Advertisement
Guest User

Untitled

a guest
Oct 29th, 2011
190
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.35 KB | None | 0 0
  1. smite@rockbox:~/tmp/rockbox/utils/sbtools/sa2ara08k_02_hf1_eng$ sudo valgrind ../sbtoelf -a "usbotp(066f:3780)" -z -o FIRMWARE. firmware.sb
  2. ==15320== Memcheck, a memory error detector
  3. ==15320== Copyright (C) 2002-2010, and GNU GPL'd, by Julian Seward et al.
  4. ==15320== Using Valgrind-3.6.1-Debian and LibVEX; rerun with -h for copyright info
  5. ==15320== Command: ../sbtoelf -a usbotp(066f:3780) -z -o FIRMWARE. firmware.sb
  6. ==15320==
  7. Basic info:
  8. SB version: 1.1
  9. Header SHA-1: 67 98 27 1B 47 52 3C E2 46 D6 42 8B 6C C4 F4 29 FA 77 B3 16 Ok
  10. Flags: 100
  11. Total file size : 44283024
  12. Sizes and offsets:
  13. # of encryption keys = 1
  14. # of sections = 16
  15. Versions
  16. Random 1: 29 F1 73 67 74 6C
  17. Random 2: 5D C7 5E 4F 32 69
  18. Creation date/time = Mon Apr 11 11:47:57 2011
  19. Product version = 0.3.23
  20. Component version = 0.3.23
  21. Drive tag = 50
  22. First boot tag offset = 18
  23. First boot section ID = 0x00000000
  24. Encryption data
  25. Key 0: USB-OTP(066f:3780)
  26. CBC-MAC of headers: 6A 2E F0 78 32 C5 8A EA 08 6D 7E 6B 91 4B 1A 20 Ok
  27. Encrypted key : 02 6C 78 58 B9 F5 39 23 47 1D 9E C4 B9 7F 4B 1C
  28. Decrypted key : 75 3C 70 EA AC 95 A0 B9 3E 4B DC 24 03 65 8D 24
  29. Summary:
  30. Real key: 75 3C 70 EA AC 95 A0 B9 3E 4B DC 24 03 65 8D 24
  31. IV : 67 98 27 1B 47 52 3C E2 46 D6 42 8B 6C C4 F4 29
  32. Sections
  33. Section '____'
  34. pos = 190 - 6e00
  35. len = 6c70
  36. flags = 1 Boot Section (Encrypted)
  37. LOAD | addr=0x00000000 | len=0x00001d44 | crc=0xe93b78b5 Ok
  38. LOAD | addr=0x00001d44 | len=0x00000064 | crc=0xd629ceef Ok
  39. LOAD | addr=0x00001da8 | len=0x00000009 | crc=0x84fd58a8 Ok
  40. FILL | addr=0x00001db4 | len=0x0000003b | pattern=0x00000000
  41. FILL | addr=0x00001df0 | len=0x00000800 | pattern=0x00000000
  42. CALL | addr=0x0000018c | arg=0x00000000
  43. write FIRMWARE.____.0.elf
  44. ==15320== Syscall param write(buf) points to uninitialised byte(s)
  45. ==15320== at 0x41072E3: __write_nocancel (syscall-template.S:82)
  46. ==15320== by 0x40AF634: _IO_file_write@@GLIBC_2.1 (fileops.c:1276)
  47. ==15320== by 0x40AF513: new_do_write (fileops.c:530)
  48. ==15320== by 0x40A6619: _IO_seekoff_unlocked (ioseekoff.c:71)
  49. ==15320== by 0x40A8161: fseek (fseek.c:41)
  50. ==15320== by 0x804D39A: elf_write_file (elf.c:358)
  51. ==15320== by 0x8048FDE: extract_elf_section (sbtoelf.c:120)
  52. ==15320== by 0x804967E: extract_section (sbtoelf.c:237)
  53. ==15320== by 0x804AB10: extract (sbtoelf.c:565)
  54. ==15320== by 0x804B7FA: main (sbtoelf.c:817)
  55. ==15320== Address 0x4030010 is not stack'd, malloc'd or (recently) free'd
  56. ==15320==
  57. LOAD | addr=0x00000000 | len=0x00003044 | crc=0x7aef7c1f Ok
  58. LOAD | addr=0x00003044 | len=0x000000ac | crc=0x77c4eecc Ok
  59. LOAD | addr=0x000030f0 | len=0x0000002a | crc=0x8ad18f88 Ok
  60. FILL | addr=0x0000311c | len=0x000000c9 | pattern=0x00000000
  61. FILL | addr=0x000031e8 | len=0x00000800 | pattern=0x00000000
  62. FILL | addr=0x000039e8 | len=0x00000004 | pattern=0x00000000
  63. CALL | addr=0x0000019c | arg=0x00000000
  64. write FIRMWARE.____.1.elf
  65. LOAD | addr=0x00000000 | len=0x000019d8 | crc=0x0bc62e91 Ok
  66. LOAD | addr=0x000019d8 | len=0x0000021c | crc=0x8b59414d Ok
  67. LOAD | addr=0x00001bf4 | len=0x0000000e | crc=0x66bc53a4 Ok
  68. FILL | addr=0x00001c04 | len=0x000000cc | pattern=0x00000000
  69. FILL | addr=0x00001cd0 | len=0x00000800 | pattern=0x00000000
  70. FILL | addr=0x000024d0 | len=0x00000004 | pattern=0x00000000
  71. CALL | addr=0x0000009c | arg=0x00000000
  72. write FIRMWARE.____.2.elf
  73. CALL | addr=0x000000d0 | arg=0x6c62615f
  74. write FIRMWARE.____.3.elf
  75. CALL | addr=0x00000114 | arg=0x6d6c635f
  76. write FIRMWARE.____.4.elf
  77. Section 'mlc_'
  78. pos = 6e10 - 52630
  79. len = 4b820
  80. flags = 1 Boot Section (Encrypted)
  81. LOAD | addr=0x00000000 | len=0x00000bec | crc=0xa68c8ec1 Ok
  82. LOAD | addr=0x00000bec | len=0x000001d4 | crc=0x9c5eabfe Ok
  83. LOAD | addr=0x00000dc0 | len=0x00000004 | crc=0xf2bb7be1 Ok
  84. FILL | addr=0x00000dc4 | len=0x00000013 | pattern=0x00000000
  85. CALL | addr=0x00000134 | arg=0x00000001
  86. write FIRMWARE.mlc_.0.elf
  87. LOAD | addr=0x00000000 | len=0x00000400 | crc=0x0250bc79 Ok
  88. LOAD | addr=0x00000400 | len=0x00001970 | crc=0xfae96c0a Ok
  89. LOAD | addr=0x40034400 | len=0x00001890 | crc=0x55ed0d5d Ok
  90. LOAD | addr=0x40054908 | len=0x0001c614 | crc=0xd3510440 Ok
  91. LOAD | addr=0x40070f1c | len=0x00000004 | crc=0x25957235 Ok
  92. LOAD | addr=0x40070f20 | len=0x0000000a | crc=0xf48cd038 Ok
  93. LOAD | addr=0x40070f2c | len=0x00000054 | crc=0x960d1785 Ok
  94. LOAD | addr=0x40070f80 | len=0x0000010c | crc=0x3d09d76a Ok
  95. LOAD | addr=0x4007108c | len=0x00000043 | crc=0x6bbe6aa7 Ok
  96. LOAD | addr=0x400710d0 | len=0x0002ab34 | crc=0x626a36c4 Ok
  97. JUMP | addr=0x40072838 | arg=0x00000000
  98. write FIRMWARE.mlc_.1.elf
  99. Section 'host'
  100. pos = 52640 - 78630
  101. len = 25ff0
  102. flags = 1 Boot Section (Encrypted)
  103. LOAD | addr=0x00000000 | len=0x00000400 | crc=0x858ff8ad Ok
  104. LOAD | addr=0x00002400 | len=0x000001d8 | crc=0xb7589894 Ok
  105. LOAD | addr=0x00002c28 | len=0x00001924 | crc=0x27a976c9 Ok
  106. LOAD | addr=0x0000454c | len=0x00000004 | crc=0xa17f00aa Ok
  107. LOAD | addr=0x00004550 | len=0x0000000a | crc=0x75b83296 Ok
  108. LOAD | addr=0x0000455c | len=0x00000050 | crc=0xf4efeacc Ok
  109. LOAD | addr=0x000045ac | len=0x00000014 | crc=0x740b0ac1 Ok
  110. LOAD | addr=0x4001c000 | len=0x00002574 | crc=0x17b1ad6e Ok
  111. LOAD | addr=0x40185000 | len=0x0000ea40 | crc=0xc3fe13c1 Ok
  112. LOAD | addr=0x40194000 | len=0x00000610 | crc=0xa0c85d20 Ok
  113. LOAD | addr=0x40195000 | len=0x00000254 | crc=0x4e027e94 Ok
  114. LOAD | addr=0x401c0000 | len=0x0000063c | crc=0x69fd7898 Ok
  115. LOAD | addr=0x401c4000 | len=0x0001111e | crc=0x48e7a9bb Ok
  116. LOAD | addr=0x401d5120 | len=0x00000ef8 | crc=0x57a51938 Ok
  117. LOAD | addr=0x401d664c | len=0x000000b4 | crc=0x5774bf90 Ok
  118. JUMP | addr=0x401c4df0 | arg=0x00000000
  119. write FIRMWARE.host.0.elf
  120. Section 'play'
  121. pos = 78640 - 1055b0
  122. len = 8cf70
  123. flags = 1 Boot Section (Encrypted)
  124. LOAD | addr=0x40001000 | len=0x00000020 | crc=0x96a7f638 Ok
  125. LOAD | addr=0x40001020 | len=0x00000008 | crc=0x5dfd2cc5 Ok
  126. LOAD | addr=0x40001028 | len=0x0000000c | crc=0xe4dad6fc Ok
  127. LOAD | addr=0x40001034 | len=0x00000004 | crc=0xdcace36f Ok
  128. LOAD | addr=0x40001038 | len=0x00000004 | crc=0x1f9f93f5 Ok
  129. LOAD | addr=0x4000143c | len=0x00003b60 | crc=0x5aac19fc Ok
  130. LOAD | addr=0x40004f9c | len=0x0004b234 | crc=0xc0cbbebc Ok
  131. LOAD | addr=0x400501d0 | len=0x00000098 | crc=0x15191bd7 Ok
  132. FILL | addr=0x40050268 | len=0x00000170 | pattern=0x00000000
  133. CALL | addr=0x4000175c | arg=0x00000000
  134. write FIRMWARE.play.0.elf
  135. LOAD | addr=0x00000000 | len=0x00000400 | crc=0x1f30d9ab Ok
  136. LOAD | addr=0x0000285c | len=0x00001a94 | crc=0xab152fb9 Ok
  137. LOAD | addr=0x000042f0 | len=0x00000004 | crc=0x04c42e03 Ok
  138. LOAD | addr=0x000042f4 | len=0x0000000a | crc=0x1c77e649 Ok
  139. LOAD | addr=0x00004300 | len=0x00000050 | crc=0x84e94ab9 Ok
  140. LOAD | addr=0x00004350 | len=0x00000014 | crc=0xa2d0911c Ok
  141. LOAD | addr=0x4001c000 | len=0x0000280c | crc=0xb518b742 Ok
  142. LOAD | addr=0x401ca000 | len=0x000155f0 | crc=0x6299a731 Ok
  143. LOAD | addr=0x401e0000 | len=0x00000488 | crc=0xf7f07fa2 Ok
  144. LOAD | addr=0x401e0488 | len=0x0000ce04 | crc=0xb5d6283f Ok
  145. LOAD | addr=0x401ed28c | len=0x00002230 | crc=0x7153302f Ok
  146. LOAD | addr=0x401ef4bc | len=0x00001bcc | crc=0x68589ac3 Ok
  147. LOAD | addr=0x401f3000 | len=0x0000063c | crc=0x1db563ff Ok
  148. LOAD | addr=0x401f7000 | len=0x00011b4a | crc=0x69d672da Ok
  149. LOAD | addr=0x40208b4c | len=0x00000ef8 | crc=0xcfadfe53 Ok
  150. LOAD | addr=0x4020a078 | len=0x000000b4 | crc=0xb4758358 Ok
  151. JUMP | addr=0x401f7df0 | arg=0x00000000
  152. write FIRMWARE.play.1.elf
  153. Section 'lba_'
  154. pos = 1055c0 - 147330
  155. len = 41d70
  156. flags = 1 Boot Section (Encrypted)
  157. LOAD | addr=0x00000000 | len=0x00000bec | crc=0x29e6e529 Ok
  158. LOAD | addr=0x00000bec | len=0x000001d4 | crc=0x394c0a38 Ok
  159. LOAD | addr=0x00000dc0 | len=0x00000004 | crc=0x2514b607 Ok
  160. FILL | addr=0x00000dc4 | len=0x00000013 | pattern=0x00000000
  161. CALL | addr=0x00000134 | arg=0x00000001
  162. write FIRMWARE.lba_.0.elf
  163. LOAD | addr=0x00000000 | len=0x00000400 | crc=0x4670ca12 Ok
  164. LOAD | addr=0x00000400 | len=0x00001970 | crc=0x7007f247 Ok
  165. LOAD | addr=0x40034400 | len=0x00001380 | crc=0xc7dbe266 Ok
  166. LOAD | addr=0x40053a78 | len=0x0001b738 | crc=0xfa2dc766 Ok
  167. LOAD | addr=0x4006f1b0 | len=0x00000004 | crc=0x9f0d5570 Ok
  168. LOAD | addr=0x4006f1b4 | len=0x0000000a | crc=0x99ce2805 Ok
  169. LOAD | addr=0x4006f1c0 | len=0x00000054 | crc=0xa8198d45 Ok
  170. LOAD | addr=0x4006f214 | len=0x0000010c | crc=0xceefdbc3 Ok
  171. LOAD | addr=0x4006f320 | len=0x00000043 | crc=0x49437379 Ok
  172. LOAD | addr=0x4006f364 | len=0x0002247c | crc=0x5d5f506e Ok
  173. JUMP | addr=0x40070a34 | arg=0x00000000
  174. write FIRMWARE.lba_.1.elf
  175. Section 'hLst'
  176. pos = 147340 - 1693e0
  177. len = 220a0
  178. flags = 1 Boot Section (Encrypted)
  179. LOAD | addr=0x00000000 | len=0x00000400 | crc=0x858ff8ad Ok
  180. LOAD | addr=0x00001c00 | len=0x000001d8 | crc=0xfc4e36f6 Ok
  181. LOAD | addr=0x00002428 | len=0x00001924 | crc=0xadb9cc80 Ok
  182. LOAD | addr=0x00003d4c | len=0x00000004 | crc=0x1f795c70 Ok
  183. LOAD | addr=0x00003d50 | len=0x0000000a | crc=0x26c1b4f8 Ok
  184. LOAD | addr=0x00003d5c | len=0x00000050 | crc=0xd40df089 Ok
  185. LOAD | addr=0x00003dac | len=0x00000014 | crc=0x41959433 Ok
  186. LOAD | addr=0x4001c000 | len=0x000021c4 | crc=0x1604ddb3 Ok
  187. LOAD | addr=0x40184000 | len=0x0000f904 | crc=0x52080e91 Ok
  188. LOAD | addr=0x40194000 | len=0x00000654 | crc=0x4f9d530f Ok
  189. LOAD | addr=0x40195000 | len=0x000000f4 | crc=0x8b96e9c8 Ok
  190. LOAD | addr=0x401c0000 | len=0x0000063c | crc=0xe93767f4 Ok
  191. LOAD | addr=0x401c4000 | len=0x0000d4b6 | crc=0x57ced69f Ok
  192. LOAD | addr=0x401d14b8 | len=0x00000200 | crc=0x3411e893 Ok
  193. LOAD | addr=0x401d1cec | len=0x000000b4 | crc=0xc4a52e2a Ok
  194. JUMP | addr=0x401c4df0 | arg=0x00000000
  195. write FIRMWARE.hLst.0.elf
  196. Section 'pLay'
  197. pos = 1693f0 - 1f2400
  198. len = 89010
  199. flags = 1 Boot Section (Encrypted)
  200. LOAD | addr=0x40001000 | len=0x00000020 | crc=0x96a7f638 Ok
  201. LOAD | addr=0x40001020 | len=0x00000008 | crc=0x76994d89 Ok
  202. LOAD | addr=0x40001028 | len=0x0000000c | crc=0x653ead07 Ok
  203. LOAD | addr=0x40001034 | len=0x00000004 | crc=0x72598332 Ok
  204. LOAD | addr=0x40001038 | len=0x00000004 | crc=0x3fd23eda Ok
  205. LOAD | addr=0x4000143c | len=0x00003b60 | crc=0x5aac19fc Ok
  206. LOAD | addr=0x40004f9c | len=0x0004b234 | crc=0x13dd5300 Ok
  207. LOAD | addr=0x400501d0 | len=0x00000098 | crc=0xf8d95de2 Ok
  208. FILL | addr=0x40050268 | len=0x00000170 | pattern=0x00000000
  209. CALL | addr=0x4000175c | arg=0x00000000
  210. write FIRMWARE.pLay.0.elf
  211. LOAD | addr=0x00000000 | len=0x00000400 | crc=0x1f30d9ab Ok
  212. LOAD | addr=0x0000205c | len=0x00001a94 | crc=0x3fc95dbc Ok
  213. LOAD | addr=0x00003af0 | len=0x00000004 | crc=0xee890656 Ok
  214. LOAD | addr=0x00003af4 | len=0x0000000a | crc=0xe1e17618 Ok
  215. LOAD | addr=0x00003b00 | len=0x00000050 | crc=0x5f0c85d1 Ok
  216. LOAD | addr=0x00003b50 | len=0x00000014 | crc=0x6c2fda91 Ok
  217. LOAD | addr=0x4001c000 | len=0x000022fc | crc=0xc8af2d41 Ok
  218. LOAD | addr=0x401c9000 | len=0x000164b0 | crc=0x55fe7b17 Ok
  219. LOAD | addr=0x401e0000 | len=0x000004cc | crc=0xea877cb1 Ok
  220. LOAD | addr=0x401e04cc | len=0x0000ce04 | crc=0xf9a10faf Ok
  221. LOAD | addr=0x401ed2d0 | len=0x00002230 | crc=0x7153302f Ok
  222. LOAD | addr=0x401ef500 | len=0x00001bcc | crc=0x4f9ec02f Ok
  223. LOAD | addr=0x401f3000 | len=0x0000063c | crc=0x1a33014c Ok
  224. LOAD | addr=0x401f7000 | len=0x0000defa | crc=0x2d9f04fd Ok
  225. LOAD | addr=0x40204efc | len=0x00000200 | crc=0x63e63556 Ok
  226. LOAD | addr=0x40205730 | len=0x000000b4 | crc=0x2a0e38a3 Ok
  227. JUMP | addr=0x401f7df0 | arg=0x00000000
  228. write FIRMWARE.pLay.1.elf
  229. Section 'hvm2'
  230. pos = 1f3000 - 205020
  231. len = 12020
  232. flags = 2 Data Section
  233. Section 'hvmi'
  234. pos = 206000 - 40bbf0
  235. len = 205bf0
  236. flags = 2 Data Section
  237. Section 'pvm2'
  238. pos = 40c000 - 41ea50
  239. len = 12a50
  240. flags = 2 Data Section
  241. Section 'pvmi'
  242. pos = 41f000 - 646380
  243. len = 227380
  244. flags = 2 Data Section
  245. Section 'hLm2'
  246. pos = 647000 - 6546c0
  247. len = d6c0
  248. flags = 2 Data Section
  249. Section 'hLmi'
  250. pos = 655000 - 854a80
  251. len = 1ffa80
  252. flags = 2 Data Section
  253. Section 'pLm2'
  254. pos = 855000 - 863100
  255. len = e100
  256. flags = 2 Data Section
  257. Section 'pLmi'
  258. pos = 864000 - a85370
  259. len = 221370
  260. flags = 2 Data Section
  261. Section 'rsrc'
  262. pos = a86000 - 2a3b470
  263. len = 1fb5470
  264. flags = 2 Data Section
  265. Final signature:
  266. Encrypted SHA-1:
  267. 9E 08 F6 CF 22 1C CA B0 BC 64 64 AA F0 8D A2 33
  268. 31 2B 41 F9 F4 39 28 16 37 08 50 98 21 5A 0C 6A
  269. File SHA-1:
  270. 82 07 C6 5E C9 56 17 32 B6 82 30 18 1F C8 15 2F 55 0B 36 55 Ok
  271. ==15320==
  272. ==15320== HEAP SUMMARY:
  273. ==15320== in use at exit: 1,538 bytes in 35 blocks
  274. ==15320== total heap usage: 415 allocs, 380 frees, 90,736,309 bytes allocated
  275. ==15320==
  276. ==15320== LEAK SUMMARY:
  277. ==15320== definitely lost: 1,024 bytes in 21 blocks
  278. ==15320== indirectly lost: 154 bytes in 10 blocks
  279. ==15320== possibly lost: 32 bytes in 2 blocks
  280. ==15320== still reachable: 328 bytes in 2 blocks
  281. ==15320== suppressed: 0 bytes in 0 blocks
  282. ==15320== Rerun with --leak-check=full to see details of leaked memory
  283. ==15320==
  284. ==15320== For counts of detected and suppressed errors, rerun with: -v
  285. ==15320== Use --track-origins=yes to see where uninitialised values come from
  286. ==15320== ERROR SUMMARY: 12 errors from 1 contexts (suppressed: 17 from 6)
  287. smite@rockbox:~/tmp/rockbox/utils/sbtools/sa2ara08k_02_hf1_eng$
  288.  
  289.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement