Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- C:\NAND\Win Tools\Reset Glitch\reset_glitch_hack_v1.1>python common/imgbuild/build.py nand.bin common/cdxell/CD common/xell/xell-gggggg.bin CB.6750.bin
- * found flash image, unpacking...
- ECC'ed - will unecc.
- Found 2BL (build 6751) at 00008000
- Found 4BL (build 8453) at 00011380
- Found 5BL (build 1888) at 00016b00
- * found decrypted CD
- * found XeLL binary, must be linked to 1c000000
- * found (hopefully) decrypted CB
- * we found the following parts:
- SMC: 2.3
- CB_A: 6750
- CB_B: missing
- CD (image): 8453
- CD (decrypted): 8453
- * checking for proper 1BL key... ok
- * checking if all files decrypted properly... ok
- * checking required versions... ok
- * this image will be valid *only* for: jasper
- * patching SMC...
- CRC32: 5b3aed00
- patchset "Jasper, version 2.3" matches, 1 patch(es)
- * zero-pairing...
- * constructing new image...
- * base size: 70000
- * No separate recovery Xell available!
- * Flash Layout:
- 0x00000000..0x000001ff (0x00000200 bytes) Header
- 0x00000200..0x00000fff (0x00000e00 bytes) Padding
- 0x00001000..0x00003fff (0x00003000 bytes) SMC
- 0x00004000..0x00007fff (0x00004000 bytes) Keyvault
- 0x00008000..0x00011a3f (0x00009a40 bytes) CB_A 6750
- 0x00011a40..0x00017a3f (0x00006000 bytes) CD 8453
- 0x00017a40..0x000bffff (0x000a85c0 bytes) Padding
- 0x000c0000..0x000fffff (0x00040000 bytes) Xell (backup)
- 0x00100000..0x0013ffff (0x00040000 bytes) Xell (main)
- * Encoding ECC...
- ------------- Written into output/image_00000000.ecc
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement