www.dedoshop.com
Pagina 2 di 3 PrimaPrima 123 UltimaUltima
Risultati da 21 a 40 di 55

Discussione: Codice di stato: d0000138

  1. #21
    Dolo-miticusss L'avatar di Babilozzo
    Data Registrazione
    May 2012
    Località
    Marmolada, Dolomiti
    Messaggi
    4,279
    eh vabbeh! ora ho capito lascia perdere quella dashboard, scaricati l'f3 installer dal link che ti ho segnalato sopra.. e prova a installare quella piuttosto
    Esplora i link spaziali dei Tutorial RGH fatti con le mie manine Sante
    «L'abitudine e' in tutte le cose il miglior maestro.» -- Plinio il vecchio, "Storia naturale"

  2. #22
    Junior Member
    Data Registrazione
    Apr 2013
    Messaggi
    33
    ok installata dal xexmenu.
    Sono andato su plugins settings/status e ho premuto su unload.
    Ora appare scritto load.
    Ho riavviato la fsd e adesso nella minibalde mi appaiono le scritte:
    Freestyle home, accedi 4 profili etc.
    Se provo ad accedere a un qualsiasi profilo mi dail solito errore.

  3. #23
    Dolo-miticusss L'avatar di Babilozzo
    Data Registrazione
    May 2012
    Località
    Marmolada, Dolomiti
    Messaggi
    4,279
    Appunto, devi tenerlo unload il plugin, e al posto di freestyle home deve apparire pagina iniziale di xbox... così vediamo se fà lo stesso anche con la dash hack senza plugin.. non devi riavviare se no si ricarica.

    Su realmodscene parlano di bad block / bad flash relativamente al codice d'errore, potresti sempre ritentare la sorte flashando nuovamente l'immagine hack, magari generandola preventivamente con JRunner e utilizzare simple nand flasher di swizzy ..beh comunque xell o simple nand usano ugualmente rawflash però non si sà mai.
    Ultima modifica di Babilozzo; 14-04-13 alle 14: 59
    Esplora i link spaziali dei Tutorial RGH fatti con le mie manine Sante
    «L'abitudine e' in tutte le cose il miglior maestro.» -- Plinio il vecchio, "Storia naturale"

  4. #24
    Junior Member
    Data Registrazione
    Apr 2013
    Messaggi
    33
    Ok. tutto fatto.
    Ora mi appare pagina iniziale ma il problema persiste.
    Tra l'altro ho notato che se avvi un gioco con utente disconnesso, quando il gioco ti chiede di accedere, si ripropone sempre lo stesso errore.
    Leggi questo:
    [url]http://www.consoleopen.com/forum/sezione-xbox-360-jtag-e-reset-glitch-hack/3680-rgh-falcon-14699-errore-tastiera.html[/url]
    è il mio stesso errore

  5. #25
    Junior Member
    Data Registrazione
    Apr 2013
    Messaggi
    33
    Presumo che per risolvere il problema devo spostare il bad block dai primi 50 blocchi.
    Come si fa?

  6. #26
    Regular Member L'avatar di ant0xex
    Data Registrazione
    Feb 2013
    Località
    Santa Croce Camerina (RG)
    Messaggi
    220
    Mi sembra comunque che autogg rimappa in automatico il bad block...
    Se così non fosse, usa un programma per rimapparlo,(trovi facilmente tanti tutorial per farlo, sia sul forum, o al massimo googla un pò) ricrea il tuo freeboot e riflashalo, utilizzando la procedura che ti ho postato prima...

  7. #27
    Regular Member L'avatar di ant0xex
    Data Registrazione
    Feb 2013
    Località
    Santa Croce Camerina (RG)
    Messaggi
    220
    Prova ad usare questo tutorial postato già da guerrierodipace su un altro thread per rimapparlo, e dicci come và :
    [url=http://www.youtube.com/watch?feature=player_embedded&v=-RPh1jxGOho]Jtag Tool Tutorial (Remap Bad Blocks) - Coolshrimp - YouTube[/url]

  8. #28
    Junior Member
    Data Registrazione
    Apr 2013
    Messaggi
    33
    Scusa un secondo.
    Visto che mi stai dando una grossa mano e ti ringrazio e visto che con tutte queste guide mi sta andando in pappa il cervello, se io ti mando il mio file nand.bin originale potesti rimapparmi i bad block e, se fosse possibile, rimandarmi il nandflash.bin e xenon.elf da inserire nella chiavetta.
    Penso che faresti molto prima a fare cosi che dandomi altri suggerimenti.
    Se questo non ti scoccia possiamo fare cosi?

  9. #29
    Dolo-miticusss L'avatar di Babilozzo
    Data Registrazione
    May 2012
    Località
    Marmolada, Dolomiti
    Messaggi
    4,279
    Addirittura? Ma perchè non guardi i log del software e vedi se effettivamente rimappa prima di andare nel panico? al limite posta qui il log intero, dalla lettura/inizializzazione della nand in poi, così vediamo se è tutto in ordine

    P.s. un badblock è una cella di memoria che non può più essere letta o scritta, sulla nand non nell'immagine hack.
    Da quello che ho visto io rawflash quando lo avvi, e comincia a scrivere la nand, se incontra un badblock ti avvisa con un messaggio a video e ti sposta l'informazione che andrebbe scritta li , in una zona di memoria di riserva detta "spare" che è comunque limitata, ma se riflashi e fai una foto al tv quando rawflash ha finito di scrivere appena prima di riavviare forse è meglio..
    Ultima modifica di Babilozzo; 14-04-13 alle 16: 52
    Esplora i link spaziali dei Tutorial RGH fatti con le mie manine Sante
    «L'abitudine e' in tutte le cose il miglior maestro.» -- Plinio il vecchio, "Storia naturale"

  10. #30
    Junior Member
    Data Registrazione
    Apr 2013
    Messaggi
    33
    So che sto per dire una fesseria, ma ci provo lo stesso:
    Ho aperto autogg.
    A destra, dove c'è la sezione "badblocks" ho caricato il file nand.bin originale e mi ha subito trovato il bad block 38c nella posizione 3ff.
    Ho selezionato il tasto unmappa e mi ha creato un file nand_unmap.bin
    Controllando questo file con 360 flash dump non mi trova più i bad block. Sembrano spariti.
    Ora se, carico questo file nand_unmap.bin con autogg, e nella sezione xebuild clicco su crea e successivamente su raw flash, faccio una procedura corretta o c'è il rischio che brikko la console?

  11. #31
    Dolo-miticusss L'avatar di Babilozzo
    Data Registrazione
    May 2012
    Località
    Marmolada, Dolomiti
    Messaggi
    4,279
    Io non ho mai usato autogg per fare una cosa simile.. e cmq fisicamente in nand hai un blocco bruciato quindi è inutile che gli togli il flag "bad" l'importante è che il blocco non sia in zona xell (dove viene memorizzato xell in nand) . alla peggio non avvi la dash ma xell deve rimanere sempre funzionante altrimenti devi riflashare tramite spi. Posta il log prima di flashare, s oppure usa jrunner e crea una immagine hack partendo da quella originale
    E se posti il log anche sarebbe una buona idea, che non ci sfugga qualcosa

    Hai un'alternativa.. per verificare di avere il badblock in nand in quella posizione, fai una lettura della stessa usando [URL="http://www.homebrew-connection.org/files/xbox/nand_flasher/dl_Simple_360_NAND_Flasher_v1.3_BETA.rar"]simple nand flasher! [/URL]

    No?
    Ultima modifica di Babilozzo; 14-04-13 alle 17: 09
    Esplora i link spaziali dei Tutorial RGH fatti con le mie manine Sante
    «L'abitudine e' in tutte le cose il miglior maestro.» -- Plinio il vecchio, "Storia naturale"

  12. #32
    Junior Member
    Data Registrazione
    Apr 2013
    Messaggi
    33
    Questo è il log:

    ***** AutoGG _ gia aggiornato all'ultima versione 0.9.2 Rev 67b *****

    * Per iniziare la procedura _ necessario il vostro NAND Dump:
    - Se lo avete gi_ caricate il dump dal pulsante a forma di cartella.
    - Se avete gi_ Fsd v3 collegate la console alla rete LAN e premete IP Xbox > Leggi.
    - Se non avete FSD ma Xell provare a utilizzare il pulsante con l'icona Usb e seguire la procedura.
    - Sel la console _ Retail ( Dash Originale ) installa e seleziona il tuo Nand reader e
    premi Flasher > Leggi
    * Se avete gi_ FSD v3 e si desidera aggiornarla selezionare la modalit_ LAN o USB e provare AutoUpdate-Dash
    Log salvato in C:\Users\Luciano\Desktop\AutoGG 0%2e9%2e2 rev67\AutoGG_0.9.2\LOGS\AutoGG_log_2013_04_14(18h. 13m.56sg).txt
    Attendere la creazione dei *temp files*...OK

    CERCO LA NAND: "nand\nanddump.bin"


    -------------------------------------------------------------------------------------------------------------
    NandPro v3.0a by Tiros

    Using Virtual Nand Device File: nand\nanddump.bin
    Flash Config: 0x00023010
    Block Size: 16KB Block Limits: 0x000000..0x000000
    File: common\temp\flash.bin
    Reading
    0000
    0000



    -------------------------------------------------------------------------------------------------------------
    Small Block trovato
    Flashconfig:0023010 Size=16
    Caricamento Nand ...OK
    Controllando i Bad Blocks ...
    Block 38c Trovato in 0x3ff (offset:0x107C001)

    Checking ECC-CheckSum... Wait

    -------------------------------------------------------------------------------------------------------------
    Ecc Check: OK

    -------------------------------------------------------------------------------------------------------------
    Done
    VERIFICA SMC_CONFIG
    Smc Config trovato: 0x00FEB800
    Lettura temperature...:
    Reset Parental Code: XXUD
    VERIFICA NAND DATA

    ID: 6ccda17
    ECC - unECC
    Trovato SMC (version 3.1) : 00001000 - 00004000

    Nand RETAIL (Original)
    Trovato Keyvault : 00004000 - 00008000
    Looking for Cpukey in Local Database. Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
    Cpukey Detected : 17F9C84B15623D3EB580AC28FF1879A0
    Checking CpuKey
    Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
    CpuKey is correct
    Trovato CB_A (build 9188) : 00008000 - 00009ac0
    Trovato CB_B (build 9188) : 00009ac0 - 000112c0
    Trovato CD (build 9452) : 000112c0 - 000161e0
    Trovato CE (build 1888) : 000161e0 - 0006c250
    Trovato CF (build 13146) : 00070000- 00074450
    Trovato CF1 (build 14699) : 00080000- 00084450
    Trovato CG (build 13146) : 00074450- 000d845e
    Trovato CG1 build 14699) : 00084450- 000eb5b8
    Nand valida
    VERIFICA MODELLO CONSOLE
    Verificando se _ modificabile...
    Modello : Trinity CB_A_9188 GLITCHEABLE
    CD_9452 Non JtaggABILE

    Size: 16


    -------------------------------------------------------------------------------------------------------------
    1 file copiati.

    -------------------------------------------------------------------------------------------------------------

    FileSystems:
    FileSystem Active:22 offset:0xE25E00
    FileSystem Last:17 offset:0xF4F640

    Block Size File
    0x00001000 0x00003000 SMC_3.1.bin
    0x00004000 0x00004000 Keyvault.bin
    0x00008000 0x00001AC0 CB_A_9188.bin
    0x00009AC0 0x00007800 CB_B_9188.bin
    0x000112C0 0x00004F20 CD_9452.bin
    0x000161E0 0x00056070 CE_1888.bin
    0x00070000 0x00004450 CF_13146.bin
    0x00080000 0x00004450 CF1_14699.bin
    0x00074450 0x0006400E CG_13146.bin
    0x00084450 0x00067168 CG1_14699.bin
    0x00EDC000 0x00014000 aac.xexp2
    0x00EF0000 0x00061000 bootanim.xex
    0x00F54000 0x0001E000 hud.xex
    0x000A4000 0x00013000 huduiskin.xex
    0x000B8000 0x00008000 mfgbootlauncher.xex
    0x000C0000 0x0000E000 nomni.xexp2
    0x000D0000 0x00005000 nomnifwm.xexp2
    0x000D8000 0x00002000 nomnifwk.xexp2
    0x000DC000 0x00236000 xam.xex
    0x00314000 0x00015000 ximecore.xex
    0x0032C000 0x00002800 ximedic.xexp2
    0x0037C000 0x00018000 xenonclatin.xttp2
    0x00394000 0x00007000 xenonjklatin.xttp2
    0x003B0000 0x0000C000 createprofile.xex
    0x003BC000 0x0063A000 dash.xex
    0x009F8000 0x00009000 deviceselector.xex
    0x00ECC000 0x00000A00 crl.bin
    0x00A28000 0x0011B000 xenonclatin.xtt
    0x00A04000 0x0001B000 gamerprofile.xex
    0x00B5C000 0x001A8000 xenonjklatin.xtt
    0x00B44000 0x0000C000 minimediaplayer.xex
    0x00B50000 0x00016000 signin.xex
    0x00D24000 0x00090000 ximedic.xex
    0x00D10000 0x00007000 updater.xex
    0x00EB4000 0x00000400 secdata.bin
    0x00DE0000 0x00004000 fcrt.bin
    0x003A4000 0x00007090 dae.bin
    0x00E00000 0x00004000 extended.bin
    0x00E08000 0x0005B5C0 sysupdate.xexp2
    0x00D18000 0x00009000 vk.xex

    X-val: 00 00 00 00 00 00 00 00
    Secdata _ pulito
    Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0

    Nand in Folder

    -------------------------------------------------------------------------------------------------------------
    1 file copiati.

    -------------------------------------------------------------------------------------------------------------

    -------------------------------------------------------------------------------------------------------------

    * Selezionare il tipo di immagine e le opzioni desiderate e fare clic su Xebuild>Crea.

    -------------------------------------------------------------------------------------------------------------
    Nand nand\nanddump.bin Lettura valida in caricamento. Attendere ..........
    Nand originale, Smc pu_ essere patchato
    16203 Installed
    Queste opzioni verranno usate per creare l'immagine:
    xeBuild.exe -o cfldv=2 -noenter -t Glitch -c Trinity -d ..\nand -o patchsmc -f 16203 -b DD88AD0C9ED669E7B56794FB68563EFA -p 17F9C84B15623D3EB580AC28FF1879A0 ..\output\nandflash.bin -v
    -------------------------------------------------------------------------------------------------------------
    ---------------------------------------------------------------
    xeBuild v1.07.561
    ---------------------------------------------------------------
    building glitch image
    verbose set to level 1

    ------ parsing user ini at '.\..\nand\options.ini' ------

    ******* WARNING: could not open user ini at '.\..\nand\options.ini', skipping
    default console DVD eject button is being used to start xell

    ------ parsing ini at '.\16203\_glitch.ini' ------
    ini version 16203

    ini: label [trinitybl] found
    found (1) 'cba_9188.bin' crc: 0x5a76752d
    found (2) 'cbb_9188.bin' crc: 0xfebb1074
    found (3) 'cd_9452.bin' crc: 0x455fa02c
    found (4) 'ce_1888.bin' crc: 0xff9b60df
    found (5) 'cf_16203.bin' crc: 0xc4c27121
    found (6) 'cg_16203.bin' crc: 0xcbb44eac
    ini dictates dual CB for this model

    ini: label [flashfs] found
    found (1) 'aac.xexp' crc: 0x62924e10
    found (2) 'bootanim.xex' crc: 0xc8b660b2
    found (3) 'createprofile.xex' crc: 0x9f6efee2
    found (4) 'dash.xex' crc: 0x18ea6c7e
    found (5) 'deviceselector.xex' crc: 0x75c32b5b
    found (6) 'gamerprofile.xex' crc: 0xec9746f7
    found (7) 'hud.xex' crc: 0xabf19107
    found (8) 'huduiskin.xex' crc: 0xf3563a5c
    found (9) 'mfgbootlauncher.xex' crc: 0x763c73fe
    found (10) 'minimediaplayer.xex' crc: 0xda1d0a4a
    found (11) 'nomni.xexp' crc: 0xaae9ad36
    found (12) 'nomnifwk.xexp' crc: 0xb3c2c31b
    found (13) 'nomnifwm.xexp' crc: 0xf69cf9fc
    found (14) 'SegoeXbox-Light.xtt' crc: 0xe0ee6049
    found (15) 'signin.xex' crc: 0xc1d7185d
    found (16) 'updater.xex' crc: 0x19286110
    found (17) 'vk.xex' crc: 0xefcbab82
    found (18) 'xam.xex' crc: 0xf8db3557
    found (19) 'xenonclatin.xtt' crc: 0xd5d17ff5
    found (20) 'xenonclatin.xttp' crc: 0x7a507ad1
    found (21) 'xenonjklatin.xtt' crc: 0xdde4a14c
    found (22) 'xenonjklatin.xttp' crc: 0xe2adddfb
    found (23) 'ximecore.xex' crc: 0xe85e813b
    found (24) 'ximedic.xex' crc: 0x1d992bfb
    found (25) 'ximedic.xexp' crc: 0xfb2bb58c
    found (26) '..\launch.xex' crc: 0x00000000
    found (27) '..\lhelper.xex' crc: 0x00000000
    found (28) '..\launch.ini' crc: 0x00000000

    ini: label [security] found
    found (1) 'crl.bin' crc: 0x00000000
    found (2) 'dae.bin' crc: 0x00000000
    found (3) 'extended.bin' crc: 0x00000000
    found (4) 'fcrt.bin' crc: 0x00000000
    found (5) 'secdata.bin' crc: 0x00000000
    ------ ini parsing completed ------

    output name overridden to: ..\output\nandflash.bin


    ------ Checking .\..\nand\nanddump.bin ------
    .\..\nand\nanddump.bin file size: 0x1080000
    nanddump header checks passed OK!
    Loading NAND dump (0x1080000 bytes)...done!
    Detecting NAND controller type from dump data...
    NAND dump is from a small block machine
    NAND dump uses big block controller
    parsing dump into user and spare...
    bad block at 0x38c (raw offset 0xea1800), block ignored
    copying nanddump data from block 0x3ff to block 0x38c for file extraction integrity
    block 0x38c was remapped to block 0x3ff at remap instance 0
    done!
    cleaning up stray remaps
    done!
    --remap summary--
    0: source: 0x038c dest: 0x03ff
    -----------------
    decrypting KeyVault at address 0x4000 of size 0x4000
    keyvault decrypted OK, will use if no kv.bin is provided
    decrypting SMC at address 0x1000 of size 0x3000
    SMC decrypted OK, will use if no external smc.bin is provided
    seeking smc config in dump...found at offset 0xf7c000! Using if no smc config is provided.
    CF slot 0 decrypted ok LDV 0x01 Pairing: 0xeb49fe
    CF slot 1 decrypted ok LDV 0x02 Pairing: 0xeb49fe
    setting pairing data from image to 0xeb49fe
    LDV was already set to 2
    MobileB.dat found at page 0x6fe0, size 2048 (0x800) bytes
    MobileC.dat found at page 0x4e0, size 512 (0x200) bytes
    MobileD.dat found at page 0x50c0, size 2048 (0x800) bytes
    MobileE.dat found at page 0x5120, size 2048 (0x800) bytes
    Statistics.settings found at page 0x7bc0, size 4096 (0x1000) bytes
    Xstress.settings found at page 0x7bc0, size 4096 (0x1000) bytes
    seeking FSRoot...fsroot found at page 0x6dc0 raw offset 0xe25c00
    seeking security files...
    crl.bin found in sector 0x3b3 size 0xa00...verified! Will use if external file not found.
    dae.bin found in sector 0xe9 size 0x7090...verified! Will use if external file not found.
    extended.bin found in sector 0x380 size 0x4000...verified! Will use if external file not found.
    fcrt.bin found in sector 0x378 size 0x4000...verified! Will use if external file not found.
    secdata.bin found in sector 0x3ad size 0x400...verified! Will use if external file not found.
    done!
    Writing initial header to flash image

    ------ loading system update container ------
    .\16203\su20076000_00000000 found, loading...done!
    Read 0xb31000 bytes to memory
    checking container integrity...
    header seems valid, version 2.0.16203.00
    header hash is OK, checking content hashes...
    content hashes seem OK, everything looks good!
    extracted SUPD\xboxupd.bin (0x79a60 bytes)
    decrypting SUPD\xboxupd.bin\CF_16203.bin (0x4560 bytes)...done!
    decrypting SUPD\xboxupd.bin\CG_16203.bin (0x754f2 bytes)...done!

    ------ Loading bootloaders and required security files ------
    reading .\..\nand\smc.bin failed, using smc.bin from nand dump
    reset smc load address to 0x1000 size 0x3000
    reading .\..\nand\kv.bin failed, using kv.bin from nand dump
    reading .\common\cba_9188.bin (0x1ac0 bytes)
    reading .\common\cbb_9188.bin (0x7800 bytes)
    reading .\common\cd_9452.bin (0x4f20 bytes)
    reading .\common\ce_1888.bin (0x5606a b pad 0x56070 b)
    reading .\..\nand\xell-gggggg.bin (0x40000 bytes)
    extracted SUPD\xboxupd.bin\CF_16203.bin (0x4560 bytes)
    extracted SUPD\xboxupd.bin\CG_16203.bin (0x754f2 bytes)
    reading .\16203\bin\patches_trinity.bin (0x870 bytes)
    reading .\..\nand\smc_config.bin failed, using smc_config.bin from nand dump
    -------------------
    checking smc_config
    -------------------
    extracting config
    ------------------
    SMC config info:
    ------------------
    Target temps: Cpu: 82_C Gpu: 78_C Edram: 76_C
    Max temps : Cpu: 89_C Gpu: 82_C Edram: 82_C
    Cpu Fan : (auto)
    Gpu Fan : (auto)
    MAC Address : 7c:1e:52:01:fa:bf
    AVRegion : 0x00000300 (PAL50)
    GameRegion : 0x02fe (PAL/EU)
    DVDRegion : 2
    resetKey : XXUD
    ---------------------
    Checking for smc config data patches
    smc config was not patched
    ---------------------
    done!
    patch slot offset reset to: 0xb0000

    ------ Patching BLs and modifying patches ------
    Patching header for xell power reason
    Patching BLs...Done!

    ------ Encrypting and finalizing bootloaders ------
    initializing random nonces
    encoding smc.bin size 0x3000
    SMC checksum: f9c96639
    known clean SMC found, type: Trinity v5.1(3.01)
    patching SMC reset limit at offset: 0x13b3
    SMC reset limit patched successfully!
    encoding kv.bin size 0x4000
    decrypted keyvault has been set for reference
    encoding cba_9188.bin size 0x1ac0
    encoding cbb_9188.bin size 0x7800
    CB 9188 seq 0x03010001 type: 0x03 cseq: 0x01 allow: 0x0001
    expected fuses:
    fuseset 00: C0FFFFFFFFFFFFFF
    fuseset 01: 0F0F0F0F0F0FF0F0
    fuseset 02: F000000000000000 (sequence)
    fuseset 02: F000000000000000 (allow cseq 1)
    **dual CB flag detected!**
    encoding cd_9452.bin size 0x5290
    encoding ce_1888.bin size 0x56070
    encoding xell-gggggg.bin size 0x40000
    encoding cf_16203.bin size 0x4560
    encoding cg_16203.bin size 0x75500
    encoding patches_trinity.bin size 0x4a4
    done!

    ------ Adding bootloaders to flash image ------
    adding smc.bin at raw offset 0x00001000 len 0x3000 (end 0x4000)
    adding kv.bin at raw offset 0x00004000 len 0x4000 (end 0x8000)
    adding cba_9188.bin at raw offset 0x00008000 len 0x1ac0 (end 0x9ac0)
    adding cbb_9188.bin at raw offset 0x00009ac0 len 0x7800 (end 0x112c0)
    adding cd_9452.bin at raw offset 0x000112c0 len 0x5290 (end 0x16550)
    adding ce_1888.bin at raw offset 0x00016550 len 0x56070 (end 0x6c5c0)
    adding xell-gggggg.bin at raw offset 0x00070000 len 0x40000 (end 0xb0000)
    adding cf_16203.bin at raw offset 0x000b0000 len 0x4560 (end 0xb4560)
    adding cg_16203.bin at raw offset 0x000b4560 len 0x75500 (end 0xc0000, rest in fs)
    adding patches_trinity.bin at raw offset 0x000c0010 len 0x4a4 (end 0xc04b4)
    Fixing up FS table...done!
    Writing zeropair CG patch slot overflow data to sysupdate.xexp1
    at raw offset 0xd0000 len 0x00069a60 (end: 0x00139a60)...done!

    ------ adding 28 firmware files ------
    extracted SUPD\aac.xexp (0x14000 bytes) (crc32: 0x62924e10 ini: 0x62924e10)
    adding as aac.xexp1 at raw offset 0x139a60 len 0x00014000 (end 0x0014da60)
    extracted SUPD\bootanim.xex (0x61000 bytes) (crc32: 0xc8b660b2 ini: 0xc8b660b2)
    adding as bootanim.xex at raw offset 0x150000 len 0x00061000 (end 0x001b1000)
    extracted SUPD\createprofile.xex (0xc000 bytes) (crc32: 0x9f6efee2 ini: 0x9f6efee2)
    adding as createprofile.xex at raw offset 0x1b1000 len 0x0000c000 (end 0x001bd000)
    extracted SUPD\dash.xex (0x59c000 bytes) (crc32: 0x18ea6c7e ini: 0x18ea6c7e)
    adding as dash.xex at raw offset 0x1c0000 len 0x0059c000 (end 0x0075c000)
    extracted SUPD\deviceselector.xex (0xa000 bytes) (crc32: 0x75c32b5b ini: 0x75c32b5b)
    adding as deviceselector.xex at raw offset 0x75c000 len 0x0000a000 (end 0x00766000)
    extracted SUPD\gamerprofile.xex (0x1b000 bytes) (crc32: 0xec9746f7 ini: 0xec9746f7)
    adding as gamerprofile.xex at raw offset 0x766000 len 0x0001b000 (end 0x00781000)
    extracted SUPD\hud.xex (0x1d000 bytes) (crc32: 0xabf19107 ini: 0xabf19107)
    adding as hud.xex at raw offset 0x783000 len 0x0001d000 (end 0x007a0000)
    extracted SUPD\huduiskin.xex (0x14000 bytes) (crc32: 0xf3563a5c ini: 0xf3563a5c)
    adding as huduiskin.xex at raw offset 0x7a1000 len 0x00014000 (end 0x007b5000)
    extracted SUPD\mfgbootlauncher.xex (0x8000 bytes) (crc32: 0x763c73fe ini: 0x763c73fe)
    adding as mfgbootlauncher.xex at raw offset 0x7b8000 len 0x00008000 (end 0x007c0000)
    extracted SUPD\minimediaplayer.xex (0xb000 bytes) (crc32: 0xda1d0a4a ini: 0xda1d0a4a)
    adding as minimediaplayer.xex at raw offset 0x7c0000 len 0x0000b000 (end 0x007cb000)
    extracted SUPD\nomni.xexp (0xe000 bytes) (crc32: 0xaae9ad36 ini: 0xaae9ad36)
    adding as nomni.xexp1 at raw offset 0x7cb000 len 0x0000e000 (end 0x007d9000)
    extracted SUPD\nomnifwk.xexp (0x2000 bytes) (crc32: 0xb3c2c31b ini: 0xb3c2c31b)
    adding as nomnifwk.xexp1 at raw offset 0x7da000 len 0x00002000 (end 0x007dc000)
    extracted SUPD\nomnifwm.xexp (0x5000 bytes) (crc32: 0xf69cf9fc ini: 0xf69cf9fc)
    adding as nomnifwm.xexp1 at raw offset 0x7de000 len 0x00005000 (end 0x007e3000)
    extracted SUPD\SegoeXbox-Light.xtt (0x6000 bytes) (crc32: 0xe0ee6049 ini: 0xe0ee6049)
    adding as SegoeXbox-Light.xtt at raw offset 0x7e5000 len 0x00006000 (end 0x007eb000)
    extracted SUPD\signin.xex (0x16000 bytes) (crc32: 0xc1d7185d ini: 0xc1d7185d)
    adding as signin.xex at raw offset 0x7ee000 len 0x00016000 (end 0x00804000)
    extracted SUPD\updater.xex (0x7000 bytes) (crc32: 0x19286110 ini: 0x19286110)
    adding as updater.xex at raw offset 0x806000 len 0x00007000 (end 0x0080d000)
    extracted SUPD\vk.xex (0xb000 bytes) (crc32: 0xefcbab82 ini: 0xefcbab82)
    adding as vk.xex at raw offset 0x80f000 len 0x0000b000 (end 0x0081a000)
    extracted SUPD\xam.xex (0x24f000 bytes) (crc32: 0xf8db3557 ini: 0xf8db3557)
    adding as xam.xex at raw offset 0x81b000 len 0x0024f000 (end 0x00a6a000)
    reading .\16203\xenonclatin.xtt (0x11b000 bytes) (crc32: 0xd5d17ff5 ini: 0xd5d17ff5)
    adding as xenonclatin.xtt at raw offset 0xa6b000 len 0x0011b000 (end 0x00b86000)
    extracted SUPD\xenonclatin.xttp (0x18000 bytes) (crc32: 0x7a507ad1 ini: 0x7a507ad1)
    adding as xenonclatin.xttp1 at raw offset 0xb87000 len 0x00018000 (end 0x00b9f000)
    reading .\16203\xenonjklatin.xtt (0x1a8000 bytes) (crc32: 0xdde4a14c ini: 0xdde4a14c)
    adding as xenonjklatin.xtt at raw offset 0xba0000 len 0x001a8000 (end 0x00d48000)
    extracted SUPD\xenonjklatin.xttp (0x7000 bytes) (crc32: 0xe2adddfb ini: 0xe2adddfb)
    adding as xenonjklatin.xttp1 at raw offset 0xd48000 len 0x00007000 (end 0x00d4f000)
    extracted SUPD\ximecore.xex (0x17000 bytes) (crc32: 0xe85e813b ini: 0xe85e813b)
    adding as ximecore.xex at raw offset 0xd4f000 len 0x00017000 (end 0x00d66000)
    reading .\16203\ximedic.xex (0x90000 bytes) (crc32: 0x1d992bfb ini: 0x1d992bfb)
    adding as ximedic.xex at raw offset 0xd67000 len 0x00090000 (end 0x00df7000)
    extracted SUPD\ximedic.xexp (0x2800 bytes) (crc32: 0xfb2bb58c ini: 0xfb2bb58c)
    adding as ximedic.xexp1 at raw offset 0xdf8000 len 0x00002800 (end 0x00dfa800)
    reading .\16203\..\launch.xex (0xc800 bytes)
    adding as launch.xex at raw offset 0xdfa800 len 0x0000c800 (end 0x00e07000)
    reading .\16203\..\lhelper.xex (0x6000 bytes)
    adding as lhelper.xex at raw offset 0xe08800 len 0x00006000 (end 0x00e0e800)
    reading .\16203\..\launch.ini (0x2ad bytes)
    adding as launch.ini at raw offset 0xe12000 len 0x000002ad (end 0x00e122ad)

    ------ adding 5 security files ------
    <- Processing crl.bin ->
    reading .\..\nand\crl.bin (0xa00 bytes)
    crl appears crypted, attempting to decrypt with CPU key...failed! Trying alternate key...success!
    adding as crl.bin at raw offset 0xe18000 len 0x00000a00 (end 0x00e18a00)

    <- Processing dae.bin ->
    reading .\..\nand\dae.bin (0xad30 bytes)
    dae appears encrypted, attempting to decrypt with CPU key...failed! Attempting to decrypt with alternate key...
    success!
    adding as dae.bin at raw offset 0xe1c000 len 0x0000ad30 (end 0x00e26d30)

    <- Processing extended.bin ->
    reading .\..\nand\extended.bin (0x4000 bytes)
    adding as extended.bin at raw offset 0xe28000 len 0x00004000 (end 0x00e2c000)

    <- Processing fcrt.bin ->
    could not read fcrt.bin, using data from nanddump.bin...
    adding as fcrt.bin at raw offset 0xe2c000 len 0x00004000 (end 0x00e30000)

    <- Processing secdata.bin ->
    reading .\..\nand\secdata.bin (0x400 bytes)
    adding as secdata.bin at raw offset 0xe30000 len 0x00000400 (end 0x00e30400)

    ------ checking for Mobile*.dat ------
    MobileB.dat found, adding from nanddump.bin
    adding MobileB.dat as type 0x31 at raw offset 0xe34000 len 0x800 (end 0xe34800)
    MobileC.dat found, adding from nanddump.bin
    adding MobileC.dat as type 0x32 at raw offset 0xe38000 len 0x200 (end 0xe38200)
    MobileD.dat found, adding from nanddump.bin
    adding MobileD.dat as type 0x33 at raw offset 0xe3c000 len 0x800 (end 0xe3c800)
    MobileE.dat found, adding from nanddump.bin
    adding MobileE.dat as type 0x34 at raw offset 0xe40000 len 0x800 (end 0xe40800)
    Statistics.settings found, adding from nanddump.bin
    adding Statistics.settings at raw offset 0xf78000 len 0x1000 (end 0xf79000)
    Xstress.settings found, adding from nanddump.bin
    adding Xstress.settings at raw offset 0xf74000 len 0x1000 (end 0xf75000)

    ------ adding smc_config.bin ------
    adding smc config to offset 0x00f7c000, len 0x400

    ------ finalizing image ------
    Fixing up empty FS block entries...done!
    Writing FS table to image offset 0xe44000 len 0x4000 (end 0xe48000)...done!
    fixing up big block controller on small block NAND LBA numbers...done!
    calculating ECD bytes and assembling raw image...done!
    remapping 1 blocks
    copying 0x4200 bytes of LBA 0x38c to block 0x3ff...zero fill origin...done!
    done!
    writing file '..\output\nandflash.bin' to disk...done!
    ..\output\nandflash.bin written OK

    ---------------------------------------------------------------
    ..\output\nandflash.bin image built, info:
    ---------------------------------------------------------------
    Console : Trinity
    NAND size : 16MiB
    Build : Glitch
    Xell : power on console with console eject button
    Serial : 012220713805
    ConsoleId : 368764504957
    MoboSerial: 791192B120501385
    Mfg Date : 09/12/2011
    CPU Key : 17F9C84B15623D3EB580AC28FF1879A0
    1BL Key : DD88AD0C9ED669E7B56794FB68563EFA
    DVD Key : BAE0A0F4ABFDEE9E7E67627BF7403F41
    CF LDV : 2
    KV type : type2 (hashed)
    ---------------------------------------------------------------
    xeBuild Finished. Have a nice day.
    ---------------------------------------------------------------

    -------------------------------------------------------------------------------------------------------------
    xeBuild Nand generata. Ora puoi flasharla
    (output\nandflash.bin)

    -------------------------------------------------------------------------------------------------------------
    * Per flashare l'immagine Xebuild creata avete 3 opzioni:

    1. - Tramite Flasher (Nandreader) premendo Xebuild > Flash.
    2. - Preparare un dispositivo USB in Fat32 e premere Xebuild>RawFlash per copiare i file necessari, inserire il dispositivo nella console e avviare Xell.
    3. - Se avete Fsd v3 connettere la console alla LAN e premere xebuild > Ip-Flash

    -------------------------------------------------------------------------------------------------------------

  13. #33
    Junior Member
    Data Registrazione
    Apr 2013
    Messaggi
    33
    Questo era il log del flash che ho fatto ieri

  14. #34
    Junior Member
    Data Registrazione
    Apr 2013
    Messaggi
    33
    Adesso posto il log dopo aver rimappato con autogg:
    ***** AutoGG _ gia aggiornato all'ultima versione 0.9.2 Rev 67b *****

    * Per iniziare la procedura _ necessario il vostro NAND Dump:
    - Se lo avete gi_ caricate il dump dal pulsante a forma di cartella.
    - Se avete gi_ Fsd v3 collegate la console alla rete LAN e premete IP Xbox > Leggi.
    - Se non avete FSD ma Xell provare a utilizzare il pulsante con l'icona Usb e seguire la procedura.
    - Sel la console _ Retail ( Dash Originale ) installa e seleziona il tuo Nand reader e
    premi Flasher > Leggi
    * Se avete gi_ FSD v3 e si desidera aggiornarla selezionare la modalit_ LAN o USB e provare AutoUpdate-Dash
    Log salvato in C:\Users\Luciano\Desktop\AutoGG 0%2e9%2e2 rev67\AutoGG_0.9.2\LOGS\AutoGG_log_2013_04_14(18h. 13m.56sg).txt
    Attendere la creazione dei *temp files*...OK

    CERCO LA NAND: "nand\nanddump.bin"


    -------------------------------------------------------------------------------------------------------------
    NandPro v3.0a by Tiros

    Using Virtual Nand Device File: nand\nanddump.bin
    Flash Config: 0x00023010
    Block Size: 16KB Block Limits: 0x000000..0x000000
    File: common\temp\flash.bin
    Reading
    0000
    0000



    -------------------------------------------------------------------------------------------------------------
    Small Block trovato
    Flashconfig:0023010 Size=16
    Caricamento Nand ...OK
    Controllando i Bad Blocks ...
    Block 38c Trovato in 0x3ff (offset:0x107C001)

    Checking ECC-CheckSum... Wait

    -------------------------------------------------------------------------------------------------------------
    Ecc Check: OK

    -------------------------------------------------------------------------------------------------------------
    Done
    VERIFICA SMC_CONFIG
    Smc Config trovato: 0x00FEB800
    Lettura temperature...:
    Reset Parental Code: XXUD
    VERIFICA NAND DATA

    ID: 6ccda17
    ECC - unECC
    Trovato SMC (version 3.1) : 00001000 - 00004000

    Nand RETAIL (Original)
    Trovato Keyvault : 00004000 - 00008000
    Looking for Cpukey in Local Database. Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
    Cpukey Detected : 17F9C84B15623D3EB580AC28FF1879A0
    Checking CpuKey
    Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
    CpuKey is correct
    Trovato CB_A (build 9188) : 00008000 - 00009ac0
    Trovato CB_B (build 9188) : 00009ac0 - 000112c0
    Trovato CD (build 9452) : 000112c0 - 000161e0
    Trovato CE (build 1888) : 000161e0 - 0006c250
    Trovato CF (build 13146) : 00070000- 00074450
    Trovato CF1 (build 14699) : 00080000- 00084450
    Trovato CG (build 13146) : 00074450- 000d845e
    Trovato CG1 build 14699) : 00084450- 000eb5b8
    Nand valida
    VERIFICA MODELLO CONSOLE
    Verificando se _ modificabile...
    Modello : Trinity CB_A_9188 GLITCHEABLE
    CD_9452 Non JtaggABILE

    Size: 16


    -------------------------------------------------------------------------------------------------------------
    1 file copiati.

    -------------------------------------------------------------------------------------------------------------

    FileSystems:
    FileSystem Active:22 offset:0xE25E00
    FileSystem Last:17 offset:0xF4F640

    Block Size File
    0x00001000 0x00003000 SMC_3.1.bin
    0x00004000 0x00004000 Keyvault.bin
    0x00008000 0x00001AC0 CB_A_9188.bin
    0x00009AC0 0x00007800 CB_B_9188.bin
    0x000112C0 0x00004F20 CD_9452.bin
    0x000161E0 0x00056070 CE_1888.bin
    0x00070000 0x00004450 CF_13146.bin
    0x00080000 0x00004450 CF1_14699.bin
    0x00074450 0x0006400E CG_13146.bin
    0x00084450 0x00067168 CG1_14699.bin
    0x00EDC000 0x00014000 aac.xexp2
    0x00EF0000 0x00061000 bootanim.xex
    0x00F54000 0x0001E000 hud.xex
    0x000A4000 0x00013000 huduiskin.xex
    0x000B8000 0x00008000 mfgbootlauncher.xex
    0x000C0000 0x0000E000 nomni.xexp2
    0x000D0000 0x00005000 nomnifwm.xexp2
    0x000D8000 0x00002000 nomnifwk.xexp2
    0x000DC000 0x00236000 xam.xex
    0x00314000 0x00015000 ximecore.xex
    0x0032C000 0x00002800 ximedic.xexp2
    0x0037C000 0x00018000 xenonclatin.xttp2
    0x00394000 0x00007000 xenonjklatin.xttp2
    0x003B0000 0x0000C000 createprofile.xex
    0x003BC000 0x0063A000 dash.xex
    0x009F8000 0x00009000 deviceselector.xex
    0x00ECC000 0x00000A00 crl.bin
    0x00A28000 0x0011B000 xenonclatin.xtt
    0x00A04000 0x0001B000 gamerprofile.xex
    0x00B5C000 0x001A8000 xenonjklatin.xtt
    0x00B44000 0x0000C000 minimediaplayer.xex
    0x00B50000 0x00016000 signin.xex
    0x00D24000 0x00090000 ximedic.xex
    0x00D10000 0x00007000 updater.xex
    0x00EB4000 0x00000400 secdata.bin
    0x00DE0000 0x00004000 fcrt.bin
    0x003A4000 0x00007090 dae.bin
    0x00E00000 0x00004000 extended.bin
    0x00E08000 0x0005B5C0 sysupdate.xexp2
    0x00D18000 0x00009000 vk.xex

    X-val: 00 00 00 00 00 00 00 00
    Secdata _ pulito
    Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0

    Nand in Folder

    -------------------------------------------------------------------------------------------------------------
    1 file copiati.

    -------------------------------------------------------------------------------------------------------------

    -------------------------------------------------------------------------------------------------------------

    * Selezionare il tipo di immagine e le opzioni desiderate e fare clic su Xebuild>Crea.

    -------------------------------------------------------------------------------------------------------------
    Nand nand\nanddump.bin Lettura valida in caricamento. Attendere ..........
    Nand originale, Smc pu_ essere patchato
    16203 Installed
    Queste opzioni verranno usate per creare l'immagine:
    xeBuild.exe -o cfldv=2 -noenter -t Glitch -c Trinity -d ..\nand -o patchsmc -f 16203 -b DD88AD0C9ED669E7B56794FB68563EFA -p 17F9C84B15623D3EB580AC28FF1879A0 ..\output\nandflash.bin -v
    -------------------------------------------------------------------------------------------------------------
    ---------------------------------------------------------------
    xeBuild v1.07.561
    ---------------------------------------------------------------
    building glitch image
    verbose set to level 1

    ------ parsing user ini at '.\..\nand\options.ini' ------

    ******* WARNING: could not open user ini at '.\..\nand\options.ini', skipping
    default console DVD eject button is being used to start xell

    ------ parsing ini at '.\16203\_glitch.ini' ------
    ini version 16203

    ini: label [trinitybl] found
    found (1) 'cba_9188.bin' crc: 0x5a76752d
    found (2) 'cbb_9188.bin' crc: 0xfebb1074
    found (3) 'cd_9452.bin' crc: 0x455fa02c
    found (4) 'ce_1888.bin' crc: 0xff9b60df
    found (5) 'cf_16203.bin' crc: 0xc4c27121
    found (6) 'cg_16203.bin' crc: 0xcbb44eac
    ini dictates dual CB for this model

    ini: label [flashfs] found
    found (1) 'aac.xexp' crc: 0x62924e10
    found (2) 'bootanim.xex' crc: 0xc8b660b2
    found (3) 'createprofile.xex' crc: 0x9f6efee2
    found (4) 'dash.xex' crc: 0x18ea6c7e
    found (5) 'deviceselector.xex' crc: 0x75c32b5b
    found (6) 'gamerprofile.xex' crc: 0xec9746f7
    found (7) 'hud.xex' crc: 0xabf19107
    found (8) 'huduiskin.xex' crc: 0xf3563a5c
    found (9) 'mfgbootlauncher.xex' crc: 0x763c73fe
    found (10) 'minimediaplayer.xex' crc: 0xda1d0a4a
    found (11) 'nomni.xexp' crc: 0xaae9ad36
    found (12) 'nomnifwk.xexp' crc: 0xb3c2c31b
    found (13) 'nomnifwm.xexp' crc: 0xf69cf9fc
    found (14) 'SegoeXbox-Light.xtt' crc: 0xe0ee6049
    found (15) 'signin.xex' crc: 0xc1d7185d
    found (16) 'updater.xex' crc: 0x19286110
    found (17) 'vk.xex' crc: 0xefcbab82
    found (18) 'xam.xex' crc: 0xf8db3557
    found (19) 'xenonclatin.xtt' crc: 0xd5d17ff5
    found (20) 'xenonclatin.xttp' crc: 0x7a507ad1
    found (21) 'xenonjklatin.xtt' crc: 0xdde4a14c
    found (22) 'xenonjklatin.xttp' crc: 0xe2adddfb
    found (23) 'ximecore.xex' crc: 0xe85e813b
    found (24) 'ximedic.xex' crc: 0x1d992bfb
    found (25) 'ximedic.xexp' crc: 0xfb2bb58c
    found (26) '..\launch.xex' crc: 0x00000000
    found (27) '..\lhelper.xex' crc: 0x00000000
    found (28) '..\launch.ini' crc: 0x00000000

    ini: label [security] found
    found (1) 'crl.bin' crc: 0x00000000
    found (2) 'dae.bin' crc: 0x00000000
    found (3) 'extended.bin' crc: 0x00000000
    found (4) 'fcrt.bin' crc: 0x00000000
    found (5) 'secdata.bin' crc: 0x00000000
    ------ ini parsing completed ------

    output name overridden to: ..\output\nandflash.bin


    ------ Checking .\..\nand\nanddump.bin ------
    .\..\nand\nanddump.bin file size: 0x1080000
    nanddump header checks passed OK!
    Loading NAND dump (0x1080000 bytes)...done!
    Detecting NAND controller type from dump data...
    NAND dump is from a small block machine
    NAND dump uses big block controller
    parsing dump into user and spare...
    bad block at 0x38c (raw offset 0xea1800), block ignored
    copying nanddump data from block 0x3ff to block 0x38c for file extraction integrity
    block 0x38c was remapped to block 0x3ff at remap instance 0
    done!
    cleaning up stray remaps
    done!
    --remap summary--
    0: source: 0x038c dest: 0x03ff
    -----------------
    decrypting KeyVault at address 0x4000 of size 0x4000
    keyvault decrypted OK, will use if no kv.bin is provided
    decrypting SMC at address 0x1000 of size 0x3000
    SMC decrypted OK, will use if no external smc.bin is provided
    seeking smc config in dump...found at offset 0xf7c000! Using if no smc config is provided.
    CF slot 0 decrypted ok LDV 0x01 Pairing: 0xeb49fe
    CF slot 1 decrypted ok LDV 0x02 Pairing: 0xeb49fe
    setting pairing data from image to 0xeb49fe
    LDV was already set to 2
    MobileB.dat found at page 0x6fe0, size 2048 (0x800) bytes
    MobileC.dat found at page 0x4e0, size 512 (0x200) bytes
    MobileD.dat found at page 0x50c0, size 2048 (0x800) bytes
    MobileE.dat found at page 0x5120, size 2048 (0x800) bytes
    Statistics.settings found at page 0x7bc0, size 4096 (0x1000) bytes
    Xstress.settings found at page 0x7bc0, size 4096 (0x1000) bytes
    seeking FSRoot...fsroot found at page 0x6dc0 raw offset 0xe25c00
    seeking security files...
    crl.bin found in sector 0x3b3 size 0xa00...verified! Will use if external file not found.
    dae.bin found in sector 0xe9 size 0x7090...verified! Will use if external file not found.
    extended.bin found in sector 0x380 size 0x4000...verified! Will use if external file not found.
    fcrt.bin found in sector 0x378 size 0x4000...verified! Will use if external file not found.
    secdata.bin found in sector 0x3ad size 0x400...verified! Will use if external file not found.
    done!
    Writing initial header to flash image

    ------ loading system update container ------
    .\16203\su20076000_00000000 found, loading...done!
    Read 0xb31000 bytes to memory
    checking container integrity...
    header seems valid, version 2.0.16203.00
    header hash is OK, checking content hashes...
    content hashes seem OK, everything looks good!
    extracted SUPD\xboxupd.bin (0x79a60 bytes)
    decrypting SUPD\xboxupd.bin\CF_16203.bin (0x4560 bytes)...done!
    decrypting SUPD\xboxupd.bin\CG_16203.bin (0x754f2 bytes)...done!

    ------ Loading bootloaders and required security files ------
    reading .\..\nand\smc.bin failed, using smc.bin from nand dump
    reset smc load address to 0x1000 size 0x3000
    reading .\..\nand\kv.bin failed, using kv.bin from nand dump
    reading .\common\cba_9188.bin (0x1ac0 bytes)
    reading .\common\cbb_9188.bin (0x7800 bytes)
    reading .\common\cd_9452.bin (0x4f20 bytes)
    reading .\common\ce_1888.bin (0x5606a b pad 0x56070 b)
    reading .\..\nand\xell-gggggg.bin (0x40000 bytes)
    extracted SUPD\xboxupd.bin\CF_16203.bin (0x4560 bytes)
    extracted SUPD\xboxupd.bin\CG_16203.bin (0x754f2 bytes)
    reading .\16203\bin\patches_trinity.bin (0x870 bytes)
    reading .\..\nand\smc_config.bin failed, using smc_config.bin from nand dump
    -------------------
    checking smc_config
    -------------------
    extracting config
    ------------------
    SMC config info:
    ------------------
    Target temps: Cpu: 82_C Gpu: 78_C Edram: 76_C
    Max temps : Cpu: 89_C Gpu: 82_C Edram: 82_C
    Cpu Fan : (auto)
    Gpu Fan : (auto)
    MAC Address : 7c:1e:52:01:fa:bf
    AVRegion : 0x00000300 (PAL50)
    GameRegion : 0x02fe (PAL/EU)
    DVDRegion : 2
    resetKey : XXUD
    ---------------------
    Checking for smc config data patches
    smc config was not patched
    ---------------------
    done!
    patch slot offset reset to: 0xb0000

    ------ Patching BLs and modifying patches ------
    Patching header for xell power reason
    Patching BLs...Done!

    ------ Encrypting and finalizing bootloaders ------
    initializing random nonces
    encoding smc.bin size 0x3000
    SMC checksum: f9c96639
    known clean SMC found, type: Trinity v5.1(3.01)
    patching SMC reset limit at offset: 0x13b3
    SMC reset limit patched successfully!
    encoding kv.bin size 0x4000
    decrypted keyvault has been set for reference
    encoding cba_9188.bin size 0x1ac0
    encoding cbb_9188.bin size 0x7800
    CB 9188 seq 0x03010001 type: 0x03 cseq: 0x01 allow: 0x0001
    expected fuses:
    fuseset 00: C0FFFFFFFFFFFFFF
    fuseset 01: 0F0F0F0F0F0FF0F0
    fuseset 02: F000000000000000 (sequence)
    fuseset 02: F000000000000000 (allow cseq 1)
    **dual CB flag detected!**
    encoding cd_9452.bin size 0x5290
    encoding ce_1888.bin size 0x56070
    encoding xell-gggggg.bin size 0x40000
    encoding cf_16203.bin size 0x4560
    encoding cg_16203.bin size 0x75500
    encoding patches_trinity.bin size 0x4a4
    done!

    ------ Adding bootloaders to flash image ------
    adding smc.bin at raw offset 0x00001000 len 0x3000 (end 0x4000)
    adding kv.bin at raw offset 0x00004000 len 0x4000 (end 0x8000)
    adding cba_9188.bin at raw offset 0x00008000 len 0x1ac0 (end 0x9ac0)
    adding cbb_9188.bin at raw offset 0x00009ac0 len 0x7800 (end 0x112c0)
    adding cd_9452.bin at raw offset 0x000112c0 len 0x5290 (end 0x16550)
    adding ce_1888.bin at raw offset 0x00016550 len 0x56070 (end 0x6c5c0)
    adding xell-gggggg.bin at raw offset 0x00070000 len 0x40000 (end 0xb0000)
    adding cf_16203.bin at raw offset 0x000b0000 len 0x4560 (end 0xb4560)
    adding cg_16203.bin at raw offset 0x000b4560 len 0x75500 (end 0xc0000, rest in fs)
    adding patches_trinity.bin at raw offset 0x000c0010 len 0x4a4 (end 0xc04b4)
    Fixing up FS table...done!
    Writing zeropair CG patch slot overflow data to sysupdate.xexp1
    at raw offset 0xd0000 len 0x00069a60 (end: 0x00139a60)...done!

    ------ adding 28 firmware files ------
    extracted SUPD\aac.xexp (0x14000 bytes) (crc32: 0x62924e10 ini: 0x62924e10)
    adding as aac.xexp1 at raw offset 0x139a60 len 0x00014000 (end 0x0014da60)
    extracted SUPD\bootanim.xex (0x61000 bytes) (crc32: 0xc8b660b2 ini: 0xc8b660b2)
    adding as bootanim.xex at raw offset 0x150000 len 0x00061000 (end 0x001b1000)
    extracted SUPD\createprofile.xex (0xc000 bytes) (crc32: 0x9f6efee2 ini: 0x9f6efee2)
    adding as createprofile.xex at raw offset 0x1b1000 len 0x0000c000 (end 0x001bd000)
    extracted SUPD\dash.xex (0x59c000 bytes) (crc32: 0x18ea6c7e ini: 0x18ea6c7e)
    adding as dash.xex at raw offset 0x1c0000 len 0x0059c000 (end 0x0075c000)
    extracted SUPD\deviceselector.xex (0xa000 bytes) (crc32: 0x75c32b5b ini: 0x75c32b5b)
    adding as deviceselector.xex at raw offset 0x75c000 len 0x0000a000 (end 0x00766000)
    extracted SUPD\gamerprofile.xex (0x1b000 bytes) (crc32: 0xec9746f7 ini: 0xec9746f7)
    adding as gamerprofile.xex at raw offset 0x766000 len 0x0001b000 (end 0x00781000)
    extracted SUPD\hud.xex (0x1d000 bytes) (crc32: 0xabf19107 ini: 0xabf19107)
    adding as hud.xex at raw offset 0x783000 len 0x0001d000 (end 0x007a0000)
    extracted SUPD\huduiskin.xex (0x14000 bytes) (crc32: 0xf3563a5c ini: 0xf3563a5c)
    adding as huduiskin.xex at raw offset 0x7a1000 len 0x00014000 (end 0x007b5000)
    extracted SUPD\mfgbootlauncher.xex (0x8000 bytes) (crc32: 0x763c73fe ini: 0x763c73fe)
    adding as mfgbootlauncher.xex at raw offset 0x7b8000 len 0x00008000 (end 0x007c0000)
    extracted SUPD\minimediaplayer.xex (0xb000 bytes) (crc32: 0xda1d0a4a ini: 0xda1d0a4a)
    adding as minimediaplayer.xex at raw offset 0x7c0000 len 0x0000b000 (end 0x007cb000)
    extracted SUPD\nomni.xexp (0xe000 bytes) (crc32: 0xaae9ad36 ini: 0xaae9ad36)
    adding as nomni.xexp1 at raw offset 0x7cb000 len 0x0000e000 (end 0x007d9000)
    extracted SUPD\nomnifwk.xexp (0x2000 bytes) (crc32: 0xb3c2c31b ini: 0xb3c2c31b)
    adding as nomnifwk.xexp1 at raw offset 0x7da000 len 0x00002000 (end 0x007dc000)
    extracted SUPD\nomnifwm.xexp (0x5000 bytes) (crc32: 0xf69cf9fc ini: 0xf69cf9fc)
    adding as nomnifwm.xexp1 at raw offset 0x7de000 len 0x00005000 (end 0x007e3000)
    extracted SUPD\SegoeXbox-Light.xtt (0x6000 bytes) (crc32: 0xe0ee6049 ini: 0xe0ee6049)
    adding as SegoeXbox-Light.xtt at raw offset 0x7e5000 len 0x00006000 (end 0x007eb000)
    extracted SUPD\signin.xex (0x16000 bytes) (crc32: 0xc1d7185d ini: 0xc1d7185d)
    adding as signin.xex at raw offset 0x7ee000 len 0x00016000 (end 0x00804000)
    extracted SUPD\updater.xex (0x7000 bytes) (crc32: 0x19286110 ini: 0x19286110)
    adding as updater.xex at raw offset 0x806000 len 0x00007000 (end 0x0080d000)
    extracted SUPD\vk.xex (0xb000 bytes) (crc32: 0xefcbab82 ini: 0xefcbab82)
    adding as vk.xex at raw offset 0x80f000 len 0x0000b000 (end 0x0081a000)
    extracted SUPD\xam.xex (0x24f000 bytes) (crc32: 0xf8db3557 ini: 0xf8db3557)
    adding as xam.xex at raw offset 0x81b000 len 0x0024f000 (end 0x00a6a000)
    reading .\16203\xenonclatin.xtt (0x11b000 bytes) (crc32: 0xd5d17ff5 ini: 0xd5d17ff5)
    adding as xenonclatin.xtt at raw offset 0xa6b000 len 0x0011b000 (end 0x00b86000)
    extracted SUPD\xenonclatin.xttp (0x18000 bytes) (crc32: 0x7a507ad1 ini: 0x7a507ad1)
    adding as xenonclatin.xttp1 at raw offset 0xb87000 len 0x00018000 (end 0x00b9f000)
    reading .\16203\xenonjklatin.xtt (0x1a8000 bytes) (crc32: 0xdde4a14c ini: 0xdde4a14c)
    adding as xenonjklatin.xtt at raw offset 0xba0000 len 0x001a8000 (end 0x00d48000)
    extracted SUPD\xenonjklatin.xttp (0x7000 bytes) (crc32: 0xe2adddfb ini: 0xe2adddfb)
    adding as xenonjklatin.xttp1 at raw offset 0xd48000 len 0x00007000 (end 0x00d4f000)
    extracted SUPD\ximecore.xex (0x17000 bytes) (crc32: 0xe85e813b ini: 0xe85e813b)
    adding as ximecore.xex at raw offset 0xd4f000 len 0x00017000 (end 0x00d66000)
    reading .\16203\ximedic.xex (0x90000 bytes) (crc32: 0x1d992bfb ini: 0x1d992bfb)
    adding as ximedic.xex at raw offset 0xd67000 len 0x00090000 (end 0x00df7000)
    extracted SUPD\ximedic.xexp (0x2800 bytes) (crc32: 0xfb2bb58c ini: 0xfb2bb58c)
    adding as ximedic.xexp1 at raw offset 0xdf8000 len 0x00002800 (end 0x00dfa800)
    reading .\16203\..\launch.xex (0xc800 bytes)
    adding as launch.xex at raw offset 0xdfa800 len 0x0000c800 (end 0x00e07000)
    reading .\16203\..\lhelper.xex (0x6000 bytes)
    adding as lhelper.xex at raw offset 0xe08800 len 0x00006000 (end 0x00e0e800)
    reading .\16203\..\launch.ini (0x2ad bytes)
    adding as launch.ini at raw offset 0xe12000 len 0x000002ad (end 0x00e122ad)

    ------ adding 5 security files ------
    <- Processing crl.bin ->
    reading .\..\nand\crl.bin (0xa00 bytes)
    crl appears crypted, attempting to decrypt with CPU key...failed! Trying alternate key...success!
    adding as crl.bin at raw offset 0xe18000 len 0x00000a00 (end 0x00e18a00)

    <- Processing dae.bin ->
    reading .\..\nand\dae.bin (0xad30 bytes)
    dae appears encrypted, attempting to decrypt with CPU key...failed! Attempting to decrypt with alternate key...
    success!
    adding as dae.bin at raw offset 0xe1c000 len 0x0000ad30 (end 0x00e26d30)

    <- Processing extended.bin ->
    reading .\..\nand\extended.bin (0x4000 bytes)
    adding as extended.bin at raw offset 0xe28000 len 0x00004000 (end 0x00e2c000)

    <- Processing fcrt.bin ->
    could not read fcrt.bin, using data from nanddump.bin...
    adding as fcrt.bin at raw offset 0xe2c000 len 0x00004000 (end 0x00e30000)

    <- Processing secdata.bin ->
    reading .\..\nand\secdata.bin (0x400 bytes)
    adding as secdata.bin at raw offset 0xe30000 len 0x00000400 (end 0x00e30400)

    ------ checking for Mobile*.dat ------
    MobileB.dat found, adding from nanddump.bin
    adding MobileB.dat as type 0x31 at raw offset 0xe34000 len 0x800 (end 0xe34800)
    MobileC.dat found, adding from nanddump.bin
    adding MobileC.dat as type 0x32 at raw offset 0xe38000 len 0x200 (end 0xe38200)
    MobileD.dat found, adding from nanddump.bin
    adding MobileD.dat as type 0x33 at raw offset 0xe3c000 len 0x800 (end 0xe3c800)
    MobileE.dat found, adding from nanddump.bin
    adding MobileE.dat as type 0x34 at raw offset 0xe40000 len 0x800 (end 0xe40800)
    Statistics.settings found, adding from nanddump.bin
    adding Statistics.settings at raw offset 0xf78000 len 0x1000 (end 0xf79000)
    Xstress.settings found, adding from nanddump.bin
    adding Xstress.settings at raw offset 0xf74000 len 0x1000 (end 0xf75000)

    ------ adding smc_config.bin ------
    adding smc config to offset 0x00f7c000, len 0x400

    ------ finalizing image ------
    Fixing up empty FS block entries...done!
    Writing FS table to image offset 0xe44000 len 0x4000 (end 0xe48000)...done!
    fixing up big block controller on small block NAND LBA numbers...done!
    calculating ECD bytes and assembling raw image...done!
    remapping 1 blocks
    copying 0x4200 bytes of LBA 0x38c to block 0x3ff...zero fill origin...done!
    done!
    writing file '..\output\nandflash.bin' to disk...done!
    ..\output\nandflash.bin written OK

    ---------------------------------------------------------------
    ..\output\nandflash.bin image built, info:
    ---------------------------------------------------------------
    Console : Trinity
    NAND size : 16MiB
    Build : Glitch
    Xell : power on console with console eject button
    Serial : 012220713805
    ConsoleId : 368764504957
    MoboSerial: 791192B120501385
    Mfg Date : 09/12/2011
    CPU Key : 17F9C84B15623D3EB580AC28FF1879A0
    1BL Key : DD88AD0C9ED669E7B56794FB68563EFA
    DVD Key : BAE0A0F4ABFDEE9E7E67627BF7403F41
    CF LDV : 2
    KV type : type2 (hashed)
    ---------------------------------------------------------------
    xeBuild Finished. Have a nice day.
    ---------------------------------------------------------------

    -------------------------------------------------------------------------------------------------------------
    xeBuild Nand generata. Ora puoi flasharla
    (output\nandflash.bin)

    -------------------------------------------------------------------------------------------------------------
    * Per flashare l'immagine Xebuild creata avete 3 opzioni:

    1. - Tramite Flasher (Nandreader) premendo Xebuild > Flash.
    2. - Preparare un dispositivo USB in Fat32 e premere Xebuild>RawFlash per copiare i file necessari, inserire il dispositivo nella console e avviare Xell.
    3. - Se avete Fsd v3 connettere la console alla LAN e premere xebuild > Ip-Flash

    -------------------------------------------------------------------------------------------------------------
    Log salvato in C:\Users\Luciano\Desktop\AutoGG 0%2e9%2e2 rev67\AutoGG_0.9.2\LOGS\AutoGG_log_2013_04_14(18h. 15m.17sg).txt
    Attendere la creazione dei *temp files*...OK

    ************************************************** ***********
    ************************************************** ***********
    Riavvio Files e variabili...

    CERCO LA NAND: "nand\nanddump.bin"


    -------------------------------------------------------------------------------------------------------------
    NandPro v3.0a by Tiros

    Using Virtual Nand Device File: nand\nanddump.bin
    Flash Config: 0x00023010
    Block Size: 16KB Block Limits: 0x000000..0x000000
    File: common\temp\flash.bin
    Reading
    0000
    0000



    -------------------------------------------------------------------------------------------------------------
    Small Block trovato
    Flashconfig:0023010 Size=16
    Caricamento Nand ...OK
    Controllando i Bad Blocks ...
    Nessun Bad Block trovato

    Checking ECC-CheckSum... Wait

    -------------------------------------------------------------------------------------------------------------
    Ecc Check: OK

    -------------------------------------------------------------------------------------------------------------
    Done
    VERIFICA SMC_CONFIG
    Smc Config trovato: 0x00FEB800
    Lettura temperature...:
    Reset Parental Code: XXUD
    VERIFICA NAND DATA

    ID: 6ccda17
    ECC - unECC
    Trovato SMC (version 3.1) : 00001000 - 00004000

    Nand RETAIL (Original)
    Trovato Keyvault : 00004000 - 00008000
    Looking for Cpukey in Local Database. Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
    Cpukey Detected : 17F9C84B15623D3EB580AC28FF1879A0
    Checking CpuKey
    Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
    CpuKey is correct
    Trovato CB_A (build 9188) : 00008000 - 00009ac0
    Trovato CB_B (build 9188) : 00009ac0 - 000112c0
    Trovato CD (build 9452) : 000112c0 - 000161e0
    Trovato CE (build 1888) : 000161e0 - 0006c250
    Trovato CF (build 13146) : 00070000- 00074450
    Trovato CF1 (build 14699) : 00080000- 00084450
    Trovato CG (build 13146) : 00074450- 000d845e
    Trovato CG1 build 14699) : 00084450- 000eb5b8
    Nand valida
    VERIFICA MODELLO CONSOLE
    Verificando se _ modificabile...
    Modello : Trinity CB_A_9188 GLITCHEABLE
    CD_9452 Non JtaggABILE

    Size: 16


    -------------------------------------------------------------------------------------------------------------
    1 file copiati.

    -------------------------------------------------------------------------------------------------------------

    FileSystems:
    FileSystem Active:22 offset:0xE25E00
    FileSystem Last:17 offset:0xF4F640

    Block Size File
    0x00001000 0x00003000 SMC_3.1.bin
    0x00004000 0x00004000 Keyvault.bin
    0x00008000 0x00001AC0 CB_A_9188.bin
    0x00009AC0 0x00007800 CB_B_9188.bin
    0x000112C0 0x00004F20 CD_9452.bin
    0x000161E0 0x00056070 CE_1888.bin
    0x00070000 0x00004450 CF_13146.bin
    0x00080000 0x00004450 CF1_14699.bin
    0x00074450 0x0006400E CG_13146.bin
    0x00084450 0x00067168 CG1_14699.bin
    0x00EDC000 0x00014000 aac.xexp2
    0x00EF0000 0x00061000 bootanim.xex
    0x00F54000 0x0001E000 hud.xex
    0x000A4000 0x00013000 huduiskin.xex
    0x000B8000 0x00008000 mfgbootlauncher.xex
    0x000C0000 0x0000E000 nomni.xexp2
    0x000D0000 0x00005000 nomnifwm.xexp2
    0x000D8000 0x00002000 nomnifwk.xexp2
    0x000DC000 0x00236000 xam.xex
    0x00314000 0x00015000 ximecore.xex
    0x0032C000 0x00002800 ximedic.xexp2
    0x0037C000 0x00018000 xenonclatin.xttp2
    0x00394000 0x00007000 xenonjklatin.xttp2
    0x003B0000 0x0000C000 createprofile.xex
    0x003BC000 0x0063A000 dash.xex
    0x009F8000 0x00009000 deviceselector.xex
    0x00ECC000 0x00000A00 crl.bin
    0x00A28000 0x0011B000 xenonclatin.xtt
    0x00A04000 0x0001B000 gamerprofile.xex
    0x00B5C000 0x001A8000 xenonjklatin.xtt
    0x00B44000 0x0000C000 minimediaplayer.xex
    0x00B50000 0x00016000 signin.xex
    0x00D24000 0x00090000 ximedic.xex
    0x00D10000 0x00007000 updater.xex
    0x00EB4000 0x00000400 secdata.bin
    0x00DE0000 0x00004000 fcrt.bin
    0x003A4000 0x00007090 dae.bin
    0x00E00000 0x00004000 extended.bin
    0x00E08000 0x0005B5C0 sysupdate.xexp2
    0x00D18000 0x00009000 vk.xex

    X-val: 00 00 00 00 00 00 00 00
    Secdata _ pulito
    Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0

    Nand in Folder

    -------------------------------------------------------------------------------------------------------------
    1 file copiati.

    -------------------------------------------------------------------------------------------------------------

    -------------------------------------------------------------------------------------------------------------

    * Selezionare il tipo di immagine e le opzioni desiderate e fare clic su Xebuild>Crea.

    -------------------------------------------------------------------------------------------------------------
    Nand nand\nanddump.bin Lettura valida in caricamento. Attendere ..........
    Nand originale, Smc pu_ essere patchato
    16203 Installed
    Queste opzioni verranno usate per creare l'immagine:
    xeBuild.exe -o cfldv=2 -noenter -t Glitch -c Trinity -d ..\nand -o patchsmc -f 16203 -b DD88AD0C9ED669E7B56794FB68563EFA -p 17F9C84B15623D3EB580AC28FF1879A0 ..\output\nandflash.bin -v
    -------------------------------------------------------------------------------------------------------------
    ---------------------------------------------------------------
    xeBuild v1.07.561
    ---------------------------------------------------------------
    building glitch image
    verbose set to level 1

    ------ parsing user ini at '.\..\nand\options.ini' ------

    ******* WARNING: could not open user ini at '.\..\nand\options.ini', skipping
    default console DVD eject button is being used to start xell

    ------ parsing ini at '.\16203\_glitch.ini' ------
    ini version 16203

    ini: label [trinitybl] found
    found (1) 'cba_9188.bin' crc: 0x5a76752d
    found (2) 'cbb_9188.bin' crc: 0xfebb1074
    found (3) 'cd_9452.bin' crc: 0x455fa02c
    found (4) 'ce_1888.bin' crc: 0xff9b60df
    found (5) 'cf_16203.bin' crc: 0xc4c27121
    found (6) 'cg_16203.bin' crc: 0xcbb44eac
    ini dictates dual CB for this model

    ini: label [flashfs] found
    found (1) 'aac.xexp' crc: 0x62924e10
    found (2) 'bootanim.xex' crc: 0xc8b660b2
    found (3) 'createprofile.xex' crc: 0x9f6efee2
    found (4) 'dash.xex' crc: 0x18ea6c7e
    found (5) 'deviceselector.xex' crc: 0x75c32b5b
    found (6) 'gamerprofile.xex' crc: 0xec9746f7
    found (7) 'hud.xex' crc: 0xabf19107
    found (8) 'huduiskin.xex' crc: 0xf3563a5c
    found (9) 'mfgbootlauncher.xex' crc: 0x763c73fe
    found (10) 'minimediaplayer.xex' crc: 0xda1d0a4a
    found (11) 'nomni.xexp' crc: 0xaae9ad36
    found (12) 'nomnifwk.xexp' crc: 0xb3c2c31b
    found (13) 'nomnifwm.xexp' crc: 0xf69cf9fc
    found (14) 'SegoeXbox-Light.xtt' crc: 0xe0ee6049
    found (15) 'signin.xex' crc: 0xc1d7185d
    found (16) 'updater.xex' crc: 0x19286110
    found (17) 'vk.xex' crc: 0xefcbab82
    found (18) 'xam.xex' crc: 0xf8db3557
    found (19) 'xenonclatin.xtt' crc: 0xd5d17ff5
    found (20) 'xenonclatin.xttp' crc: 0x7a507ad1
    found (21) 'xenonjklatin.xtt' crc: 0xdde4a14c
    found (22) 'xenonjklatin.xttp' crc: 0xe2adddfb
    found (23) 'ximecore.xex' crc: 0xe85e813b
    found (24) 'ximedic.xex' crc: 0x1d992bfb
    found (25) 'ximedic.xexp' crc: 0xfb2bb58c
    found (26) '..\launch.xex' crc: 0x00000000
    found (27
    -------------------------------------------------------------------------------------------------------------
    xeBuild Nand generata. Ora puoi flasharla
    (output\nandflash.bin)

    -------------------------------------------------------------------------------------------------------------
    * Per flashare l'immagine Xebuild creata avete 3 opzioni:

    1. - Tramite Flasher (Nandreader) premendo Xebuild > Flash.
    2. - Preparare un dispositivo USB in Fat32 e premere Xebuild>RawFlash per copiare i file necessari, inserire il dispositivo nella console e avviare Xell.
    3. - Se avete Fsd v3 connettere la console alla LAN e premere xebuild > Ip-Flash

    -------------------------------------------------------------------------------------------------------------

  15. #35
    Dolo-miticusss L'avatar di Babilozzo
    Data Registrazione
    May 2012
    Località
    Marmolada, Dolomiti
    Messaggi
    4,279
    tutto in ottimo stato e il blocco cattivo è comunque in una zona di memoria alta (raw offset 0xea1800), block ignored

    copying 0x4200 bytes of LBA 0x38c to block 0x3ff...zero fill origin...done!
    done!
    sembra dirti che non c'è nulla (zero fill) in quell'area , i file della dashboard hack sono integri.
    Esplora i link spaziali dei Tutorial RGH fatti con le mie manine Sante
    «L'abitudine e' in tutte le cose il miglior maestro.» -- Plinio il vecchio, "Storia naturale"

  16. #36
    Junior Member
    Data Registrazione
    Apr 2013
    Messaggi
    33
    Con simple nand flasher mi da questi dati:

    game:\flashdmp.bin opened ok, attemting to read 0x1080000 bytes from flash...
    block 0x1fe seems bad, status 0x00000310
    block 0x201 seems bad, status 0x00000310
    processing block 0x038d of 0x0400 (88.77 %) ! SFCX: Bad block found a7 0000038C
    block 0x38c seems bad, status 0x00000350

    Ci capisci qualcosa? perchè per me è arabo

  17. #37
    Dolo-miticusss L'avatar di Babilozzo
    Data Registrazione
    May 2012
    Località
    Marmolada, Dolomiti
    Messaggi
    4,279
    Buono è chè hai i bad block in una zona alta quindi nessun problema di avvio xell o bl

    Ora genera una nuova immagine hack partendo da questo dump che hai fatto con simple nand flasher e prova a flashare di conseguenza l'immagine con i due bad block rimappati sono fiducioso
    Esplora i link spaziali dei Tutorial RGH fatti con le mie manine Sante
    «L'abitudine e' in tutte le cose il miglior maestro.» -- Plinio il vecchio, "Storia naturale"

  18. #38
    Junior Member
    Data Registrazione
    Apr 2013
    Messaggi
    33
    Ecco in quest'ultima parte non ci ho capito proprio nulla.
    Non dimenticare che sono alle primissime armi.
    Come faccio a creare questa nuova immagine?

  19. #39
    Dolo-miticusss L'avatar di Babilozzo
    Data Registrazione
    May 2012
    Località
    Marmolada, Dolomiti
    Messaggi
    4,279
    Ti prendi il file che ha generato simple nand flasher dalla xbox game:\flashdmp.bin lo carichi su autogg e ricrei una immagine hack come hai fatto prima, lui ti rimappa i 2 blocchi difettosi e poi la flashi tranquillamente tramite xell come hai fatto la prima volta..oèppure con simple nand mettendo l'immagine creata con autogg nella cartella dove c'è l'eseguibile di simple nand..
    Esplora i link spaziali dei Tutorial RGH fatti con le mie manine Sante
    «L'abitudine e' in tutte le cose il miglior maestro.» -- Plinio il vecchio, "Storia naturale"

  20. #40
    Junior Member
    Data Registrazione
    Apr 2013
    Messaggi
    33
    Sono sempre del parere che se ti mandavo il file a quest'ora il thread era chiuso

Pagina 2 di 3 PrimaPrima 123 UltimaUltima

Segnalibri

Permessi di Scrittura

  • Tu non puoi inviare nuove discussioni
  • Tu non puoi inviare risposte
  • Tu non puoi inviare allegati
  • Tu non puoi modificare i tuoi messaggi
  •  

realizzazione siti internet ed e-commerce mugello