R-JTAG Problems with R-JTAG Keep getting RROD 0010 sometimes will Glitch

DG x Unknown

Full Member
Sep 22, 2012
25
1
Hello People im having some problems with my R-jtag install on my jasper 16mb console

Console Type: (Jasper)
NAND size: 16
Dashboard version: e.g 2.0.16547
CB version: e.g 5774
updflash.bin log (if applicable):
---- { Image Build Mode } ----
building jtag image
<enter> key on completion suppressed
data directory overridden from command line to '16547\'
per build directory overridden from command line to 'data\'
file name overridden from command line to 'C:\Users\Thomas\Desktop\New folder (2)\263620293705\updflash.bin'


------ parsing user ini at 'data\options.ini' ------
loading file...done!
pre-parsing and sanitizing
done!
User options.ini loaded, 0x1b0 bytes in memory
loading cpukey.txt from data\cpukey.txt
CPU Key set to: 0x9F1E2BD1941E2AE24F8F39314A85325A (weight:0x35 valid; ecd: valid)
setting 1blkey from ini: 0xDD88AD0C9ED669E7B56794FB68563EFA
1BL Key set to : 0xDD88AD0C9ED669E7B56794FB68563EFA sum: 0x983 (expects: 0x983)
xex Key set to : 0x20B185A59D28FDC340583FBB0896BF91 sum: 0x800 (expects: 0x800)
Using patchsmc option (ini file)


------ parsing ini at '16547\_jtag.ini' ------
ini version 16547


ini: label [jasperbl] found
found (1) 'cb_6723.bin' crc: 0xe9292b90
found (2) 'cd_6723.bin' crc: 0x0fcff305
found (3) 'ce_1888.bin' crc: 0xff9b60df
found (4) 'cf_4532.bin' crc: 0xd28ef722
found (5) 'cg_4532.bin' crc: 0x2530f8ce
found (6) 'cb_6750.bin' crc: 0xf7afa8cc
found (7) 'cd_8453.bin' crc: 0x25e0acd0
found (8) 'cf_16547.bin' crc: 0xa54f9efc
found (9) 'cg_16547.bin' crc: 0xc34c06ed


ini: label [flashfs] found
found (1) 'aac.xexp' crc: 0xf2808dc5
found (2) 'bootanim.xex' crc: 0xd5c63122
found (3) 'createprofile.xex' crc: 0xf7e474ef
found (4) 'dash.xex' crc: 0x2a153493
found (5) 'deviceselector.xex' crc: 0x09e04596
found (6) 'gamerprofile.xex' crc: 0x4647565d
found (7) 'hud.xex' crc: 0xa6f9c197
found (8) 'huduiskin.xex' crc: 0x1d296f10
found (9) 'mfgbootlauncher.xex' crc: 0x33d5771b
found (10) 'minimediaplayer.xex' crc: 0x4de56d9c
found (11) 'nomni.xexp' crc: 0x97cadcec
found (12) 'nomnifwk.xexp' crc: 0xc7ab2e5b
found (13) 'nomnifwm.xexp' crc: 0x22253a42
found (14) 'SegoeXbox-Light.xtt' crc: 0xe0ee6049
found (15) 'signin.xex' crc: 0xaffe7f78
found (16) 'updater.xex' crc: 0xf6e1cdd5
found (17) 'vk.xex' crc: 0xb916846b
found (18) 'xam.xex' crc: 0x027463e8
found (19) 'xenonclatin.xtt' crc: 0xd5d17ff5
found (20) 'xenonclatin.xttp' crc: 0x7a507ad1
found (21) 'xenonjklatin.xtt' crc: 0xdde4a14c
found (22) 'xenonjklatin.xttp' crc: 0xe2adddfb
found (23) 'ximecore.xex' crc: 0xa86f3ef4
found (24) 'ximedic.xex' crc: 0x1d992bfb
found (25) 'ximedic.xexp' crc: 0x186d8df9
found (26) '..\launch.xex' crc: 0x00000000
found (27) '..\lhelper.xex' crc: 0x00000000
found (28) '..\launch.ini' crc: 0x00000000


ini: label [security] found
found (1) 'crl.bin' crc: 0x00000000
found (2) 'dae.bin' crc: 0x00000000
found (3) 'extended.bin' crc: 0x00000000
found (4) 'secdata.bin' crc: 0x00000000
------ ini parsing completed ------


output name overridden to: C:\Users\Thomas\Desktop\New folder (2)\263620293705\updflash.bin


1BL RSA pub key file is not available, signature checks will not be performed
PIRS RSA pub key file is not available, signature checks will not be performed
MASTER RSA pub key file is not available, signature checks will not be performed


------ Checking data\nanddump.bin ------
data\nanddump.bin file size: 0x1080000
nanddump header checks passed OK!
Loading NAND dump (0x1080000 bytes)...done!
Detecting NAND controller type from dump data...
NAND dump is from a small block machine
NAND dump uses big block controller
parsing dump into user and spare...
done!
decrypting KeyVault at address 0x4000 of size 0x4000
keyvault decrypted OK, will use if no kv.bin is provided
decrypting SMC at address 0x1000 of size 0x3000
SMC decrypted OK, will use if no external smc.bin is provided
seeking smc config in dump...found at offset 0xf7c000! Using if no smc config is provided.
CF slot 0 decrypted ok LDV 0x0f Pairing: 0x0480be
CF slot 1 decrypted ok LDV 0x0e Pairing: 0x0480be
setting LDV from image to 15
setting pairing data from image to 0x0480be
pairing set to: 04 80 be
MobileB.dat found at block 0x1c3, page 0x14 (page 0x3874), size 2048 (0x800) bytes
MobileC.dat found at block 0x1b5, page 0x0 (page 0x36a0), size 512 (0x200) bytes
MobileD.dat found at block 0x196, page 0x8 (page 0x32c8), size 2048 (0x800) bytes
MobileE.dat found at block 0x1dc, page 0x10 (page 0x3b90), size 2048 (0x800) bytes
Statistics.settings found at page 0x7bc0, size 4096 (0x1000) bytes
seeking FSRoot...fsroot found at block 0x1a4, page 0x0 (page 0x3480) raw offset 0x3480
seeking security files...
crl.bin found in sector 0x20e size 0xa00...verified! Will use if external file not found.
dae.bin found in sector 0x209 size 0xd9c0...verified! Will use if external file not found.
extended.bin found in sector 0x91 size 0x4000...verified! Will use if external file not found.
secdata.bin found in sector 0x207 size 0x400...verified! Will use if external file not found.
done!
Writing initial header to flash image


------ loading system update container ------
16547\su20076000_00000000 found, loading...done!
Read 0xb35000 bytes to memory
checking integrity...
header seems valid, version 2.0.16547.0
header hash is OK, checking content hashes...
content hashes seem OK, everything looks good!
extracted SUPD\xboxupd.bin (0x7a010 bytes)
decrypting SUPD\xboxupd.bin\CF_16547.bin (0x4560 bytes)...done!
decrypting SUPD\xboxupd.bin\CG_16547.bin (0x75aac bytes)...done!


------ Loading bootloaders and required security files ------
could not read 16547\bin\payload.bin, using built in payload (0x200 bytes)
reading data\SMC.bin (0x3000 bytes)
reset smc load address to 0x1000 size 0x3000
reading data\kv.bin failed, using kv.bin from nand dump
reading .\common\cb_6723.bin (0x9550 bytes)
loaded cb_6723.bin, could not check signature rsa key not present!
reading .\common\cd_6723.bin (0x56f0 bytes)
reading .\common\ce_1888.bin (0x5606a b pad 0x56070 b)
reading .\common\cf_4532.bin (0x44c0 bytes)
reading .\common\cg_4532.bin (0x2ef40 bytes)
extracted SUPD\xboxupd.bin\CF_16547.bin (0x4560 bytes)
extracted SUPD\xboxupd.bin\CG_16547.bin (0x75aac bytes)
could not read 16547\bin\freeboot.bin, using built in core (0xd40 bytes)
reading 16547\bin\patches_jasper.bin (0x9d4 bytes)
reading data\xell-2f.bin (0x40000 bytes)
reading .\common\cb_6750.bin (0x9a40 bytes)
loaded cb_6750.bin, could not check signature rsa key not present!
reading .\common\cd_8453.bin (0x5780 bytes)
reading data\smc_config.bin failed, using smc_config.bin from nand dump
-------------------
checking smc_config
-------------------
extracting config
------------------
SMC config info:
------------------
Target temps: Cpu: 80øC Gpu: 75øC Edram: 77øC
Max temps : Cpu: 95øC Gpu: 90øC Edram: 92øC
Cpu Fan : (auto)
Gpu Fan : (auto)
MAC Address : 00:25:ae:01:a0:3d
AVRegion : 0x00000300 (PAL50)
GameRegion : 0x02fe (PAL/EU)
DVDRegion : 2
resetKey : XAUD
---------------------
Checking for smc config data patches
smc config was not patched
---------------------
could not check signature of cb_6723.bin, 1BL RSA key not present!
could not check signature of cb_6750.bin, 1BL RSA key not present!
done!


------ Patching boot reasons and options into flash header ------
Patching header for xell power reason


------ Encrypting and finalizing bootloaders ------
Fuse CPU Key set to: 0x9F1E2BD1941E2AE24F8F39314A85325A
Fuse CF LDV set to : 0xFFFFFFFFFFFFFFF00000000000000000
encoding payload.bin size 0x200 (JTAG)
patching payload.bin to load size 0xd40 (0x350 reps)
encoding SMC.bin size 0x3000 (JTAG)
SMC checksum: 45e7930b
unknown SMC found, type: Jasper v4.1(2.03)
jtag hack found in smc.bin!


******* WARNING: could not patch SMC reset limit!


encoding kv.bin size 0x4000 (JTAG)
decrypted keyvault has been set for reference
Master RSA pub not available, not checking hash
encoding cb_6723.bin size 0x9550 (JTAG)
CB 6723 seq 0x01050010 type: 0x01 cseq: 0x05 allow: 0x0010
expected fuses:
fuseset 00: C0FFFFFFFFFFFFFF
fuseset 01: 0F0F0F0F0F0F0FF0
fuseset 02: 0000F00000000000 (sequence)
fuseset 02: 0000F00000000000 (allow cseq 5)
encoding cd_6723.bin size 0x56f0 (JTAG)
encoding ce_1888.bin size 0x56070 (JTAG)
encoding cf_4532.bin size 0x44c0 (JTAG)
encoding cg_4532.bin size 0x2ef40 (JTAG)
encoding cf_16547.bin size 0x4560 (JTAG)
encoding cg_16547.bin size 0x75ab0 (JTAG)
encoding freeboot.bin size 0xd40 (JTAG)
patching freeboot.bin with with kernel version string '16547'
Boot options set:
- console DVD eject button is being used to start xell
- alternate xell button disabled
encoding patches_jasper.bin size 0x9d8 (JTAG)
encoding fuses.bin size 0x60 (JTAG)
encoding xell-2f.bin size 0x40000 (JTAG)
encoding cb_6750.bin size 0x9a40 (JTAG)
CB 6750 seq 0x01070050 type: 0x01 cseq: 0x07 allow: 0x0050
expected fuses:
fuseset 00: C0FFFFFFFFFFFFFF
fuseset 01: 0F0F0F0F0F0F0FF0
fuseset 02: 000000F000000000 (sequence)
fuseset 02: 0000F00000000000 (allow cseq 5)
fuseset 02: 000000F000000000 (allow cseq 7)
CBENC pairing set to: 04 80 be
encoding cd_8453.bin size 0x5780 (JTAG)


Virtual Fuses set to:
fuseset 00: C0FFFFFFFFFFFFFF
fuseset 01: 0F0F0F0F0F0F0FF0
fuseset 02: 000000F000000000
fuseset 03: 9F1E2BD1941E2AE2
fuseset 04: 9F1E2BD1941E2AE2
fuseset 05: 4F8F39314A85325A
fuseset 06: 4F8F39314A85325A
fuseset 07: FFFFFFFFFFFFFFF0
fuseset 08: 0000000000000000
fuseset 09: 0000000000000000
fuseset 10: 0000000000000000
fuseset 11: 0000000000000000
done!


------ Adding bootloaders to flash image ------
adding payload.bin at raw offset 0x00000200 len 0x200 (end 0x400)
adding SMC.bin at raw offset 0x00001000 len 0x3000 (end 0x4000)
adding kv.bin at raw offset 0x00004000 len 0x4000 (end 0x8000)
adding cb_6723.bin at raw offset 0x00008000 len 0x9550 (end 0x11550)
adding cd_6723.bin at raw offset 0x00011550 len 0x56f0 (end 0x16c40)
adding ce_1888.bin at raw offset 0x00016c40 len 0x56070 (end 0x6ccb0)
adding cf_4532.bin at raw offset 0x00070000 len 0x44c0 (end 0x744c0)
adding cg_4532.bin at raw offset 0x000744c0 len 0x2ef40 (end 0x80000, rest in fs)
adding cf_16547.bin at raw offset 0x00080000 len 0x4560 (end 0x84560)
adding cg_16547.bin at raw offset 0x00084560 len 0x75ab0 (end 0x90000, rest in fs)
adding freeboot.bin at raw offset 0x00090000 len 0xd40 (end 0x90d40)
adding patches_jasper.bin at raw offset 0x00091000 len 0x9d8 (end 0x919d8)
adding fuses.bin at raw offset 0x00095000 len 0x60 (end 0x95060)
adding xell-2f.bin at raw offset 0x00095060 len 0x40000 (end 0xd5060)
adding cb_6750.bin at raw offset 0x000d5060 len 0x9a40 (end 0xdeaa0)
adding cd_8453.bin at raw offset 0x000deaa0 len 0x5780 (end 0xe4220)
Fixing up FS table...done!
Writing zeropair CG patch slot overflow data to sysupdate.xexp1
at raw offset 0xe8000 len 0x00023400 (end: 0x0010b400)...done!
Writing target CG patch slot overflow data to sysupdate.xexp2
at raw offset 0xe8000 len 0x0006a010 (end: 0x00152010)...done!


------ adding 28 firmware files ------
extracted SUPD\aac.xexp (0x14000 bytes) (crc32: 0xf2808dc5 ini: 0xf2808dc5)
adding as aac.xexp2 at raw offset 0x176010 len 0x00014000 (end 0x0018a010)
extracted SUPD\bootanim.xex (0x61000 bytes) (crc32: 0xd5c63122 ini: 0xd5c63122)
adding as bootanim.xex at raw offset 0x18c000 len 0x00061000 (end 0x001ed000)
extracted SUPD\createprofile.xex (0xc000 bytes) (crc32: 0xf7e474ef ini: 0xf7e474ef)
adding as createprofile.xex at raw offset 0x1ed000 len 0x0000c000 (end 0x001f9000)
extracted SUPD\dash.xex (0x598000 bytes) (crc32: 0x2a153493 ini: 0x2a153493)
adding as dash.xex at raw offset 0x1fc000 len 0x00598000 (end 0x00794000)
extracted SUPD\deviceselector.xex (0xa000 bytes) (crc32: 0x09e04596 ini: 0x09e04596)
adding as deviceselector.xex at raw offset 0x794000 len 0x0000a000 (end 0x0079e000)
extracted SUPD\gamerprofile.xex (0x1b000 bytes) (crc32: 0x4647565d ini: 0x4647565d)
adding as gamerprofile.xex at raw offset 0x79e000 len 0x0001b000 (end 0x007b9000)
extracted SUPD\hud.xex (0x1d000 bytes) (crc32: 0xa6f9c197 ini: 0xa6f9c197)
adding as hud.xex at raw offset 0x7bb000 len 0x0001d000 (end 0x007d8000)
extracted SUPD\huduiskin.xex (0x14000 bytes) (crc32: 0x1d296f10 ini: 0x1d296f10)
adding as huduiskin.xex at raw offset 0x7d9000 len 0x00014000 (end 0x007ed000)
extracted SUPD\mfgbootlauncher.xex (0x8000 bytes) (crc32: 0x33d5771b ini: 0x33d5771b)
adding as mfgbootlauncher.xex at raw offset 0x7f0000 len 0x00008000 (end 0x007f8000)
extracted SUPD\minimediaplayer.xex (0xc000 bytes) (crc32: 0x4de56d9c ini: 0x4de56d9c)
adding as minimediaplayer.xex at raw offset 0x7f8000 len 0x0000c000 (end 0x00804000)
extracted SUPD\nomni.xexp (0xc800 bytes) (crc32: 0x97cadcec ini: 0x97cadcec)
adding as nomni.xexp2 at raw offset 0x804000 len 0x0000c800 (end 0x00810800)
extracted SUPD\nomnifwk.xexp (0x2000 bytes) (crc32: 0xc7ab2e5b ini: 0xc7ab2e5b)
adding as nomnifwk.xexp2 at raw offset 0x810800 len 0x00002000 (end 0x00812800)
extracted SUPD\nomnifwm.xexp (0x5000 bytes) (crc32: 0x22253a42 ini: 0x22253a42)
adding as nomnifwm.xexp2 at raw offset 0x816000 len 0x00005000 (end 0x0081b000)
extracted SUPD\SegoeXbox-Light.xtt (0x6000 bytes) (crc32: 0xe0ee6049 ini: 0xe0ee6049)
adding as SegoeXbox-Light.xtt at raw offset 0x81d000 len 0x00006000 (end 0x00823000)
extracted SUPD\signin.xex (0x19000 bytes) (crc32: 0xaffe7f78 ini: 0xaffe7f78)
adding as signin.xex at raw offset 0x826000 len 0x00019000 (end 0x0083f000)
extracted SUPD\updater.xex (0x7000 bytes) (crc32: 0xf6e1cdd5 ini: 0xf6e1cdd5)
adding as updater.xex at raw offset 0x841000 len 0x00007000 (end 0x00848000)
extracted SUPD\vk.xex (0xb000 bytes) (crc32: 0xb916846b ini: 0xb916846b)
adding as vk.xex at raw offset 0x84b000 len 0x0000b000 (end 0x00856000)
extracted SUPD\xam.xex (0x253000 bytes) (crc32: 0x027463e8 ini: 0x027463e8)
adding as xam.xex at raw offset 0x857000 len 0x00253000 (end 0x00aaa000)
extracted nanddump\xenonclatin.xtt (0x11b000 bytes) (crc32: 0xd5d17ff5 ini: 0xd5d17ff5)
adding as xenonclatin.xtt at raw offset 0xaab000 len 0x0011b000 (end 0x00bc6000)
extracted SUPD\xenonclatin.xttp (0x18000 bytes) (crc32: 0x7a507ad1 ini: 0x7a507ad1)
adding as xenonclatin.xttp2 at raw offset 0xbc7000 len 0x00018000 (end 0x00bdf000)
extracted nanddump\xenonjklatin.xtt (0x1a8000 bytes) (crc32: 0xdde4a14c ini: 0xdde4a14c)
adding as xenonjklatin.xtt at raw offset 0xbe0000 len 0x001a8000 (end 0x00d88000)
extracted SUPD\xenonjklatin.xttp (0x7000 bytes) (crc32: 0xe2adddfb ini: 0xe2adddfb)
adding as xenonjklatin.xttp2 at raw offset 0xd88000 len 0x00007000 (end 0x00d8f000)
extracted SUPD\ximecore.xex (0x17000 bytes) (crc32: 0xa86f3ef4 ini: 0xa86f3ef4)
adding as ximecore.xex at raw offset 0xd8f000 len 0x00017000 (end 0x00da6000)
extracted nanddump\ximedic.xex (0x90000 bytes) (crc32: 0x1d992bfb ini: 0x1d992bfb)
adding as ximedic.xex at raw offset 0xda7000 len 0x00090000 (end 0x00e37000)
extracted SUPD\ximedic.xexp (0x2800 bytes) (crc32: 0x186d8df9 ini: 0x186d8df9)
adding as ximedic.xexp2 at raw offset 0xe38000 len 0x00002800 (end 0x00e3a800)
reading 16547\..\launch.xex (0xd000 bytes)
adding as launch.xex at raw offset 0xe3a800 len 0x0000d000 (end 0x00e47800)
reading 16547\..\lhelper.xex (0x6000 bytes)
adding as lhelper.xex at raw offset 0xe49000 len 0x00006000 (end 0x00e4f000)
***** could not read file '..\launch.ini', skipping *****


------ adding 4 security files ------
<- Processing crl.bin ->
reading data\crl.bin (0xa00 bytes)
crl appears crypted, attempting to decrypt with CPU key...failed! Trying alternate key...success!
adding as crl.bin at raw offset 0xe54000 len 0x00000a00 (end 0x00e54a00)


<- Processing dae.bin ->
reading data\dae.bin (0xad30 bytes)
dae appears encrypted, attempting to decrypt with CPU key...failed! Attempting to decrypt with alternate key...
success!
adding as dae.bin at raw offset 0xe58000 len 0x0000ad30 (end 0x00e62d30)


<- Processing extended.bin ->
reading data\extended.bin (0x4000 bytes)
adding as extended.bin at raw offset 0xe64000 len 0x00004000 (end 0x00e68000)


<- Processing secdata.bin ->
reading data\secdata.bin (0x400 bytes)
adding as secdata.bin at raw offset 0xe68000 len 0x00000400 (end 0x00e68400)


------ checking for Mobile*.dat ------
MobileB.dat found, adding from previous parse
adding MobileB.dat as type 0x31 at raw offset 0xe6c000 len 0x800 (end 0xe6c800)
MobileC.dat found, adding from previous parse
adding MobileC.dat as type 0x32 at raw offset 0xe70000 len 0x200 (end 0xe70200)
MobileD.dat found, adding from previous parse
adding MobileD.dat as type 0x33 at raw offset 0xe74000 len 0x800 (end 0xe74800)
MobileE.dat found, adding from previous parse
adding MobileE.dat as type 0x34 at raw offset 0xe78000 len 0x800 (end 0xe78800)
Statistics.settings found, adding from previous parse
adding Statistics.settings at raw offset 0xf78000 len 0x1000 (end 0xf79000)


------ adding smc_config.bin ------
adding smc config to offset 0x00f7c000, len 0x400


------ finalizing image ------
Fixing up empty FS block entries...done!
Writing FS table to image offset 0xe7c000 len 0x4000 (end 0xe80000)...done!
fixing up big block controller on small block NAND LBA numbers...done!
calculating ECD bytes and assembling raw image...done!
done remapping!


------ writing image to disk ------
writing file 'C:\Users\Thomas\Desktop\New folder (2)\263620293705\updflash.bin' to disk...done!
---------------------------------------------------------------
C:\Users\Thomas\Desktop\New folder (2)\263620293705\updflash.bin image built, info:
---------------------------------------------------------------
Kernel : 2.0.16547.0
Console : Jasper
NAND size : 16MiB
Build : JTAG
Xell : power on console with console eject button
Serial : 263620293705
ConsoleId : 024831345257
MoboSerial: 7056642202109375
Mfg Date : 09/09/2009
CPU Key : 9F1E2BD1941E2AE24F8F39314A85325A
1BL Key : DD88AD0C9ED669E7B56794FB68563EFA
DVD Key : 2792C7DCB42379EB9C91EA8E465BA6A5
CF LDV : 15
KV type : type2 (hashed - unchecked, master key not available)
---------------------------------------------------------------
xeBuild Finished. Have a nice day.

---------------------------------------------------------------
Image of R-JTAG board:
IMG_3598.jpgIMG_3597.jpg
Images of close-up soldering to motherboard:
(attach images to your post)

Was the console working before you started: YES

Description of problem:

i have installed the r-jtag chip in the console and done all the stuff then played with the dip settings keep getting 3 light 0010 thats fine i played about till it was all good and booting to get my CPU key done that typed into jrunner all good flashed it to the console and booted it up, it took about 6tries to boot to getting it to glitch the first time that was fine put the console back in the mother board cage and plugged everything back up tried to boot it again and worked fine in 4 try's then turned it off and got it in 2 try's then again but in 6 try's that was fine played about for it bit then turned it off came back 20min later and tried to boot it and it glitched 8times then would not boot went to rrod 0010 and it keeps doing that and sometimes boots. any ideas anyone?

Im using Dips 8,7,2 also the 1.2v and 470 jumper

it was working now keep getting rrod 0010 but sometimes will glitch.

i know my soldering is ok as it worked well sometime just work boot 100% everytime!

thanks tom
 
Last edited:

gavin_darkglide

VIP Member
Dec 14, 2012
2,303
118
Please fill out the template, this could be a cold joint. also did you tune the rater with the box in the cage, with wireless, kinect, and hdd all connected, because hooking these things up will change the shape of the pulse, so tuning could be your problem. On my jasper it the settings I found worked the best were 3,7,8 1v8, and 440 on the jtag qsb.
 

DG x Unknown

Full Member
Sep 22, 2012
25
1
Please fill out the template, this could be a cold joint. also did you tune the rater with the box in the cage, with wireless, kinect, and hdd all connected, because hooking these things up will change the shape of the pulse, so tuning could be your problem. On my jasper it the settings I found worked the best were 3,7,8 1v8, and 440 on the jtag qsb.
Console Type: (Jasper)
NAND size: 16
Dashboard version: e.g 2.0.16547
CB version: e.g 5774
updflash.bin log (if applicable):
---- { Image Build Mode } ----
building jtag image
<enter> key on completion suppressed
data directory overridden from command line to '16547\'
per build directory overridden from command line to 'data\'
file name overridden from command line to 'C:\Users\Thomas\Desktop\New folder (2)\263620293705\updflash.bin'


------ parsing user ini at 'data\options.ini' ------
loading file...done!
pre-parsing and sanitizing
done!
User options.ini loaded, 0x1b0 bytes in memory
loading cpukey.txt from data\cpukey.txt
CPU Key set to: 0x9F1E2BD1941E2AE24F8F39314A85325A (weight:0x35 valid; ecd: valid)
setting 1blkey from ini: 0xDD88AD0C9ED669E7B56794FB68563EFA
1BL Key set to : 0xDD88AD0C9ED669E7B56794FB68563EFA sum: 0x983 (expects: 0x983)
xex Key set to : 0x20B185A59D28FDC340583FBB0896BF91 sum: 0x800 (expects: 0x800)
Using patchsmc option (ini file)


------ parsing ini at '16547\_jtag.ini' ------
ini version 16547


ini: label [jasperbl] found
found (1) 'cb_6723.bin' crc: 0xe9292b90
found (2) 'cd_6723.bin' crc: 0x0fcff305
found (3) 'ce_1888.bin' crc: 0xff9b60df
found (4) 'cf_4532.bin' crc: 0xd28ef722
found (5) 'cg_4532.bin' crc: 0x2530f8ce
found (6) 'cb_6750.bin' crc: 0xf7afa8cc
found (7) 'cd_8453.bin' crc: 0x25e0acd0
found (8) 'cf_16547.bin' crc: 0xa54f9efc
found (9) 'cg_16547.bin' crc: 0xc34c06ed


ini: label [flashfs] found
found (1) 'aac.xexp' crc: 0xf2808dc5
found (2) 'bootanim.xex' crc: 0xd5c63122
found (3) 'createprofile.xex' crc: 0xf7e474ef
found (4) 'dash.xex' crc: 0x2a153493
found (5) 'deviceselector.xex' crc: 0x09e04596
found (6) 'gamerprofile.xex' crc: 0x4647565d
found (7) 'hud.xex' crc: 0xa6f9c197
found (8) 'huduiskin.xex' crc: 0x1d296f10
found (9) 'mfgbootlauncher.xex' crc: 0x33d5771b
found (10) 'minimediaplayer.xex' crc: 0x4de56d9c
found (11) 'nomni.xexp' crc: 0x97cadcec
found (12) 'nomnifwk.xexp' crc: 0xc7ab2e5b
found (13) 'nomnifwm.xexp' crc: 0x22253a42
found (14) 'SegoeXbox-Light.xtt' crc: 0xe0ee6049
found (15) 'signin.xex' crc: 0xaffe7f78
found (16) 'updater.xex' crc: 0xf6e1cdd5
found (17) 'vk.xex' crc: 0xb916846b
found (18) 'xam.xex' crc: 0x027463e8
found (19) 'xenonclatin.xtt' crc: 0xd5d17ff5
found (20) 'xenonclatin.xttp' crc: 0x7a507ad1
found (21) 'xenonjklatin.xtt' crc: 0xdde4a14c
found (22) 'xenonjklatin.xttp' crc: 0xe2adddfb
found (23) 'ximecore.xex' crc: 0xa86f3ef4
found (24) 'ximedic.xex' crc: 0x1d992bfb
found (25) 'ximedic.xexp' crc: 0x186d8df9
found (26) '..\launch.xex' crc: 0x00000000
found (27) '..\lhelper.xex' crc: 0x00000000
found (28) '..\launch.ini' crc: 0x00000000


ini: label [security] found
found (1) 'crl.bin' crc: 0x00000000
found (2) 'dae.bin' crc: 0x00000000
found (3) 'extended.bin' crc: 0x00000000
found (4) 'secdata.bin' crc: 0x00000000
------ ini parsing completed ------


output name overridden to: C:\Users\Thomas\Desktop\New folder (2)\263620293705\updflash.bin


1BL RSA pub key file is not available, signature checks will not be performed
PIRS RSA pub key file is not available, signature checks will not be performed
MASTER RSA pub key file is not available, signature checks will not be performed


------ Checking data\nanddump.bin ------
data\nanddump.bin file size: 0x1080000
nanddump header checks passed OK!
Loading NAND dump (0x1080000 bytes)...done!
Detecting NAND controller type from dump data...
NAND dump is from a small block machine
NAND dump uses big block controller
parsing dump into user and spare...
done!
decrypting KeyVault at address 0x4000 of size 0x4000
keyvault decrypted OK, will use if no kv.bin is provided
decrypting SMC at address 0x1000 of size 0x3000
SMC decrypted OK, will use if no external smc.bin is provided
seeking smc config in dump...found at offset 0xf7c000! Using if no smc config is provided.
CF slot 0 decrypted ok LDV 0x0f Pairing: 0x0480be
CF slot 1 decrypted ok LDV 0x0e Pairing: 0x0480be
setting LDV from image to 15
setting pairing data from image to 0x0480be
pairing set to: 04 80 be
MobileB.dat found at block 0x1c3, page 0x14 (page 0x3874), size 2048 (0x800) bytes
MobileC.dat found at block 0x1b5, page 0x0 (page 0x36a0), size 512 (0x200) bytes
MobileD.dat found at block 0x196, page 0x8 (page 0x32c8), size 2048 (0x800) bytes
MobileE.dat found at block 0x1dc, page 0x10 (page 0x3b90), size 2048 (0x800) bytes
Statistics.settings found at page 0x7bc0, size 4096 (0x1000) bytes
seeking FSRoot...fsroot found at block 0x1a4, page 0x0 (page 0x3480) raw offset 0x3480
seeking security files...
crl.bin found in sector 0x20e size 0xa00...verified! Will use if external file not found.
dae.bin found in sector 0x209 size 0xd9c0...verified! Will use if external file not found.
extended.bin found in sector 0x91 size 0x4000...verified! Will use if external file not found.
secdata.bin found in sector 0x207 size 0x400...verified! Will use if external file not found.
done!
Writing initial header to flash image


------ loading system update container ------
16547\su20076000_00000000 found, loading...done!
Read 0xb35000 bytes to memory
checking integrity...
header seems valid, version 2.0.16547.0
header hash is OK, checking content hashes...
content hashes seem OK, everything looks good!
extracted SUPD\xboxupd.bin (0x7a010 bytes)
decrypting SUPD\xboxupd.bin\CF_16547.bin (0x4560 bytes)...done!
decrypting SUPD\xboxupd.bin\CG_16547.bin (0x75aac bytes)...done!


------ Loading bootloaders and required security files ------
could not read 16547\bin\payload.bin, using built in payload (0x200 bytes)
reading data\SMC.bin (0x3000 bytes)
reset smc load address to 0x1000 size 0x3000
reading data\kv.bin failed, using kv.bin from nand dump
reading .\common\cb_6723.bin (0x9550 bytes)
loaded cb_6723.bin, could not check signature rsa key not present!
reading .\common\cd_6723.bin (0x56f0 bytes)
reading .\common\ce_1888.bin (0x5606a b pad 0x56070 b)
reading .\common\cf_4532.bin (0x44c0 bytes)
reading .\common\cg_4532.bin (0x2ef40 bytes)
extracted SUPD\xboxupd.bin\CF_16547.bin (0x4560 bytes)
extracted SUPD\xboxupd.bin\CG_16547.bin (0x75aac bytes)
could not read 16547\bin\freeboot.bin, using built in core (0xd40 bytes)
reading 16547\bin\patches_jasper.bin (0x9d4 bytes)
reading data\xell-2f.bin (0x40000 bytes)
reading .\common\cb_6750.bin (0x9a40 bytes)
loaded cb_6750.bin, could not check signature rsa key not present!
reading .\common\cd_8453.bin (0x5780 bytes)
reading data\smc_config.bin failed, using smc_config.bin from nand dump
-------------------
checking smc_config
-------------------
extracting config
------------------
SMC config info:
------------------
Target temps: Cpu: 80øC Gpu: 75øC Edram: 77øC
Max temps : Cpu: 95øC Gpu: 90øC Edram: 92øC
Cpu Fan : (auto)
Gpu Fan : (auto)
MAC Address : 00:25:ae:01:a0:3d
AVRegion : 0x00000300 (PAL50)
GameRegion : 0x02fe (PAL/EU)
DVDRegion : 2
resetKey : XAUD
---------------------
Checking for smc config data patches
smc config was not patched
---------------------
could not check signature of cb_6723.bin, 1BL RSA key not present!
could not check signature of cb_6750.bin, 1BL RSA key not present!
done!


------ Patching boot reasons and options into flash header ------
Patching header for xell power reason


------ Encrypting and finalizing bootloaders ------
Fuse CPU Key set to: 0x9F1E2BD1941E2AE24F8F39314A85325A
Fuse CF LDV set to : 0xFFFFFFFFFFFFFFF00000000000000000
encoding payload.bin size 0x200 (JTAG)
patching payload.bin to load size 0xd40 (0x350 reps)
encoding SMC.bin size 0x3000 (JTAG)
SMC checksum: 45e7930b
unknown SMC found, type: Jasper v4.1(2.03)
jtag hack found in smc.bin!


******* WARNING: could not patch SMC reset limit!


encoding kv.bin size 0x4000 (JTAG)
decrypted keyvault has been set for reference
Master RSA pub not available, not checking hash
encoding cb_6723.bin size 0x9550 (JTAG)
CB 6723 seq 0x01050010 type: 0x01 cseq: 0x05 allow: 0x0010
expected fuses:
fuseset 00: C0FFFFFFFFFFFFFF
fuseset 01: 0F0F0F0F0F0F0FF0
fuseset 02: 0000F00000000000 (sequence)
fuseset 02: 0000F00000000000 (allow cseq 5)
encoding cd_6723.bin size 0x56f0 (JTAG)
encoding ce_1888.bin size 0x56070 (JTAG)
encoding cf_4532.bin size 0x44c0 (JTAG)
encoding cg_4532.bin size 0x2ef40 (JTAG)
encoding cf_16547.bin size 0x4560 (JTAG)
encoding cg_16547.bin size 0x75ab0 (JTAG)
encoding freeboot.bin size 0xd40 (JTAG)
patching freeboot.bin with with kernel version string '16547'
Boot options set:
- console DVD eject button is being used to start xell
- alternate xell button disabled
encoding patches_jasper.bin size 0x9d8 (JTAG)
encoding fuses.bin size 0x60 (JTAG)
encoding xell-2f.bin size 0x40000 (JTAG)
encoding cb_6750.bin size 0x9a40 (JTAG)
CB 6750 seq 0x01070050 type: 0x01 cseq: 0x07 allow: 0x0050
expected fuses:
fuseset 00: C0FFFFFFFFFFFFFF
fuseset 01: 0F0F0F0F0F0F0FF0
fuseset 02: 000000F000000000 (sequence)
fuseset 02: 0000F00000000000 (allow cseq 5)
fuseset 02: 000000F000000000 (allow cseq 7)
CBENC pairing set to: 04 80 be
encoding cd_8453.bin size 0x5780 (JTAG)


Virtual Fuses set to:
fuseset 00: C0FFFFFFFFFFFFFF
fuseset 01: 0F0F0F0F0F0F0FF0
fuseset 02: 000000F000000000
fuseset 03: 9F1E2BD1941E2AE2
fuseset 04: 9F1E2BD1941E2AE2
fuseset 05: 4F8F39314A85325A
fuseset 06: 4F8F39314A85325A
fuseset 07: FFFFFFFFFFFFFFF0
fuseset 08: 0000000000000000
fuseset 09: 0000000000000000
fuseset 10: 0000000000000000
fuseset 11: 0000000000000000
done!


------ Adding bootloaders to flash image ------
adding payload.bin at raw offset 0x00000200 len 0x200 (end 0x400)
adding SMC.bin at raw offset 0x00001000 len 0x3000 (end 0x4000)
adding kv.bin at raw offset 0x00004000 len 0x4000 (end 0x8000)
adding cb_6723.bin at raw offset 0x00008000 len 0x9550 (end 0x11550)
adding cd_6723.bin at raw offset 0x00011550 len 0x56f0 (end 0x16c40)
adding ce_1888.bin at raw offset 0x00016c40 len 0x56070 (end 0x6ccb0)
adding cf_4532.bin at raw offset 0x00070000 len 0x44c0 (end 0x744c0)
adding cg_4532.bin at raw offset 0x000744c0 len 0x2ef40 (end 0x80000, rest in fs)
adding cf_16547.bin at raw offset 0x00080000 len 0x4560 (end 0x84560)
adding cg_16547.bin at raw offset 0x00084560 len 0x75ab0 (end 0x90000, rest in fs)
adding freeboot.bin at raw offset 0x00090000 len 0xd40 (end 0x90d40)
adding patches_jasper.bin at raw offset 0x00091000 len 0x9d8 (end 0x919d8)
adding fuses.bin at raw offset 0x00095000 len 0x60 (end 0x95060)
adding xell-2f.bin at raw offset 0x00095060 len 0x40000 (end 0xd5060)
adding cb_6750.bin at raw offset 0x000d5060 len 0x9a40 (end 0xdeaa0)
adding cd_8453.bin at raw offset 0x000deaa0 len 0x5780 (end 0xe4220)
Fixing up FS table...done!
Writing zeropair CG patch slot overflow data to sysupdate.xexp1
at raw offset 0xe8000 len 0x00023400 (end: 0x0010b400)...done!
Writing target CG patch slot overflow data to sysupdate.xexp2
at raw offset 0xe8000 len 0x0006a010 (end: 0x00152010)...done!


------ adding 28 firmware files ------
extracted SUPD\aac.xexp (0x14000 bytes) (crc32: 0xf2808dc5 ini: 0xf2808dc5)
adding as aac.xexp2 at raw offset 0x176010 len 0x00014000 (end 0x0018a010)
extracted SUPD\bootanim.xex (0x61000 bytes) (crc32: 0xd5c63122 ini: 0xd5c63122)
adding as bootanim.xex at raw offset 0x18c000 len 0x00061000 (end 0x001ed000)
extracted SUPD\createprofile.xex (0xc000 bytes) (crc32: 0xf7e474ef ini: 0xf7e474ef)
adding as createprofile.xex at raw offset 0x1ed000 len 0x0000c000 (end 0x001f9000)
extracted SUPD\dash.xex (0x598000 bytes) (crc32: 0x2a153493 ini: 0x2a153493)
adding as dash.xex at raw offset 0x1fc000 len 0x00598000 (end 0x00794000)
extracted SUPD\deviceselector.xex (0xa000 bytes) (crc32: 0x09e04596 ini: 0x09e04596)
adding as deviceselector.xex at raw offset 0x794000 len 0x0000a000 (end 0x0079e000)
extracted SUPD\gamerprofile.xex (0x1b000 bytes) (crc32: 0x4647565d ini: 0x4647565d)
adding as gamerprofile.xex at raw offset 0x79e000 len 0x0001b000 (end 0x007b9000)
extracted SUPD\hud.xex (0x1d000 bytes) (crc32: 0xa6f9c197 ini: 0xa6f9c197)
adding as hud.xex at raw offset 0x7bb000 len 0x0001d000 (end 0x007d8000)
extracted SUPD\huduiskin.xex (0x14000 bytes) (crc32: 0x1d296f10 ini: 0x1d296f10)
adding as huduiskin.xex at raw offset 0x7d9000 len 0x00014000 (end 0x007ed000)
extracted SUPD\mfgbootlauncher.xex (0x8000 bytes) (crc32: 0x33d5771b ini: 0x33d5771b)
adding as mfgbootlauncher.xex at raw offset 0x7f0000 len 0x00008000 (end 0x007f8000)
extracted SUPD\minimediaplayer.xex (0xc000 bytes) (crc32: 0x4de56d9c ini: 0x4de56d9c)
adding as minimediaplayer.xex at raw offset 0x7f8000 len 0x0000c000 (end 0x00804000)
extracted SUPD\nomni.xexp (0xc800 bytes) (crc32: 0x97cadcec ini: 0x97cadcec)
adding as nomni.xexp2 at raw offset 0x804000 len 0x0000c800 (end 0x00810800)
extracted SUPD\nomnifwk.xexp (0x2000 bytes) (crc32: 0xc7ab2e5b ini: 0xc7ab2e5b)
adding as nomnifwk.xexp2 at raw offset 0x810800 len 0x00002000 (end 0x00812800)
extracted SUPD\nomnifwm.xexp (0x5000 bytes) (crc32: 0x22253a42 ini: 0x22253a42)
adding as nomnifwm.xexp2 at raw offset 0x816000 len 0x00005000 (end 0x0081b000)
extracted SUPD\SegoeXbox-Light.xtt (0x6000 bytes) (crc32: 0xe0ee6049 ini: 0xe0ee6049)
adding as SegoeXbox-Light.xtt at raw offset 0x81d000 len 0x00006000 (end 0x00823000)
extracted SUPD\signin.xex (0x19000 bytes) (crc32: 0xaffe7f78 ini: 0xaffe7f78)
adding as signin.xex at raw offset 0x826000 len 0x00019000 (end 0x0083f000)
extracted SUPD\updater.xex (0x7000 bytes) (crc32: 0xf6e1cdd5 ini: 0xf6e1cdd5)
adding as updater.xex at raw offset 0x841000 len 0x00007000 (end 0x00848000)
extracted SUPD\vk.xex (0xb000 bytes) (crc32: 0xb916846b ini: 0xb916846b)
adding as vk.xex at raw offset 0x84b000 len 0x0000b000 (end 0x00856000)
extracted SUPD\xam.xex (0x253000 bytes) (crc32: 0x027463e8 ini: 0x027463e8)
adding as xam.xex at raw offset 0x857000 len 0x00253000 (end 0x00aaa000)
extracted nanddump\xenonclatin.xtt (0x11b000 bytes) (crc32: 0xd5d17ff5 ini: 0xd5d17ff5)
adding as xenonclatin.xtt at raw offset 0xaab000 len 0x0011b000 (end 0x00bc6000)
extracted SUPD\xenonclatin.xttp (0x18000 bytes) (crc32: 0x7a507ad1 ini: 0x7a507ad1)
adding as xenonclatin.xttp2 at raw offset 0xbc7000 len 0x00018000 (end 0x00bdf000)
extracted nanddump\xenonjklatin.xtt (0x1a8000 bytes) (crc32: 0xdde4a14c ini: 0xdde4a14c)
adding as xenonjklatin.xtt at raw offset 0xbe0000 len 0x001a8000 (end 0x00d88000)
extracted SUPD\xenonjklatin.xttp (0x7000 bytes) (crc32: 0xe2adddfb ini: 0xe2adddfb)
adding as xenonjklatin.xttp2 at raw offset 0xd88000 len 0x00007000 (end 0x00d8f000)
extracted SUPD\ximecore.xex (0x17000 bytes) (crc32: 0xa86f3ef4 ini: 0xa86f3ef4)
adding as ximecore.xex at raw offset 0xd8f000 len 0x00017000 (end 0x00da6000)
extracted nanddump\ximedic.xex (0x90000 bytes) (crc32: 0x1d992bfb ini: 0x1d992bfb)
adding as ximedic.xex at raw offset 0xda7000 len 0x00090000 (end 0x00e37000)
extracted SUPD\ximedic.xexp (0x2800 bytes) (crc32: 0x186d8df9 ini: 0x186d8df9)
adding as ximedic.xexp2 at raw offset 0xe38000 len 0x00002800 (end 0x00e3a800)
reading 16547\..\launch.xex (0xd000 bytes)
adding as launch.xex at raw offset 0xe3a800 len 0x0000d000 (end 0x00e47800)
reading 16547\..\lhelper.xex (0x6000 bytes)
adding as lhelper.xex at raw offset 0xe49000 len 0x00006000 (end 0x00e4f000)
***** could not read file '..\launch.ini', skipping *****


------ adding 4 security files ------
<- Processing crl.bin ->
reading data\crl.bin (0xa00 bytes)
crl appears crypted, attempting to decrypt with CPU key...failed! Trying alternate key...success!
adding as crl.bin at raw offset 0xe54000 len 0x00000a00 (end 0x00e54a00)


<- Processing dae.bin ->
reading data\dae.bin (0xad30 bytes)
dae appears encrypted, attempting to decrypt with CPU key...failed! Attempting to decrypt with alternate key...
success!
adding as dae.bin at raw offset 0xe58000 len 0x0000ad30 (end 0x00e62d30)


<- Processing extended.bin ->
reading data\extended.bin (0x4000 bytes)
adding as extended.bin at raw offset 0xe64000 len 0x00004000 (end 0x00e68000)


<- Processing secdata.bin ->
reading data\secdata.bin (0x400 bytes)
adding as secdata.bin at raw offset 0xe68000 len 0x00000400 (end 0x00e68400)


------ checking for Mobile*.dat ------
MobileB.dat found, adding from previous parse
adding MobileB.dat as type 0x31 at raw offset 0xe6c000 len 0x800 (end 0xe6c800)
MobileC.dat found, adding from previous parse
adding MobileC.dat as type 0x32 at raw offset 0xe70000 len 0x200 (end 0xe70200)
MobileD.dat found, adding from previous parse
adding MobileD.dat as type 0x33 at raw offset 0xe74000 len 0x800 (end 0xe74800)
MobileE.dat found, adding from previous parse
adding MobileE.dat as type 0x34 at raw offset 0xe78000 len 0x800 (end 0xe78800)
Statistics.settings found, adding from previous parse
adding Statistics.settings at raw offset 0xf78000 len 0x1000 (end 0xf79000)


------ adding smc_config.bin ------
adding smc config to offset 0x00f7c000, len 0x400


------ finalizing image ------
Fixing up empty FS block entries...done!
Writing FS table to image offset 0xe7c000 len 0x4000 (end 0xe80000)...done!
fixing up big block controller on small block NAND LBA numbers...done!
calculating ECD bytes and assembling raw image...done!
done remapping!


------ writing image to disk ------
writing file 'C:\Users\Thomas\Desktop\New folder (2)\263620293705\updflash.bin' to disk...done!
---------------------------------------------------------------
C:\Users\Thomas\Desktop\New folder (2)\263620293705\updflash.bin image built, info:
---------------------------------------------------------------
Kernel : 2.0.16547.0
Console : Jasper
NAND size : 16MiB
Build : JTAG
Xell : power on console with console eject button
Serial : 263620293705
ConsoleId : 024831345257
MoboSerial: 7056642202109375
Mfg Date : 09/09/2009
CPU Key : 9F1E2BD1941E2AE24F8F39314A85325A
1BL Key : DD88AD0C9ED669E7B56794FB68563EFA
DVD Key : 2792C7DCB42379EB9C91EA8E465BA6A5
CF LDV : 15
KV type : type2 (hashed - unchecked, master key not available)
---------------------------------------------------------------
xeBuild Finished. Have a nice day.

---------------------------------------------------------------
Image of R-JTAG board:
View attachment 25081View attachment 25082
Images of close-up soldering to motherboard:
(attach images to your post)

Was the console working before you started: YES

Description of problem:

i have installed the r-jtag chip in the console and done all the stuff then played with the dip settings keep getting 3 light 0010 thats fine i played about till it was all good and booting to get my CPU key done that typed into jrunner all good flashed it to the console and booted it up, it took about 6tries to boot to getting it to glitch the first time that was fine put the console back in the mother board cage and plugged everything back up tried to boot it again and worked fine in 4 try's then turned it off and got it in 2 try's then again but in 6 try's that was fine played about for it bit then turned it off came back 20min later and tried to boot it and it glitched 8times then would not boot went to rrod 0010 and it keeps doing that and sometimes boots. any ideas anyone?

Im using Dips 8,7,2 also the 1.2v and 470 jumper

it was working now keep getting rrod 0010 but sometimes will glitch.

i know my soldering is ok as it worked well sometime just work boot 100% everytime!