eh vabbeh! ora ho capito lascia perdere quella dashboard, scaricati l'f3 installer dal link che ti ho segnalato sopra.. e prova a installare quella piuttosto
eh vabbeh! ora ho capito lascia perdere quella dashboard, scaricati l'f3 installer dal link che ti ho segnalato sopra.. e prova a installare quella piuttosto
Esplora i link spaziali dei Tutorial RGH fatti con le mie manine Sante
«L'abitudine e' in tutte le cose il miglior maestro.» -- Plinio il vecchio, "Storia naturale"
ok installata dal xexmenu.
Sono andato su plugins settings/status e ho premuto su unload.
Ora appare scritto load.
Ho riavviato la fsd e adesso nella minibalde mi appaiono le scritte:
Freestyle home, accedi 4 profili etc.
Se provo ad accedere a un qualsiasi profilo mi dail solito errore.
Appunto, devi tenerlo unload il plugin, e al posto di freestyle home deve apparire pagina iniziale di xbox... così vediamo se fà lo stesso anche con la dash hack senza plugin.. non devi riavviare se no si ricarica.
Su realmodscene parlano di bad block / bad flash relativamente al codice d'errore, potresti sempre ritentare la sorte flashando nuovamente l'immagine hack, magari generandola preventivamente con JRunner e utilizzare simple nand flasher di swizzy ..beh comunque xell o simple nand usano ugualmente rawflash però non si sà mai.
Ultima modifica di Babilozzo; 14-04-13 alle 14: 59
Esplora i link spaziali dei Tutorial RGH fatti con le mie manine Sante
«L'abitudine e' in tutte le cose il miglior maestro.» -- Plinio il vecchio, "Storia naturale"
Ok. tutto fatto.
Ora mi appare pagina iniziale ma il problema persiste.
Tra l'altro ho notato che se avvi un gioco con utente disconnesso, quando il gioco ti chiede di accedere, si ripropone sempre lo stesso errore.
Leggi questo:
[url]http://www.consoleopen.com/forum/sezione-xbox-360-jtag-e-reset-glitch-hack/3680-rgh-falcon-14699-errore-tastiera.html[/url]
è il mio stesso errore
Presumo che per risolvere il problema devo spostare il bad block dai primi 50 blocchi.
Come si fa?
Mi sembra comunque che autogg rimappa in automatico il bad block...
Se così non fosse, usa un programma per rimapparlo,(trovi facilmente tanti tutorial per farlo, sia sul forum, o al massimo googla un pò) ricrea il tuo freeboot e riflashalo, utilizzando la procedura che ti ho postato prima...
Prova ad usare questo tutorial postato già da guerrierodipace su un altro thread per rimapparlo, e dicci come và :
[url=http://www.youtube.com/watch?feature=player_embedded&v=-RPh1jxGOho]Jtag Tool Tutorial (Remap Bad Blocks) - Coolshrimp - YouTube[/url]
Scusa un secondo.
Visto che mi stai dando una grossa mano e ti ringrazio e visto che con tutte queste guide mi sta andando in pappa il cervello, se io ti mando il mio file nand.bin originale potesti rimapparmi i bad block e, se fosse possibile, rimandarmi il nandflash.bin e xenon.elf da inserire nella chiavetta.
Penso che faresti molto prima a fare cosi che dandomi altri suggerimenti.
Se questo non ti scoccia possiamo fare cosi?
Addirittura? Ma perchè non guardi i log del software e vedi se effettivamente rimappa prima di andare nel panico? al limite posta qui il log intero, dalla lettura/inizializzazione della nand in poi, così vediamo se è tutto in ordine
P.s. un badblock è una cella di memoria che non può più essere letta o scritta, sulla nand non nell'immagine hack.
Da quello che ho visto io rawflash quando lo avvi, e comincia a scrivere la nand, se incontra un badblock ti avvisa con un messaggio a video e ti sposta l'informazione che andrebbe scritta li , in una zona di memoria di riserva detta "spare" che è comunque limitata, ma se riflashi e fai una foto al tv quando rawflash ha finito di scrivere appena prima di riavviare forse è meglio..
Ultima modifica di Babilozzo; 14-04-13 alle 16: 52
Esplora i link spaziali dei Tutorial RGH fatti con le mie manine Sante
«L'abitudine e' in tutte le cose il miglior maestro.» -- Plinio il vecchio, "Storia naturale"
So che sto per dire una fesseria, ma ci provo lo stesso:
Ho aperto autogg.
A destra, dove c'è la sezione "badblocks" ho caricato il file nand.bin originale e mi ha subito trovato il bad block 38c nella posizione 3ff.
Ho selezionato il tasto unmappa e mi ha creato un file nand_unmap.bin
Controllando questo file con 360 flash dump non mi trova più i bad block. Sembrano spariti.
Ora se, carico questo file nand_unmap.bin con autogg, e nella sezione xebuild clicco su crea e successivamente su raw flash, faccio una procedura corretta o c'è il rischio che brikko la console?
Io non ho mai usato autogg per fare una cosa simile.. e cmq fisicamente in nand hai un blocco bruciato quindi è inutile che gli togli il flag "bad" l'importante è che il blocco non sia in zona xell (dove viene memorizzato xell in nand) . alla peggio non avvi la dash ma xell deve rimanere sempre funzionante altrimenti devi riflashare tramite spi. Posta il log prima di flashare, s oppure usa jrunner e crea una immagine hack partendo da quella originale
E se posti il log anche sarebbe una buona idea, che non ci sfugga qualcosa
Hai un'alternativa.. per verificare di avere il badblock in nand in quella posizione, fai una lettura della stessa usando [URL="http://www.homebrew-connection.org/files/xbox/nand_flasher/dl_Simple_360_NAND_Flasher_v1.3_BETA.rar"]simple nand flasher! [/URL]
No?
Ultima modifica di Babilozzo; 14-04-13 alle 17: 09
Esplora i link spaziali dei Tutorial RGH fatti con le mie manine Sante
«L'abitudine e' in tutte le cose il miglior maestro.» -- Plinio il vecchio, "Storia naturale"
Questo è il log:
***** AutoGG _ gia aggiornato all'ultima versione 0.9.2 Rev 67b *****
* Per iniziare la procedura _ necessario il vostro NAND Dump:
- Se lo avete gi_ caricate il dump dal pulsante a forma di cartella.
- Se avete gi_ Fsd v3 collegate la console alla rete LAN e premete IP Xbox > Leggi.
- Se non avete FSD ma Xell provare a utilizzare il pulsante con l'icona Usb e seguire la procedura.
- Sel la console _ Retail ( Dash Originale ) installa e seleziona il tuo Nand reader e
premi Flasher > Leggi
* Se avete gi_ FSD v3 e si desidera aggiornarla selezionare la modalit_ LAN o USB e provare AutoUpdate-Dash
Log salvato in C:\Users\Luciano\Desktop\AutoGG 0%2e9%2e2 rev67\AutoGG_0.9.2\LOGS\AutoGG_log_2013_04_14(18h. 13m.56sg).txt
Attendere la creazione dei *temp files*...OK
CERCO LA NAND: "nand\nanddump.bin"
-------------------------------------------------------------------------------------------------------------
NandPro v3.0a by Tiros
Using Virtual Nand Device File: nand\nanddump.bin
Flash Config: 0x00023010
Block Size: 16KB Block Limits: 0x000000..0x000000
File: common\temp\flash.bin
Reading
0000
0000
-------------------------------------------------------------------------------------------------------------
Small Block trovato
Flashconfig:0023010 Size=16
Caricamento Nand ...OK
Controllando i Bad Blocks ...
Block 38c Trovato in 0x3ff (offset:0x107C001)
Checking ECC-CheckSum... Wait
-------------------------------------------------------------------------------------------------------------
Ecc Check: OK
-------------------------------------------------------------------------------------------------------------
Done
VERIFICA SMC_CONFIG
Smc Config trovato: 0x00FEB800
Lettura temperature...:
Reset Parental Code: XXUD
VERIFICA NAND DATA
ID: 6ccda17
ECC - unECC
Trovato SMC (version 3.1) : 00001000 - 00004000
Nand RETAIL (Original)
Trovato Keyvault : 00004000 - 00008000
Looking for Cpukey in Local Database. Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
Cpukey Detected : 17F9C84B15623D3EB580AC28FF1879A0
Checking CpuKey
Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
CpuKey is correct
Trovato CB_A (build 9188) : 00008000 - 00009ac0
Trovato CB_B (build 9188) : 00009ac0 - 000112c0
Trovato CD (build 9452) : 000112c0 - 000161e0
Trovato CE (build 1888) : 000161e0 - 0006c250
Trovato CF (build 13146) : 00070000- 00074450
Trovato CF1 (build 14699) : 00080000- 00084450
Trovato CG (build 13146) : 00074450- 000d845e
Trovato CG1 build 14699) : 00084450- 000eb5b8
Nand valida
VERIFICA MODELLO CONSOLE
Verificando se _ modificabile...
Modello : Trinity CB_A_9188 GLITCHEABLE
CD_9452 Non JtaggABILE
Size: 16
-------------------------------------------------------------------------------------------------------------
1 file copiati.
-------------------------------------------------------------------------------------------------------------
FileSystems:
FileSystem Active:22 offset:0xE25E00
FileSystem Last:17 offset:0xF4F640
Block Size File
0x00001000 0x00003000 SMC_3.1.bin
0x00004000 0x00004000 Keyvault.bin
0x00008000 0x00001AC0 CB_A_9188.bin
0x00009AC0 0x00007800 CB_B_9188.bin
0x000112C0 0x00004F20 CD_9452.bin
0x000161E0 0x00056070 CE_1888.bin
0x00070000 0x00004450 CF_13146.bin
0x00080000 0x00004450 CF1_14699.bin
0x00074450 0x0006400E CG_13146.bin
0x00084450 0x00067168 CG1_14699.bin
0x00EDC000 0x00014000 aac.xexp2
0x00EF0000 0x00061000 bootanim.xex
0x00F54000 0x0001E000 hud.xex
0x000A4000 0x00013000 huduiskin.xex
0x000B8000 0x00008000 mfgbootlauncher.xex
0x000C0000 0x0000E000 nomni.xexp2
0x000D0000 0x00005000 nomnifwm.xexp2
0x000D8000 0x00002000 nomnifwk.xexp2
0x000DC000 0x00236000 xam.xex
0x00314000 0x00015000 ximecore.xex
0x0032C000 0x00002800 ximedic.xexp2
0x0037C000 0x00018000 xenonclatin.xttp2
0x00394000 0x00007000 xenonjklatin.xttp2
0x003B0000 0x0000C000 createprofile.xex
0x003BC000 0x0063A000 dash.xex
0x009F8000 0x00009000 deviceselector.xex
0x00ECC000 0x00000A00 crl.bin
0x00A28000 0x0011B000 xenonclatin.xtt
0x00A04000 0x0001B000 gamerprofile.xex
0x00B5C000 0x001A8000 xenonjklatin.xtt
0x00B44000 0x0000C000 minimediaplayer.xex
0x00B50000 0x00016000 signin.xex
0x00D24000 0x00090000 ximedic.xex
0x00D10000 0x00007000 updater.xex
0x00EB4000 0x00000400 secdata.bin
0x00DE0000 0x00004000 fcrt.bin
0x003A4000 0x00007090 dae.bin
0x00E00000 0x00004000 extended.bin
0x00E08000 0x0005B5C0 sysupdate.xexp2
0x00D18000 0x00009000 vk.xex
X-val: 00 00 00 00 00 00 00 00
Secdata _ pulito
Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
Nand in Folder
-------------------------------------------------------------------------------------------------------------
1 file copiati.
-------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------
* Selezionare il tipo di immagine e le opzioni desiderate e fare clic su Xebuild>Crea.
-------------------------------------------------------------------------------------------------------------
Nand nand\nanddump.bin Lettura valida in caricamento. Attendere ..........
Nand originale, Smc pu_ essere patchato
16203 Installed
Queste opzioni verranno usate per creare l'immagine:
xeBuild.exe -o cfldv=2 -noenter -t Glitch -c Trinity -d ..\nand -o patchsmc -f 16203 -b DD88AD0C9ED669E7B56794FB68563EFA -p 17F9C84B15623D3EB580AC28FF1879A0 ..\output\nandflash.bin -v
-------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------
xeBuild v1.07.561
---------------------------------------------------------------
building glitch image
verbose set to level 1
------ parsing user ini at '.\..\nand\options.ini' ------
******* WARNING: could not open user ini at '.\..\nand\options.ini', skipping
default console DVD eject button is being used to start xell
------ parsing ini at '.\16203\_glitch.ini' ------
ini version 16203
ini: label [trinitybl] found
found (1) 'cba_9188.bin' crc: 0x5a76752d
found (2) 'cbb_9188.bin' crc: 0xfebb1074
found (3) 'cd_9452.bin' crc: 0x455fa02c
found (4) 'ce_1888.bin' crc: 0xff9b60df
found (5) 'cf_16203.bin' crc: 0xc4c27121
found (6) 'cg_16203.bin' crc: 0xcbb44eac
ini dictates dual CB for this model
ini: label [flashfs] found
found (1) 'aac.xexp' crc: 0x62924e10
found (2) 'bootanim.xex' crc: 0xc8b660b2
found (3) 'createprofile.xex' crc: 0x9f6efee2
found (4) 'dash.xex' crc: 0x18ea6c7e
found (5) 'deviceselector.xex' crc: 0x75c32b5b
found (6) 'gamerprofile.xex' crc: 0xec9746f7
found (7) 'hud.xex' crc: 0xabf19107
found (8) 'huduiskin.xex' crc: 0xf3563a5c
found (9) 'mfgbootlauncher.xex' crc: 0x763c73fe
found (10) 'minimediaplayer.xex' crc: 0xda1d0a4a
found (11) 'nomni.xexp' crc: 0xaae9ad36
found (12) 'nomnifwk.xexp' crc: 0xb3c2c31b
found (13) 'nomnifwm.xexp' crc: 0xf69cf9fc
found (14) 'SegoeXbox-Light.xtt' crc: 0xe0ee6049
found (15) 'signin.xex' crc: 0xc1d7185d
found (16) 'updater.xex' crc: 0x19286110
found (17) 'vk.xex' crc: 0xefcbab82
found (18) 'xam.xex' crc: 0xf8db3557
found (19) 'xenonclatin.xtt' crc: 0xd5d17ff5
found (20) 'xenonclatin.xttp' crc: 0x7a507ad1
found (21) 'xenonjklatin.xtt' crc: 0xdde4a14c
found (22) 'xenonjklatin.xttp' crc: 0xe2adddfb
found (23) 'ximecore.xex' crc: 0xe85e813b
found (24) 'ximedic.xex' crc: 0x1d992bfb
found (25) 'ximedic.xexp' crc: 0xfb2bb58c
found (26) '..\launch.xex' crc: 0x00000000
found (27) '..\lhelper.xex' crc: 0x00000000
found (28) '..\launch.ini' crc: 0x00000000
ini: label [security] found
found (1) 'crl.bin' crc: 0x00000000
found (2) 'dae.bin' crc: 0x00000000
found (3) 'extended.bin' crc: 0x00000000
found (4) 'fcrt.bin' crc: 0x00000000
found (5) 'secdata.bin' crc: 0x00000000
------ ini parsing completed ------
output name overridden to: ..\output\nandflash.bin
------ Checking .\..\nand\nanddump.bin ------
.\..\nand\nanddump.bin file size: 0x1080000
nanddump header checks passed OK!
Loading NAND dump (0x1080000 bytes)...done!
Detecting NAND controller type from dump data...
NAND dump is from a small block machine
NAND dump uses big block controller
parsing dump into user and spare...
bad block at 0x38c (raw offset 0xea1800), block ignored
copying nanddump data from block 0x3ff to block 0x38c for file extraction integrity
block 0x38c was remapped to block 0x3ff at remap instance 0
done!
cleaning up stray remaps
done!
--remap summary--
0: source: 0x038c dest: 0x03ff
-----------------
decrypting KeyVault at address 0x4000 of size 0x4000
keyvault decrypted OK, will use if no kv.bin is provided
decrypting SMC at address 0x1000 of size 0x3000
SMC decrypted OK, will use if no external smc.bin is provided
seeking smc config in dump...found at offset 0xf7c000! Using if no smc config is provided.
CF slot 0 decrypted ok LDV 0x01 Pairing: 0xeb49fe
CF slot 1 decrypted ok LDV 0x02 Pairing: 0xeb49fe
setting pairing data from image to 0xeb49fe
LDV was already set to 2
MobileB.dat found at page 0x6fe0, size 2048 (0x800) bytes
MobileC.dat found at page 0x4e0, size 512 (0x200) bytes
MobileD.dat found at page 0x50c0, size 2048 (0x800) bytes
MobileE.dat found at page 0x5120, size 2048 (0x800) bytes
Statistics.settings found at page 0x7bc0, size 4096 (0x1000) bytes
Xstress.settings found at page 0x7bc0, size 4096 (0x1000) bytes
seeking FSRoot...fsroot found at page 0x6dc0 raw offset 0xe25c00
seeking security files...
crl.bin found in sector 0x3b3 size 0xa00...verified! Will use if external file not found.
dae.bin found in sector 0xe9 size 0x7090...verified! Will use if external file not found.
extended.bin found in sector 0x380 size 0x4000...verified! Will use if external file not found.
fcrt.bin found in sector 0x378 size 0x4000...verified! Will use if external file not found.
secdata.bin found in sector 0x3ad size 0x400...verified! Will use if external file not found.
done!
Writing initial header to flash image
------ loading system update container ------
.\16203\su20076000_00000000 found, loading...done!
Read 0xb31000 bytes to memory
checking container integrity...
header seems valid, version 2.0.16203.00
header hash is OK, checking content hashes...
content hashes seem OK, everything looks good!
extracted SUPD\xboxupd.bin (0x79a60 bytes)
decrypting SUPD\xboxupd.bin\CF_16203.bin (0x4560 bytes)...done!
decrypting SUPD\xboxupd.bin\CG_16203.bin (0x754f2 bytes)...done!
------ Loading bootloaders and required security files ------
reading .\..\nand\smc.bin failed, using smc.bin from nand dump
reset smc load address to 0x1000 size 0x3000
reading .\..\nand\kv.bin failed, using kv.bin from nand dump
reading .\common\cba_9188.bin (0x1ac0 bytes)
reading .\common\cbb_9188.bin (0x7800 bytes)
reading .\common\cd_9452.bin (0x4f20 bytes)
reading .\common\ce_1888.bin (0x5606a b pad 0x56070 b)
reading .\..\nand\xell-gggggg.bin (0x40000 bytes)
extracted SUPD\xboxupd.bin\CF_16203.bin (0x4560 bytes)
extracted SUPD\xboxupd.bin\CG_16203.bin (0x754f2 bytes)
reading .\16203\bin\patches_trinity.bin (0x870 bytes)
reading .\..\nand\smc_config.bin failed, using smc_config.bin from nand dump
-------------------
checking smc_config
-------------------
extracting config
------------------
SMC config info:
------------------
Target temps: Cpu: 82_C Gpu: 78_C Edram: 76_C
Max temps : Cpu: 89_C Gpu: 82_C Edram: 82_C
Cpu Fan : (auto)
Gpu Fan : (auto)
MAC Address : 7c:1e:52:01:fa:bf
AVRegion : 0x00000300 (PAL50)
GameRegion : 0x02fe (PAL/EU)
DVDRegion : 2
resetKey : XXUD
---------------------
Checking for smc config data patches
smc config was not patched
---------------------
done!
patch slot offset reset to: 0xb0000
------ Patching BLs and modifying patches ------
Patching header for xell power reason
Patching BLs...Done!
------ Encrypting and finalizing bootloaders ------
initializing random nonces
encoding smc.bin size 0x3000
SMC checksum: f9c96639
known clean SMC found, type: Trinity v5.1(3.01)
patching SMC reset limit at offset: 0x13b3
SMC reset limit patched successfully!
encoding kv.bin size 0x4000
decrypted keyvault has been set for reference
encoding cba_9188.bin size 0x1ac0
encoding cbb_9188.bin size 0x7800
CB 9188 seq 0x03010001 type: 0x03 cseq: 0x01 allow: 0x0001
expected fuses:
fuseset 00: C0FFFFFFFFFFFFFF
fuseset 01: 0F0F0F0F0F0FF0F0
fuseset 02: F000000000000000 (sequence)
fuseset 02: F000000000000000 (allow cseq 1)
**dual CB flag detected!**
encoding cd_9452.bin size 0x5290
encoding ce_1888.bin size 0x56070
encoding xell-gggggg.bin size 0x40000
encoding cf_16203.bin size 0x4560
encoding cg_16203.bin size 0x75500
encoding patches_trinity.bin size 0x4a4
done!
------ Adding bootloaders to flash image ------
adding smc.bin at raw offset 0x00001000 len 0x3000 (end 0x4000)
adding kv.bin at raw offset 0x00004000 len 0x4000 (end 0x8000)
adding cba_9188.bin at raw offset 0x00008000 len 0x1ac0 (end 0x9ac0)
adding cbb_9188.bin at raw offset 0x00009ac0 len 0x7800 (end 0x112c0)
adding cd_9452.bin at raw offset 0x000112c0 len 0x5290 (end 0x16550)
adding ce_1888.bin at raw offset 0x00016550 len 0x56070 (end 0x6c5c0)
adding xell-gggggg.bin at raw offset 0x00070000 len 0x40000 (end 0xb0000)
adding cf_16203.bin at raw offset 0x000b0000 len 0x4560 (end 0xb4560)
adding cg_16203.bin at raw offset 0x000b4560 len 0x75500 (end 0xc0000, rest in fs)
adding patches_trinity.bin at raw offset 0x000c0010 len 0x4a4 (end 0xc04b4)
Fixing up FS table...done!
Writing zeropair CG patch slot overflow data to sysupdate.xexp1
at raw offset 0xd0000 len 0x00069a60 (end: 0x00139a60)...done!
------ adding 28 firmware files ------
extracted SUPD\aac.xexp (0x14000 bytes) (crc32: 0x62924e10 ini: 0x62924e10)
adding as aac.xexp1 at raw offset 0x139a60 len 0x00014000 (end 0x0014da60)
extracted SUPD\bootanim.xex (0x61000 bytes) (crc32: 0xc8b660b2 ini: 0xc8b660b2)
adding as bootanim.xex at raw offset 0x150000 len 0x00061000 (end 0x001b1000)
extracted SUPD\createprofile.xex (0xc000 bytes) (crc32: 0x9f6efee2 ini: 0x9f6efee2)
adding as createprofile.xex at raw offset 0x1b1000 len 0x0000c000 (end 0x001bd000)
extracted SUPD\dash.xex (0x59c000 bytes) (crc32: 0x18ea6c7e ini: 0x18ea6c7e)
adding as dash.xex at raw offset 0x1c0000 len 0x0059c000 (end 0x0075c000)
extracted SUPD\deviceselector.xex (0xa000 bytes) (crc32: 0x75c32b5b ini: 0x75c32b5b)
adding as deviceselector.xex at raw offset 0x75c000 len 0x0000a000 (end 0x00766000)
extracted SUPD\gamerprofile.xex (0x1b000 bytes) (crc32: 0xec9746f7 ini: 0xec9746f7)
adding as gamerprofile.xex at raw offset 0x766000 len 0x0001b000 (end 0x00781000)
extracted SUPD\hud.xex (0x1d000 bytes) (crc32: 0xabf19107 ini: 0xabf19107)
adding as hud.xex at raw offset 0x783000 len 0x0001d000 (end 0x007a0000)
extracted SUPD\huduiskin.xex (0x14000 bytes) (crc32: 0xf3563a5c ini: 0xf3563a5c)
adding as huduiskin.xex at raw offset 0x7a1000 len 0x00014000 (end 0x007b5000)
extracted SUPD\mfgbootlauncher.xex (0x8000 bytes) (crc32: 0x763c73fe ini: 0x763c73fe)
adding as mfgbootlauncher.xex at raw offset 0x7b8000 len 0x00008000 (end 0x007c0000)
extracted SUPD\minimediaplayer.xex (0xb000 bytes) (crc32: 0xda1d0a4a ini: 0xda1d0a4a)
adding as minimediaplayer.xex at raw offset 0x7c0000 len 0x0000b000 (end 0x007cb000)
extracted SUPD\nomni.xexp (0xe000 bytes) (crc32: 0xaae9ad36 ini: 0xaae9ad36)
adding as nomni.xexp1 at raw offset 0x7cb000 len 0x0000e000 (end 0x007d9000)
extracted SUPD\nomnifwk.xexp (0x2000 bytes) (crc32: 0xb3c2c31b ini: 0xb3c2c31b)
adding as nomnifwk.xexp1 at raw offset 0x7da000 len 0x00002000 (end 0x007dc000)
extracted SUPD\nomnifwm.xexp (0x5000 bytes) (crc32: 0xf69cf9fc ini: 0xf69cf9fc)
adding as nomnifwm.xexp1 at raw offset 0x7de000 len 0x00005000 (end 0x007e3000)
extracted SUPD\SegoeXbox-Light.xtt (0x6000 bytes) (crc32: 0xe0ee6049 ini: 0xe0ee6049)
adding as SegoeXbox-Light.xtt at raw offset 0x7e5000 len 0x00006000 (end 0x007eb000)
extracted SUPD\signin.xex (0x16000 bytes) (crc32: 0xc1d7185d ini: 0xc1d7185d)
adding as signin.xex at raw offset 0x7ee000 len 0x00016000 (end 0x00804000)
extracted SUPD\updater.xex (0x7000 bytes) (crc32: 0x19286110 ini: 0x19286110)
adding as updater.xex at raw offset 0x806000 len 0x00007000 (end 0x0080d000)
extracted SUPD\vk.xex (0xb000 bytes) (crc32: 0xefcbab82 ini: 0xefcbab82)
adding as vk.xex at raw offset 0x80f000 len 0x0000b000 (end 0x0081a000)
extracted SUPD\xam.xex (0x24f000 bytes) (crc32: 0xf8db3557 ini: 0xf8db3557)
adding as xam.xex at raw offset 0x81b000 len 0x0024f000 (end 0x00a6a000)
reading .\16203\xenonclatin.xtt (0x11b000 bytes) (crc32: 0xd5d17ff5 ini: 0xd5d17ff5)
adding as xenonclatin.xtt at raw offset 0xa6b000 len 0x0011b000 (end 0x00b86000)
extracted SUPD\xenonclatin.xttp (0x18000 bytes) (crc32: 0x7a507ad1 ini: 0x7a507ad1)
adding as xenonclatin.xttp1 at raw offset 0xb87000 len 0x00018000 (end 0x00b9f000)
reading .\16203\xenonjklatin.xtt (0x1a8000 bytes) (crc32: 0xdde4a14c ini: 0xdde4a14c)
adding as xenonjklatin.xtt at raw offset 0xba0000 len 0x001a8000 (end 0x00d48000)
extracted SUPD\xenonjklatin.xttp (0x7000 bytes) (crc32: 0xe2adddfb ini: 0xe2adddfb)
adding as xenonjklatin.xttp1 at raw offset 0xd48000 len 0x00007000 (end 0x00d4f000)
extracted SUPD\ximecore.xex (0x17000 bytes) (crc32: 0xe85e813b ini: 0xe85e813b)
adding as ximecore.xex at raw offset 0xd4f000 len 0x00017000 (end 0x00d66000)
reading .\16203\ximedic.xex (0x90000 bytes) (crc32: 0x1d992bfb ini: 0x1d992bfb)
adding as ximedic.xex at raw offset 0xd67000 len 0x00090000 (end 0x00df7000)
extracted SUPD\ximedic.xexp (0x2800 bytes) (crc32: 0xfb2bb58c ini: 0xfb2bb58c)
adding as ximedic.xexp1 at raw offset 0xdf8000 len 0x00002800 (end 0x00dfa800)
reading .\16203\..\launch.xex (0xc800 bytes)
adding as launch.xex at raw offset 0xdfa800 len 0x0000c800 (end 0x00e07000)
reading .\16203\..\lhelper.xex (0x6000 bytes)
adding as lhelper.xex at raw offset 0xe08800 len 0x00006000 (end 0x00e0e800)
reading .\16203\..\launch.ini (0x2ad bytes)
adding as launch.ini at raw offset 0xe12000 len 0x000002ad (end 0x00e122ad)
------ adding 5 security files ------
<- Processing crl.bin ->
reading .\..\nand\crl.bin (0xa00 bytes)
crl appears crypted, attempting to decrypt with CPU key...failed! Trying alternate key...success!
adding as crl.bin at raw offset 0xe18000 len 0x00000a00 (end 0x00e18a00)
<- Processing dae.bin ->
reading .\..\nand\dae.bin (0xad30 bytes)
dae appears encrypted, attempting to decrypt with CPU key...failed! Attempting to decrypt with alternate key...
success!
adding as dae.bin at raw offset 0xe1c000 len 0x0000ad30 (end 0x00e26d30)
<- Processing extended.bin ->
reading .\..\nand\extended.bin (0x4000 bytes)
adding as extended.bin at raw offset 0xe28000 len 0x00004000 (end 0x00e2c000)
<- Processing fcrt.bin ->
could not read fcrt.bin, using data from nanddump.bin...
adding as fcrt.bin at raw offset 0xe2c000 len 0x00004000 (end 0x00e30000)
<- Processing secdata.bin ->
reading .\..\nand\secdata.bin (0x400 bytes)
adding as secdata.bin at raw offset 0xe30000 len 0x00000400 (end 0x00e30400)
------ checking for Mobile*.dat ------
MobileB.dat found, adding from nanddump.bin
adding MobileB.dat as type 0x31 at raw offset 0xe34000 len 0x800 (end 0xe34800)
MobileC.dat found, adding from nanddump.bin
adding MobileC.dat as type 0x32 at raw offset 0xe38000 len 0x200 (end 0xe38200)
MobileD.dat found, adding from nanddump.bin
adding MobileD.dat as type 0x33 at raw offset 0xe3c000 len 0x800 (end 0xe3c800)
MobileE.dat found, adding from nanddump.bin
adding MobileE.dat as type 0x34 at raw offset 0xe40000 len 0x800 (end 0xe40800)
Statistics.settings found, adding from nanddump.bin
adding Statistics.settings at raw offset 0xf78000 len 0x1000 (end 0xf79000)
Xstress.settings found, adding from nanddump.bin
adding Xstress.settings at raw offset 0xf74000 len 0x1000 (end 0xf75000)
------ adding smc_config.bin ------
adding smc config to offset 0x00f7c000, len 0x400
------ finalizing image ------
Fixing up empty FS block entries...done!
Writing FS table to image offset 0xe44000 len 0x4000 (end 0xe48000)...done!
fixing up big block controller on small block NAND LBA numbers...done!
calculating ECD bytes and assembling raw image...done!
remapping 1 blocks
copying 0x4200 bytes of LBA 0x38c to block 0x3ff...zero fill origin...done!
done!
writing file '..\output\nandflash.bin' to disk...done!
..\output\nandflash.bin written OK
---------------------------------------------------------------
..\output\nandflash.bin image built, info:
---------------------------------------------------------------
Console : Trinity
NAND size : 16MiB
Build : Glitch
Xell : power on console with console eject button
Serial : 012220713805
ConsoleId : 368764504957
MoboSerial: 791192B120501385
Mfg Date : 09/12/2011
CPU Key : 17F9C84B15623D3EB580AC28FF1879A0
1BL Key : DD88AD0C9ED669E7B56794FB68563EFA
DVD Key : BAE0A0F4ABFDEE9E7E67627BF7403F41
CF LDV : 2
KV type : type2 (hashed)
---------------------------------------------------------------
xeBuild Finished. Have a nice day.
---------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------
xeBuild Nand generata. Ora puoi flasharla
(output\nandflash.bin)
-------------------------------------------------------------------------------------------------------------
* Per flashare l'immagine Xebuild creata avete 3 opzioni:
1. - Tramite Flasher (Nandreader) premendo Xebuild > Flash.
2. - Preparare un dispositivo USB in Fat32 e premere Xebuild>RawFlash per copiare i file necessari, inserire il dispositivo nella console e avviare Xell.
3. - Se avete Fsd v3 connettere la console alla LAN e premere xebuild > Ip-Flash
-------------------------------------------------------------------------------------------------------------
Questo era il log del flash che ho fatto ieri
Adesso posto il log dopo aver rimappato con autogg:
***** AutoGG _ gia aggiornato all'ultima versione 0.9.2 Rev 67b *****
* Per iniziare la procedura _ necessario il vostro NAND Dump:
- Se lo avete gi_ caricate il dump dal pulsante a forma di cartella.
- Se avete gi_ Fsd v3 collegate la console alla rete LAN e premete IP Xbox > Leggi.
- Se non avete FSD ma Xell provare a utilizzare il pulsante con l'icona Usb e seguire la procedura.
- Sel la console _ Retail ( Dash Originale ) installa e seleziona il tuo Nand reader e
premi Flasher > Leggi
* Se avete gi_ FSD v3 e si desidera aggiornarla selezionare la modalit_ LAN o USB e provare AutoUpdate-Dash
Log salvato in C:\Users\Luciano\Desktop\AutoGG 0%2e9%2e2 rev67\AutoGG_0.9.2\LOGS\AutoGG_log_2013_04_14(18h. 13m.56sg).txt
Attendere la creazione dei *temp files*...OK
CERCO LA NAND: "nand\nanddump.bin"
-------------------------------------------------------------------------------------------------------------
NandPro v3.0a by Tiros
Using Virtual Nand Device File: nand\nanddump.bin
Flash Config: 0x00023010
Block Size: 16KB Block Limits: 0x000000..0x000000
File: common\temp\flash.bin
Reading
0000
0000
-------------------------------------------------------------------------------------------------------------
Small Block trovato
Flashconfig:0023010 Size=16
Caricamento Nand ...OK
Controllando i Bad Blocks ...
Block 38c Trovato in 0x3ff (offset:0x107C001)
Checking ECC-CheckSum... Wait
-------------------------------------------------------------------------------------------------------------
Ecc Check: OK
-------------------------------------------------------------------------------------------------------------
Done
VERIFICA SMC_CONFIG
Smc Config trovato: 0x00FEB800
Lettura temperature...:
Reset Parental Code: XXUD
VERIFICA NAND DATA
ID: 6ccda17
ECC - unECC
Trovato SMC (version 3.1) : 00001000 - 00004000
Nand RETAIL (Original)
Trovato Keyvault : 00004000 - 00008000
Looking for Cpukey in Local Database. Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
Cpukey Detected : 17F9C84B15623D3EB580AC28FF1879A0
Checking CpuKey
Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
CpuKey is correct
Trovato CB_A (build 9188) : 00008000 - 00009ac0
Trovato CB_B (build 9188) : 00009ac0 - 000112c0
Trovato CD (build 9452) : 000112c0 - 000161e0
Trovato CE (build 1888) : 000161e0 - 0006c250
Trovato CF (build 13146) : 00070000- 00074450
Trovato CF1 (build 14699) : 00080000- 00084450
Trovato CG (build 13146) : 00074450- 000d845e
Trovato CG1 build 14699) : 00084450- 000eb5b8
Nand valida
VERIFICA MODELLO CONSOLE
Verificando se _ modificabile...
Modello : Trinity CB_A_9188 GLITCHEABLE
CD_9452 Non JtaggABILE
Size: 16
-------------------------------------------------------------------------------------------------------------
1 file copiati.
-------------------------------------------------------------------------------------------------------------
FileSystems:
FileSystem Active:22 offset:0xE25E00
FileSystem Last:17 offset:0xF4F640
Block Size File
0x00001000 0x00003000 SMC_3.1.bin
0x00004000 0x00004000 Keyvault.bin
0x00008000 0x00001AC0 CB_A_9188.bin
0x00009AC0 0x00007800 CB_B_9188.bin
0x000112C0 0x00004F20 CD_9452.bin
0x000161E0 0x00056070 CE_1888.bin
0x00070000 0x00004450 CF_13146.bin
0x00080000 0x00004450 CF1_14699.bin
0x00074450 0x0006400E CG_13146.bin
0x00084450 0x00067168 CG1_14699.bin
0x00EDC000 0x00014000 aac.xexp2
0x00EF0000 0x00061000 bootanim.xex
0x00F54000 0x0001E000 hud.xex
0x000A4000 0x00013000 huduiskin.xex
0x000B8000 0x00008000 mfgbootlauncher.xex
0x000C0000 0x0000E000 nomni.xexp2
0x000D0000 0x00005000 nomnifwm.xexp2
0x000D8000 0x00002000 nomnifwk.xexp2
0x000DC000 0x00236000 xam.xex
0x00314000 0x00015000 ximecore.xex
0x0032C000 0x00002800 ximedic.xexp2
0x0037C000 0x00018000 xenonclatin.xttp2
0x00394000 0x00007000 xenonjklatin.xttp2
0x003B0000 0x0000C000 createprofile.xex
0x003BC000 0x0063A000 dash.xex
0x009F8000 0x00009000 deviceselector.xex
0x00ECC000 0x00000A00 crl.bin
0x00A28000 0x0011B000 xenonclatin.xtt
0x00A04000 0x0001B000 gamerprofile.xex
0x00B5C000 0x001A8000 xenonjklatin.xtt
0x00B44000 0x0000C000 minimediaplayer.xex
0x00B50000 0x00016000 signin.xex
0x00D24000 0x00090000 ximedic.xex
0x00D10000 0x00007000 updater.xex
0x00EB4000 0x00000400 secdata.bin
0x00DE0000 0x00004000 fcrt.bin
0x003A4000 0x00007090 dae.bin
0x00E00000 0x00004000 extended.bin
0x00E08000 0x0005B5C0 sysupdate.xexp2
0x00D18000 0x00009000 vk.xex
X-val: 00 00 00 00 00 00 00 00
Secdata _ pulito
Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
Nand in Folder
-------------------------------------------------------------------------------------------------------------
1 file copiati.
-------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------
* Selezionare il tipo di immagine e le opzioni desiderate e fare clic su Xebuild>Crea.
-------------------------------------------------------------------------------------------------------------
Nand nand\nanddump.bin Lettura valida in caricamento. Attendere ..........
Nand originale, Smc pu_ essere patchato
16203 Installed
Queste opzioni verranno usate per creare l'immagine:
xeBuild.exe -o cfldv=2 -noenter -t Glitch -c Trinity -d ..\nand -o patchsmc -f 16203 -b DD88AD0C9ED669E7B56794FB68563EFA -p 17F9C84B15623D3EB580AC28FF1879A0 ..\output\nandflash.bin -v
-------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------
xeBuild v1.07.561
---------------------------------------------------------------
building glitch image
verbose set to level 1
------ parsing user ini at '.\..\nand\options.ini' ------
******* WARNING: could not open user ini at '.\..\nand\options.ini', skipping
default console DVD eject button is being used to start xell
------ parsing ini at '.\16203\_glitch.ini' ------
ini version 16203
ini: label [trinitybl] found
found (1) 'cba_9188.bin' crc: 0x5a76752d
found (2) 'cbb_9188.bin' crc: 0xfebb1074
found (3) 'cd_9452.bin' crc: 0x455fa02c
found (4) 'ce_1888.bin' crc: 0xff9b60df
found (5) 'cf_16203.bin' crc: 0xc4c27121
found (6) 'cg_16203.bin' crc: 0xcbb44eac
ini dictates dual CB for this model
ini: label [flashfs] found
found (1) 'aac.xexp' crc: 0x62924e10
found (2) 'bootanim.xex' crc: 0xc8b660b2
found (3) 'createprofile.xex' crc: 0x9f6efee2
found (4) 'dash.xex' crc: 0x18ea6c7e
found (5) 'deviceselector.xex' crc: 0x75c32b5b
found (6) 'gamerprofile.xex' crc: 0xec9746f7
found (7) 'hud.xex' crc: 0xabf19107
found (8) 'huduiskin.xex' crc: 0xf3563a5c
found (9) 'mfgbootlauncher.xex' crc: 0x763c73fe
found (10) 'minimediaplayer.xex' crc: 0xda1d0a4a
found (11) 'nomni.xexp' crc: 0xaae9ad36
found (12) 'nomnifwk.xexp' crc: 0xb3c2c31b
found (13) 'nomnifwm.xexp' crc: 0xf69cf9fc
found (14) 'SegoeXbox-Light.xtt' crc: 0xe0ee6049
found (15) 'signin.xex' crc: 0xc1d7185d
found (16) 'updater.xex' crc: 0x19286110
found (17) 'vk.xex' crc: 0xefcbab82
found (18) 'xam.xex' crc: 0xf8db3557
found (19) 'xenonclatin.xtt' crc: 0xd5d17ff5
found (20) 'xenonclatin.xttp' crc: 0x7a507ad1
found (21) 'xenonjklatin.xtt' crc: 0xdde4a14c
found (22) 'xenonjklatin.xttp' crc: 0xe2adddfb
found (23) 'ximecore.xex' crc: 0xe85e813b
found (24) 'ximedic.xex' crc: 0x1d992bfb
found (25) 'ximedic.xexp' crc: 0xfb2bb58c
found (26) '..\launch.xex' crc: 0x00000000
found (27) '..\lhelper.xex' crc: 0x00000000
found (28) '..\launch.ini' crc: 0x00000000
ini: label [security] found
found (1) 'crl.bin' crc: 0x00000000
found (2) 'dae.bin' crc: 0x00000000
found (3) 'extended.bin' crc: 0x00000000
found (4) 'fcrt.bin' crc: 0x00000000
found (5) 'secdata.bin' crc: 0x00000000
------ ini parsing completed ------
output name overridden to: ..\output\nandflash.bin
------ Checking .\..\nand\nanddump.bin ------
.\..\nand\nanddump.bin file size: 0x1080000
nanddump header checks passed OK!
Loading NAND dump (0x1080000 bytes)...done!
Detecting NAND controller type from dump data...
NAND dump is from a small block machine
NAND dump uses big block controller
parsing dump into user and spare...
bad block at 0x38c (raw offset 0xea1800), block ignored
copying nanddump data from block 0x3ff to block 0x38c for file extraction integrity
block 0x38c was remapped to block 0x3ff at remap instance 0
done!
cleaning up stray remaps
done!
--remap summary--
0: source: 0x038c dest: 0x03ff
-----------------
decrypting KeyVault at address 0x4000 of size 0x4000
keyvault decrypted OK, will use if no kv.bin is provided
decrypting SMC at address 0x1000 of size 0x3000
SMC decrypted OK, will use if no external smc.bin is provided
seeking smc config in dump...found at offset 0xf7c000! Using if no smc config is provided.
CF slot 0 decrypted ok LDV 0x01 Pairing: 0xeb49fe
CF slot 1 decrypted ok LDV 0x02 Pairing: 0xeb49fe
setting pairing data from image to 0xeb49fe
LDV was already set to 2
MobileB.dat found at page 0x6fe0, size 2048 (0x800) bytes
MobileC.dat found at page 0x4e0, size 512 (0x200) bytes
MobileD.dat found at page 0x50c0, size 2048 (0x800) bytes
MobileE.dat found at page 0x5120, size 2048 (0x800) bytes
Statistics.settings found at page 0x7bc0, size 4096 (0x1000) bytes
Xstress.settings found at page 0x7bc0, size 4096 (0x1000) bytes
seeking FSRoot...fsroot found at page 0x6dc0 raw offset 0xe25c00
seeking security files...
crl.bin found in sector 0x3b3 size 0xa00...verified! Will use if external file not found.
dae.bin found in sector 0xe9 size 0x7090...verified! Will use if external file not found.
extended.bin found in sector 0x380 size 0x4000...verified! Will use if external file not found.
fcrt.bin found in sector 0x378 size 0x4000...verified! Will use if external file not found.
secdata.bin found in sector 0x3ad size 0x400...verified! Will use if external file not found.
done!
Writing initial header to flash image
------ loading system update container ------
.\16203\su20076000_00000000 found, loading...done!
Read 0xb31000 bytes to memory
checking container integrity...
header seems valid, version 2.0.16203.00
header hash is OK, checking content hashes...
content hashes seem OK, everything looks good!
extracted SUPD\xboxupd.bin (0x79a60 bytes)
decrypting SUPD\xboxupd.bin\CF_16203.bin (0x4560 bytes)...done!
decrypting SUPD\xboxupd.bin\CG_16203.bin (0x754f2 bytes)...done!
------ Loading bootloaders and required security files ------
reading .\..\nand\smc.bin failed, using smc.bin from nand dump
reset smc load address to 0x1000 size 0x3000
reading .\..\nand\kv.bin failed, using kv.bin from nand dump
reading .\common\cba_9188.bin (0x1ac0 bytes)
reading .\common\cbb_9188.bin (0x7800 bytes)
reading .\common\cd_9452.bin (0x4f20 bytes)
reading .\common\ce_1888.bin (0x5606a b pad 0x56070 b)
reading .\..\nand\xell-gggggg.bin (0x40000 bytes)
extracted SUPD\xboxupd.bin\CF_16203.bin (0x4560 bytes)
extracted SUPD\xboxupd.bin\CG_16203.bin (0x754f2 bytes)
reading .\16203\bin\patches_trinity.bin (0x870 bytes)
reading .\..\nand\smc_config.bin failed, using smc_config.bin from nand dump
-------------------
checking smc_config
-------------------
extracting config
------------------
SMC config info:
------------------
Target temps: Cpu: 82_C Gpu: 78_C Edram: 76_C
Max temps : Cpu: 89_C Gpu: 82_C Edram: 82_C
Cpu Fan : (auto)
Gpu Fan : (auto)
MAC Address : 7c:1e:52:01:fa:bf
AVRegion : 0x00000300 (PAL50)
GameRegion : 0x02fe (PAL/EU)
DVDRegion : 2
resetKey : XXUD
---------------------
Checking for smc config data patches
smc config was not patched
---------------------
done!
patch slot offset reset to: 0xb0000
------ Patching BLs and modifying patches ------
Patching header for xell power reason
Patching BLs...Done!
------ Encrypting and finalizing bootloaders ------
initializing random nonces
encoding smc.bin size 0x3000
SMC checksum: f9c96639
known clean SMC found, type: Trinity v5.1(3.01)
patching SMC reset limit at offset: 0x13b3
SMC reset limit patched successfully!
encoding kv.bin size 0x4000
decrypted keyvault has been set for reference
encoding cba_9188.bin size 0x1ac0
encoding cbb_9188.bin size 0x7800
CB 9188 seq 0x03010001 type: 0x03 cseq: 0x01 allow: 0x0001
expected fuses:
fuseset 00: C0FFFFFFFFFFFFFF
fuseset 01: 0F0F0F0F0F0FF0F0
fuseset 02: F000000000000000 (sequence)
fuseset 02: F000000000000000 (allow cseq 1)
**dual CB flag detected!**
encoding cd_9452.bin size 0x5290
encoding ce_1888.bin size 0x56070
encoding xell-gggggg.bin size 0x40000
encoding cf_16203.bin size 0x4560
encoding cg_16203.bin size 0x75500
encoding patches_trinity.bin size 0x4a4
done!
------ Adding bootloaders to flash image ------
adding smc.bin at raw offset 0x00001000 len 0x3000 (end 0x4000)
adding kv.bin at raw offset 0x00004000 len 0x4000 (end 0x8000)
adding cba_9188.bin at raw offset 0x00008000 len 0x1ac0 (end 0x9ac0)
adding cbb_9188.bin at raw offset 0x00009ac0 len 0x7800 (end 0x112c0)
adding cd_9452.bin at raw offset 0x000112c0 len 0x5290 (end 0x16550)
adding ce_1888.bin at raw offset 0x00016550 len 0x56070 (end 0x6c5c0)
adding xell-gggggg.bin at raw offset 0x00070000 len 0x40000 (end 0xb0000)
adding cf_16203.bin at raw offset 0x000b0000 len 0x4560 (end 0xb4560)
adding cg_16203.bin at raw offset 0x000b4560 len 0x75500 (end 0xc0000, rest in fs)
adding patches_trinity.bin at raw offset 0x000c0010 len 0x4a4 (end 0xc04b4)
Fixing up FS table...done!
Writing zeropair CG patch slot overflow data to sysupdate.xexp1
at raw offset 0xd0000 len 0x00069a60 (end: 0x00139a60)...done!
------ adding 28 firmware files ------
extracted SUPD\aac.xexp (0x14000 bytes) (crc32: 0x62924e10 ini: 0x62924e10)
adding as aac.xexp1 at raw offset 0x139a60 len 0x00014000 (end 0x0014da60)
extracted SUPD\bootanim.xex (0x61000 bytes) (crc32: 0xc8b660b2 ini: 0xc8b660b2)
adding as bootanim.xex at raw offset 0x150000 len 0x00061000 (end 0x001b1000)
extracted SUPD\createprofile.xex (0xc000 bytes) (crc32: 0x9f6efee2 ini: 0x9f6efee2)
adding as createprofile.xex at raw offset 0x1b1000 len 0x0000c000 (end 0x001bd000)
extracted SUPD\dash.xex (0x59c000 bytes) (crc32: 0x18ea6c7e ini: 0x18ea6c7e)
adding as dash.xex at raw offset 0x1c0000 len 0x0059c000 (end 0x0075c000)
extracted SUPD\deviceselector.xex (0xa000 bytes) (crc32: 0x75c32b5b ini: 0x75c32b5b)
adding as deviceselector.xex at raw offset 0x75c000 len 0x0000a000 (end 0x00766000)
extracted SUPD\gamerprofile.xex (0x1b000 bytes) (crc32: 0xec9746f7 ini: 0xec9746f7)
adding as gamerprofile.xex at raw offset 0x766000 len 0x0001b000 (end 0x00781000)
extracted SUPD\hud.xex (0x1d000 bytes) (crc32: 0xabf19107 ini: 0xabf19107)
adding as hud.xex at raw offset 0x783000 len 0x0001d000 (end 0x007a0000)
extracted SUPD\huduiskin.xex (0x14000 bytes) (crc32: 0xf3563a5c ini: 0xf3563a5c)
adding as huduiskin.xex at raw offset 0x7a1000 len 0x00014000 (end 0x007b5000)
extracted SUPD\mfgbootlauncher.xex (0x8000 bytes) (crc32: 0x763c73fe ini: 0x763c73fe)
adding as mfgbootlauncher.xex at raw offset 0x7b8000 len 0x00008000 (end 0x007c0000)
extracted SUPD\minimediaplayer.xex (0xb000 bytes) (crc32: 0xda1d0a4a ini: 0xda1d0a4a)
adding as minimediaplayer.xex at raw offset 0x7c0000 len 0x0000b000 (end 0x007cb000)
extracted SUPD\nomni.xexp (0xe000 bytes) (crc32: 0xaae9ad36 ini: 0xaae9ad36)
adding as nomni.xexp1 at raw offset 0x7cb000 len 0x0000e000 (end 0x007d9000)
extracted SUPD\nomnifwk.xexp (0x2000 bytes) (crc32: 0xb3c2c31b ini: 0xb3c2c31b)
adding as nomnifwk.xexp1 at raw offset 0x7da000 len 0x00002000 (end 0x007dc000)
extracted SUPD\nomnifwm.xexp (0x5000 bytes) (crc32: 0xf69cf9fc ini: 0xf69cf9fc)
adding as nomnifwm.xexp1 at raw offset 0x7de000 len 0x00005000 (end 0x007e3000)
extracted SUPD\SegoeXbox-Light.xtt (0x6000 bytes) (crc32: 0xe0ee6049 ini: 0xe0ee6049)
adding as SegoeXbox-Light.xtt at raw offset 0x7e5000 len 0x00006000 (end 0x007eb000)
extracted SUPD\signin.xex (0x16000 bytes) (crc32: 0xc1d7185d ini: 0xc1d7185d)
adding as signin.xex at raw offset 0x7ee000 len 0x00016000 (end 0x00804000)
extracted SUPD\updater.xex (0x7000 bytes) (crc32: 0x19286110 ini: 0x19286110)
adding as updater.xex at raw offset 0x806000 len 0x00007000 (end 0x0080d000)
extracted SUPD\vk.xex (0xb000 bytes) (crc32: 0xefcbab82 ini: 0xefcbab82)
adding as vk.xex at raw offset 0x80f000 len 0x0000b000 (end 0x0081a000)
extracted SUPD\xam.xex (0x24f000 bytes) (crc32: 0xf8db3557 ini: 0xf8db3557)
adding as xam.xex at raw offset 0x81b000 len 0x0024f000 (end 0x00a6a000)
reading .\16203\xenonclatin.xtt (0x11b000 bytes) (crc32: 0xd5d17ff5 ini: 0xd5d17ff5)
adding as xenonclatin.xtt at raw offset 0xa6b000 len 0x0011b000 (end 0x00b86000)
extracted SUPD\xenonclatin.xttp (0x18000 bytes) (crc32: 0x7a507ad1 ini: 0x7a507ad1)
adding as xenonclatin.xttp1 at raw offset 0xb87000 len 0x00018000 (end 0x00b9f000)
reading .\16203\xenonjklatin.xtt (0x1a8000 bytes) (crc32: 0xdde4a14c ini: 0xdde4a14c)
adding as xenonjklatin.xtt at raw offset 0xba0000 len 0x001a8000 (end 0x00d48000)
extracted SUPD\xenonjklatin.xttp (0x7000 bytes) (crc32: 0xe2adddfb ini: 0xe2adddfb)
adding as xenonjklatin.xttp1 at raw offset 0xd48000 len 0x00007000 (end 0x00d4f000)
extracted SUPD\ximecore.xex (0x17000 bytes) (crc32: 0xe85e813b ini: 0xe85e813b)
adding as ximecore.xex at raw offset 0xd4f000 len 0x00017000 (end 0x00d66000)
reading .\16203\ximedic.xex (0x90000 bytes) (crc32: 0x1d992bfb ini: 0x1d992bfb)
adding as ximedic.xex at raw offset 0xd67000 len 0x00090000 (end 0x00df7000)
extracted SUPD\ximedic.xexp (0x2800 bytes) (crc32: 0xfb2bb58c ini: 0xfb2bb58c)
adding as ximedic.xexp1 at raw offset 0xdf8000 len 0x00002800 (end 0x00dfa800)
reading .\16203\..\launch.xex (0xc800 bytes)
adding as launch.xex at raw offset 0xdfa800 len 0x0000c800 (end 0x00e07000)
reading .\16203\..\lhelper.xex (0x6000 bytes)
adding as lhelper.xex at raw offset 0xe08800 len 0x00006000 (end 0x00e0e800)
reading .\16203\..\launch.ini (0x2ad bytes)
adding as launch.ini at raw offset 0xe12000 len 0x000002ad (end 0x00e122ad)
------ adding 5 security files ------
<- Processing crl.bin ->
reading .\..\nand\crl.bin (0xa00 bytes)
crl appears crypted, attempting to decrypt with CPU key...failed! Trying alternate key...success!
adding as crl.bin at raw offset 0xe18000 len 0x00000a00 (end 0x00e18a00)
<- Processing dae.bin ->
reading .\..\nand\dae.bin (0xad30 bytes)
dae appears encrypted, attempting to decrypt with CPU key...failed! Attempting to decrypt with alternate key...
success!
adding as dae.bin at raw offset 0xe1c000 len 0x0000ad30 (end 0x00e26d30)
<- Processing extended.bin ->
reading .\..\nand\extended.bin (0x4000 bytes)
adding as extended.bin at raw offset 0xe28000 len 0x00004000 (end 0x00e2c000)
<- Processing fcrt.bin ->
could not read fcrt.bin, using data from nanddump.bin...
adding as fcrt.bin at raw offset 0xe2c000 len 0x00004000 (end 0x00e30000)
<- Processing secdata.bin ->
reading .\..\nand\secdata.bin (0x400 bytes)
adding as secdata.bin at raw offset 0xe30000 len 0x00000400 (end 0x00e30400)
------ checking for Mobile*.dat ------
MobileB.dat found, adding from nanddump.bin
adding MobileB.dat as type 0x31 at raw offset 0xe34000 len 0x800 (end 0xe34800)
MobileC.dat found, adding from nanddump.bin
adding MobileC.dat as type 0x32 at raw offset 0xe38000 len 0x200 (end 0xe38200)
MobileD.dat found, adding from nanddump.bin
adding MobileD.dat as type 0x33 at raw offset 0xe3c000 len 0x800 (end 0xe3c800)
MobileE.dat found, adding from nanddump.bin
adding MobileE.dat as type 0x34 at raw offset 0xe40000 len 0x800 (end 0xe40800)
Statistics.settings found, adding from nanddump.bin
adding Statistics.settings at raw offset 0xf78000 len 0x1000 (end 0xf79000)
Xstress.settings found, adding from nanddump.bin
adding Xstress.settings at raw offset 0xf74000 len 0x1000 (end 0xf75000)
------ adding smc_config.bin ------
adding smc config to offset 0x00f7c000, len 0x400
------ finalizing image ------
Fixing up empty FS block entries...done!
Writing FS table to image offset 0xe44000 len 0x4000 (end 0xe48000)...done!
fixing up big block controller on small block NAND LBA numbers...done!
calculating ECD bytes and assembling raw image...done!
remapping 1 blocks
copying 0x4200 bytes of LBA 0x38c to block 0x3ff...zero fill origin...done!
done!
writing file '..\output\nandflash.bin' to disk...done!
..\output\nandflash.bin written OK
---------------------------------------------------------------
..\output\nandflash.bin image built, info:
---------------------------------------------------------------
Console : Trinity
NAND size : 16MiB
Build : Glitch
Xell : power on console with console eject button
Serial : 012220713805
ConsoleId : 368764504957
MoboSerial: 791192B120501385
Mfg Date : 09/12/2011
CPU Key : 17F9C84B15623D3EB580AC28FF1879A0
1BL Key : DD88AD0C9ED669E7B56794FB68563EFA
DVD Key : BAE0A0F4ABFDEE9E7E67627BF7403F41
CF LDV : 2
KV type : type2 (hashed)
---------------------------------------------------------------
xeBuild Finished. Have a nice day.
---------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------
xeBuild Nand generata. Ora puoi flasharla
(output\nandflash.bin)
-------------------------------------------------------------------------------------------------------------
* Per flashare l'immagine Xebuild creata avete 3 opzioni:
1. - Tramite Flasher (Nandreader) premendo Xebuild > Flash.
2. - Preparare un dispositivo USB in Fat32 e premere Xebuild>RawFlash per copiare i file necessari, inserire il dispositivo nella console e avviare Xell.
3. - Se avete Fsd v3 connettere la console alla LAN e premere xebuild > Ip-Flash
-------------------------------------------------------------------------------------------------------------
Log salvato in C:\Users\Luciano\Desktop\AutoGG 0%2e9%2e2 rev67\AutoGG_0.9.2\LOGS\AutoGG_log_2013_04_14(18h. 15m.17sg).txt
Attendere la creazione dei *temp files*...OK
************************************************** ***********
************************************************** ***********
Riavvio Files e variabili...
CERCO LA NAND: "nand\nanddump.bin"
-------------------------------------------------------------------------------------------------------------
NandPro v3.0a by Tiros
Using Virtual Nand Device File: nand\nanddump.bin
Flash Config: 0x00023010
Block Size: 16KB Block Limits: 0x000000..0x000000
File: common\temp\flash.bin
Reading
0000
0000
-------------------------------------------------------------------------------------------------------------
Small Block trovato
Flashconfig:0023010 Size=16
Caricamento Nand ...OK
Controllando i Bad Blocks ...
Nessun Bad Block trovato
Checking ECC-CheckSum... Wait
-------------------------------------------------------------------------------------------------------------
Ecc Check: OK
-------------------------------------------------------------------------------------------------------------
Done
VERIFICA SMC_CONFIG
Smc Config trovato: 0x00FEB800
Lettura temperature...:
Reset Parental Code: XXUD
VERIFICA NAND DATA
ID: 6ccda17
ECC - unECC
Trovato SMC (version 3.1) : 00001000 - 00004000
Nand RETAIL (Original)
Trovato Keyvault : 00004000 - 00008000
Looking for Cpukey in Local Database. Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
Cpukey Detected : 17F9C84B15623D3EB580AC28FF1879A0
Checking CpuKey
Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
CpuKey is correct
Trovato CB_A (build 9188) : 00008000 - 00009ac0
Trovato CB_B (build 9188) : 00009ac0 - 000112c0
Trovato CD (build 9452) : 000112c0 - 000161e0
Trovato CE (build 1888) : 000161e0 - 0006c250
Trovato CF (build 13146) : 00070000- 00074450
Trovato CF1 (build 14699) : 00080000- 00084450
Trovato CG (build 13146) : 00074450- 000d845e
Trovato CG1 build 14699) : 00084450- 000eb5b8
Nand valida
VERIFICA MODELLO CONSOLE
Verificando se _ modificabile...
Modello : Trinity CB_A_9188 GLITCHEABLE
CD_9452 Non JtaggABILE
Size: 16
-------------------------------------------------------------------------------------------------------------
1 file copiati.
-------------------------------------------------------------------------------------------------------------
FileSystems:
FileSystem Active:22 offset:0xE25E00
FileSystem Last:17 offset:0xF4F640
Block Size File
0x00001000 0x00003000 SMC_3.1.bin
0x00004000 0x00004000 Keyvault.bin
0x00008000 0x00001AC0 CB_A_9188.bin
0x00009AC0 0x00007800 CB_B_9188.bin
0x000112C0 0x00004F20 CD_9452.bin
0x000161E0 0x00056070 CE_1888.bin
0x00070000 0x00004450 CF_13146.bin
0x00080000 0x00004450 CF1_14699.bin
0x00074450 0x0006400E CG_13146.bin
0x00084450 0x00067168 CG1_14699.bin
0x00EDC000 0x00014000 aac.xexp2
0x00EF0000 0x00061000 bootanim.xex
0x00F54000 0x0001E000 hud.xex
0x000A4000 0x00013000 huduiskin.xex
0x000B8000 0x00008000 mfgbootlauncher.xex
0x000C0000 0x0000E000 nomni.xexp2
0x000D0000 0x00005000 nomnifwm.xexp2
0x000D8000 0x00002000 nomnifwk.xexp2
0x000DC000 0x00236000 xam.xex
0x00314000 0x00015000 ximecore.xex
0x0032C000 0x00002800 ximedic.xexp2
0x0037C000 0x00018000 xenonclatin.xttp2
0x00394000 0x00007000 xenonjklatin.xttp2
0x003B0000 0x0000C000 createprofile.xex
0x003BC000 0x0063A000 dash.xex
0x009F8000 0x00009000 deviceselector.xex
0x00ECC000 0x00000A00 crl.bin
0x00A28000 0x0011B000 xenonclatin.xtt
0x00A04000 0x0001B000 gamerprofile.xex
0x00B5C000 0x001A8000 xenonjklatin.xtt
0x00B44000 0x0000C000 minimediaplayer.xex
0x00B50000 0x00016000 signin.xex
0x00D24000 0x00090000 ximedic.xex
0x00D10000 0x00007000 updater.xex
0x00EB4000 0x00000400 secdata.bin
0x00DE0000 0x00004000 fcrt.bin
0x003A4000 0x00007090 dae.bin
0x00E00000 0x00004000 extended.bin
0x00E08000 0x0005B5C0 sysupdate.xexp2
0x00D18000 0x00009000 vk.xex
X-val: 00 00 00 00 00 00 00 00
Secdata _ pulito
Saved New Id: 6ccda17 with Cpukey : 17F9C84B15623D3EB580AC28FF1879A0
Nand in Folder
-------------------------------------------------------------------------------------------------------------
1 file copiati.
-------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------
* Selezionare il tipo di immagine e le opzioni desiderate e fare clic su Xebuild>Crea.
-------------------------------------------------------------------------------------------------------------
Nand nand\nanddump.bin Lettura valida in caricamento. Attendere ..........
Nand originale, Smc pu_ essere patchato
16203 Installed
Queste opzioni verranno usate per creare l'immagine:
xeBuild.exe -o cfldv=2 -noenter -t Glitch -c Trinity -d ..\nand -o patchsmc -f 16203 -b DD88AD0C9ED669E7B56794FB68563EFA -p 17F9C84B15623D3EB580AC28FF1879A0 ..\output\nandflash.bin -v
-------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------
xeBuild v1.07.561
---------------------------------------------------------------
building glitch image
verbose set to level 1
------ parsing user ini at '.\..\nand\options.ini' ------
******* WARNING: could not open user ini at '.\..\nand\options.ini', skipping
default console DVD eject button is being used to start xell
------ parsing ini at '.\16203\_glitch.ini' ------
ini version 16203
ini: label [trinitybl] found
found (1) 'cba_9188.bin' crc: 0x5a76752d
found (2) 'cbb_9188.bin' crc: 0xfebb1074
found (3) 'cd_9452.bin' crc: 0x455fa02c
found (4) 'ce_1888.bin' crc: 0xff9b60df
found (5) 'cf_16203.bin' crc: 0xc4c27121
found (6) 'cg_16203.bin' crc: 0xcbb44eac
ini dictates dual CB for this model
ini: label [flashfs] found
found (1) 'aac.xexp' crc: 0x62924e10
found (2) 'bootanim.xex' crc: 0xc8b660b2
found (3) 'createprofile.xex' crc: 0x9f6efee2
found (4) 'dash.xex' crc: 0x18ea6c7e
found (5) 'deviceselector.xex' crc: 0x75c32b5b
found (6) 'gamerprofile.xex' crc: 0xec9746f7
found (7) 'hud.xex' crc: 0xabf19107
found (8) 'huduiskin.xex' crc: 0xf3563a5c
found (9) 'mfgbootlauncher.xex' crc: 0x763c73fe
found (10) 'minimediaplayer.xex' crc: 0xda1d0a4a
found (11) 'nomni.xexp' crc: 0xaae9ad36
found (12) 'nomnifwk.xexp' crc: 0xb3c2c31b
found (13) 'nomnifwm.xexp' crc: 0xf69cf9fc
found (14) 'SegoeXbox-Light.xtt' crc: 0xe0ee6049
found (15) 'signin.xex' crc: 0xc1d7185d
found (16) 'updater.xex' crc: 0x19286110
found (17) 'vk.xex' crc: 0xefcbab82
found (18) 'xam.xex' crc: 0xf8db3557
found (19) 'xenonclatin.xtt' crc: 0xd5d17ff5
found (20) 'xenonclatin.xttp' crc: 0x7a507ad1
found (21) 'xenonjklatin.xtt' crc: 0xdde4a14c
found (22) 'xenonjklatin.xttp' crc: 0xe2adddfb
found (23) 'ximecore.xex' crc: 0xe85e813b
found (24) 'ximedic.xex' crc: 0x1d992bfb
found (25) 'ximedic.xexp' crc: 0xfb2bb58c
found (26) '..\launch.xex' crc: 0x00000000
found (27
-------------------------------------------------------------------------------------------------------------
xeBuild Nand generata. Ora puoi flasharla
(output\nandflash.bin)
-------------------------------------------------------------------------------------------------------------
* Per flashare l'immagine Xebuild creata avete 3 opzioni:
1. - Tramite Flasher (Nandreader) premendo Xebuild > Flash.
2. - Preparare un dispositivo USB in Fat32 e premere Xebuild>RawFlash per copiare i file necessari, inserire il dispositivo nella console e avviare Xell.
3. - Se avete Fsd v3 connettere la console alla LAN e premere xebuild > Ip-Flash
-------------------------------------------------------------------------------------------------------------
tutto in ottimo stato e il blocco cattivo è comunque in una zona di memoria alta (raw offset 0xea1800), block ignored
copying 0x4200 bytes of LBA 0x38c to block 0x3ff...zero fill origin...done!
done!
sembra dirti che non c'è nulla (zero fill) in quell'area , i file della dashboard hack sono integri.
Esplora i link spaziali dei Tutorial RGH fatti con le mie manine Sante
«L'abitudine e' in tutte le cose il miglior maestro.» -- Plinio il vecchio, "Storia naturale"
Con simple nand flasher mi da questi dati:
game:\flashdmp.bin opened ok, attemting to read 0x1080000 bytes from flash...
block 0x1fe seems bad, status 0x00000310
block 0x201 seems bad, status 0x00000310
processing block 0x038d of 0x0400 (88.77 %) ! SFCX: Bad block found a7 0000038C
block 0x38c seems bad, status 0x00000350
Ci capisci qualcosa? perchè per me è arabo
Buono è chè hai i bad block in una zona alta quindi nessun problema di avvio xell o bl
Ora genera una nuova immagine hack partendo da questo dump che hai fatto con simple nand flasher e prova a flashare di conseguenza l'immagine con i due bad block rimappati sono fiducioso
Esplora i link spaziali dei Tutorial RGH fatti con le mie manine Sante
«L'abitudine e' in tutte le cose il miglior maestro.» -- Plinio il vecchio, "Storia naturale"
Ecco in quest'ultima parte non ci ho capito proprio nulla.
Non dimenticare che sono alle primissime armi.
Come faccio a creare questa nuova immagine?
Ti prendi il file che ha generato simple nand flasher dalla xbox game:\flashdmp.bin lo carichi su autogg e ricrei una immagine hack come hai fatto prima, lui ti rimappa i 2 blocchi difettosi e poi la flashi tranquillamente tramite xell come hai fatto la prima volta..oèppure con simple nand mettendo l'immagine creata con autogg nella cartella dove c'è l'eseguibile di simple nand..
Esplora i link spaziali dei Tutorial RGH fatti con le mie manine Sante
«L'abitudine e' in tutte le cose il miglior maestro.» -- Plinio il vecchio, "Storia naturale"
Sono sempre del parere che se ti mandavo il file a quest'ora il thread era chiuso
Segnalibri