- 精华
- 0
- 帖子
- 433
- 威望
- 0 点
- 积分
- 503 点
- 种子
- 5 点
- 注册时间
- 2011-8-24
- 最后登录
- 2022-11-28
|

楼主 |
发表于 2012-7-24 21:20 · 山东
|
显示全部楼层
012年7月24日星期二 10:04:28 我的合成固件的信息
J-Runner v0.2 Beta (279) Started
Downloaded *xeBuild/13599/_glitch.ini
Finished Checking Files
Checking Files
Finished Checking Files
Version: 01
Flash Config: 0x00AA3020
Jasper 512MB
Reading Nand to D:\JRunner\output\nanddump1.bin
Reading Nand
Done!
in 25:46 min:sec
Initializing Nand..
Reading Nand to D:\JRunner\output\nanddump2.bin
Reading Nand
Nand Initialization Finished
Done!
in 25:47 min:sec
Comparing...Takes a while on big nands
Nands are the same
* unpacking flash image, ....
ECC'ed - will unecc.
UnECC'ed
* found decrypted CD
* found XeLL binary, must be linked to 0x1c000000
* we found the following parts:
SMC: 2.3
CB_A: 6753
CB_B: 6753
CD (image): 6753
CD (decrypted): 9452
* checking required versions...
ok
* patching SMC...
Patching Jasper version 2.3 SMC at offset 0x12BA
* Replacing CD...
* XOR HACK NEEDED FOR CB 6753
* patching CB_B...
patchset for 6752 found, 4 patch(es)
* Applying XOR Hack to CB_B 6753
*** Re-encrypting CB_B with xor keystream
*** Fixing entrypoint
* Replacing CB_A 6753 with 6752
* encrypting CB...
* constructing new image...
* base size: 70000
* No separate recovery Xell available!
* Flash Layout:
0x0..0x1FF (0x200 bytes) Header
0x200..0xFFF (0xE00 bytes) Padding
0x1000..0x3FFF (0x3000 bytes) SMC
0x4000..0x7FFF (0x4000 bytes) Keyvault
0x8000..0x9ABF (0x1AC0 bytes) CB_A 6752
0x9AC0..0x1317F (0x96C0 bytes) CB_B 6752
0x13180..0x1917F (0x6000 bytes) CD 9452
0x19180..0xBFFFF (0xA6E80 bytes) Padding
0xC0000..0xFFFFF (0x40000 bytes) Xell (backup)
0x100000..0x13FFFF (0x40000 bytes) Xell (main)
* Encoding ECC...Done!
------------- Written into output\image_00000000.ecc
|
|