Advertisement
Guest User

Untitled

a guest
Oct 4th, 2011
329
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.40 KB | None | 0 0
  1. C:\NAND\Win Tools\Reset Glitch\reset_glitch_hack_v1.1>python common/imgbuild/build.py nand.bin common/cdxell/CD common/xell/xell-gggggg.bin
  2. * found flash image, unpacking...
  3. ECC'ed - will unecc.
  4. Found 2BL (build 6751) at 00008000
  5. Found 4BL (build 8453) at 00011380
  6. Found 5BL (build 1888) at 00016b00
  7. * found decrypted CD
  8. * found XeLL binary, must be linked to 1c000000
  9. * we found the following parts:
  10. SMC: 2.3
  11. CB_A: 6751
  12. CB_B: missing
  13. CD (image): 8453
  14. CD (decrypted): 8453
  15. * checking for proper 1BL key... ok
  16. * decrypting...
  17. * checking if all files decrypted properly... ok
  18. * checking required versions... ok
  19. * this image will be valid *only* for:
  20. * patching SMC...
  21. CRC32: 5b3aed00
  22. patchset "Jasper, version 2.3" matches, 1 patch(es)
  23. * zero-pairing...
  24. * constructing new image...
  25. * base size: 70000
  26. * No separate recovery Xell available!
  27. * Flash Layout:
  28. 0x00000000..0x000001ff (0x00000200 bytes) Header
  29. 0x00000200..0x00000fff (0x00000e00 bytes) Padding
  30. 0x00001000..0x00003fff (0x00003000 bytes) SMC
  31. 0x00004000..0x00007fff (0x00004000 bytes) Keyvault
  32. 0x00008000..0x0001137f (0x00009380 bytes) CB_A 6751
  33. 0x00011380..0x0001737f (0x00006000 bytes) CD 8453
  34. 0x00017380..0x000bffff (0x000a8c80 bytes) Padding
  35. 0x000c0000..0x000fffff (0x00040000 bytes) Xell (backup)
  36. 0x00100000..0x0013ffff (0x00040000 bytes) Xell (main)
  37. * Encoding ECC...
  38. ------------- Written into output/image_00000000.ecc
  39.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement