Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ---------------------------------------------------------------
- xeBuild v1.01.421
- ---------------------------------------------------------------
- building glitch image
- per build directory overridden from command line to 'mydata'
- data directory overridden from command line to '14719'
- suffix '_RGH2jasper' added from command line to ini and patches filenames
- ------ parsing user ini at '.\mydata\options.ini' ------
- loading file...done!
- pre-parsing and sanitizing
- done!
- User options.ini loaded, 0x170 bytes in memory
- loading cpukey.txt from .\mydata\cpukey.txt
- CPU Key set to: **********
- loading 1blkey.txt from 1blkey.txt
- 1BL Key set to: ********** sum: 0x983 (expects: 0x983)
- xex Key set to: ********** sum: 0x800 (expects: 0x800)
- ------ parsing ini at '.\14719\_glitch_RGH2jasper.ini' ------
- ini version 14719
- ini: label [jasperbl] found
- found (1) 'cba_6752.bin' crc: 0x6aed11dc
- found (2) 'cbb_6752.bin' crc: 0xc90be105
- found (3) 'cd_9452.bin' crc: 0x455fa02c
- found (4) 'ce_1888.bin' crc: 0xff9b60df
- found (5) 'cf_14719.bin' crc: 0x31764aae
- found (6) 'cg_14719.bin' crc: 0x2b990f2a
- ini dictates dual CB for this model
- ini: label [flashfs] found
- found (1) 'aac.xexp' crc: 0x79fa8ef9
- found (2) 'bootanim.xex' crc: 0x4708ac41
- found (3) 'createprofile.xex' crc: 0x17d7eeef
- found (4) 'dash.xex' crc: 0xc331818a
- found (5) 'deviceselector.xex' crc: 0xce0a6ac4
- found (6) 'gamerprofile.xex' crc: 0x3d6fde71
- found (7) 'hud.xex' crc: 0xfb9af532
- found (8) 'huduiskin.xex' crc: 0x59c8f99e
- found (9) 'mfgbootlauncher.xex' crc: 0x30028379
- found (10) 'minimediaplayer.xex' crc: 0xea50ae99
- found (11) 'nomni.xexp' crc: 0xd1e81135
- found (12) 'nomnifwk.xexp' crc: 0x6311da91
- found (13) 'nomnifwm.xexp' crc: 0x03b32644
- found (14) 'SegoeXbox-Light.xtt' crc: 0x086eb344
- found (15) 'signin.xex' crc: 0x09f66fc4
- found (16) 'updater.xex' crc: 0x9dc378a8
- found (17) 'vk.xex' crc: 0x8ad4198e
- found (18) 'xam.xex' crc: 0xc1ee0989
- found (19) 'xenonclatin.xtt' crc: 0xd5d17ff5
- found (20) 'xenonclatin.xttp' crc: 0x7a507ad1
- found (21) 'xenonjklatin.xtt' crc: 0xdde4a14c
- found (22) 'xenonjklatin.xttp' crc: 0x945b7092
- found (23) 'ximecore.xex' crc: 0x709614d6
- found (24) 'ximedic.xex' crc: 0x1d992bfb
- found (25) 'ximedic.xexp' crc: 0xa1284e82
- found (26) '..\launch.xex' crc: 0x00000000
- found (27) '..\lhelper.xex' crc: 0x00000000
- found (28) '..\launch.ini' crc: 0x00000000
- ini: label [security] found
- found (1) 'crl.bin' crc: 0x00000000
- found (2) 'dae.bin' crc: 0x00000000
- found (3) 'extended.bin' crc: 0x00000000
- found (4) 'fcrt.bin' crc: 0x00000000
- found (5) 'secdata.bin' crc: 0x00000000
- ------ ini parsing completed ------
- auto image name used: 14719_gg_jasper.bin
- ------ Checking .\mydata\nanddump.bin ------
- Loading NAND dump (0x28ee70 bytes)...done!
- Detecting NAND controller type from dump data...
- NAND dump is from a small block machine
- NAND dump uses big block controller
- parsing dump into user and spare...
- done!
- decrypting KeyVault at address 0x4000 of size 0x4000
- keyvault decrypted OK, will use if no kv.bin is provided
- decrypting SMC at address 0x1000 of size 0x3000
- SMC decrypted OK, will use if no external smc.bin is provided
- seeking smc config in dump...found at offset 0xf7c000! Using if no smc config is provided.
- CF slot 0 decrypted ok LDV 0x09 Pairing: 0xf3a33b
- CF slot 1 decrypted ok LDV 0x08 Pairing: 0xf3a33b
- setting LDV from image to 9
- setting pairing data from image to 0xf3a33b
- MobileB.dat found at page 0x2c00, size 2048 (0x800) bytes
- MobileC.dat found at page 0x34a0, size 512 (0x200) bytes
- MobileD.dat found at page 0x3340, size 2048 (0x800) bytes
- MobileE.dat found at page 0x7120, size 2048 (0x800) bytes
- seeking security files...fsroot found at page 0x2c80 raw offset 0x5bc800
- crl.bin found in sector 0x1ca size 0xa00...verified! Will use if external file not found.
- dae.bin found in sector 0x1bd size 0x7090...verified! Will use if external file not found.
- extended.bin found in sector 0x163 size 0x4000...verified! Will use if external file not found.
- secdata.bin found in sector 0x1bb size 0x400...verified! Will use if external file not found.
- Writing initial header to flash image
- ------ Loading bootloaders and required security files ------
- reading .\mydata\smc.bin failed, using smc.bin from nand dump
- reset smc load address to 0x1000 size 0x3000
- reading .\mydata\kv.bin failed, using kv.bin from nand dump
- reading .\14719\cba_6752.bin (0x1ac0 bytes)
- reading .\14719\cbb_6752.bin (0x9390 bytes)
- reading .\14719\cd_9452.bin (0x4f20 bytes)
- reading .\14719\ce_1888.bin (0x5606a b pad 0x56070 b)
- xell not found in perbuild directory, checking firmware /bin folder
- xell not found in firmware /bin folder, checking base path
- reading xell-gggggg.bin (0x40000 bytes)
- reading .\14719\cf_14719.bin (0x4560 bytes)
- reading .\14719\cg_14719.bin (0x664aa b pad 0x664b0 b)
- reading .\14719\bin\patches_fat_RGH2jasper.bin (0x720 bytes)
- reading .\mydata\smc_config.bin failed, using smc_config.bin from nand dump
- -------------------
- checking smc_config
- -------------------
- extracting config
- ------------------
- SMC config info:
- ------------------
- Target temps: Cpu: 80шC Gpu: 75шC Edram: 77шC
- Max temps : Cpu: 95шC Gpu: 90шC Edram: 92шC
- Cpu Fan : (auto)
- Gpu Fan : (auto)
- MAC Address : **********
- AVRegion : 0x00000300 (PAL50)
- GameRegion : 0x02fe (PAL/EU)
- DVDRegion : 5
- resetKey : RADA
- ---------------------
- Checking for smc config data patches
- smc config was not patched
- ---------------------
- done!
- patch slot offset reset to: 0xb0000
- ------ Patching BLs and modifying patches ------
- Patching patches...
- Default patch offset 0x000c0010 not changed
- Patching patches for alt power reason
- Patches patched!
- Patching BLs...Done!
- ------ Encrypting and finalizing bootloaders ------
- encoding smc.bin size 0x3000
- SMC checksum: 5b3aed00
- known clean SMC found, type: Jasper v4.1(2.03)
- ******* ERROR: clean SMC found? you should use a hacked smc for glitch images.
- encoding kv.bin size 0x4000
- decrypted keyvault has been set for reference
- encoding cba_6752.bin size 0x1ac0
- encoding cbb_6752.bin size 0x9390
- CB 6752 seq 0x010800d0 type: 0x01 cseq: 0x08 allow: 0x00d0
- expected fuses:
- fuseset 00: C0FFFFFFFFFFFFFF
- fuseset 01: 0F0F0F0F0F0F0FF0
- fuseset 02: 0000000F00000000 (sequence)
- fuseset 02: 0000F00000000000 (allow cseq 5)
- fuseset 02: 000000F000000000 (allow cseq 7)
- fuseset 02: 0000000F00000000 (allow cseq 8)
- encoding cd_9452.bin size 0x5200
- encoding ce_1888.bin size 0x56070
- encoding xell-gggggg.bin size 0x40000
- encoding cf_14719.bin size 0x4560
- encoding cg_14719.bin size 0x664b0
- encoding patches_fat_RGH2jasper.bin size 0x3f0
- done!
- ------ Adding bootloaders to flash image ------
- adding smc.bin at raw offset 0x00001000 len 0x3000 (end 0x4000)
- adding kv.bin at raw offset 0x00004000 len 0x4000 (end 0x8000)
- adding cba_6752.bin at raw offset 0x00008000 len 0x1ac0 (end 0x9ac0)
- adding cbb_6752.bin at raw offset 0x00009ac0 len 0x9390 (end 0x12e50)
- adding cd_9452.bin at raw offset 0x00012e50 len 0x5200 (end 0x18050)
- adding ce_1888.bin at raw offset 0x00018050 len 0x56070 (end 0x6e0c0)
- adding xell-gggggg.bin at raw offset 0x00070000 len 0x40000 (end 0xb0000)
- adding cf_14719.bin at raw offset 0x000b0000 len 0x4560 (end 0xb4560)
- adding cg_14719.bin at raw offset 0x000b4560 len 0x664b0 (end 0xc0000, rest in fs)
- adding patches_fat_RGH2jasper.bin at raw offset 0x000c0010 len 0x3f0 (end 0xc0400)
- Fixing up FS table...done!
- Writing CG patch slot overflow data to sysupdate.xexp1 at raw offset 0xd0000...done!
- ------ adding 28 firmware files ------
- reading .\14719\aac.xexp (0x14000 bytes) (crc32: 0x79fa8ef9 ini: 0x79fa8ef9)
- adding as aac.xexp1 at raw offset 0x12aa10 len 0x00014000 (end 0x0013ea10)
- reading .\14719\bootanim.xex (0x61000 bytes) (crc32: 0x4708ac41 ini: 0x4708ac41)
- adding as bootanim.xex at raw offset 0x140000 len 0x00061000 (end 0x001a1000)
- reading .\14719\createprofile.xex (0xc000 bytes) (crc32: 0x17d7eeef ini: 0x17d7eeef)
- adding as createprofile.xex at raw offset 0x1a1000 len 0x0000c000 (end 0x001ad000)
- reading .\14719\dash.xex (0x63a000 bytes) (crc32: 0xc331818a ini: 0xc331818a)
- adding as dash.xex at raw offset 0x1b0000 len 0x0063a000 (end 0x007ea000)
- reading .\14719\deviceselector.xex (0x9000 bytes) (crc32: 0xce0a6ac4 ini: 0xce0a6ac4)
- adding as deviceselector.xex at raw offset 0x7ea000 len 0x00009000 (end 0x007f3000)
- reading .\14719\gamerprofile.xex (0x1b000 bytes) (crc32: 0x3d6fde71 ini: 0x3d6fde71)
- adding as gamerprofile.xex at raw offset 0x7f5000 len 0x0001b000 (end 0x00810000)
- reading .\14719\hud.xex (0x1e000 bytes) (crc32: 0xfb9af532 ini: 0xfb9af532)
- adding as hud.xex at raw offset 0x813000 len 0x0001e000 (end 0x00831000)
- reading .\14719\huduiskin.xex (0x13000 bytes) (crc32: 0x59c8f99e ini: 0x59c8f99e)
- adding as huduiskin.xex at raw offset 0x832000 len 0x00013000 (end 0x00845000)
- reading .\14719\mfgbootlauncher.xex (0x8000 bytes) (crc32: 0x30028379 ini: 0x30028379)
- adding as mfgbootlauncher.xex at raw offset 0x847000 len 0x00008000 (end 0x0084f000)
- reading .\14719\minimediaplayer.xex (0xc000 bytes) (crc32: 0xea50ae99 ini: 0xea50ae99)
- adding as minimediaplayer.xex at raw offset 0x850000 len 0x0000c000 (end 0x0085c000)
- reading .\14719\nomni.xexp (0xc800 bytes) (crc32: 0xd1e81135 ini: 0xd1e81135)
- adding as nomni.xexp1 at raw offset 0x85c000 len 0x0000c800 (end 0x00868800)
- reading .\14719\nomnifwk.xexp (0x2000 bytes) (crc32: 0x6311da91 ini: 0x6311da91)
- adding as nomnifwk.xexp1 at raw offset 0x868800 len 0x00002000 (end 0x0086a800)
- reading .\14719\nomnifwm.xexp (0x5000 bytes) (crc32: 0x03b32644 ini: 0x03b32644)
- adding as nomnifwm.xexp1 at raw offset 0x86e000 len 0x00005000 (end 0x00873000)
- reading .\14719\SegoeXbox-Light.xtt (0x6000 bytes) (crc32: 0x086eb344 ini: 0x086eb344)
- adding as SegoeXbox-Light.xtt at raw offset 0x875000 len 0x00006000 (end 0x0087b000)
- reading .\14719\signin.xex (0x16000 bytes) (crc32: 0x09f66fc4 ini: 0x09f66fc4)
- adding as signin.xex at raw offset 0x87e000 len 0x00016000 (end 0x00894000)
- reading .\14719\updater.xex (0x7000 bytes) (crc32: 0x9dc378a8 ini: 0x9dc378a8)
- adding as updater.xex at raw offset 0x896000 len 0x00007000 (end 0x0089d000)
- reading .\14719\vk.xex (0x9000 bytes) (crc32: 0x8ad4198e ini: 0x8ad4198e)
- adding as vk.xex at raw offset 0x89f000 len 0x00009000 (end 0x008a8000)
- reading .\14719\xam.xex (0x236000 bytes) (crc32: 0xc1ee0989 ini: 0xc1ee0989)
- adding as xam.xex at raw offset 0x8a9000 len 0x00236000 (end 0x00adf000)
- reading .\14719\xenonclatin.xtt (0x11b000 bytes) (crc32: 0xd5d17ff5 ini: 0xd5d17ff5)
- adding as xenonclatin.xtt at raw offset 0xae2000 len 0x0011b000 (end 0x00bfd000)
- reading .\14719\xenonclatin.xttp (0x18000 bytes) (crc32: 0x7a507ad1 ini: 0x7a507ad1)
- adding as xenonclatin.xttp1 at raw offset 0xbff000 len 0x00018000 (end 0x00c17000)
- reading .\14719\xenonjklatin.xtt (0x1a8000 bytes) (crc32: 0xdde4a14c ini: 0xdde4a14c)
- adding as xenonjklatin.xtt at raw offset 0xc18000 len 0x001a8000 (end 0x00dc0000)
- reading .\14719\xenonjklatin.xttp (0x7000 bytes) (crc32: 0x945b7092 ini: 0x945b7092)
- adding as xenonjklatin.xttp1 at raw offset 0xdc0000 len 0x00007000 (end 0x00dc7000)
- reading .\14719\ximecore.xex (0x15000 bytes) (crc32: 0x709614d6 ini: 0x709614d6)
- adding as ximecore.xex at raw offset 0xdc7000 len 0x00015000 (end 0x00ddc000)
- reading .\14719\ximedic.xex (0x90000 bytes) (crc32: 0x1d992bfb ini: 0x1d992bfb)
- adding as ximedic.xex at raw offset 0xddd000 len 0x00090000 (end 0x00e6d000)
- reading .\14719\ximedic.xexp (0x2800 bytes) (crc32: 0xa1284e82 ini: 0xa1284e82)
- adding as ximedic.xexp1 at raw offset 0xe70000 len 0x00002800 (end 0x00e72800)
- ***** could not read .\14719\..\launch.xex, skipping *****
- ***** could not read .\14719\..\lhelper.xex, skipping *****
- ***** could not read .\14719\..\launch.ini, skipping *****
- ------ adding 5 security files ------
- <- Processing crl.bin ->
- reading .\mydata\crl.bin (0xa00 bytes)
- crl appears crypted, attempting to decrypt with CPU key...failed! Trying alternate key...success!
- adding as crl.bin at raw offset 0xe74000 len 0x00000a00 (end 0x00e74a00)
- <- Processing dae.bin ->
- reading .\mydata\dae.bin (0xad30 bytes)
- dae appears encrypted, attempting to decrypt with CPU key...failed! Attempting to decrypt with alternate key...
- success!
- adding as dae.bin at raw offset 0xe78000 len 0x0000ad30 (end 0x00e82d30)
- <- Processing extended.bin ->
- reading .\mydata\extended.bin (0x4000 bytes)
- adding as extended.bin at raw offset 0xe84000 len 0x00004000 (end 0x00e88000)
- <- Processing fcrt.bin ->
- fcrt.bin not found and not required by keyvault, skipped
- <- Processing secdata.bin ->
- reading .\mydata\secdata.bin (0x400 bytes)
- adding as secdata.bin at raw offset 0xe88000 len 0x00000400 (end 0x00e88400)
- ------ checking for Mobile*.dat ------
- MobileB.dat found, adding from nanddump.bin
- adding MobileB.dat as type 0x31 at raw offset 0xe8c000 len 0x800 (end 0xe8c800)
- MobileC.dat found, adding from nanddump.bin
- adding MobileC.dat as type 0x32 at raw offset 0xe90000 len 0x200 (end 0xe90200)
- MobileD.dat found, adding from nanddump.bin
- adding MobileD.dat as type 0x33 at raw offset 0xe94000 len 0x800 (end 0xe94800)
- MobileE.dat found, adding from nanddump.bin
- adding MobileE.dat as type 0x34 at raw offset 0xe98000 len 0x800 (end 0xe98800)
- ------ adding smc_config.bin ------
- adding smc config to offset 0x00f7c000, len 0x400
- ------ finalizing image ------
- Fixing up empty FS block entries...done!
- Writing FS table to image...done!
- fixing up big block controller on small block NAND LBA numbers...done!
- calculating ECD bytes and assembling raw image...done!
- writing file '14719_gg_jasper.bin' to disk...done!
- 14719_gg_jasper.bin written OK
- ---------------------------------------------------------------
- 14719_gg_jasper.bin image built, info:
- ---------------------------------------------------------------
- Console : Jasper
- NAND size: 16MiB
- Build : Glitch
- Xell : power on console with console eject button
- CPU Key : **********
- 1BL Key : **********
- DVD Key : **********
- CF LDV : 9
- KV type : type2 (hashed)
- ---------------------------------------------------------------
- xeBuild Finished. Have a nice day.
- ---------------------------------------------------------------
Advertisement
Add Comment
Please, Sign In to add comment