Advertisement
Guest User

CB6750

a guest
Oct 6th, 2011
411
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.44 KB | None | 0 0
  1.  
  2. C:\NAND\Win Tools\Reset Glitch\reset_glitch_hack_v1.1>python common/imgbuild/build.py nand.bin common/cdxell/CD common/xell/xell-gggggg.bin CB.6750.bin
  3. * found flash image, unpacking...
  4. ECC'ed - will unecc.
  5. Found 2BL (build 6751) at 00008000
  6. Found 4BL (build 8453) at 00011380
  7. Found 5BL (build 1888) at 00016b00
  8. * found decrypted CD
  9. * found XeLL binary, must be linked to 1c000000
  10. * found (hopefully) decrypted CB
  11. * we found the following parts:
  12. SMC: 2.3
  13. CB_A: 6750
  14. CB_B: missing
  15. CD (image): 8453
  16. CD (decrypted): 8453
  17. * checking for proper 1BL key... ok
  18. * checking if all files decrypted properly... ok
  19. * checking required versions... ok
  20. * this image will be valid *only* for: jasper
  21. * patching SMC...
  22. CRC32: 5b3aed00
  23. patchset "Jasper, version 2.3" matches, 1 patch(es)
  24. * zero-pairing...
  25. * constructing new image...
  26. * base size: 70000
  27. * No separate recovery Xell available!
  28. * Flash Layout:
  29. 0x00000000..0x000001ff (0x00000200 bytes) Header
  30. 0x00000200..0x00000fff (0x00000e00 bytes) Padding
  31. 0x00001000..0x00003fff (0x00003000 bytes) SMC
  32. 0x00004000..0x00007fff (0x00004000 bytes) Keyvault
  33. 0x00008000..0x00011a3f (0x00009a40 bytes) CB_A 6750
  34. 0x00011a40..0x00017a3f (0x00006000 bytes) CD 8453
  35. 0x00017a40..0x000bffff (0x000a85c0 bytes) Padding
  36. 0x000c0000..0x000fffff (0x00040000 bytes) Xell (backup)
  37. 0x00100000..0x0013ffff (0x00040000 bytes) Xell (main)
  38. * Encoding ECC...
  39. ------------- Written into output/image_00000000.ecc
  40.  
  41.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement