People need a help.
I'm doing a Corona V1 + DASH 14719.
Extracts the first time with JR NAND + NAND-X and was weird.
Deleted, restarted the notebook and draws again and came anyway.
However when opening in AutoGG saw it was normal, however not noticed a detail that already came with NAND glitch.
I created the ECC recorded in NAND.
Now the XBOX is just the LED flashing green and not charging Xell.
I created again with the ECC AutoGG and nothing, is only the flashing green LED
What do I do?
PS: I tested the XBOX before opening, in front of the customer and was calling normally. I saw that was in the dash and 14719 would not need the DGX.
Below is the photo:
---------- Post added at 09:53 ---------- Previous post was at 09:52 ----------
This is the ECC created by JR, so I figured it looks like the SMC are talking about.
Anyone know how to solve this?
===================================================
quarta-feira, 9 de janeiro de 2013 14:15:36
J-Runner v0.2 Beta (284) Started
WARNING! - Your selected working directory already contains files!
You can view these files by using 'Show Working Folder' Button
Consider fellow users, Save bandwidth, please have only minimum number of dashes selected.
Checking Files
Finished Checking Files
Initializing nanddump1.bin..
Nand Initialization Finished
* unpacking flash image, ....
Spare Data found, will remove.
Removed
* found decrypted CD
* found XeLL binary, must be linked to 0x1c000000
* we found the following parts:
SMC: 2.5
CB_A: 13121
CB_B: 13121
CD (image): 12905
CD (decrypted): 9452
* checking required versions...
ok
* patching SMC...
! Warning: can't patch this Corona type SMC!
* Replacing CD...
* patching CB_B...
patchset for 13121 found, 5 patch(es)
* constructing new image...
* base size: 70000
* No separate recovery Xell available!
* Flash Layout:
0x0..0x1FF (0x200 bytes) Header
0x200..0x7FF (0x600 bytes) Padding
0x800..0x3FFF (0x3800 bytes) SMC
0x4000..0x7FFF (0x4000 bytes) Keyvault
0x8000..0x9AEF (0x1AF0 bytes) CB_A 13121
0x9AF0..0x1162F (0x7B40 bytes) CB_B 13121
0x11630..0x1762F (0x6000 bytes) CD 9452
0x17630..0xBFFFF (0xA89D0 bytes) Padding
0xC0000..0xFFFFF (0x40000 bytes) Xell (backup)
0x100000..0x13FFFF (0x40000 bytes) Xell (main)
* Encoding ECC...Done!
------------- Written into output\image_00000000.ecc
I'm doing a Corona V1 + DASH 14719.
Extracts the first time with JR NAND + NAND-X and was weird.
Deleted, restarted the notebook and draws again and came anyway.
However when opening in AutoGG saw it was normal, however not noticed a detail that already came with NAND glitch.
I created the ECC recorded in NAND.
Now the XBOX is just the LED flashing green and not charging Xell.
I created again with the ECC AutoGG and nothing, is only the flashing green LED
What do I do?
PS: I tested the XBOX before opening, in front of the customer and was calling normally. I saw that was in the dash and 14719 would not need the DGX.
Below is the photo:
---------- Post added at 09:53 ---------- Previous post was at 09:52 ----------
This is the ECC created by JR, so I figured it looks like the SMC are talking about.
Anyone know how to solve this?
===================================================
quarta-feira, 9 de janeiro de 2013 14:15:36
J-Runner v0.2 Beta (284) Started
WARNING! - Your selected working directory already contains files!
You can view these files by using 'Show Working Folder' Button
Consider fellow users, Save bandwidth, please have only minimum number of dashes selected.
Checking Files
Finished Checking Files
Initializing nanddump1.bin..
Nand Initialization Finished
* unpacking flash image, ....
Spare Data found, will remove.
Removed
* found decrypted CD
* found XeLL binary, must be linked to 0x1c000000
* we found the following parts:
SMC: 2.5
CB_A: 13121
CB_B: 13121
CD (image): 12905
CD (decrypted): 9452
* checking required versions...
ok
* patching SMC...
! Warning: can't patch this Corona type SMC!
* Replacing CD...
* patching CB_B...
patchset for 13121 found, 5 patch(es)
* constructing new image...
* base size: 70000
* No separate recovery Xell available!
* Flash Layout:
0x0..0x1FF (0x200 bytes) Header
0x200..0x7FF (0x600 bytes) Padding
0x800..0x3FFF (0x3800 bytes) SMC
0x4000..0x7FFF (0x4000 bytes) Keyvault
0x8000..0x9AEF (0x1AF0 bytes) CB_A 13121
0x9AF0..0x1162F (0x7B40 bytes) CB_B 13121
0x11630..0x1762F (0x6000 bytes) CD 9452
0x17630..0xBFFFF (0xA89D0 bytes) Padding
0xC0000..0xFFFFF (0x40000 bytes) Xell (backup)
0x100000..0x13FFFF (0x40000 bytes) Xell (main)
* Encoding ECC...Done!
------------- Written into output\image_00000000.ecc