- 精华
- 0
- 帖子
- 173
- 威望
- 0 点
- 积分
- 185 点
- 种子
- 5 点
- 注册时间
- 2008-4-15
- 最后登录
- 2022-10-17
|
楼主 |
发表于 2011-11-7 14:09 · 河南
|
显示全部楼层
手动生成ecc文件,写入依旧黑屏进不了xell;帮看下命令是否有问题。
D:\gggggg>common\imgbuild\build.py nand1.bin common\cdxell\CD common\xell\xell-g
ggggg.bin
* found flash image, unpacking...
ECC'ed - will unecc.
Found 2BL (build 6751) at 00008000
Found 4BL (build 8453) at 00011380
Found 5BL (build 1888) at 00016b00
* found decrypted CD
* found XeLL binary, must be linked to 1c000000
* we found the following parts:
SMC: 2.3
CB_A: 6751
CB_B: missingCD (image): 8453
CD (decrypted): 8453
* decrypting...
* checking if all files decrypted properly... ok
* checking required versions... ok
* this image will be valid *only* for:
* patching SMC...
patchset "Jasper (for all hdmi fats), version 2.3" matches, 1 patch(es)
* zero-pairing...
* constructing new image...
* base size: 70000
* No separate recovery Xell available!
* Flash Layout:
0x00000000..0x000001ff (0x00000200 bytes) Header
0x00000200..0x00000fff (0x00000e00 bytes) Padding
0x00001000..0x00003fff (0x00003000 bytes) SMC
0x00004000..0x00007fff (0x00004000 bytes) Keyvault
0x00008000..0x0001137f (0x00009380 bytes) CB_A 6751
0x00011380..0x0001737f (0x00006000 bytes) CD 8453
0x00017380..0x000bffff (0x000a8c80 bytes) Padding
0x000c0000..0x000fffff (0x00040000 bytes) Xell (backup)
0x00100000..0x0013ffff (0x00040000 bytes) Xell (main)
* Encoding ECC...
------------- Written into output/image_00000000.ecc |
|