本帖最后由 數碼小天才 于 2023-3-10 18:03 編輯
無限重啟
ttl輸出:
Bootrom start
Boot from eMMC
Initializing DDR ... OK
Starting DDR training ... OK
Starting fastboot ...
System startup
Reg Version: v1.1.0
Reg Time: 2016/1/18 14:01:18
Reg Name: hi3798mdmo1g_hi3798mv100_ddr3_1gbyte_16bitx2_4layers_emmc.reg
Relocate Boot to DDR
Jump to DDR
Compressed-boot v1.0.0
Uncompress........................Ok
System startup
Reg Version: v1.1.0
Reg Time: 2016/1/18 14:01:18
Reg Name: hi3798mdmo1g_hi3798mv100_ddr3_1gbyte_16bitx2_4layers_emmc.reg
Relocate Boot to DDR
Jump to DDR
Fastboot 3.3.0 (wujiaxi@RD4TEAM) (Feb 03 2016 - 08:31:35)
Fastboot: Version 3.3.0
Build Date: Feb 3 2016, 08:32:13
CPU: Hi3798Mv100 (CA)
Boot Media: eMMC
DDR Size: 1GB
Check nand flash controller v610. found
Special NAND id table Version 1.36
Nand ID: 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00
No NAND device found!!!
MMC/SD controller initialization.
MMC/SD Card:
MID: 0x15
Read Block: 512 Bytes
Write Block: 512 Bytes
Chip Size: 3728M Bytes (High Capacity)
Name: "4FPD3"
Chip Type: MMC
Version: 5.0
Speed: 52000000Hz
Bus Width: 8bit
Boot Addr: 0 Bytes
Boot Env on eMMC
Env Offset: 0x00100000
Env Size: 0x00010000
Env Range: 0x00010000
HI_OTP_LockIdWord,327: ID_WORD have already been locked
SDK Version: HiSTBAndroidV600R001C00SPC063_v2015120719
Security Begin Read RSA Key!
Secure boot is enabled
press the key!!
get key 0 2
get chipid =137980100
get chipType (HI3798MV100)
count=2
Press the IR remote!!
Press the IR remote!!
boot_select = kernel
Start Audio enable!!!skyworth board!!!
kernelbootargs:console=ttyAMA0,115200 blkdevparts=mmcblk0:1M(fastboot),1M(bootargs),10M(recovery),2M(deviceinfo),8M(baseparam),8M(pqparam),20M(logo),20M(logobak),40M(fastplay),40M(fastplaybak),40M(kernel),20M(misc),1M(userapi),1M(hibdrv),1M(qbflag),1M(qbdata),800M(system),1024M(userdata),500M(cache),8M(macid),64M(skparam),400M(skbackup),50M(private),-(sdcard) coherent_pool=1M --hpm62
mac:6A:72:75:7A:C3:38
MMC read: dev # 0, block # 1, count 1 ... 1 blocks read: OK
1263157 Bytes/s
RSA Module:
0xBD, 0xCA, 0x00, 0xF4, 0x0D, 0xA4, 0x04, 0xEF, 0xD8, 0x79, 0xB0, 0x7D, 0xBC, 0x3E, 0x54, 0x4E,
0xFF, 0x96, 0xBB, 0xA9, 0x71, 0x75, 0xAC, 0x4C, 0x35, 0xEB, 0x38, 0x89, 0x42, 0x41, 0x48, 0xE9,
0x58, 0x7A, 0xDF, 0x5B, 0x8D, 0x19, 0x45, 0xA7, 0x29, 0xB2, 0xD7, 0x3D, 0x35, 0x9A, 0xFC, 0xFD,
0xFE, 0x1D, 0x10, 0x5F, 0xA5, 0xE0, 0x33, 0xB2, 0xBB, 0x87, 0x1C, 0x81, 0x5E, 0x4C, 0x53, 0x93,
0x73, 0x05, 0x71, 0x96, 0x80, 0xEE, 0xA0, 0x68, 0x72, 0xE0, 0x64, 0x3A, 0xA7, 0x73, 0xBF, 0x31,
0x09, 0xDE, 0x95, 0x5E, 0xF2, 0x19, 0x25, 0xE1, 0x0A, 0x0A, 0x01, 0xD5, 0xFB, 0x94, 0x1F, 0x2A,
0x17, 0xFF, 0x2C, 0x55, 0x37, 0x7C, 0xB0, 0x7F, 0xAB, 0x33, 0xC2, 0x01, 0xA7, 0xB9, 0x49, 0x7F,
0xDD, 0xA6, 0x69, 0x1D, 0x7C, 0xF3, 0xCB, 0x6B, 0xD5, 0xEB, 0xCD, 0x02, 0xDE, 0xD9, 0x74, 0x4E,
0xB0, 0x1F, 0x2F, 0x47, 0xB5, 0x01, 0x5A, 0xFE, 0x6D, 0x15, 0xE7, 0xA7, 0x59, 0x90, 0x7D, 0x10,
0x84, 0xE6, 0x5F, 0x9D, 0x89, 0x7E, 0x79, 0x5A, 0x8D, 0x20, 0x24, 0x9C, 0x23, 0xD2, 0x67, 0x20,
0x68, 0x41, 0xAB, 0xAD, 0xC5, 0x2D, 0xCB, 0x47, 0x8B, 0xE6, 0xD9, 0x47, 0x65, 0xD3, 0x1E, 0xDB,
0xC6, 0x65, 0x9D, 0x96, 0x78, 0x01, 0x9D, 0x47, 0xE6, 0x1D, 0xA9, 0xD3, 0x34, 0xF6, 0xDC, 0xFD,
0x10, 0x88, 0x1C, 0x5E, 0x64, 0x43, 0xD8, 0xA5, 0x19, 0x6F, 0x9E, 0x0A, 0x6F, 0x35, 0x46, 0xBF,
0xE6, 0x52, 0x5E, 0x0C, 0x92, 0x6D, 0x3E, 0x3F, 0x6C, 0x82, 0x00, 0x05, 0xBE, 0x85, 0x98, 0x19,
0xA0, 0x4B, 0x83, 0x29, 0x55, 0x7E, 0xAB, 0x92, 0x23, 0x5A, 0x6F, 0x8F, 0x12, 0xFE, 0x7A, 0x25,
0xDF, 0x24, 0x58, 0xF9, 0xFE, 0x30, 0x5E, 0xB8, 0xF4, 0xB6, 0x43, 0xDD, 0x98, 0x42, 0xB8, 0x69,
RSA Exponent:
0x03, 0x00, 0x00, 0x00,
get extern rsa key success!
g_EnvFlashAddr:0x100000, g_EnvFlashPartionSize:0x100000
Open addr, enFlashType: 0x00000002
HI_CA_CommonVerify_BootPara,2213: Sign Header found!
HI_CA_CommonVerify_BootPara,2219: CRC32 check ok
HI_CA_CommonVerify_BootPara,2255: begin sha2, length:65536
HI_CA_CommonVerify_BootPara,2270: Sha check ok
u8MagicNumber:Hisilicon_ADVCA_ImgHead_MagicNum
u8Version:v1.0.0.3
u32CreateDay:0x0
u32CreateTime:0x0
u32HeadLength:0x384
u32SignedDataLength:65536:0x10000
u32IsYaffsImage:0
u32IsConfigNandBlock:1
u32NandBlockType:0
u32IsNeedEncrypt:0
u32IsEncrypted:0
u32HashType:1
u32CurrentsectionID:0
u32TotalsectionID:1
u32SectionSize:0
82 f9 03 a2 78 ea 1f 5d 6e 1d 40 01 9e 16 c7 5d c2 6f 4f 98 46 8b a1 fa 46 84 db 43 f9 7b db a9
u32SignatureLen:256
88 3b f5 6c 1a c6 f8 29 20 6a 81 dd 0f a7 87 9d c0 5c 7e f8 a5 15 b9 56 63 f3 b2 cd 69 be 94 a0 57 fb 5a fb a3 0d 6a b5 4e 4e 5b c3 3f df b7 a4 fd d2 01 a2 d5 12 dc 79 78 f7 ff 5e 0a fb 0c 1e 33 d1 6a b7 fb 6d 49 09 7c ce 8a 82 a0 7d 58 00 2c cc 28 06 a0 7a ed a6 5d ae 26 b4 a5 01 84 b2 9e 71 ca 81 0a 02 28 b5 fd fb 7d 9c 64 ad 04 b7 f3 b0 7f 0f 12 13 bb c4 d6 69 3a de a9 eb a8 7e c8 54 12 e0 22 d8 0e 2a 35 8d f7 e1 fc c1 bc e5 03 d1 00 8f 0d 6c c6 62 b3 4b e1 74 39 72 8a c0 cd fa 9d 83 c3 8b 0b 85 c0 64 46 dc 66 d7 35 e8 71 fe 05 a4 05 31 ce 78 8d e3 eb 72 d0 d7 d5 73 94 a8 3c 82 24 df 3b 7a f7 4c 05 d9 16 07 23 e6 99 54 02 4a 31 8f a8 5d 2c b4 e2 36 9b 26 e3 17 32 32 d4 58 c7 a2 ed 06 dd 5f 71 50 1e 26 a9 5f ca e5 87 52 64 6f 43 0c 5e 78 d2 ab 3d e0 7b cf
OrignalImagePath:/home/wanbing/HPM64-hi3798-SC_CM_77117/sdk/kitkat/out/target/product/Hi3798MV100/Emmc/bootargs.bin
RSAPrivateKeyPath:/home/wanbing/HPM64-hi3798-SC_CM_77117/sdk/kitkat/device/hisilicon/Hi3798MV100/security/extern_rsa_priv.txt
CRC32:5866469c
HI_CA_CommonVerify_BootPara,2276: Check Authenitication is ok
CA_Common_VerifyBootParaByPartitionDebug,535: verify success
HI_CA_GetAuthMode,863: Common Signature!
HI_CA_GetAuthMode,863: Common Signature!
CA_Common_VerifyParseSignCommand,462: verify image:recovery, sign:recovery, offset:0x200000
CA_Common_Search_SignHeader,1734: PartitionSignName:recovery
短接強刷無反應,ttl輸出:usb bootstrap
Udisk(1):
|