- 精华
- 0
- 帖子
- 67
- 威望
- 0 点
- 积分
- 67 点
- 种子
- 0 点
- 注册时间
- 2011-10-10
- 最后登录
- 2024-1-6
|
本帖最后由 zehao159 于 2012-11-6 23:11 编辑
等了好久也没进。。。。就绿灯一直闪、A点是焊后面的代替点的,其他的就按图的焊,软件用JRunner273、、、跪求大神、JRunner这信息对不?
===================================================
2012年11月6日 20:46:40
J-Runner v0.2 Beta (273) Started
Version v0.2 Beta (283) is available for download.
Checking Files
Finished Checking Files
Initializing Nand..
Nand Initialization Finished
* unpacking flash image, ....
ECC'ed - will unecc.
UnECC'ed
* found decrypted CD
* found XeLL binary, must be linked to 0x1c000000
* we found the following parts:
SMC: 2.3
CB_A: 6753
CB_B: 6753
CD (image): 6753
CD (decrypted): 9452
* checking required versions...
ok
* patching SMC...
Patching Jasper version 2.3 SMC at offset 0x12BA
* Replacing CD...
* XOR HACK NEEDED FOR CB 6753
* patching CB_B...
patchset for 6752 found, 4 patch(es)
* Applying XOR Hack to CB_B 6753
*** Re-encrypting CB_B with xor keystream
*** Fixing entrypoint
* Replacing CB_A 6753 with 6752
* encrypting CB...
* constructing new image...
* base size: 70000
* No separate recovery Xell available!
* Flash Layout:
0x0..0x1FF (0x200 bytes) Header
0x200..0xFFF (0xE00 bytes) Padding
0x1000..0x3FFF (0x3000 bytes) SMC
0x4000..0x7FFF (0x4000 bytes) Keyvault
0x8000..0x9ABF (0x1AC0 bytes) CB_A 6752
0x9AC0..0x1317F (0x96C0 bytes) CB_B 6752
0x13180..0x1917F (0x6000 bytes) CD 9452
0x19180..0xBFFFF (0xA6E80 bytes) Padding
0xC0000..0xFFFFF (0x40000 bytes) Xell (backup)
0x100000..0x13FFFF (0x40000 bytes) Xell (main)
* Encoding ECC...
100%
------------- Written into output\image_00000000.ecc
Arm Version: 1
Flash Config: 0x00AA3020
Writing Nand
Done!
|
|