" | sort -u
0https://d1s31zyz7dcc2d.cloudfront.prod.ota-cloudfront.net/47a1457e0802980eb32f63cd3ce355c0/update-kindle-csm_biscuit-272.6.8.0_user_680767620.bin{"binaryType":"full","md5Sum":"805e721e1bed461d8a81015a1f703fc1","remoteFileSize":"396710733","sha256":"6ababc517529938f0d1e836c3410a91df19683ae62d7fca9e2ca57320d5d2faa"}
https://d1s31zyz7dcc2d.cloudfront.net/60556d35239d902637f0fc503411b791/update-kindle-csm_biscuit-272.6.7.2_user_672720020.bin/cache/update-kindle-csm_biscuit-272.6.7.2_user_672720020.binbinary/octet-stream
https://d1s31zyz7dcc2d.cloudfront.prod.ota-cloudfront.net/47a1457e0802980eb32f63cd3ce355c0/update-kindle-csm_biscuit-272.6.8.0_user_680767620.bin
https://d1s31zyz7dcc2d.cloudfront.prod.ota-cloudfront.net/47a1457e0802980eb32f63cd3ce355c0/update-kindle-csm_biscuit-272.6.8.0_user_680767620.bin/cache/update-kindle-csm_biscuit-272.6.8.0_user_680767620.binbinary/octet-stream

please let me know if you require anything else!

edit: I thought you might have the urls already, because you already have the 5.5.5.4 url

viraniac commented 1 year ago

This seems new https://d1s31zyz7dcc2d.cloudfront.net/60556d35239d902637f0fc503411b791/update-kindle-csm_biscuit-272.6.7.2_user_672720020.bin The other one is just 5.5.5.4

frostworx commented 1 year ago

nice, I'll provide the same data for the other device, as soon as I have root access

frostworx commented 1 year ago

yay, I have a version from my 2nd new dot:

root@biscuit:/ # grep version.name /system/*.prop
ro.build.version.name=Fire OS 5.5.2.1 (601481420)

strings mmcblk0p16 | grep "http.*.biscuit" | sort -u

doesn't have any match though. is there anything else which might be interesting?

viraniac commented 1 year ago

what all strings you get that start with http:// or https:// ?

frostworx commented 1 year ago

I knew you asked this :) here we go:

# strings mmcblk0p16 | grep "http:\|https:" | sort -u
    <a href="http://download.oracle.com/javase/6/docs/api/java/util/zip/CRC32.html">CRC-32 Documentation</a>
    <class value="AuthenticatedDeviceGetUpdatesQueryInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
    <class value="BaseInstalledSoftwareComponentDetails:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
    <class value="DeviceInstalledSoftwareComponentDetails:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
    <class value="GetSoftwareComponentDetailsForOtaGroupInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
    <class value="PaginatedSoftwareComponentDetailsForOtaGroup:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
    <class value="SoftwareComponentDependenciesContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
    <class value="SoftwareComponentVersionCodeContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
    <class value="SoftwareComponentVersionListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
    <class value="UnauthenticatedDeviceGetUpdatesQueryInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
    <class value="UnauthenticatedDeviceTypeListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
  https://w.amazon.com/index.php/DevicePlatform/DeviceRegistry
  https://w.amazon.com/index.php/Digital/Delivery/Messaging/Authentication
  https://w.amazon.com/index.php/Digital/Delivery/Messaging/FAQ#How_unique_do_message_IDs_have_to_be_on_the_device.3F
  https://w.amazon.com/index.php/Digital/Delivery/Messaging/Interface#Delivery_Options
  https://w.amazon.com/index.php/Digital/Delivery/Messaging/Interface#Endpoint
  https://w.amazon.com/index.php/Digital/Delivery/Messaging/Interface#Message
  https://w.amazon.com/index.php/Digital/Delivery/Messaging/Interface#Message_Metadata
  https://w.amazon.com/index.php/Digital/Delivery/Messaging/Interface#Response
  https://w.amazon.com/index.php/Digital/Delivery/Messaging/Interface#Status_Codes
  https://w.amazon.com/index.php/Digital/Delivery/Messaging/TransportProtocols/WebServiceHTTP#Response_2
  https://w.amazon.com/index.php?title=IdentityServices/DirectedIDs
 http://specs.openid.net/auth/2.0
!https://det-ta-g7g.amazon.com:443
!sdcdurl.cde.tahttps://cde-ta-g7g.amazon.com/FionaCDEServiceEngine>
#9dcdurl.websitehttps://www.amazon.com7
#]dcdurl.firs.tahttps://firs-ta-g7g.amazon.com/FirsProxy4
#odcdurl.todo.tahttps://todo-ta-g7g.amazon.com/FionaTodoListProxy=
$http://d3h5bk8iotgjvw.cloudfront.net
$http://www.amazon.com/ap/ext/oauth/2
$https://api.amazon.com/auth/O2/token
$https://dp-mont.integ.amazon.com:443
%9dcdurl.wsync.v2https://api.amazon.com)
%odcdurl.kdk.subshttps://kdk-ws.amazon.com/SubscriptionStatusProxy.
&https://identity-snds.amazon.com/snds/
'http://clients3.google.com/generate_204
'https://android.googleapis.com/gcm/send
'https://det-ta-g7g.integ.amazon.com:443
(https://device-metrics-us.amazon.com:443
)9dcdurl.panda.prodhttps://api.amazon.com6
)Edcdurl.panda.betahttps://api.integ.amazon.comH
)idcdurl.det.unauthhttps://det-ta-g7g.amazon.com/DeviceEventProxy
*https://det-ta-g7g.vipinteg.amazon.com:443
*https://device-metrics-us-2.amazon.com:443
+http://specs.openid.net/extensions/pape/1.0
,http://www.amazon.com/workAroundDcpBlackList
,https://devicemessaging.us-east-1.amazon.com
-]dcdurl.firs.ta.prodhttps://firs-ta-g7g.amazon.com/FirsProxyJ
-idcdurl.firs.ta.betahttps://firs-ta-g7g.integ.amazon.com/FirsProxy-
-odcdurl.todo.ta.prodhttps://todo-ta-g7g.amazon.com/FionaTodoListProxyS
-{dcdurl.todo.ta.betahttps://todo-ta-g7g.integ.amazon.com/FionaTodoListProxy?
/Idcdurl.panda.preprodhttps://api-preprod.amazon.com1
/adcdurl.facebook.authhttps://api.facebook.com/method/auth.loginI
1Ydcdurl.messaging.posthttps://device-messaging-na.amazon.comD
2http://specs.openid.net/auth/2.0/identifier_select
2https://device-messaging-na.amazon.com/GetMessages
2https://graph.facebook.com/oauth/access_token_info
3mdcdurl.firs.ta.preprodhttps://firs-ta-g7g-preprod.amazon.com/FirsProxyE
5dcdurl.dcas.pfmhttps://dcape-na.amazon.com/getCustomerAttribute?version=1_0;preferences=$PREFERENCEB
5https://devicemessaging.us-east-1.amazon.com/messages
5odcddmld.dms.endpointURLhttps://device-metrics-us.amazon.com/metricsBatch7
6https://softwareupdates.amazon.com/software/inventory2
7http://www.amazon.com/ap/specs/auth/confirm_credentials
7https://updates.amazon.com/software/inventory/companion
8http://internal.amazon.com/coral/com.amazon.whisperpush/
8https://api.facebook.com/method/auth.authorizeproxiedapp
9See also http://www.slf4j.org/codes.html#substituteLogger
9dcdurl.odachttps://www.amazon.com
9dcdurl.pandahttps://api.amazon.com)
:https://todo-ta-g7g.amazon.com/FionaTodoListProxy/getItems
<https://api.facebook.com/method/auth.grantextendedpermission
=adcdurl.twitter.access.tokenhttps://api.twitter.com/oauth/access_token1
>http://internal.amazon.com/coral/com.amazon.whisperpush.types/
>https://%s:443/dfu/sign/v1?deviceSerialNumber=%s&deviceType=%s
Adcdurl.grokhttps://kca.amazon.com/kca4
Ahttps://api.facebook.com/method/permissions.getandroiddescription
Bhttp://internal.amazon.com/coral/com.amazon.devicemessaging.types/
Chttp://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/
Dhttps://w.amazon.com/index.php/DigitalSecurity/CertificatePinningFAQ
Ehttp://internal.amazon.com/coral/com.amazon.devicemessaging.protocol/
Ghttps://w.amazon.com/index.php/IdentityServices/PandaService/Onboarding
ISee http://www.slf4j.org/codes.html#loggerNameMismatch for an explanation
ISee http://www.slf4j.org/codes.html#multiple_bindings for an explanation.
ISee http://www.slf4j.org/codes.html#version_mismatch for further details.
KSee http://www.slf4j.org/codes.html#StaticLoggerBinder for further details.
M(https:\/\/|http:\/\/)?(z\.cn|amzn\.asia|a\.co|amzn\.co|amzn\.eu)\/\S*#verify
Mdcdurl.mysnhttps://kindle.amazon.com/socialg
URL does not use https: 
URL does not use https: %s
UTF-8 is not supported. This should not happen according to http://developer.android.com/reference/java/nio/charset/Charset.html
Udcdurl.emberhttps://www.amazon.com/gp/ember/xyml?
Wdcdurl.firshttps://firs-g7g.amazon.com/FirsProxyD
Wdcdurl.sndshttps://identity-snds.amazon.com/snds/
ZSee https://w.amazon.com/index.php/IdentityServices/Mobile/DevoPreprodProdSwitch/UserGuide
]    <namespace value="http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
accessibility_script_injection_urlhttps://ssl.gstatic.com/accessibility/javascript/android/AndroidVox_v1.js
b    <class value="DeviceId:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
c    <class value="Inventory:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
cdcdurl.dethttps://det-g7g.amazon.com/DeviceEventProxyC
d    <class value="UpdatePath:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
dcdurl.dcas.timezonehttps://dcape-na.amazon.com/getCustomerTimezone?version=1_0h
dcdurl.todo.ta.preprodhttps://todo-ta-g7g-preprod.amazon.com/FionaTodoListProxyN
dcdwifid.captiveportal.proto.cnhttp://>
dcdwifid.captiveportal.protohttp://:
e    <class value="OtaGroupKey:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
f    <class value="UpdateBinary:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
g    <class value="CallerDetails:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
g    <class value="DeviceDetails:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
g    <class value="OfferedUpdate:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
g    <class value="UpdatePathKey:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
gCheck https://w.amazon.com/index.php/IdentityServices/Mobile/DevoPreprodProdSwitch/UserGuide for detail
http://
http://prod.amazoncrl.com
https://
https://(.*)\.amazon\.[^/]+
https://api.amazon.com
https://arcus-uswest.amazon.com
https://www
i    <class value="DeviceInventory:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
i    <class value="UpdateBinaryKey:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
idcdurl.todohttps://todo-g7g.amazon.com/FionaTodoListProxy:
k    <class value="BaseDeviceDetails:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
k    <class value="SoftwareComponent:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
l    <class value="GetUpdateContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
l    <class value="ThrottledException:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
m    <class value="DependencyException:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
m    <class value="OtaGroupIdContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
mdcdurl.cdehttps://cde-g7g.amazon.com/FionaCDEServiceEngineA
n    <class value="DeliveryRestrictions:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
n    <class value="PutUpdateBinaryInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
n    <class value="RangeBasedUpdatePath:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
n    <class value="SoftwareComponentKey:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
o    <class value="DeviceIdListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
o    <class value="PutDeviceDetailsInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
o    <class value="UpdateBinaryContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
odcdurl.storehttps://www.amazon.com/gp/digital/juno/index.html(
q    <class value="FailedOtaGroupInsertion:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
q    <class value="GetUpdatePathQueryInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
q    <class value="OtaGroupIdListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
q    <class value="RangeBasedUpdatePathKey:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
q    <class value="SoftwareVersionByDevice:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
q    <class value="UpdatePathListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
r    <class value="BaseGetUpdatesQueryInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
r    <class value="InvalidArgumentException:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
r    <class value="SoftwareComponentVersion:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
rMAP certificate pinning list: https://code.amazon.com/packages/MAPAndroidLib/blobs/mainline/--/pinned-ca-roots.pem
s    <class value="AvailableUpdatesContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
s    <class value="PutDevicesInOtaGroupInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
s    <class value="UnauthenticatedDeviceType:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
s    <class value="UpdateBinaryListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
t    <class value="DeviceGetUpdatesQueryInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
t    <class value="OfferedUpdateListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
t    <class value="PutDevicesInOtaGroupOutput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
t    <class value="SoftwareComponentContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
u    <class value="SoftwareComponentDependency:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
u    <class value="SoftwareComponentVersionKey:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
v    <class value="PaginatedOtaGroupIdContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
w    <class value="DeviceIdWithSoftwareComponent:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
x    <class value="PaginatedDeviceIdListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
x    <class value="SoftwareComponentDependencyKey:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
x    <class value="SoftwareComponentListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
xorg.slf4j.LoggerFactory could not be successfully initialized. See also http://www.slf4j.org/codes.html#unsuccessfulInit
z    <class value="GetUpdatesForCompanionQueryInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
z    <class value="PutSoftwareVersionsByDeviceInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
{    <class value="InstalledSoftwareComponentDetails:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
frostworx commented 1 year ago

nonsec_gelato_55.bin doesn't have one single google or github hit here, so maybe:

# strings mmcblk0p16 | grep "\.bin" | sort -u
%sso_data_migrator.bind_timeout_millis
/sdcard/Aspen.bin
0Failed to copy binary file: nonsec_gelato_55.bin
:Binary copied nonsec_gelato_55.bin -> /cache/OZ20A___FWG55
Firmware.bin
_(.*).bin$
_(\d+).bin$
android.binder.objects.death
android.binder.objects.local
android.binder.objects.proxy
batterystats.bin
batterystats.bin.tmp
batterystats.bin_ext    }
com.amazon.client.metrics.bind
entropy.bin
nonsec_gelato_55.bin
stats.bin
stats.bin.bakkak
status.bin
status.bin.bakak

might be interesting as well

viraniac commented 1 year ago

can you share the output of cat /proc/cmdline from that 5.5.2.1 device?

frostworx commented 1 year ago
root@biscuit:/ # cat /proc/cmdline
console=tty0 console=ttyS0,921600n1 console=ttyMT0,921600n1 earlycon=uart8250,mmio32,0x11002000 root=/dev/ram vmalloc=496M androidboot.hardware=mt8163 androidboot.unlocked_kernel=true androidboot.rpmb_state=1 androidboot.secure_cpu=1 androidboot.prod=1 androidboot.pl_version=0x0005 androidboot.tee_version=0x0102 androidboot.lk_version=0x0000 androidboot.pl_build_desc=bd7ae89-20221003_215949 androidboot.lk_build_desc=beb022a-20211202_231918 bootopt=64S3,32N2,64N2 androidboot.selinux=enforce androidboot.slot_suffix=_a printk.disable_uart=1 bootprof.pl_t=4150 bootprof.lk_t=3408 boot_reason=0 androidboot.serialno=XXXXXXOBSCUREDXXXXXXX androidboot.bootreason=power_key nt35521_id=0
Billybangleballs commented 1 year ago

The dot is opened up on the bench with a piece of foil shorting out c52. The terminal says "Waiting for bootrom" Should the rotating blue led show be happening? How long do I need to wait?

viraniac commented 1 year ago

@frostworx That sucks. I saw the preprod in the url and was hoping that is a developer device.

@Billybangleballs no if you had it shorted correctly, it will not show blue light

viraniac commented 1 year ago

@frostworx how old is that firmware grep build.date /system/*.prop

frostworx commented 1 year ago
root@biscuit:/ #  grep build.date /system/*.prop
ro.build.date=Sat Mar 24 07:18:52 UTC 2018
ro.build.date.utc=1521875932
viraniac commented 1 year ago

The oldest OTA I have is from Dec 2016, followed by one from July 2019. Its a shame we don't have url for this one. It would have been one of the oldest firmware

frostworx commented 1 year ago

just have seen this in dmesg: :)

<4>[    0.057735] <0>**********************************************************
<4>[    0.057749] <0> (0)[1:swapper/0][name:trace&]**   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
<4>[    0.057758] <0> (0)[1:swapper/0][name:trace&]**                                                      **
<4>[    0.057767] <0> (0)[1:swapper/0][name:trace&]** trace_printk() being used. Allocating extra memory.  **
<4>[    0.057776] <0> (0)[1:swapper/0][name:trace&]**                                                      **
<4>[    0.057785] <0> (0)[1:swapper/0][name:trace&]** This means that this is a DEBUG kernel and it is     **
<4>[    0.057794] <0> (0)[1:swapper/0][name:trace&]** unsafe for produciton use.                           **
<4>[    0.057803] <0> (0)[1:swapper/0][name:trace&]**                                                      **
<4>[    0.057812] <0> (0)[1:swapper/0][name:trace&]** If you see this message and you are not debugging    **
<4>[    0.057821] <0> (0)[1:swapper/0][name:trace&]** the kernel, report this immediately to your vendor!  **
<4>[    0.057830] <0> (0)[1:swapper/0][name:trace&]**                                                      **
<4>[    0.057839] <0> (0)[1:swapper/0][name:trace&]**   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
viraniac commented 1 year ago

Its still there in latest 6.5.6.0 image. So I guess they never disabled it

viraniac commented 1 year ago

Anyways I think we can close this. If anyone have any issues, they can start a new issue

Billybangleballs commented 1 year ago

I think I've broken the dot, it doesn't work anymore, I shall have to go and check ebay for another one.

viraniac commented 1 year ago

@Billybangleballs did the rooting process got completed? Can you share the output of rooting process?

Also have you tried booting using mtkclient like the readme asks you to do?

Billybangleballs commented 1 year ago

[18:55:33] Waiting for bootrom [19:01:34] Waiting for bootrom [19:22:11] Waiting for bootrom [19:24:10] Waiting for bootrom [20:27:09] Waiting for bootrom [21:02:20] Waiting for bootrom

So that is as far as I got. I spent all day installing python3.8, but the amonet code that required it has been changed, so it might work on 3.7 now if I can get the dot to respond. I'm having to revert the python3.8 because it has broken my pi. apt-get requires python3.7 and refuses to play with other versions. I managed to short out the capacitor, (no blue leds), but the software just waited for bootrom that never materialised. So really, I'm no further on than I was last week. I will take another look next week when I get time.

viraniac commented 1 year ago

@Billybangleballs Just confirming that you are following proper steps

1) run python3 main.py. choose step for rooting, choose step rooting again. and follow any other prompts until it reaches the waiting for bootrom prompt 2) short the capacitor to ground and while keeping it shorted 3) plug the echodot to pc or whatever you are using to run the script.

Exactly in that order. Please confirm that you are not plugging the echo dot first and then running the script. Also that capacitor and other surface mounted things besides it are extremely fragile and can be easily knocked off. So make you are not puting too much pressure when trying to short the capacitor

frostworx commented 1 year ago

@Billybangleballs, it would make sense if you opened a separate issue for that, as this one was closed. good luck!

Billybangleballs commented 1 year ago

@frostworx I had the same idea about 12 hours ago ;)