smite@rockbox:~/tmp/rockbox/utils/sbtools/sa2ara08k_02_hf1_eng$ sudo valgrind ../sbtoelf -a "usbotp(066f:3780)" -z -o FIRMWARE. firmware.sb
==15320== Memcheck, a memory error detector
==15320== Copyright (C) 2002-2010, and GNU GPL'd, by Julian Seward et al.
==15320== Using Valgrind-3.6.1-Debian and LibVEX; rerun with -h for copyright info
==15320== Command: ../sbtoelf -a usbotp(066f:3780) -z -o FIRMWARE. firmware.sb
==15320==
Basic info:
SB version: 1.1
Header SHA-1: 67 98 27 1B 47 52 3C E2 46 D6 42 8B 6C C4 F4 29 FA 77 B3 16 Ok
Flags: 100
Total file size : 44283024
Sizes and offsets:
# of encryption keys = 1
# of sections = 16
Versions
Random 1: 29 F1 73 67 74 6C
Random 2: 5D C7 5E 4F 32 69
Creation date/time = Mon Apr 11 11:47:57 2011
Product version = 0.3.23
Component version = 0.3.23
Drive tag = 50
First boot tag offset = 18
First boot section ID = 0x00000000
Encryption data
Key 0: USB-OTP(066f:3780)
CBC-MAC of headers: 6A 2E F0 78 32 C5 8A EA 08 6D 7E 6B 91 4B 1A 20 Ok
Encrypted key : 02 6C 78 58 B9 F5 39 23 47 1D 9E C4 B9 7F 4B 1C
Decrypted key : 75 3C 70 EA AC 95 A0 B9 3E 4B DC 24 03 65 8D 24
Summary:
Real key: 75 3C 70 EA AC 95 A0 B9 3E 4B DC 24 03 65 8D 24
IV : 67 98 27 1B 47 52 3C E2 46 D6 42 8B 6C C4 F4 29
Sections
Section '____'
pos = 190 - 6e00
len = 6c70
flags = 1 Boot Section (Encrypted)
LOAD | addr=0x00000000 | len=0x00001d44 | crc=0xe93b78b5 Ok
LOAD | addr=0x00001d44 | len=0x00000064 | crc=0xd629ceef Ok
LOAD | addr=0x00001da8 | len=0x00000009 | crc=0x84fd58a8 Ok
FILL | addr=0x00001db4 | len=0x0000003b | pattern=0x00000000
FILL | addr=0x00001df0 | len=0x00000800 | pattern=0x00000000
CALL | addr=0x0000018c | arg=0x00000000
write FIRMWARE.____.0.elf
==15320== Syscall param write(buf) points to uninitialised byte(s)
==15320== at 0x41072E3: __write_nocancel (syscall-template.S:82)
==15320== by 0x40AF634: _IO_file_write@@GLIBC_2.1 (fileops.c:1276)
==15320== by 0x40AF513: new_do_write (fileops.c:530)
==15320== by 0x40A6619: _IO_seekoff_unlocked (ioseekoff.c:71)
==15320== by 0x40A8161: fseek (fseek.c:41)
==15320== by 0x804D39A: elf_write_file (elf.c:358)
==15320== by 0x8048FDE: extract_elf_section (sbtoelf.c:120)
==15320== by 0x804967E: extract_section (sbtoelf.c:237)
==15320== by 0x804AB10: extract (sbtoelf.c:565)
==15320== by 0x804B7FA: main (sbtoelf.c:817)
==15320== Address 0x4030010 is not stack'd, malloc'd or (recently) free'd
==15320==
LOAD | addr=0x00000000 | len=0x00003044 | crc=0x7aef7c1f Ok
LOAD | addr=0x00003044 | len=0x000000ac | crc=0x77c4eecc Ok
LOAD | addr=0x000030f0 | len=0x0000002a | crc=0x8ad18f88 Ok
FILL | addr=0x0000311c | len=0x000000c9 | pattern=0x00000000
FILL | addr=0x000031e8 | len=0x00000800 | pattern=0x00000000
FILL | addr=0x000039e8 | len=0x00000004 | pattern=0x00000000
CALL | addr=0x0000019c | arg=0x00000000
write FIRMWARE.____.1.elf
LOAD | addr=0x00000000 | len=0x000019d8 | crc=0x0bc62e91 Ok
LOAD | addr=0x000019d8 | len=0x0000021c | crc=0x8b59414d Ok
LOAD | addr=0x00001bf4 | len=0x0000000e | crc=0x66bc53a4 Ok
FILL | addr=0x00001c04 | len=0x000000cc | pattern=0x00000000
FILL | addr=0x00001cd0 | len=0x00000800 | pattern=0x00000000
FILL | addr=0x000024d0 | len=0x00000004 | pattern=0x00000000
CALL | addr=0x0000009c | arg=0x00000000
write FIRMWARE.____.2.elf
CALL | addr=0x000000d0 | arg=0x6c62615f
write FIRMWARE.____.3.elf
CALL | addr=0x00000114 | arg=0x6d6c635f
write FIRMWARE.____.4.elf
Section 'mlc_'
pos = 6e10 - 52630
len = 4b820
flags = 1 Boot Section (Encrypted)
LOAD | addr=0x00000000 | len=0x00000bec | crc=0xa68c8ec1 Ok
LOAD | addr=0x00000bec | len=0x000001d4 | crc=0x9c5eabfe Ok
LOAD | addr=0x00000dc0 | len=0x00000004 | crc=0xf2bb7be1 Ok
FILL | addr=0x00000dc4 | len=0x00000013 | pattern=0x00000000
CALL | addr=0x00000134 | arg=0x00000001
write FIRMWARE.mlc_.0.elf
LOAD | addr=0x00000000 | len=0x00000400 | crc=0x0250bc79 Ok
LOAD | addr=0x00000400 | len=0x00001970 | crc=0xfae96c0a Ok
LOAD | addr=0x40034400 | len=0x00001890 | crc=0x55ed0d5d Ok
LOAD | addr=0x40054908 | len=0x0001c614 | crc=0xd3510440 Ok
LOAD | addr=0x40070f1c | len=0x00000004 | crc=0x25957235 Ok
LOAD | addr=0x40070f20 | len=0x0000000a | crc=0xf48cd038 Ok
LOAD | addr=0x40070f2c | len=0x00000054 | crc=0x960d1785 Ok
LOAD | addr=0x40070f80 | len=0x0000010c | crc=0x3d09d76a Ok
LOAD | addr=0x4007108c | len=0x00000043 | crc=0x6bbe6aa7 Ok
LOAD | addr=0x400710d0 | len=0x0002ab34 | crc=0x626a36c4 Ok
JUMP | addr=0x40072838 | arg=0x00000000
write FIRMWARE.mlc_.1.elf
Section 'host'
pos = 52640 - 78630
len = 25ff0
flags = 1 Boot Section (Encrypted)
LOAD | addr=0x00000000 | len=0x00000400 | crc=0x858ff8ad Ok
LOAD | addr=0x00002400 | len=0x000001d8 | crc=0xb7589894 Ok
LOAD | addr=0x00002c28 | len=0x00001924 | crc=0x27a976c9 Ok
LOAD | addr=0x0000454c | len=0x00000004 | crc=0xa17f00aa Ok
LOAD | addr=0x00004550 | len=0x0000000a | crc=0x75b83296 Ok
LOAD | addr=0x0000455c | len=0x00000050 | crc=0xf4efeacc Ok
LOAD | addr=0x000045ac | len=0x00000014 | crc=0x740b0ac1 Ok
LOAD | addr=0x4001c000 | len=0x00002574 | crc=0x17b1ad6e Ok
LOAD | addr=0x40185000 | len=0x0000ea40 | crc=0xc3fe13c1 Ok
LOAD | addr=0x40194000 | len=0x00000610 | crc=0xa0c85d20 Ok
LOAD | addr=0x40195000 | len=0x00000254 | crc=0x4e027e94 Ok
LOAD | addr=0x401c0000 | len=0x0000063c | crc=0x69fd7898 Ok
LOAD | addr=0x401c4000 | len=0x0001111e | crc=0x48e7a9bb Ok
LOAD | addr=0x401d5120 | len=0x00000ef8 | crc=0x57a51938 Ok
LOAD | addr=0x401d664c | len=0x000000b4 | crc=0x5774bf90 Ok
JUMP | addr=0x401c4df0 | arg=0x00000000
write FIRMWARE.host.0.elf
Section 'play'
pos = 78640 - 1055b0
len = 8cf70
flags = 1 Boot Section (Encrypted)
LOAD | addr=0x40001000 | len=0x00000020 | crc=0x96a7f638 Ok
LOAD | addr=0x40001020 | len=0x00000008 | crc=0x5dfd2cc5 Ok
LOAD | addr=0x40001028 | len=0x0000000c | crc=0xe4dad6fc Ok
LOAD | addr=0x40001034 | len=0x00000004 | crc=0xdcace36f Ok
LOAD | addr=0x40001038 | len=0x00000004 | crc=0x1f9f93f5 Ok
LOAD | addr=0x4000143c | len=0x00003b60 | crc=0x5aac19fc Ok
LOAD | addr=0x40004f9c | len=0x0004b234 | crc=0xc0cbbebc Ok
LOAD | addr=0x400501d0 | len=0x00000098 | crc=0x15191bd7 Ok
FILL | addr=0x40050268 | len=0x00000170 | pattern=0x00000000
CALL | addr=0x4000175c | arg=0x00000000
write FIRMWARE.play.0.elf
LOAD | addr=0x00000000 | len=0x00000400 | crc=0x1f30d9ab Ok
LOAD | addr=0x0000285c | len=0x00001a94 | crc=0xab152fb9 Ok
LOAD | addr=0x000042f0 | len=0x00000004 | crc=0x04c42e03 Ok
LOAD | addr=0x000042f4 | len=0x0000000a | crc=0x1c77e649 Ok
LOAD | addr=0x00004300 | len=0x00000050 | crc=0x84e94ab9 Ok
LOAD | addr=0x00004350 | len=0x00000014 | crc=0xa2d0911c Ok
LOAD | addr=0x4001c000 | len=0x0000280c | crc=0xb518b742 Ok
LOAD | addr=0x401ca000 | len=0x000155f0 | crc=0x6299a731 Ok
LOAD | addr=0x401e0000 | len=0x00000488 | crc=0xf7f07fa2 Ok
LOAD | addr=0x401e0488 | len=0x0000ce04 | crc=0xb5d6283f Ok
LOAD | addr=0x401ed28c | len=0x00002230 | crc=0x7153302f Ok
LOAD | addr=0x401ef4bc | len=0x00001bcc | crc=0x68589ac3 Ok
LOAD | addr=0x401f3000 | len=0x0000063c | crc=0x1db563ff Ok
LOAD | addr=0x401f7000 | len=0x00011b4a | crc=0x69d672da Ok
LOAD | addr=0x40208b4c | len=0x00000ef8 | crc=0xcfadfe53 Ok
LOAD | addr=0x4020a078 | len=0x000000b4 | crc=0xb4758358 Ok
JUMP | addr=0x401f7df0 | arg=0x00000000
write FIRMWARE.play.1.elf
Section 'lba_'
pos = 1055c0 - 147330
len = 41d70
flags = 1 Boot Section (Encrypted)
LOAD | addr=0x00000000 | len=0x00000bec | crc=0x29e6e529 Ok
LOAD | addr=0x00000bec | len=0x000001d4 | crc=0x394c0a38 Ok
LOAD | addr=0x00000dc0 | len=0x00000004 | crc=0x2514b607 Ok
FILL | addr=0x00000dc4 | len=0x00000013 | pattern=0x00000000
CALL | addr=0x00000134 | arg=0x00000001
write FIRMWARE.lba_.0.elf
LOAD | addr=0x00000000 | len=0x00000400 | crc=0x4670ca12 Ok
LOAD | addr=0x00000400 | len=0x00001970 | crc=0x7007f247 Ok
LOAD | addr=0x40034400 | len=0x00001380 | crc=0xc7dbe266 Ok
LOAD | addr=0x40053a78 | len=0x0001b738 | crc=0xfa2dc766 Ok
LOAD | addr=0x4006f1b0 | len=0x00000004 | crc=0x9f0d5570 Ok
LOAD | addr=0x4006f1b4 | len=0x0000000a | crc=0x99ce2805 Ok
LOAD | addr=0x4006f1c0 | len=0x00000054 | crc=0xa8198d45 Ok
LOAD | addr=0x4006f214 | len=0x0000010c | crc=0xceefdbc3 Ok
LOAD | addr=0x4006f320 | len=0x00000043 | crc=0x49437379 Ok
LOAD | addr=0x4006f364 | len=0x0002247c | crc=0x5d5f506e Ok
JUMP | addr=0x40070a34 | arg=0x00000000
write FIRMWARE.lba_.1.elf
Section 'hLst'
pos = 147340 - 1693e0
len = 220a0
flags = 1 Boot Section (Encrypted)
LOAD | addr=0x00000000 | len=0x00000400 | crc=0x858ff8ad Ok
LOAD | addr=0x00001c00 | len=0x000001d8 | crc=0xfc4e36f6 Ok
LOAD | addr=0x00002428 | len=0x00001924 | crc=0xadb9cc80 Ok
LOAD | addr=0x00003d4c | len=0x00000004 | crc=0x1f795c70 Ok
LOAD | addr=0x00003d50 | len=0x0000000a | crc=0x26c1b4f8 Ok
LOAD | addr=0x00003d5c | len=0x00000050 | crc=0xd40df089 Ok
LOAD | addr=0x00003dac | len=0x00000014 | crc=0x41959433 Ok
LOAD | addr=0x4001c000 | len=0x000021c4 | crc=0x1604ddb3 Ok
LOAD | addr=0x40184000 | len=0x0000f904 | crc=0x52080e91 Ok
LOAD | addr=0x40194000 | len=0x00000654 | crc=0x4f9d530f Ok
LOAD | addr=0x40195000 | len=0x000000f4 | crc=0x8b96e9c8 Ok
LOAD | addr=0x401c0000 | len=0x0000063c | crc=0xe93767f4 Ok
LOAD | addr=0x401c4000 | len=0x0000d4b6 | crc=0x57ced69f Ok
LOAD | addr=0x401d14b8 | len=0x00000200 | crc=0x3411e893 Ok
LOAD | addr=0x401d1cec | len=0x000000b4 | crc=0xc4a52e2a Ok
JUMP | addr=0x401c4df0 | arg=0x00000000
write FIRMWARE.hLst.0.elf
Section 'pLay'
pos = 1693f0 - 1f2400
len = 89010
flags = 1 Boot Section (Encrypted)
LOAD | addr=0x40001000 | len=0x00000020 | crc=0x96a7f638 Ok
LOAD | addr=0x40001020 | len=0x00000008 | crc=0x76994d89 Ok
LOAD | addr=0x40001028 | len=0x0000000c | crc=0x653ead07 Ok
LOAD | addr=0x40001034 | len=0x00000004 | crc=0x72598332 Ok
LOAD | addr=0x40001038 | len=0x00000004 | crc=0x3fd23eda Ok
LOAD | addr=0x4000143c | len=0x00003b60 | crc=0x5aac19fc Ok
LOAD | addr=0x40004f9c | len=0x0004b234 | crc=0x13dd5300 Ok
LOAD | addr=0x400501d0 | len=0x00000098 | crc=0xf8d95de2 Ok
FILL | addr=0x40050268 | len=0x00000170 | pattern=0x00000000
CALL | addr=0x4000175c | arg=0x00000000
write FIRMWARE.pLay.0.elf
LOAD | addr=0x00000000 | len=0x00000400 | crc=0x1f30d9ab Ok
LOAD | addr=0x0000205c | len=0x00001a94 | crc=0x3fc95dbc Ok
LOAD | addr=0x00003af0 | len=0x00000004 | crc=0xee890656 Ok
LOAD | addr=0x00003af4 | len=0x0000000a | crc=0xe1e17618 Ok
LOAD | addr=0x00003b00 | len=0x00000050 | crc=0x5f0c85d1 Ok
LOAD | addr=0x00003b50 | len=0x00000014 | crc=0x6c2fda91 Ok
LOAD | addr=0x4001c000 | len=0x000022fc | crc=0xc8af2d41 Ok
LOAD | addr=0x401c9000 | len=0x000164b0 | crc=0x55fe7b17 Ok
LOAD | addr=0x401e0000 | len=0x000004cc | crc=0xea877cb1 Ok
LOAD | addr=0x401e04cc | len=0x0000ce04 | crc=0xf9a10faf Ok
LOAD | addr=0x401ed2d0 | len=0x00002230 | crc=0x7153302f Ok
LOAD | addr=0x401ef500 | len=0x00001bcc | crc=0x4f9ec02f Ok
LOAD | addr=0x401f3000 | len=0x0000063c | crc=0x1a33014c Ok
LOAD | addr=0x401f7000 | len=0x0000defa | crc=0x2d9f04fd Ok
LOAD | addr=0x40204efc | len=0x00000200 | crc=0x63e63556 Ok
LOAD | addr=0x40205730 | len=0x000000b4 | crc=0x2a0e38a3 Ok
JUMP | addr=0x401f7df0 | arg=0x00000000
write FIRMWARE.pLay.1.elf
Section 'hvm2'
pos = 1f3000 - 205020
len = 12020
flags = 2 Data Section
Section 'hvmi'
pos = 206000 - 40bbf0
len = 205bf0
flags = 2 Data Section
Section 'pvm2'
pos = 40c000 - 41ea50
len = 12a50
flags = 2 Data Section
Section 'pvmi'
pos = 41f000 - 646380
len = 227380
flags = 2 Data Section
Section 'hLm2'
pos = 647000 - 6546c0
len = d6c0
flags = 2 Data Section
Section 'hLmi'
pos = 655000 - 854a80
len = 1ffa80
flags = 2 Data Section
Section 'pLm2'
pos = 855000 - 863100
len = e100
flags = 2 Data Section
Section 'pLmi'
pos = 864000 - a85370
len = 221370
flags = 2 Data Section
Section 'rsrc'
pos = a86000 - 2a3b470
len = 1fb5470
flags = 2 Data Section
Final signature:
Encrypted SHA-1:
9E 08 F6 CF 22 1C CA B0 BC 64 64 AA F0 8D A2 33
31 2B 41 F9 F4 39 28 16 37 08 50 98 21 5A 0C 6A
File SHA-1:
82 07 C6 5E C9 56 17 32 B6 82 30 18 1F C8 15 2F 55 0B 36 55 Ok
==15320==
==15320== HEAP SUMMARY:
==15320== in use at exit: 1,538 bytes in 35 blocks
==15320== total heap usage: 415 allocs, 380 frees, 90,736,309 bytes allocated
==15320==
==15320== LEAK SUMMARY:
==15320== definitely lost: 1,024 bytes in 21 blocks
==15320== indirectly lost: 154 bytes in 10 blocks
==15320== possibly lost: 32 bytes in 2 blocks
==15320== still reachable: 328 bytes in 2 blocks
==15320== suppressed: 0 bytes in 0 blocks
==15320== Rerun with --leak-check=full to see details of leaked memory
==15320==
==15320== For counts of detected and suppressed errors, rerun with: -v
==15320== Use --track-origins=yes to see where uninitialised values come from
==15320== ERROR SUMMARY: 12 errors from 1 contexts (suppressed: 17 from 6)
smite@rockbox:~/tmp/rockbox/utils/sbtools/sa2ara08k_02_hf1_eng$