This week only. Pastebin PRO Accounts Christmas Special! Don't miss out!Want more features on Pastebin? Sign Up, it's FREE!
Guest

Untitled

By: a guest on Oct 29th, 2011  |  syntax: None  |  size: 14.35 KB  |  views: 32  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. smite@rockbox:~/tmp/rockbox/utils/sbtools/sa2ara08k_02_hf1_eng$ sudo valgrind ../sbtoelf -a "usbotp(066f:3780)" -z -o FIRMWARE. firmware.sb
  2. ==15320== Memcheck, a memory error detector
  3. ==15320== Copyright (C) 2002-2010, and GNU GPL'd, by Julian Seward et al.
  4. ==15320== Using Valgrind-3.6.1-Debian and LibVEX; rerun with -h for copyright info
  5. ==15320== Command: ../sbtoelf -a usbotp(066f:3780) -z -o FIRMWARE. firmware.sb
  6. ==15320==
  7. Basic info:
  8.   SB version: 1.1
  9.   Header SHA-1: 67 98 27 1B 47 52 3C E2 46 D6 42 8B 6C C4 F4 29 FA 77 B3 16  Ok
  10.   Flags: 100
  11.   Total file size : 44283024
  12. Sizes and offsets:
  13.   # of encryption keys = 1
  14.   # of sections = 16
  15. Versions
  16.   Random 1: 29 F1 73 67 74 6C
  17.   Random 2: 5D C7 5E 4F 32 69
  18.   Creation date/time = Mon Apr 11 11:47:57 2011
  19.   Product version   = 0.3.23
  20.   Component version = 0.3.23
  21.   Drive tag = 50
  22.   First boot tag offset = 18
  23.   First boot section ID = 0x00000000
  24. Encryption data
  25.   Key 0: USB-OTP(066f:3780)
  26.     CBC-MAC of headers: 6A 2E F0 78 32 C5 8A EA 08 6D 7E 6B 91 4B 1A 20  Ok
  27.     Encrypted key     : 02 6C 78 58 B9 F5 39 23 47 1D 9E C4 B9 7F 4B 1C
  28.     Decrypted key     : 75 3C 70 EA AC 95 A0 B9 3E 4B DC 24 03 65 8D 24
  29.   Summary:
  30.     Real key: 75 3C 70 EA AC 95 A0 B9 3E 4B DC 24 03 65 8D 24
  31.     IV      : 67 98 27 1B 47 52 3C E2 46 D6 42 8B 6C C4 F4 29
  32. Sections
  33.   Section '____'
  34.     pos   =      190 -     6e00
  35.     len   =     6c70
  36.     flags =        1  Boot Section (Encrypted)
  37.       LOAD | addr=0x00000000 | len=0x00001d44 | crc=0xe93b78b5  Ok
  38.       LOAD | addr=0x00001d44 | len=0x00000064 | crc=0xd629ceef  Ok
  39.       LOAD | addr=0x00001da8 | len=0x00000009 | crc=0x84fd58a8  Ok
  40.       FILL | addr=0x00001db4 | len=0x0000003b | pattern=0x00000000
  41.       FILL | addr=0x00001df0 | len=0x00000800 | pattern=0x00000000
  42.       CALL | addr=0x0000018c | arg=0x00000000
  43.       write FIRMWARE.____.0.elf
  44. ==15320== Syscall param write(buf) points to uninitialised byte(s)
  45. ==15320==    at 0x41072E3: __write_nocancel (syscall-template.S:82)
  46. ==15320==    by 0x40AF634: _IO_file_write@@GLIBC_2.1 (fileops.c:1276)
  47. ==15320==    by 0x40AF513: new_do_write (fileops.c:530)
  48. ==15320==    by 0x40A6619: _IO_seekoff_unlocked (ioseekoff.c:71)
  49. ==15320==    by 0x40A8161: fseek (fseek.c:41)
  50. ==15320==    by 0x804D39A: elf_write_file (elf.c:358)
  51. ==15320==    by 0x8048FDE: extract_elf_section (sbtoelf.c:120)
  52. ==15320==    by 0x804967E: extract_section (sbtoelf.c:237)
  53. ==15320==    by 0x804AB10: extract (sbtoelf.c:565)
  54. ==15320==    by 0x804B7FA: main (sbtoelf.c:817)
  55. ==15320==  Address 0x4030010 is not stack'd, malloc'd or (recently) free'd
  56. ==15320==
  57.       LOAD | addr=0x00000000 | len=0x00003044 | crc=0x7aef7c1f  Ok
  58.       LOAD | addr=0x00003044 | len=0x000000ac | crc=0x77c4eecc  Ok
  59.       LOAD | addr=0x000030f0 | len=0x0000002a | crc=0x8ad18f88  Ok
  60.       FILL | addr=0x0000311c | len=0x000000c9 | pattern=0x00000000
  61.       FILL | addr=0x000031e8 | len=0x00000800 | pattern=0x00000000
  62.       FILL | addr=0x000039e8 | len=0x00000004 | pattern=0x00000000
  63.       CALL | addr=0x0000019c | arg=0x00000000
  64.       write FIRMWARE.____.1.elf
  65.       LOAD | addr=0x00000000 | len=0x000019d8 | crc=0x0bc62e91  Ok
  66.       LOAD | addr=0x000019d8 | len=0x0000021c | crc=0x8b59414d  Ok
  67.       LOAD | addr=0x00001bf4 | len=0x0000000e | crc=0x66bc53a4  Ok
  68.       FILL | addr=0x00001c04 | len=0x000000cc | pattern=0x00000000
  69.       FILL | addr=0x00001cd0 | len=0x00000800 | pattern=0x00000000
  70.       FILL | addr=0x000024d0 | len=0x00000004 | pattern=0x00000000
  71.       CALL | addr=0x0000009c | arg=0x00000000
  72.       write FIRMWARE.____.2.elf
  73.       CALL | addr=0x000000d0 | arg=0x6c62615f
  74.       write FIRMWARE.____.3.elf
  75.       CALL | addr=0x00000114 | arg=0x6d6c635f
  76.       write FIRMWARE.____.4.elf
  77.   Section 'mlc_'
  78.     pos   =     6e10 -    52630
  79.     len   =    4b820
  80.     flags =        1  Boot Section (Encrypted)
  81.       LOAD | addr=0x00000000 | len=0x00000bec | crc=0xa68c8ec1  Ok
  82.       LOAD | addr=0x00000bec | len=0x000001d4 | crc=0x9c5eabfe  Ok
  83.       LOAD | addr=0x00000dc0 | len=0x00000004 | crc=0xf2bb7be1  Ok
  84.       FILL | addr=0x00000dc4 | len=0x00000013 | pattern=0x00000000
  85.       CALL | addr=0x00000134 | arg=0x00000001
  86.       write FIRMWARE.mlc_.0.elf
  87.       LOAD | addr=0x00000000 | len=0x00000400 | crc=0x0250bc79  Ok
  88.       LOAD | addr=0x00000400 | len=0x00001970 | crc=0xfae96c0a  Ok
  89.       LOAD | addr=0x40034400 | len=0x00001890 | crc=0x55ed0d5d  Ok
  90.       LOAD | addr=0x40054908 | len=0x0001c614 | crc=0xd3510440  Ok
  91.       LOAD | addr=0x40070f1c | len=0x00000004 | crc=0x25957235  Ok
  92.       LOAD | addr=0x40070f20 | len=0x0000000a | crc=0xf48cd038  Ok
  93.       LOAD | addr=0x40070f2c | len=0x00000054 | crc=0x960d1785  Ok
  94.       LOAD | addr=0x40070f80 | len=0x0000010c | crc=0x3d09d76a  Ok
  95.       LOAD | addr=0x4007108c | len=0x00000043 | crc=0x6bbe6aa7  Ok
  96.       LOAD | addr=0x400710d0 | len=0x0002ab34 | crc=0x626a36c4  Ok
  97.       JUMP | addr=0x40072838 | arg=0x00000000
  98.       write FIRMWARE.mlc_.1.elf
  99.   Section 'host'
  100.     pos   =    52640 -    78630
  101.     len   =    25ff0
  102.     flags =        1  Boot Section (Encrypted)
  103.       LOAD | addr=0x00000000 | len=0x00000400 | crc=0x858ff8ad  Ok
  104.       LOAD | addr=0x00002400 | len=0x000001d8 | crc=0xb7589894  Ok
  105.       LOAD | addr=0x00002c28 | len=0x00001924 | crc=0x27a976c9  Ok
  106.       LOAD | addr=0x0000454c | len=0x00000004 | crc=0xa17f00aa  Ok
  107.       LOAD | addr=0x00004550 | len=0x0000000a | crc=0x75b83296  Ok
  108.       LOAD | addr=0x0000455c | len=0x00000050 | crc=0xf4efeacc  Ok
  109.       LOAD | addr=0x000045ac | len=0x00000014 | crc=0x740b0ac1  Ok
  110.       LOAD | addr=0x4001c000 | len=0x00002574 | crc=0x17b1ad6e  Ok
  111.       LOAD | addr=0x40185000 | len=0x0000ea40 | crc=0xc3fe13c1  Ok
  112.       LOAD | addr=0x40194000 | len=0x00000610 | crc=0xa0c85d20  Ok
  113.       LOAD | addr=0x40195000 | len=0x00000254 | crc=0x4e027e94  Ok
  114.       LOAD | addr=0x401c0000 | len=0x0000063c | crc=0x69fd7898  Ok
  115.       LOAD | addr=0x401c4000 | len=0x0001111e | crc=0x48e7a9bb  Ok
  116.       LOAD | addr=0x401d5120 | len=0x00000ef8 | crc=0x57a51938  Ok
  117.       LOAD | addr=0x401d664c | len=0x000000b4 | crc=0x5774bf90  Ok
  118.       JUMP | addr=0x401c4df0 | arg=0x00000000
  119.       write FIRMWARE.host.0.elf
  120.   Section 'play'
  121.     pos   =    78640 -   1055b0
  122.     len   =    8cf70
  123.     flags =        1  Boot Section (Encrypted)
  124.       LOAD | addr=0x40001000 | len=0x00000020 | crc=0x96a7f638  Ok
  125.       LOAD | addr=0x40001020 | len=0x00000008 | crc=0x5dfd2cc5  Ok
  126.       LOAD | addr=0x40001028 | len=0x0000000c | crc=0xe4dad6fc  Ok
  127.       LOAD | addr=0x40001034 | len=0x00000004 | crc=0xdcace36f  Ok
  128.       LOAD | addr=0x40001038 | len=0x00000004 | crc=0x1f9f93f5  Ok
  129.       LOAD | addr=0x4000143c | len=0x00003b60 | crc=0x5aac19fc  Ok
  130.       LOAD | addr=0x40004f9c | len=0x0004b234 | crc=0xc0cbbebc  Ok
  131.       LOAD | addr=0x400501d0 | len=0x00000098 | crc=0x15191bd7  Ok
  132.       FILL | addr=0x40050268 | len=0x00000170 | pattern=0x00000000
  133.       CALL | addr=0x4000175c | arg=0x00000000
  134.       write FIRMWARE.play.0.elf
  135.       LOAD | addr=0x00000000 | len=0x00000400 | crc=0x1f30d9ab  Ok
  136.       LOAD | addr=0x0000285c | len=0x00001a94 | crc=0xab152fb9  Ok
  137.       LOAD | addr=0x000042f0 | len=0x00000004 | crc=0x04c42e03  Ok
  138.       LOAD | addr=0x000042f4 | len=0x0000000a | crc=0x1c77e649  Ok
  139.       LOAD | addr=0x00004300 | len=0x00000050 | crc=0x84e94ab9  Ok
  140.       LOAD | addr=0x00004350 | len=0x00000014 | crc=0xa2d0911c  Ok
  141.       LOAD | addr=0x4001c000 | len=0x0000280c | crc=0xb518b742  Ok
  142.       LOAD | addr=0x401ca000 | len=0x000155f0 | crc=0x6299a731  Ok
  143.       LOAD | addr=0x401e0000 | len=0x00000488 | crc=0xf7f07fa2  Ok
  144.       LOAD | addr=0x401e0488 | len=0x0000ce04 | crc=0xb5d6283f  Ok
  145.       LOAD | addr=0x401ed28c | len=0x00002230 | crc=0x7153302f  Ok
  146.       LOAD | addr=0x401ef4bc | len=0x00001bcc | crc=0x68589ac3  Ok
  147.       LOAD | addr=0x401f3000 | len=0x0000063c | crc=0x1db563ff  Ok
  148.       LOAD | addr=0x401f7000 | len=0x00011b4a | crc=0x69d672da  Ok
  149.       LOAD | addr=0x40208b4c | len=0x00000ef8 | crc=0xcfadfe53  Ok
  150.       LOAD | addr=0x4020a078 | len=0x000000b4 | crc=0xb4758358  Ok
  151.       JUMP | addr=0x401f7df0 | arg=0x00000000
  152.       write FIRMWARE.play.1.elf
  153.   Section 'lba_'
  154.     pos   =   1055c0 -   147330
  155.     len   =    41d70
  156.     flags =        1  Boot Section (Encrypted)
  157.       LOAD | addr=0x00000000 | len=0x00000bec | crc=0x29e6e529  Ok
  158.       LOAD | addr=0x00000bec | len=0x000001d4 | crc=0x394c0a38  Ok
  159.       LOAD | addr=0x00000dc0 | len=0x00000004 | crc=0x2514b607  Ok
  160.       FILL | addr=0x00000dc4 | len=0x00000013 | pattern=0x00000000
  161.       CALL | addr=0x00000134 | arg=0x00000001
  162.       write FIRMWARE.lba_.0.elf
  163.       LOAD | addr=0x00000000 | len=0x00000400 | crc=0x4670ca12  Ok
  164.       LOAD | addr=0x00000400 | len=0x00001970 | crc=0x7007f247  Ok
  165.       LOAD | addr=0x40034400 | len=0x00001380 | crc=0xc7dbe266  Ok
  166.       LOAD | addr=0x40053a78 | len=0x0001b738 | crc=0xfa2dc766  Ok
  167.       LOAD | addr=0x4006f1b0 | len=0x00000004 | crc=0x9f0d5570  Ok
  168.       LOAD | addr=0x4006f1b4 | len=0x0000000a | crc=0x99ce2805  Ok
  169.       LOAD | addr=0x4006f1c0 | len=0x00000054 | crc=0xa8198d45  Ok
  170.       LOAD | addr=0x4006f214 | len=0x0000010c | crc=0xceefdbc3  Ok
  171.       LOAD | addr=0x4006f320 | len=0x00000043 | crc=0x49437379  Ok
  172.       LOAD | addr=0x4006f364 | len=0x0002247c | crc=0x5d5f506e  Ok
  173.       JUMP | addr=0x40070a34 | arg=0x00000000
  174.       write FIRMWARE.lba_.1.elf
  175.   Section 'hLst'
  176.     pos   =   147340 -   1693e0
  177.     len   =    220a0
  178.     flags =        1  Boot Section (Encrypted)
  179.       LOAD | addr=0x00000000 | len=0x00000400 | crc=0x858ff8ad  Ok
  180.       LOAD | addr=0x00001c00 | len=0x000001d8 | crc=0xfc4e36f6  Ok
  181.       LOAD | addr=0x00002428 | len=0x00001924 | crc=0xadb9cc80  Ok
  182.       LOAD | addr=0x00003d4c | len=0x00000004 | crc=0x1f795c70  Ok
  183.       LOAD | addr=0x00003d50 | len=0x0000000a | crc=0x26c1b4f8  Ok
  184.       LOAD | addr=0x00003d5c | len=0x00000050 | crc=0xd40df089  Ok
  185.       LOAD | addr=0x00003dac | len=0x00000014 | crc=0x41959433  Ok
  186.       LOAD | addr=0x4001c000 | len=0x000021c4 | crc=0x1604ddb3  Ok
  187.       LOAD | addr=0x40184000 | len=0x0000f904 | crc=0x52080e91  Ok
  188.       LOAD | addr=0x40194000 | len=0x00000654 | crc=0x4f9d530f  Ok
  189.       LOAD | addr=0x40195000 | len=0x000000f4 | crc=0x8b96e9c8  Ok
  190.       LOAD | addr=0x401c0000 | len=0x0000063c | crc=0xe93767f4  Ok
  191.       LOAD | addr=0x401c4000 | len=0x0000d4b6 | crc=0x57ced69f  Ok
  192.       LOAD | addr=0x401d14b8 | len=0x00000200 | crc=0x3411e893  Ok
  193.       LOAD | addr=0x401d1cec | len=0x000000b4 | crc=0xc4a52e2a  Ok
  194.       JUMP | addr=0x401c4df0 | arg=0x00000000
  195.       write FIRMWARE.hLst.0.elf
  196.   Section 'pLay'
  197.     pos   =   1693f0 -   1f2400
  198.     len   =    89010
  199.     flags =        1  Boot Section (Encrypted)
  200.       LOAD | addr=0x40001000 | len=0x00000020 | crc=0x96a7f638  Ok
  201.       LOAD | addr=0x40001020 | len=0x00000008 | crc=0x76994d89  Ok
  202.       LOAD | addr=0x40001028 | len=0x0000000c | crc=0x653ead07  Ok
  203.       LOAD | addr=0x40001034 | len=0x00000004 | crc=0x72598332  Ok
  204.       LOAD | addr=0x40001038 | len=0x00000004 | crc=0x3fd23eda  Ok
  205.       LOAD | addr=0x4000143c | len=0x00003b60 | crc=0x5aac19fc  Ok
  206.       LOAD | addr=0x40004f9c | len=0x0004b234 | crc=0x13dd5300  Ok
  207.       LOAD | addr=0x400501d0 | len=0x00000098 | crc=0xf8d95de2  Ok
  208.       FILL | addr=0x40050268 | len=0x00000170 | pattern=0x00000000
  209.       CALL | addr=0x4000175c | arg=0x00000000
  210.       write FIRMWARE.pLay.0.elf
  211.       LOAD | addr=0x00000000 | len=0x00000400 | crc=0x1f30d9ab  Ok
  212.       LOAD | addr=0x0000205c | len=0x00001a94 | crc=0x3fc95dbc  Ok
  213.       LOAD | addr=0x00003af0 | len=0x00000004 | crc=0xee890656  Ok
  214.       LOAD | addr=0x00003af4 | len=0x0000000a | crc=0xe1e17618  Ok
  215.       LOAD | addr=0x00003b00 | len=0x00000050 | crc=0x5f0c85d1  Ok
  216.       LOAD | addr=0x00003b50 | len=0x00000014 | crc=0x6c2fda91  Ok
  217.       LOAD | addr=0x4001c000 | len=0x000022fc | crc=0xc8af2d41  Ok
  218.       LOAD | addr=0x401c9000 | len=0x000164b0 | crc=0x55fe7b17  Ok
  219.       LOAD | addr=0x401e0000 | len=0x000004cc | crc=0xea877cb1  Ok
  220.       LOAD | addr=0x401e04cc | len=0x0000ce04 | crc=0xf9a10faf  Ok
  221.       LOAD | addr=0x401ed2d0 | len=0x00002230 | crc=0x7153302f  Ok
  222.       LOAD | addr=0x401ef500 | len=0x00001bcc | crc=0x4f9ec02f  Ok
  223.       LOAD | addr=0x401f3000 | len=0x0000063c | crc=0x1a33014c  Ok
  224.       LOAD | addr=0x401f7000 | len=0x0000defa | crc=0x2d9f04fd  Ok
  225.       LOAD | addr=0x40204efc | len=0x00000200 | crc=0x63e63556  Ok
  226.       LOAD | addr=0x40205730 | len=0x000000b4 | crc=0x2a0e38a3  Ok
  227.       JUMP | addr=0x401f7df0 | arg=0x00000000
  228.       write FIRMWARE.pLay.1.elf
  229.   Section 'hvm2'
  230.     pos   =   1f3000 -   205020
  231.     len   =    12020
  232.     flags =        2  Data Section
  233.   Section 'hvmi'
  234.     pos   =   206000 -   40bbf0
  235.     len   =   205bf0
  236.     flags =        2  Data Section
  237.   Section 'pvm2'
  238.     pos   =   40c000 -   41ea50
  239.     len   =    12a50
  240.     flags =        2  Data Section
  241.   Section 'pvmi'
  242.     pos   =   41f000 -   646380
  243.     len   =   227380
  244.     flags =        2  Data Section
  245.   Section 'hLm2'
  246.     pos   =   647000 -   6546c0
  247.     len   =     d6c0
  248.     flags =        2  Data Section
  249.   Section 'hLmi'
  250.     pos   =   655000 -   854a80
  251.     len   =   1ffa80
  252.     flags =        2  Data Section
  253.   Section 'pLm2'
  254.     pos   =   855000 -   863100
  255.     len   =     e100
  256.     flags =        2  Data Section
  257.   Section 'pLmi'
  258.     pos   =   864000 -   a85370
  259.     len   =   221370
  260.     flags =        2  Data Section
  261.   Section 'rsrc'
  262.     pos   =   a86000 -  2a3b470
  263.     len   =  1fb5470
  264.     flags =        2  Data Section
  265. Final signature:
  266.   Encrypted SHA-1:
  267.     9E 08 F6 CF 22 1C CA B0 BC 64 64 AA F0 8D A2 33
  268.     31 2B 41 F9 F4 39 28 16 37 08 50 98 21 5A 0C 6A
  269.   File SHA-1:
  270.     82 07 C6 5E C9 56 17 32 B6 82 30 18 1F C8 15 2F 55 0B 36 55  Ok
  271. ==15320==
  272. ==15320== HEAP SUMMARY:
  273. ==15320==     in use at exit: 1,538 bytes in 35 blocks
  274. ==15320==   total heap usage: 415 allocs, 380 frees, 90,736,309 bytes allocated
  275. ==15320==
  276. ==15320== LEAK SUMMARY:
  277. ==15320==    definitely lost: 1,024 bytes in 21 blocks
  278. ==15320==    indirectly lost: 154 bytes in 10 blocks
  279. ==15320==      possibly lost: 32 bytes in 2 blocks
  280. ==15320==    still reachable: 328 bytes in 2 blocks
  281. ==15320==         suppressed: 0 bytes in 0 blocks
  282. ==15320== Rerun with --leak-check=full to see details of leaked memory
  283. ==15320==
  284. ==15320== For counts of detected and suppressed errors, rerun with: -v
  285. ==15320== Use --track-origins=yes to see where uninitialised values come from
  286. ==15320== ERROR SUMMARY: 12 errors from 1 contexts (suppressed: 17 from 6)
  287. smite@rockbox:~/tmp/rockbox/utils/sbtools/sa2ara08k_02_hf1_eng$
  288.  
  289.  
clone this paste RAW Paste Data