smite@rockbox:~/tmp/rockbox/utils/sbtools/sa2ara08k_02_hf1_eng$ sudo valgrind ../sbtoelf -a "usbotp(066f:3780)" -z -o FIRMWARE. firmware.sb ==15320== Memcheck, a memory error detector ==15320== Copyright (C) 2002-2010, and GNU GPL'd, by Julian Seward et al. ==15320== Using Valgrind-3.6.1-Debian and LibVEX; rerun with -h for copyright info ==15320== Command: ../sbtoelf -a usbotp(066f:3780) -z -o FIRMWARE. firmware.sb ==15320== Basic info: SB version: 1.1 Header SHA-1: 67 98 27 1B 47 52 3C E2 46 D6 42 8B 6C C4 F4 29 FA 77 B3 16 Ok Flags: 100 Total file size : 44283024 Sizes and offsets: # of encryption keys = 1 # of sections = 16 Versions Random 1: 29 F1 73 67 74 6C Random 2: 5D C7 5E 4F 32 69 Creation date/time = Mon Apr 11 11:47:57 2011 Product version = 0.3.23 Component version = 0.3.23 Drive tag = 50 First boot tag offset = 18 First boot section ID = 0x00000000 Encryption data Key 0: USB-OTP(066f:3780) CBC-MAC of headers: 6A 2E F0 78 32 C5 8A EA 08 6D 7E 6B 91 4B 1A 20 Ok Encrypted key : 02 6C 78 58 B9 F5 39 23 47 1D 9E C4 B9 7F 4B 1C Decrypted key : 75 3C 70 EA AC 95 A0 B9 3E 4B DC 24 03 65 8D 24 Summary: Real key: 75 3C 70 EA AC 95 A0 B9 3E 4B DC 24 03 65 8D 24 IV : 67 98 27 1B 47 52 3C E2 46 D6 42 8B 6C C4 F4 29 Sections Section '____' pos = 190 - 6e00 len = 6c70 flags = 1 Boot Section (Encrypted) LOAD | addr=0x00000000 | len=0x00001d44 | crc=0xe93b78b5 Ok LOAD | addr=0x00001d44 | len=0x00000064 | crc=0xd629ceef Ok LOAD | addr=0x00001da8 | len=0x00000009 | crc=0x84fd58a8 Ok FILL | addr=0x00001db4 | len=0x0000003b | pattern=0x00000000 FILL | addr=0x00001df0 | len=0x00000800 | pattern=0x00000000 CALL | addr=0x0000018c | arg=0x00000000 write FIRMWARE.____.0.elf ==15320== Syscall param write(buf) points to uninitialised byte(s) ==15320== at 0x41072E3: __write_nocancel (syscall-template.S:82) ==15320== by 0x40AF634: _IO_file_write@@GLIBC_2.1 (fileops.c:1276) ==15320== by 0x40AF513: new_do_write (fileops.c:530) ==15320== by 0x40A6619: _IO_seekoff_unlocked (ioseekoff.c:71) ==15320== by 0x40A8161: fseek (fseek.c:41) ==15320== by 0x804D39A: elf_write_file (elf.c:358) ==15320== by 0x8048FDE: extract_elf_section (sbtoelf.c:120) ==15320== by 0x804967E: extract_section (sbtoelf.c:237) ==15320== by 0x804AB10: extract (sbtoelf.c:565) ==15320== by 0x804B7FA: main (sbtoelf.c:817) ==15320== Address 0x4030010 is not stack'd, malloc'd or (recently) free'd ==15320== LOAD | addr=0x00000000 | len=0x00003044 | crc=0x7aef7c1f Ok LOAD | addr=0x00003044 | len=0x000000ac | crc=0x77c4eecc Ok LOAD | addr=0x000030f0 | len=0x0000002a | crc=0x8ad18f88 Ok FILL | addr=0x0000311c | len=0x000000c9 | pattern=0x00000000 FILL | addr=0x000031e8 | len=0x00000800 | pattern=0x00000000 FILL | addr=0x000039e8 | len=0x00000004 | pattern=0x00000000 CALL | addr=0x0000019c | arg=0x00000000 write FIRMWARE.____.1.elf LOAD | addr=0x00000000 | len=0x000019d8 | crc=0x0bc62e91 Ok LOAD | addr=0x000019d8 | len=0x0000021c | crc=0x8b59414d Ok LOAD | addr=0x00001bf4 | len=0x0000000e | crc=0x66bc53a4 Ok FILL | addr=0x00001c04 | len=0x000000cc | pattern=0x00000000 FILL | addr=0x00001cd0 | len=0x00000800 | pattern=0x00000000 FILL | addr=0x000024d0 | len=0x00000004 | pattern=0x00000000 CALL | addr=0x0000009c | arg=0x00000000 write FIRMWARE.____.2.elf CALL | addr=0x000000d0 | arg=0x6c62615f write FIRMWARE.____.3.elf CALL | addr=0x00000114 | arg=0x6d6c635f write FIRMWARE.____.4.elf Section 'mlc_' pos = 6e10 - 52630 len = 4b820 flags = 1 Boot Section (Encrypted) LOAD | addr=0x00000000 | len=0x00000bec | crc=0xa68c8ec1 Ok LOAD | addr=0x00000bec | len=0x000001d4 | crc=0x9c5eabfe Ok LOAD | addr=0x00000dc0 | len=0x00000004 | crc=0xf2bb7be1 Ok FILL | addr=0x00000dc4 | len=0x00000013 | pattern=0x00000000 CALL | addr=0x00000134 | arg=0x00000001 write FIRMWARE.mlc_.0.elf LOAD | addr=0x00000000 | len=0x00000400 | crc=0x0250bc79 Ok LOAD | addr=0x00000400 | len=0x00001970 | crc=0xfae96c0a Ok LOAD | addr=0x40034400 | len=0x00001890 | crc=0x55ed0d5d Ok LOAD | addr=0x40054908 | len=0x0001c614 | crc=0xd3510440 Ok LOAD | addr=0x40070f1c | len=0x00000004 | crc=0x25957235 Ok LOAD | addr=0x40070f20 | len=0x0000000a | crc=0xf48cd038 Ok LOAD | addr=0x40070f2c | len=0x00000054 | crc=0x960d1785 Ok LOAD | addr=0x40070f80 | len=0x0000010c | crc=0x3d09d76a Ok LOAD | addr=0x4007108c | len=0x00000043 | crc=0x6bbe6aa7 Ok LOAD | addr=0x400710d0 | len=0x0002ab34 | crc=0x626a36c4 Ok JUMP | addr=0x40072838 | arg=0x00000000 write FIRMWARE.mlc_.1.elf Section 'host' pos = 52640 - 78630 len = 25ff0 flags = 1 Boot Section (Encrypted) LOAD | addr=0x00000000 | len=0x00000400 | crc=0x858ff8ad Ok LOAD | addr=0x00002400 | len=0x000001d8 | crc=0xb7589894 Ok LOAD | addr=0x00002c28 | len=0x00001924 | crc=0x27a976c9 Ok LOAD | addr=0x0000454c | len=0x00000004 | crc=0xa17f00aa Ok LOAD | addr=0x00004550 | len=0x0000000a | crc=0x75b83296 Ok LOAD | addr=0x0000455c | len=0x00000050 | crc=0xf4efeacc Ok LOAD | addr=0x000045ac | len=0x00000014 | crc=0x740b0ac1 Ok LOAD | addr=0x4001c000 | len=0x00002574 | crc=0x17b1ad6e Ok LOAD | addr=0x40185000 | len=0x0000ea40 | crc=0xc3fe13c1 Ok LOAD | addr=0x40194000 | len=0x00000610 | crc=0xa0c85d20 Ok LOAD | addr=0x40195000 | len=0x00000254 | crc=0x4e027e94 Ok LOAD | addr=0x401c0000 | len=0x0000063c | crc=0x69fd7898 Ok LOAD | addr=0x401c4000 | len=0x0001111e | crc=0x48e7a9bb Ok LOAD | addr=0x401d5120 | len=0x00000ef8 | crc=0x57a51938 Ok LOAD | addr=0x401d664c | len=0x000000b4 | crc=0x5774bf90 Ok JUMP | addr=0x401c4df0 | arg=0x00000000 write FIRMWARE.host.0.elf Section 'play' pos = 78640 - 1055b0 len = 8cf70 flags = 1 Boot Section (Encrypted) LOAD | addr=0x40001000 | len=0x00000020 | crc=0x96a7f638 Ok LOAD | addr=0x40001020 | len=0x00000008 | crc=0x5dfd2cc5 Ok LOAD | addr=0x40001028 | len=0x0000000c | crc=0xe4dad6fc Ok LOAD | addr=0x40001034 | len=0x00000004 | crc=0xdcace36f Ok LOAD | addr=0x40001038 | len=0x00000004 | crc=0x1f9f93f5 Ok LOAD | addr=0x4000143c | len=0x00003b60 | crc=0x5aac19fc Ok LOAD | addr=0x40004f9c | len=0x0004b234 | crc=0xc0cbbebc Ok LOAD | addr=0x400501d0 | len=0x00000098 | crc=0x15191bd7 Ok FILL | addr=0x40050268 | len=0x00000170 | pattern=0x00000000 CALL | addr=0x4000175c | arg=0x00000000 write FIRMWARE.play.0.elf LOAD | addr=0x00000000 | len=0x00000400 | crc=0x1f30d9ab Ok LOAD | addr=0x0000285c | len=0x00001a94 | crc=0xab152fb9 Ok LOAD | addr=0x000042f0 | len=0x00000004 | crc=0x04c42e03 Ok LOAD | addr=0x000042f4 | len=0x0000000a | crc=0x1c77e649 Ok LOAD | addr=0x00004300 | len=0x00000050 | crc=0x84e94ab9 Ok LOAD | addr=0x00004350 | len=0x00000014 | crc=0xa2d0911c Ok LOAD | addr=0x4001c000 | len=0x0000280c | crc=0xb518b742 Ok LOAD | addr=0x401ca000 | len=0x000155f0 | crc=0x6299a731 Ok LOAD | addr=0x401e0000 | len=0x00000488 | crc=0xf7f07fa2 Ok LOAD | addr=0x401e0488 | len=0x0000ce04 | crc=0xb5d6283f Ok LOAD | addr=0x401ed28c | len=0x00002230 | crc=0x7153302f Ok LOAD | addr=0x401ef4bc | len=0x00001bcc | crc=0x68589ac3 Ok LOAD | addr=0x401f3000 | len=0x0000063c | crc=0x1db563ff Ok LOAD | addr=0x401f7000 | len=0x00011b4a | crc=0x69d672da Ok LOAD | addr=0x40208b4c | len=0x00000ef8 | crc=0xcfadfe53 Ok LOAD | addr=0x4020a078 | len=0x000000b4 | crc=0xb4758358 Ok JUMP | addr=0x401f7df0 | arg=0x00000000 write FIRMWARE.play.1.elf Section 'lba_' pos = 1055c0 - 147330 len = 41d70 flags = 1 Boot Section (Encrypted) LOAD | addr=0x00000000 | len=0x00000bec | crc=0x29e6e529 Ok LOAD | addr=0x00000bec | len=0x000001d4 | crc=0x394c0a38 Ok LOAD | addr=0x00000dc0 | len=0x00000004 | crc=0x2514b607 Ok FILL | addr=0x00000dc4 | len=0x00000013 | pattern=0x00000000 CALL | addr=0x00000134 | arg=0x00000001 write FIRMWARE.lba_.0.elf LOAD | addr=0x00000000 | len=0x00000400 | crc=0x4670ca12 Ok LOAD | addr=0x00000400 | len=0x00001970 | crc=0x7007f247 Ok LOAD | addr=0x40034400 | len=0x00001380 | crc=0xc7dbe266 Ok LOAD | addr=0x40053a78 | len=0x0001b738 | crc=0xfa2dc766 Ok LOAD | addr=0x4006f1b0 | len=0x00000004 | crc=0x9f0d5570 Ok LOAD | addr=0x4006f1b4 | len=0x0000000a | crc=0x99ce2805 Ok LOAD | addr=0x4006f1c0 | len=0x00000054 | crc=0xa8198d45 Ok LOAD | addr=0x4006f214 | len=0x0000010c | crc=0xceefdbc3 Ok LOAD | addr=0x4006f320 | len=0x00000043 | crc=0x49437379 Ok LOAD | addr=0x4006f364 | len=0x0002247c | crc=0x5d5f506e Ok JUMP | addr=0x40070a34 | arg=0x00000000 write FIRMWARE.lba_.1.elf Section 'hLst' pos = 147340 - 1693e0 len = 220a0 flags = 1 Boot Section (Encrypted) LOAD | addr=0x00000000 | len=0x00000400 | crc=0x858ff8ad Ok LOAD | addr=0x00001c00 | len=0x000001d8 | crc=0xfc4e36f6 Ok LOAD | addr=0x00002428 | len=0x00001924 | crc=0xadb9cc80 Ok LOAD | addr=0x00003d4c | len=0x00000004 | crc=0x1f795c70 Ok LOAD | addr=0x00003d50 | len=0x0000000a | crc=0x26c1b4f8 Ok LOAD | addr=0x00003d5c | len=0x00000050 | crc=0xd40df089 Ok LOAD | addr=0x00003dac | len=0x00000014 | crc=0x41959433 Ok LOAD | addr=0x4001c000 | len=0x000021c4 | crc=0x1604ddb3 Ok LOAD | addr=0x40184000 | len=0x0000f904 | crc=0x52080e91 Ok LOAD | addr=0x40194000 | len=0x00000654 | crc=0x4f9d530f Ok LOAD | addr=0x40195000 | len=0x000000f4 | crc=0x8b96e9c8 Ok LOAD | addr=0x401c0000 | len=0x0000063c | crc=0xe93767f4 Ok LOAD | addr=0x401c4000 | len=0x0000d4b6 | crc=0x57ced69f Ok LOAD | addr=0x401d14b8 | len=0x00000200 | crc=0x3411e893 Ok LOAD | addr=0x401d1cec | len=0x000000b4 | crc=0xc4a52e2a Ok JUMP | addr=0x401c4df0 | arg=0x00000000 write FIRMWARE.hLst.0.elf Section 'pLay' pos = 1693f0 - 1f2400 len = 89010 flags = 1 Boot Section (Encrypted) LOAD | addr=0x40001000 | len=0x00000020 | crc=0x96a7f638 Ok LOAD | addr=0x40001020 | len=0x00000008 | crc=0x76994d89 Ok LOAD | addr=0x40001028 | len=0x0000000c | crc=0x653ead07 Ok LOAD | addr=0x40001034 | len=0x00000004 | crc=0x72598332 Ok LOAD | addr=0x40001038 | len=0x00000004 | crc=0x3fd23eda Ok LOAD | addr=0x4000143c | len=0x00003b60 | crc=0x5aac19fc Ok LOAD | addr=0x40004f9c | len=0x0004b234 | crc=0x13dd5300 Ok LOAD | addr=0x400501d0 | len=0x00000098 | crc=0xf8d95de2 Ok FILL | addr=0x40050268 | len=0x00000170 | pattern=0x00000000 CALL | addr=0x4000175c | arg=0x00000000 write FIRMWARE.pLay.0.elf LOAD | addr=0x00000000 | len=0x00000400 | crc=0x1f30d9ab Ok LOAD | addr=0x0000205c | len=0x00001a94 | crc=0x3fc95dbc Ok LOAD | addr=0x00003af0 | len=0x00000004 | crc=0xee890656 Ok LOAD | addr=0x00003af4 | len=0x0000000a | crc=0xe1e17618 Ok LOAD | addr=0x00003b00 | len=0x00000050 | crc=0x5f0c85d1 Ok LOAD | addr=0x00003b50 | len=0x00000014 | crc=0x6c2fda91 Ok LOAD | addr=0x4001c000 | len=0x000022fc | crc=0xc8af2d41 Ok LOAD | addr=0x401c9000 | len=0x000164b0 | crc=0x55fe7b17 Ok LOAD | addr=0x401e0000 | len=0x000004cc | crc=0xea877cb1 Ok LOAD | addr=0x401e04cc | len=0x0000ce04 | crc=0xf9a10faf Ok LOAD | addr=0x401ed2d0 | len=0x00002230 | crc=0x7153302f Ok LOAD | addr=0x401ef500 | len=0x00001bcc | crc=0x4f9ec02f Ok LOAD | addr=0x401f3000 | len=0x0000063c | crc=0x1a33014c Ok LOAD | addr=0x401f7000 | len=0x0000defa | crc=0x2d9f04fd Ok LOAD | addr=0x40204efc | len=0x00000200 | crc=0x63e63556 Ok LOAD | addr=0x40205730 | len=0x000000b4 | crc=0x2a0e38a3 Ok JUMP | addr=0x401f7df0 | arg=0x00000000 write FIRMWARE.pLay.1.elf Section 'hvm2' pos = 1f3000 - 205020 len = 12020 flags = 2 Data Section Section 'hvmi' pos = 206000 - 40bbf0 len = 205bf0 flags = 2 Data Section Section 'pvm2' pos = 40c000 - 41ea50 len = 12a50 flags = 2 Data Section Section 'pvmi' pos = 41f000 - 646380 len = 227380 flags = 2 Data Section Section 'hLm2' pos = 647000 - 6546c0 len = d6c0 flags = 2 Data Section Section 'hLmi' pos = 655000 - 854a80 len = 1ffa80 flags = 2 Data Section Section 'pLm2' pos = 855000 - 863100 len = e100 flags = 2 Data Section Section 'pLmi' pos = 864000 - a85370 len = 221370 flags = 2 Data Section Section 'rsrc' pos = a86000 - 2a3b470 len = 1fb5470 flags = 2 Data Section Final signature: Encrypted SHA-1: 9E 08 F6 CF 22 1C CA B0 BC 64 64 AA F0 8D A2 33 31 2B 41 F9 F4 39 28 16 37 08 50 98 21 5A 0C 6A File SHA-1: 82 07 C6 5E C9 56 17 32 B6 82 30 18 1F C8 15 2F 55 0B 36 55 Ok ==15320== ==15320== HEAP SUMMARY: ==15320== in use at exit: 1,538 bytes in 35 blocks ==15320== total heap usage: 415 allocs, 380 frees, 90,736,309 bytes allocated ==15320== ==15320== LEAK SUMMARY: ==15320== definitely lost: 1,024 bytes in 21 blocks ==15320== indirectly lost: 154 bytes in 10 blocks ==15320== possibly lost: 32 bytes in 2 blocks ==15320== still reachable: 328 bytes in 2 blocks ==15320== suppressed: 0 bytes in 0 blocks ==15320== Rerun with --leak-check=full to see details of leaked memory ==15320== ==15320== For counts of detected and suppressed errors, rerun with: -v ==15320== Use --track-origins=yes to see where uninitialised values come from ==15320== ERROR SUMMARY: 12 errors from 1 contexts (suppressed: 17 from 6) smite@rockbox:~/tmp/rockbox/utils/sbtools/sa2ara08k_02_hf1_eng$