- Dec 7, 2014
- 6
- 0
I purchased a replacement 9504 drive with an unlocked pcb board already installed online and I'm having trouble with this part "Sending Spi Unlock request to port 0x0000". I had everything completely set up and got to the part where I click the 0x8C button and waiting for it to turn into 0x00 so I can proceed to write my drive. I cannot get passed the "Sending Spi Unlock request to port 0x0000" part. I'm not getting anything at all after I click the 0x8C button but dots and dots going forever.
Here is my JF log: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.95 Beta (321)
Session Started Tue Dec 09 19:18:01 2014
This is a Wow 64 process running on 4 x 64 bit CPUs
X360USB PRO detected, Version 0.20
Found 1 I/O Ports.
Found 3 Com Ports.
Found 2 windows drives C: Q:
Found 0 CD/DVD drives
Drive is Slim Lite-On..
Key found in KeyDB at record (3 - REPLACEMENT SLIM KEY)
Key is: 2926F91FCB3D7B7183E30B30D3D01747
Key has been tested and verified, thanks C4eva !
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 39 35 30 34 00 00 00 00 - 00 00 00 00 00 00 00 00 9504............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 31 43 47 30 31 - 37 38 30 36 30 30 34 32 D711CG0178060042
0070: 4A 00 00 00 J...
0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0010: 00 00 00 00 37 44 31 31 - 47 43 31 30 38 37 36 30 ....7D11GC108760
0020: 30 30 32 34 00 4A 00 00 - 00 00 00 00 00 00 35 39 0024.J........59
0030: 34 30 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 40 LPSD GD
0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]
0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......
0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 00 00 ............`...
00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00B0: 20 20 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ..............
00C0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00D0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00E0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00F0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0100: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0110: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0120: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0130: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0140: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0150: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0160: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0170: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0180: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0190: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01B0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01C0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01D0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01E0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01F0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
.....
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
............
Key: 2926F91FCB3D7B7183E30B30D3D01747 is verified, Thanks C4eva
Grabbing Key sector: ................
Key Sector verified.
Grabbing Serial info: ........
Drive is Slim Lite-On..
Key found in KeyDB at record (3 - REPLACEMENT SLIM KEY)
Key is: 2926F91FCB3D7B7183E30B30D3D01747
Key has been tested and verified, thanks C4eva !
Key data saved to C:\Users\Vipershouse\Documents\REPLACEMENT SLIM KEY\Key.bin
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 39 35 30 34 00 00 00 00 - 00 00 00 00 00 00 00 00 9504............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 31 43 47 30 31 - 37 38 30 36 30 30 34 32 D711CG0178060042
0070: 4A 00 00 00 J...
Inquiry String saved to C:\Users\Vipershouse\Documents\REPLACEMENT SLIM KEY\Inquiry.bin
0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0010: 00 00 00 00 37 44 31 31 - 47 43 31 30 38 37 36 30 ....7D11GC108760
0020: 30 30 32 34 00 4A 00 00 - 00 00 00 00 00 00 35 39 0024.J........59
0030: 34 30 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 40 LPSD GD
0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]
0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......
0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`[email protected]
00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00B0: 20 20 00 00 ..
Identify String saved to C:\Users\Vipershouse\Documents\REPLACEMENT SLIM KEY\Identify.bin
0000: 44 37 31 31 43 47 30 31 - 37 38 30 36 30 30 34 32 D711CG0178060042
0010: 4A 00 00 00 FF FF FF FF - 30 44 32 31 30 31 33 33 J.......0D210133
0020: 31 36 39 38 31 35 58 58 - 41 30 FF FF 53 34 50 30 169815XXA0..S4P0
0030: 34 31 37 30 30 30 30 30 - 31 32 30 32 38 31 00 00 41700000120281..
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 41 30 FF FF ............A0..
Serial String saved to C:\Users\Vipershouse\Documents\REPLACEMENT SLIM KEY\Serial.bin
Hashing Drive: ................
Dummy.bin file saved to Dummy.bin
Loading firmware from buffer
Inquiry string found
Identify string found
Drive key @ 0xA030 2926F91FCB3D7B7183E30B30D3D01747
Firmware Osig: [PLDS DG-16D4S 9504]
Firmware is: SlimKey Extract
Key database updated
Loading firmware file C:\Users\Vipershouse\Documents\Xbox 360 Mod Stuff\Slim DVD Key Lite-On\Dummy.bin
MD5 hash: ea95cfc8d55fda65763cf5f2aa8f6b28
Inquiry string found
Identify string found
Drive key @ 0xA030 F26C5E63B70E16F460476D73BF4650B3
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: SlimKey Extract
Loading firmware file C:\Users\Vipershouse\Documents\Xbox 360 Mod Stuff\Latest_iXtreme_and_Stock_Firmware_Pack\Firmware\LTPlus-0272-v3.0.bin
MD5 hash: 76b991307ddd5b2af581d0608e671b36
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Drive is Slim Lite-On..
Key found in KeyDB at record (3 - REPLACEMENT SLIM KEY)
Key is: 2926F91FCB3D7B7183E30B30D3D01747
Key has been tested and verified, thanks C4eva !
Drive is Slim Lite-On..
Key found in KeyDB at record (3 - REPLACEMENT SLIM KEY)
Key is: 2926F91FCB3D7B7183E30B30D3D01747
Key has been tested and verified, thanks C4eva !
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 39 35 30 34 00 00 00 00 - 00 00 00 00 00 00 00 00 9504............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 31 43 47 30 31 - 37 38 30 36 30 30 34 32 D711CG0178060042
0070: 4A 00 00 00 J...
Sending Password to Drive on port 0x0000
Done!
Sending Vendor Intro to port 0x0000
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
Sending Vendor Intro to port 0x0000
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x8C
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
Sending Spi UnLock request to Port 0x0000
.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Here is my JF log: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.95 Beta (321)
Session Started Tue Dec 09 19:18:01 2014
This is a Wow 64 process running on 4 x 64 bit CPUs
X360USB PRO detected, Version 0.20
Found 1 I/O Ports.
Found 3 Com Ports.
Found 2 windows drives C: Q:
Found 0 CD/DVD drives
Drive is Slim Lite-On..
Key found in KeyDB at record (3 - REPLACEMENT SLIM KEY)
Key is: 2926F91FCB3D7B7183E30B30D3D01747
Key has been tested and verified, thanks C4eva !
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 39 35 30 34 00 00 00 00 - 00 00 00 00 00 00 00 00 9504............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 31 43 47 30 31 - 37 38 30 36 30 30 34 32 D711CG0178060042
0070: 4A 00 00 00 J...
0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0010: 00 00 00 00 37 44 31 31 - 47 43 31 30 38 37 36 30 ....7D11GC108760
0020: 30 30 32 34 00 4A 00 00 - 00 00 00 00 00 00 35 39 0024.J........59
0030: 34 30 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 40 LPSD GD
0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]
0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......
0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 00 00 ............`...
00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00B0: 20 20 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ..............
00C0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00D0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00E0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00F0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0100: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0110: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0120: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0130: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0140: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0150: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0160: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0170: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0180: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0190: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01B0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01C0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01D0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01E0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01F0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
.....
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
............
Key: 2926F91FCB3D7B7183E30B30D3D01747 is verified, Thanks C4eva
Grabbing Key sector: ................
Key Sector verified.
Grabbing Serial info: ........
Drive is Slim Lite-On..
Key found in KeyDB at record (3 - REPLACEMENT SLIM KEY)
Key is: 2926F91FCB3D7B7183E30B30D3D01747
Key has been tested and verified, thanks C4eva !
Key data saved to C:\Users\Vipershouse\Documents\REPLACEMENT SLIM KEY\Key.bin
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 39 35 30 34 00 00 00 00 - 00 00 00 00 00 00 00 00 9504............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 31 43 47 30 31 - 37 38 30 36 30 30 34 32 D711CG0178060042
0070: 4A 00 00 00 J...
Inquiry String saved to C:\Users\Vipershouse\Documents\REPLACEMENT SLIM KEY\Inquiry.bin
0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0010: 00 00 00 00 37 44 31 31 - 47 43 31 30 38 37 36 30 ....7D11GC108760
0020: 30 30 32 34 00 4A 00 00 - 00 00 00 00 00 00 35 39 0024.J........59
0030: 34 30 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 40 LPSD GD
0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]
0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......
0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`[email protected]
00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00B0: 20 20 00 00 ..
Identify String saved to C:\Users\Vipershouse\Documents\REPLACEMENT SLIM KEY\Identify.bin
0000: 44 37 31 31 43 47 30 31 - 37 38 30 36 30 30 34 32 D711CG0178060042
0010: 4A 00 00 00 FF FF FF FF - 30 44 32 31 30 31 33 33 J.......0D210133
0020: 31 36 39 38 31 35 58 58 - 41 30 FF FF 53 34 50 30 169815XXA0..S4P0
0030: 34 31 37 30 30 30 30 30 - 31 32 30 32 38 31 00 00 41700000120281..
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 41 30 FF FF ............A0..
Serial String saved to C:\Users\Vipershouse\Documents\REPLACEMENT SLIM KEY\Serial.bin
Hashing Drive: ................
Dummy.bin file saved to Dummy.bin
Loading firmware from buffer
Inquiry string found
Identify string found
Drive key @ 0xA030 2926F91FCB3D7B7183E30B30D3D01747
Firmware Osig: [PLDS DG-16D4S 9504]
Firmware is: SlimKey Extract
Key database updated
Loading firmware file C:\Users\Vipershouse\Documents\Xbox 360 Mod Stuff\Slim DVD Key Lite-On\Dummy.bin
MD5 hash: ea95cfc8d55fda65763cf5f2aa8f6b28
Inquiry string found
Identify string found
Drive key @ 0xA030 F26C5E63B70E16F460476D73BF4650B3
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: SlimKey Extract
Loading firmware file C:\Users\Vipershouse\Documents\Xbox 360 Mod Stuff\Latest_iXtreme_and_Stock_Firmware_Pack\Firmware\LTPlus-0272-v3.0.bin
MD5 hash: 76b991307ddd5b2af581d0608e671b36
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Drive is Slim Lite-On..
Key found in KeyDB at record (3 - REPLACEMENT SLIM KEY)
Key is: 2926F91FCB3D7B7183E30B30D3D01747
Key has been tested and verified, thanks C4eva !
Drive is Slim Lite-On..
Key found in KeyDB at record (3 - REPLACEMENT SLIM KEY)
Key is: 2926F91FCB3D7B7183E30B30D3D01747
Key has been tested and verified, thanks C4eva !
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 39 35 30 34 00 00 00 00 - 00 00 00 00 00 00 00 00 9504............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 31 43 47 30 31 - 37 38 30 36 30 30 34 32 D711CG0178060042
0070: 4A 00 00 00 J...
Sending Password to Drive on port 0x0000
Done!
Sending Vendor Intro to port 0x0000
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
Sending Vendor Intro to port 0x0000
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x8C
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
Sending Spi UnLock request to Port 0x0000
.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................