Skip to content

Instantly share code, notes, and snippets.

@lheckemann
Created August 17, 2020 08:44
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save lheckemann/cae1e052ade5a7fec17487a414eb6cbe to your computer and use it in GitHub Desktop.
Save lheckemann/cae1e052ade5a7fec17487a414eb6cbe to your computer and use it in GitHub Desktop.
Android Bootloader - UART_DM Initialized!!!
[40] Qseecom Init Done in Appsbl version is 0x1001000
[40] secure app region addr=0x84a00000 size=0x1900000[50] TZ App region notif returned with status:0 addr:84a00000 size:26214400
[50] TZ App log region register returned with status:0 addr:8f777000 size:4096
[60] Qseecom TZ Init Done in Appsbl
[70] Loading cmnlib done
[90] Loading cmnlib64 done
pcba_config : 4
pcba is D2A , normal boot
[110] fastboot: is_unlocked = 1
[110] Not able to search the panel:
[210] chip serial splash =-510731639
[210] chip serial pinfo =-510731639
[220] Found stored PLL codes!
SPLASH_WARNING_IMG_OFFSET:972800
header: SPLASH!!8
[1510] Display init done
before SPLASH_UNLOCK_IMG_OFFSET
header: SPLASH!!8
[7340] Device is unlocked! Skipping verification...
[7340] read_oem_keystore: OEM_KEYSTORE[1652]=[0x50].
[7400] Your device has been unlocked and can't be trusted.
Wait for 5 seconds before proceeding
[12410] before send_rot_command!!!
[12410] enter send_rot_command
[12410] boot_device_state:1
[12420] Digest: [12420] 0xc2bd4150 [12420] 0xac032e57 [12420] 0xdba1d684 [12420] 0x5b3a59da [12420] 0xba4ac9a3 [12430] 0x871777cb [12430] 0xc08c1a6d [12430] 0xcc6ca66f [12430]
[12430] Final Digest: [12430] 0x5356d1d0 [12430] 0xb7abbe0 [12440] 0xfc3d040d [12440] 0x93366bc5 [12440] 0x7f747733 [12440] 0x5fe09bef [12440] 0x9c2124d0 [12440] 0xf24b6ac1 [12450]
[12460] Sending Root of Trust to trustzone: end
Android Bootloader - UART_DM Initialized!!!
and all that again.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment