xboxscene.org forums

Author Topic: Slim Jtagged But Now Boots To E79  (Read 97 times)

ravendrow

  • Archived User
  • Full Member
  • *
  • Posts: 188
Slim Jtagged But Now Boots To E79
« on: November 12, 2011, 12:54:00 PM »

QUOTE(dave11674 @ Nov 12 2011, 01:10 PM) View Post

Hi guys

ive just done a glitch on a slim machine
done loads before, this one now after all the work is done its boots up to E79 after about a min with the red light in the middle of the ring of light ?!?!

any ideas ?

my reading of the nand and glitch flashing is fine as xell booted up fine and does if i hold reset to boot.

thanks

dave


post your ggbuild log file for the console. were there any bad blocks in the NAND?
Logged

dave11674

  • Archived User
  • Newbie
  • *
  • Posts: 43
Slim Jtagged But Now Boots To E79
« Reply #1 on: November 12, 2011, 02:06:00 PM »

hi thanks

no bad blocks while reading no.

logs didnt state any BB either

---------------------------------------------------------------
     ggBuild v0.33.273
---------------------------------------------------------------
data directory overridden from command line to '13604'
per build directory overridden from command line to 'my360'
file name overridden from command line to 'updflash.bin'

------ parsing user ini at '.\my360\options.ini' ------
loading file...done!
pre-parsing and sanitizing
done!
User options.ini loaded, 0xe6 bytes in memory
loading cpukey.txt from .\my360\cpukey.txt
CPU Key set to: 0xF15030FDC9CAB64A68B65C785728DE31
setting 1blkey from ini: 0xDD88AD0C9ED669E7B56794FB68563EFA
1BL Key set to: 0xDD88AD0C9ED669E7B56794FB68563EFA sum: 0x983 (expects: 0x983)
Using nonandmu option (ini file)
Using patchsmc option (ini file)

------ Checking .\my360\nanddump.bin ------
Loading NAND dump...done!
NAND dump is from a small block machine
NAND dump uses big block controller
parsing dump into user and spare...
done!
decrypting KeyVault at address 0x4000 of size 0x4000
keyvault decrypted OK, will use if no kv.bin is provided
decrypting SMC at address 0x1000 of size 0x3000
SMC decrypted OK, will use if no external smc.bin is provided
seeking smc config in dump...found at offset 0xf7c000! Using if no smc config is provided.
CF slot 0 decrypted ok LDV 0x05 Pairing: 0xa06a75
CF slot 1 decrypted ok LDV 0x06 Pairing: 0xa06a75
setting LDV from image to 6
setting pairing data from image to 0xa06a75
MobileB.dat found at page 0x3bfc, size 2048 (0x800) bytes
MobileC.dat found at page 0x4e0, size 512 (0x200) bytes
MobileD.dat found at page 0xfb0, size 2048 (0x800) bytes
MobileE.dat found at page 0x3bcc, size 2048 (0x800) bytes

------ parsing ini at '.\13604\filelist.ini' ------
ini version 13604

ini: label [trinitybl] found
found (1) 'cba_9188.bin' crc: 0x3661a9d6
found (2) 'cbb_9188.bin' crc: 0xb7cfc17c
found (3) 'cd_9452.bin' crc: 0xb6959549
found (4) 'ce_1888.bin' crc: 0xff9b60df
found (5) 'cf_13604.bin' crc: 0x639a4cd7
found (6) 'cg_13604.bin' crc: 0x7e9f5364

ini: label [flashfs] found
found (1) 'aac.xexp' crc: 0xdaed8bc7
found (2) 'bootanim.xex' crc: 0x8a7ab1b4
found (3) 'createprofile.xex' crc: 0xe19ca8c4
found (4) 'dash.xex' crc: 0xecdaf6c0
found (5) 'deviceselector.xex' crc: 0xaa4579d1
found (6) 'gamerprofile.xex' crc: 0xebc5fec3
found (7) 'hud.xex' crc: 0xe2410ee1
found (8) 'huduiskin.xex' crc: 0x390eac39
found (9) 'mfgbootlauncher.xex' crc: 0xf3637ed9
found (10) 'minimediaplayer.xex' crc: 0x23d28bb8
found (11) 'nomni.xexp' crc: 0xed7cd3f5
found (12) 'nomnifwk.xexp' crc: 0x2c6fd7e8
found (13) 'nomnifwm.xexp' crc: 0xaa978831
found (14) 'signin.xex' crc: 0xf7436a62
found (15) 'updater.xex' crc: 0xd0cd6753
found (16) 'vk.xex' crc: 0x65f4eec0
found (17) 'xam.xex' crc: 0x2a74ee0f
found (18) 'xenonclatin.xtt' crc: 0xd5d17ff5
found (19) 'xenonclatin.xttp' crc: 0x7a507ad1
found (20) 'xenonjklatin.xtt' crc: 0xdde4a14c
found (21) 'xenonjklatin.xttp' crc: 0x945b7092
found (22) 'ximecore.xex' crc: 0xccb87938
found (23) 'ximedic.xex' crc: 0x1d992bfb
found (24) 'ximedic.xexp' crc: 0x47a55af9
found (25) '..\launch.xex' crc: 0x00000000
found (26) '..\lhelper.xex' crc: 0x00000000

ini: label [security] found
found (1) 'crl.bin' crc: 0x00000000
found (2) 'dae.bin' crc: 0x00000000
found (3) 'extended.bin' crc: 0x00000000
found (4) 'fcrt.bin' crc: 0x00000000
found (5) 'secdata.bin' crc: 0x00000000
------ ini parsing completed ------

output name overridden to: updflash.bin

Writing initial header to flash image

------ Loading bootloaders and required security files ------
reading .\my360\smc.bin failed, using smc.bin from nand dump
reading .\my360\kv.bin failed, using kv.bin from nand dump
reading .\13604\cba_9188.bin (0x1ac0 bytes) (crc32: 0x3661a9d6 ini: 0x3661a9d6)
reading .\13604\cbb_9188.bin (0x7800 bytes) (crc32: 0xb7cfc17c ini: 0xb7cfc17c)
reading .\13604\cd_9452.bin (0x4f20 bytes) (crc32: 0xb6959549 ini: 0xb6959549)
reading .\13604\ce_1888.bin (0x5606a b pad 0x56070 cool.gif (crc32: 0xff9b60df ini: 0xff9b60df)
reading .\my360\xell-gggggg.bin (0x40000 bytes)
reading .\13604\cf_13604.bin (0x4450 bytes) (crc32: 0x639a4cd7 ini: 0x639a4cd7)
reading .\13604\cg_13604.bin (0x659e0 bytes) (crc32: 0x7e9f5364 ini: 0x7e9f5364)
reading .\13604\bin\patches_trinity.bin (0x6d8 bytes)
reading .\my360\smc_config.bin failed, using smc_config.bin from nand dump
-------------------
checking smc_config
-------------------
extracting config
------------------
SMC config info:
------------------
Target temps: Cpu:  82øC Gpu:  78øC Edram:  76øC
Max temps   : Cpu:  89øC Gpu:  82øC Edram:  82øC
Cpu Fan     : (auto)
Gpu Fan     : (auto)
MAC Address : 00:xx:ae:xx:cc:xx <<<<I EDIT THIS
AVRegion    : 0x00000300 (PAL50)
GameRegion  : 0x02fe (NTSC/EU)
DVDRegion   : 2
resetKey    : XXUD
---------------------
Checking ini for smc config data patches
smc was not patched
---------------------
done!

------ Encrypting and finalizing bootloaders ------
SMC checksum: f9c96639
clean SMC found, type: Trinity 3.1
patching clean smc, type: Trinity 3.1 offset: 0x13b3
clean SMC hacked successfully
done!

------ Adding bootloaders to flash image ------
adding smc.bin to 0x00001000 len 0x3000
adding kv.bin to 0x00004000 len 0x4000
adding cba_9188.bin to 0x00008000 len 0x1ac0
adding cbb_9188.bin to 0x00009ac0 len 0x7800
adding cd_9452.bin to 0x000112c0 len 0x51e0
adding ce_1888.bin to 0x000164a0 len 0x56070
adding xell-gggggg.bin to 0x00070000 len 0x40000
adding cf_13604.bin to 0x000b0000 len 0x4450
adding cg_13604.bin to 0x000b4450 len 0x659e0
adding patches_trinity.bin to 0x000c0010 len 0x3e4
Fixing up FS table...done!
Writing CG patch slot overflow data to sysupdate.xexp1...done!

------ adding 26 firmware files ------
reading .\13604\aac.xexp (0x4800 bytes) (crc32: 0xdaed8bc7 ini: 0xdaed8bc7)
reading .\13604\bootanim.xex (0x55000 bytes) (crc32: 0x8a7ab1b4 ini: 0x8a7ab1b4)
reading .\13604\createprofile.xex (0xc000 bytes) (crc32: 0xe19ca8c4 ini: 0xe19ca8c4)
reading .\13604\dash.xex (0x5e7000 bytes) (crc32: 0xecdaf6c0 ini: 0xecdaf6c0)
reading .\13604\deviceselector.xex (0x9000 bytes) (crc32: 0xaa4579d1 ini: 0xaa4579d1)
reading .\13604\gamerprofile.xex (0x1a000 bytes) (crc32: 0xebc5fec3 ini: 0xebc5fec3)
reading .\13604\hud.xex (0x1f000 bytes) (crc32: 0xe2410ee1 ini: 0xe2410ee1)
reading .\13604\huduiskin.xex (0x11000 bytes) (crc32: 0x390eac39 ini: 0x390eac39)
reading .\13604\mfgbootlauncher.xex (0x8000 bytes) (crc32: 0xf3637ed9 ini: 0xf3637ed9)
reading .\13604\minimediaplayer.xex (0xc000 bytes) (crc32: 0x23d28bb8 ini: 0x23d28bb8)
reading .\13604\nomni.xexp (0xd000 bytes) (crc32: 0xed7cd3f5 ini: 0xed7cd3f5)
reading .\13604\nomnifwk.xexp (0x2000 bytes) (crc32: 0x2c6fd7e8 ini: 0x2c6fd7e8)
reading .\13604\nomnifwm.xexp (0x5000 bytes) (crc32: 0xaa978831 ini: 0xaa978831)
reading .\13604\signin.xex (0x12000 bytes) (crc32: 0xf7436a62 ini: 0xf7436a62)
reading .\13604\updater.xex (0x8000 bytes) (crc32: 0xd0cd6753 ini: 0xd0cd6753)
reading .\13604\vk.xex (0x9000 bytes) (crc32: 0x65f4eec0 ini: 0x65f4eec0)
reading .\13604\xam.xex (0x218000 bytes) (crc32: 0x2a74ee0f ini: 0x2a74ee0f)
reading .\13604\xenonclatin.xtt (0x11b000 bytes) (crc32: 0xd5d17ff5 ini: 0xd5d17ff5)
reading .\13604\xenonclatin.xttp (0x18000 bytes) (crc32: 0x7a507ad1 ini: 0x7a507ad1)
reading .\13604\xenonjklatin.xtt (0x1a8000 bytes) (crc32: 0xdde4a14c ini: 0xdde4a14c)
reading .\13604\xenonjklatin.xttp (0x7000 bytes) (crc32: 0x945b7092 ini: 0x945b7092)
reading .\13604\ximecore.xex (0x15000 bytes) (crc32: 0xccb87938 ini: 0xccb87938)
reading .\13604\ximedic.xex (0x90000 bytes) (crc32: 0x1d992bfb ini: 0x1d992bfb)
reading .\13604\ximedic.xexp (0x2800 bytes) (crc32: 0x47a55af9 ini: 0x47a55af9)

***** could not read .\13604\..\launch.xex, skipping *****

***** could not read .\13604\..\lhelper.xex, skipping *****

------ adding 5 security files ------
reading .\my360\crl.bin (0x9e0 bytes)
writing as crl.bin to flash
reading .\my360\dae.bin (0xad30 bytes)
writing as dae.bin to flash
reading .\my360\extended.bin (0x4000 bytes)
writing as extended.bin to flash
***** could not read fcrt.bin, skipping *****
reading .\my360\secdata.bin (0x400 bytes)
writing as secdata.bin to flash

------ checking for Mobile*.dat ------
MobileB.dat was found in dump, 0x800 bytes, adding type 0x31
MobileC.dat was found in dump, 0x200 bytes, adding type 0x32
MobileD.dat was found in dump, 0x800 bytes, adding type 0x33
MobileE.dat was found in dump, 0x800 bytes, adding type 0x34

------ adding smc_config.bin ------

------ finalizing image ------
Fixing up empty FS block entries...done!
Writing FS table to image...done!
fixing up big block controller on small block NAND LBA numbers...done!
calculating ECD bytes and assembling raw image...done!
writing file 'updflash.bin' to disk...done!
updflash.bin written OK

---------------------------------------------------------------
updflash.bin glitch image built, info:
---------------------------------------------------------------
console  : trinity
NAND size: 16MiB
CPU Key  : F15030FDC9CAB64A68B65C785728DE31
1BL Key  : DD88AD0C9ED669E7B56794FB68563EFA
CF LDV   : 6
---------------------------------------------------------------
    ggBuild Finished. Have a nice day.
---------------------------------------------------------------


as we speak im just flashing the made nand back to the 360 again
i generated a new one
so hopefully was a duff write

strage tho as xell still loaded when i booted with eject

thanks for any help guys

dave
Logged

dave11674

  • Archived User
  • Newbie
  • *
  • Posts: 43
Slim Jtagged But Now Boots To E79
« Reply #2 on: November 12, 2011, 02:41:00 PM »

ok guys the new image i made from nand2.bin seems to have done the job

tho it shouldnt of mattered

so i recon it was just a dodgy write

my 2 images had no differences
so not sure what happened.

resoldered my jtag flashing points
redid the image same way
all good

thanks guys

dave
Logged