Running /usr/bin/dev_debug_vboot 
+ date
Fri Feb 28 10:54:02 PST 2025
# DEV_DEBUG_FORCE=()
# OPT_CLEANUP=(yes)
# OPT_BIOS=()
# OPT_FORCE=()
# OPT_IMAGE=()
# OPT_KERNEL=()
# FLAG_SAVE_LOG_FILE=(yes)
+ crossystem --all
act_fwver               = 0x00010001                     # [RO/int] Active firmware version
act_kernver             = (error)                        # [RO/int] Active kernel version
arch                    = arm                            # [RO/str] Platform architecture
backup_nvram_request    = 1                              # [RW/int] Backup the nvram somewhere at the next boot. Cleared on success.
battery_cutoff_request  = 0                              # [RW/int] Cut off battery and shutdown on next boot
block_devmode           = 0                              # [RW/int] Block all use of developer mode
board_id                = 9                              # [RO/int] Board hardware revision number
clear_tpm_owner_done    = 1                              # [RW/int] Clear TPM owner done
clear_tpm_owner_request = 0                              # [RW/int] Clear TPM owner on next boot
cros_debug              = 1                              # [RO/int] OS should allow debug features
dbg_reset               = 0                              # [RW/int] Debug reset mode request
debug_build             = 0                              # [RO/int] OS image built for debug features
dev_boot_altfw          = 0                              # [RW/int] Enable developer mode alternate bootloader
dev_boot_signed_only    = 0                              # [RW/int] Enable developer mode boot only from official kernels
dev_boot_usb            = 0                              # [RW/int] Enable developer mode boot from external disk (USB/SD)
dev_default_boot        = disk                           # [RW/str] Default boot from disk, altfw or usb
dev_enable_udc          = 0                              # [RW/int] Enable USB Device Controller
devsw_boot              = 1                              # [RO/int] Developer switch position at boot
devsw_cur               = 1                              # [RO/int] Developer switch current position
diagnostic_request      = 0                              # [RW/int] Request diagnostic rom run on next boot
disable_dev_request     = 0                              # [RW/int] Disable virtual dev-mode on next boot
ecfw_act                = RW                             # [RO/str] Active EC firmware
post_ec_sync_delay      = 0                              # [RW/int] Short delay after EC software sync (persistent, writable, eve only)
fw_prev_result          = success                        # [RO/str] Firmware result of previous boot
fw_prev_tried           = B                              # [RO/str] Firmware tried on previous boot (A or B)
fw_result               = success                        # [RW/str] Firmware result this boot
fw_tried                = B                              # [RO/str] Firmware tried this boot (A or B)
fw_try_count            = 0                              # [RW/int] Number of times to try fw_try_next
fw_try_next             = B                              # [RW/str] Firmware to try next (A or B)
fw_vboot2               = 1                              # [RO/int] 1 if firmware was selected by vboot2 or 0 otherwise
fwid                    = Google_Juniper.12573.342.0     # [RO/str] Active firmware ID
fwupdate_tries          = 0                              # [RW/int] Times to try OS firmware update (inside kern_nv)
hwid                    = KENZO-IGRW C4B-A2B-B2B-B92-A6X # [RO/str] Hardware ID
inside_vm               = 0                              # [RO/int] Running in a VM?
kern_nv                 = 0x0000                         # [RO/int] Non-volatile field for kernel use
kernel_max_rollforward  = 0xfffffffe                     # [RW/int] Max kernel version to store into TPM
kernkey_vfy             = sig                            # [RO/str] Type of verification done on kernel keyblock
loc_idx                 = 1                              # [RW/int] Localization index for firmware screens
mainfw_act              = B                              # [RO/str] Active main firmware
mainfw_type             = developer                      # [RO/str] Active main firmware type
minios_priority         = A                              # [RW/str] miniOS image to try first (A or B)
nvram_cleared           = 0                              # [RW/int] Have NV settings been lost?  Write 0 to clear
display_request         = 0                              # [RW/int] Should we initialize the display at boot?
phase_enforcement       = (error)                        # [RO/int] Board should have full security settings applied
recovery_reason         = 0                              # [RO/int] Recovery mode reason for current boot
recovery_request        = 0                              # [RW/int] Recovery mode request
recovery_subcode        = 0                              # [RW/int] Recovery reason subcode
recoverysw_boot         = 0                              # [RO/int] Recovery switch position at boot
recoverysw_cur          = (error)                        # [RO/int] Recovery switch current position
recoverysw_ec_boot      = 0                              # [RO/int] Recovery switch position at EC boot
ro_fwid                 = Google_Juniper.12573.202.0     # [RO/str] Read-only firmware ID
tpm_attack              = 0                              # [RW/int] TPM was interrupted since this flag was cleared
tpm_fwver               = 0x00010001                     # [RO/int] Firmware version stored in TPM
tpm_kernver             = 0x00010005                     # [RO/int] Kernel version stored in TPM
tpm_rebooted            = 0                              # [RO/int] TPM requesting repeated reboot
try_ro_sync             = 0                              # [RO/int] try read only software sync
vdat_flags              = 0x0000d856                     # [RO/int] Flags from VbSharedData
vdat_lfdebug            = Check A result=0
Check B result=0
Firmware index booted=0x01
Active firmware version=0x00010001
Firmware version in TPM =0x00000000
Lowest combined version from firmware=0x00000000
 # [RO/str] LoadFirmware() debug data (not in print-all)
wipeout_request         = 0                              # [RW/int] Firmware requested factory reset (wipeout)
wpsw_cur                = 1                              # [RO/int] Firmware write protect hardware switch current position
+ rootdev -s
/dev/mmcblk0p5
+ ls -aCF /root
./  ../  .force_update_firmware
+ ls -aCF /mnt/stateful_partition
./		 dev_image/	  encrypted.key  reboot_vault/
../		 encrypted/	  home/		 unencrypted/
.developer_mode  encrypted.block  lost+found/	 var_overlay/
+ cgpt show /dev/mmcblk0
       start        size    part  contents
           0           1          PMBR (Boot GUID: B737BCEC-546E-497B-BF20-C3E219E28A76)
           1           1          Pri GPT header
           2          32          Pri GPT table
    17076224    43995088       1  Label: "STATE"
                                  Type: Linux data
                                  UUID: F59F9381-3806-4E88-8CA4-A0B1076E1DCA
          69       65536       2  Label: "KERN-A"
                                  Type: ChromeOS kernel
                                  UUID: 47D76B39-16BE-466F-B19F-DC9F958D5218
                                  Attr: priority=1 tries=0 successful=1 error_counter=0 
     8687616     8388608       3  Label: "ROOT-A"
                                  Type: ChromeOS rootfs
                                  UUID: 460DBE8A-2A41-4666-B470-E13D8099F078
       65605       65536       4  Label: "KERN-B"
                                  Type: ChromeOS kernel
                                  UUID: 873D93F3-0066-4720-87C3-B0FE6A96EB51
                                  Attr: priority=2 tries=0 successful=1 error_counter=0 
      299008     8388608       5  Label: "ROOT-B"
                                  Type: ChromeOS rootfs
                                  UUID: 3E7E721C-6BA1-4673-81F7-4D75CFFAE63D
          65           1       6  Label: "KERN-C"
                                  Type: ChromeOS kernel
                                  UUID: D4994B1F-70DD-45FD-A3A0-72818CEB929F
                                  Attr: priority=0 tries=15 successful=0 error_counter=0 
          66           1       7  Label: "ROOT-C"
                                  Type: ChromeOS rootfs
                                  UUID: DE371653-F4CF-4EDC-A07F-FF4148D2A6E9
      135168       32768       8  Label: "OEM"
                                  Type: Linux data
                                  UUID: 59047E43-FD8C-4159-9730-6DF82A262062
          67           1       9  Label: "reserved"
                                  Type: ChromeOS reserved
                                  UUID: 28C3B9DC-57D5-46A9-B437-FF2A656337C6
          68           1      10  Label: "reserved"
                                  Type: ChromeOS reserved
                                  UUID: 97AB0659-DD35-44D2-9364-7D105ABBA4C1
          64           1      11  Label: "RWFW"
                                  Type: ChromeOS firmware
                                  UUID: 75064E24-BD6F-4FC5-8662-FE3CE6117116
      167936      131072      12  Label: "EFI-SYSTEM"
                                  Type: EFI System Partition
                                  UUID: B737BCEC-546E-497B-BF20-C3E219E28A76
                                  Attr: legacy_boot=1 
    61071327          32          Sec GPT table
    61071359           1          Sec GPT header
+ futility flash --wp-status
WP status: enabled
# Extracting BIOS components...
# Reading BIOS image from flash...
+ futility read bios.rom
INFO: load_system_firmware: Reading SPI Flash..
Wrote AP firmware to bios.rom
+ futility dump_fmap -x bios.rom
hit at 0x00020000
fmap_signature   __FMAP__
fmap_version:    1.1
fmap_base:       0x0
fmap_size:       0x00800000 (8388608)
fmap_name:       FLASH
fmap_nareas:     26
area:            1
area_offset:     0x00000000
area_size:       0x00400000 (4194304)
area_name:       WP_RO
saved as "WP_RO"
area:            2
area_offset:     0x00000000
area_size:       0x003f8000 (4161536)
area_name:       RO_SECTION
saved as "RO_SECTION"
area:            3
area_offset:     0x00000000
area_size:       0x00020000 (131072)
area_name:       BOOTBLOCK
saved as "BOOTBLOCK"
area:            4
area_offset:     0x00020000
area_size:       0x00001000 (4096)
area_name:       FMAP
saved as "FMAP"
area:            5
area_offset:     0x00021000
area_size:       0x003d4000 (4014080)
area_name:       COREBOOT
saved as "COREBOOT"
area:            6
area_offset:     0x003f5000
area_size:       0x00002f00 (12032)
area_name:       GBB
saved as "GBB"
area:            7
area_offset:     0x003f7f00
area_size:       0x00000100 (256)
area_name:       RO_FRID
saved as "RO_FRID"
area:            8
area_offset:     0x003f8000
area_size:       0x00008000 (32768)
area_name:       RO_VPD
saved as "RO_VPD"
area:            9
area_offset:     0x00400000
area_size:       0x00150000 (1376256)
area_name:       RW_SECTION_A
saved as "RW_SECTION_A"
area:            10
area_offset:     0x00400000
area_size:       0x00002000 (8192)
area_name:       VBLOCK_A
saved as "VBLOCK_A"
area:            11
area_offset:     0x00402000
area_size:       0x0014df00 (1367808)
area_name:       FW_MAIN_A
saved as "FW_MAIN_A"
area:            12
area_offset:     0x0054ff00
area_size:       0x00000100 (256)
area_name:       RW_FWID_A
saved as "RW_FWID_A"
area:            13
area_offset:     0x00550000
area_size:       0x00009000 (36864)
area_name:       RW_MISC
saved as "RW_MISC"
area:            14
area_offset:     0x00550000
area_size:       0x00004000 (16384)
area_name:       RW_VPD
saved as "RW_VPD"
area:            15
area_offset:     0x00554000
area_size:       0x00002000 (8192)
area_name:       RW_NVRAM
saved as "RW_NVRAM"
area:            16
area_offset:     0x00556000
area_size:       0x00002000 (8192)
area_name:       RW_DDR_TRAINING
saved as "RW_DDR_TRAINING"
area:            17
area_offset:     0x00558000
area_size:       0x00001000 (4096)
area_name:       RW_ELOG
saved as "RW_ELOG"
area:            18
area_offset:     0x00559000
area_size:       0x0004e000 (319488)
area_name:       DRAMK_LOG
saved as "DRAMK_LOG"
area:            19
area_offset:     0x005a7000
area_size:       0x00150000 (1376256)
area_name:       RW_SECTION_B
saved as "RW_SECTION_B"
area:            20
area_offset:     0x005a7000
area_size:       0x00002000 (8192)
area_name:       VBLOCK_B
saved as "VBLOCK_B"
area:            21
area_offset:     0x005a9000
area_size:       0x0014df00 (1367808)
area_name:       FW_MAIN_B
saved as "FW_MAIN_B"
area:            22
area_offset:     0x006f6f00
area_size:       0x00000100 (256)
area_name:       RW_FWID_B
saved as "RW_FWID_B"
area:            23
area_offset:     0x006f7000
area_size:       0x00009000 (36864)
area_name:       RW_SHARED
saved as "RW_SHARED"
area:            24
area_offset:     0x006f7000
area_size:       0x00001000 (4096)
area_name:       SHARED_DATA
saved as "SHARED_DATA"
area:            25
area_offset:     0x006f8000
area_size:       0x00008000 (32768)
area_name:       RW_UNUSED
saved as "RW_UNUSED"
area:            26
area_offset:     0x00700000
area_size:       0x00100000 (1048576)
area_name:       RW_LEGACY
saved as "RW_LEGACY"
# Pulling root and recovery keys from GBB...
+ futility gbb -g --rootkey rootkey.vbpubk --recoverykey recoverykey.vbpubk GBB
 - exported root_key to file: rootkey.vbpubk
 - exported recovery_key to file: recoverykey.vbpubk
+ futility vbutil_key --unpack rootkey.vbpubk
Public Key file:   rootkey.vbpubk
Algorithm:         8 RSA4096 SHA512
Key Version:       1
Key sha1sum:       1fcffbe36482e537d6a2c6f0d834e554c7a74ea1
+ futility vbutil_key --unpack recoverykey.vbpubk
Public Key file:   recoverykey.vbpubk
Algorithm:         8 RSA4096 SHA512
Key Version:       1
Key sha1sum:       33bd891576b98c9dc181f12ffc7c79ae8f570096
+ futility verify -P bios.rom
bios::GBB::version::1.2
bios::GBB::flags::0
bios::GBB::hwid::offset::128
bios::GBB::hwid::size::256
bios::GBB::bmpvf::offset::4480
bios::GBB::bmpvf::size::0
bios::GBB::root_key::offset::384
bios::GBB::root_key::size::4096
bios::GBB::recovery_key::offset::4480
bios::GBB::recovery_key::size::4096
bios::GBB::size::8576
bios::GBB::header::valid
bios::GBB::hwid::value::KENZO-IGRW C4B-A2B-B2B-B92-A6X
bios::GBB::hwid::digest::algorithm::2::SHA256
bios::GBB::hwid::digest::hex::f9f641f5d8531b6efd8bccf61bcb782177971cc457ab6feca270e2644eefdcb1
bios::GBB::hwid::digest::valid
bios::GBB::root_key::valid
bios::GBB::root_key::api::1.0
bios::GBB::root_key::algorithm::8::RSA4096 SHA512
bios::GBB::root_key::version::1
bios::GBB::root_key::sha1_sum::1fcffbe36482e537d6a2c6f0d834e554c7a74ea1
bios::GBB::recovery_key::valid
bios::GBB::recovery_key::api::1.0
bios::GBB::recovery_key::algorithm::8::RSA4096 SHA512
bios::GBB::recovery_key::version::1
bios::GBB::recovery_key::sha1_sum::33bd891576b98c9dc181f12ffc7c79ae8f570096
bios::VBLOCK_A::keyblock::valid
bios::VBLOCK_A::keyblock::size::1720
bios::VBLOCK_A::keyblock::signature::valid
bios::VBLOCK_A::keyblock::signature::size::512
bios::VBLOCK_A::keyblock::signature::data_size::1144
bios::VBLOCK_A::keyblock::flags::7::!DEV:DEV:!REC
bios::VBLOCK_A::keyblock::data_key::algorithm::7::RSA4096 SHA256
bios::VBLOCK_A::keyblock::data_key::version::1
bios::VBLOCK_A::keyblock::data_key::sha1_sum::387a2222ca49b51b5bf6987a0fc39fb99f93b253
bios::VBLOCK_A::preamble::valid
bios::VBLOCK_A::preamble::signature::valid
bios::VBLOCK_A::preamble::size::2164
bios::VBLOCK_A::preamble::header_version::2.1
bios::VBLOCK_A::preamble::firmware_version::1
bios::VBLOCK_A::preamble::kernel_subkey::algorithm::8::RSA4096 SHA512
bios::VBLOCK_A::preamble::kernel_subkey::version::1
bios::VBLOCK_A::preamble::kernel_subkey::sha1_sum::fa1ec4cda8d26f3ec9cc187abb460b3c819aa9d5
bios::VBLOCK_A::preamble::flags::0
bios::VBLOCK_A::body::size::420544
bios::VBLOCK_A::body::signature::valid
bios::VBLOCK_A::verified
bios::VBLOCK_B::keyblock::valid
bios::VBLOCK_B::keyblock::size::1720
bios::VBLOCK_B::keyblock::signature::valid
bios::VBLOCK_B::keyblock::signature::size::512
bios::VBLOCK_B::keyblock::signature::data_size::1144
bios::VBLOCK_B::keyblock::flags::7::!DEV:DEV:!REC
bios::VBLOCK_B::keyblock::data_key::algorithm::7::RSA4096 SHA256
bios::VBLOCK_B::keyblock::data_key::version::1
bios::VBLOCK_B::keyblock::data_key::sha1_sum::387a2222ca49b51b5bf6987a0fc39fb99f93b253
bios::VBLOCK_B::preamble::valid
bios::VBLOCK_B::preamble::signature::valid
bios::VBLOCK_B::preamble::size::2164
bios::VBLOCK_B::preamble::header_version::2.1
bios::VBLOCK_B::preamble::firmware_version::1
bios::VBLOCK_B::preamble::kernel_subkey::algorithm::8::RSA4096 SHA512
bios::VBLOCK_B::preamble::kernel_subkey::version::1
bios::VBLOCK_B::preamble::kernel_subkey::sha1_sum::fa1ec4cda8d26f3ec9cc187abb460b3c819aa9d5
bios::VBLOCK_B::preamble::flags::0
bios::VBLOCK_B::body::size::421824
bios::VBLOCK_B::body::signature::valid
bios::VBLOCK_B::verified
# Verify firmware A with root key: 
# OK
#   TPM=0x00010001, this=0x00010001
# Verify firmware B with root key: 
# OK
#   TPM=0x00010001, this=0x00010001
# Examining kernels...
# copying /dev/mmcblk0p2 to kern_0...
+ dd if=/dev/mmcblk0p2 of=kern_0
65536+0 records in
65536+0 records out
33554432 bytes (34 MB, 32 MiB) copied, 0.235929 s, 142 MB/s
# Kernel /dev/mmcblk0p2: 
+ futility vbutil_keyblock --unpack kern_0
Keyblock file:        kern_0
Signature             ignored
Flags:                7  !DEV DEV !REC
Data key algorithm:   4 RSA2048 SHA256
Data key version:     1
Data key sha1sum:     2525a18936f802592086b3dbfdcb739e2dafd309
# OK
#   Verify /dev/mmcblk0p2 with VBLOCK_A: 
+ futility verify -P --publickey VBLOCK_A kern_0
kernel::keyblock::valid
kernel::keyblock::size::1208
kernel::keyblock::signature::valid
kernel::keyblock::signature::size::512
kernel::keyblock::signature::data_size::632
kernel::keyblock::flags::7::!DEV:DEV:!REC
kernel::keyblock::data_key::algorithm::4::RSA2048 SHA256
kernel::keyblock::data_key::version::1
kernel::keyblock::data_key::sha1_sum::2525a18936f802592086b3dbfdcb739e2dafd309
kernel::preamble::valid
kernel::preamble::signature::valid
kernel::preamble::size::64328
kernel::preamble::header_version::2.2
kernel::preamble::kernel_version::5
kernel::preamble::flags::0
kernel::body::address::1048576
kernel::body::size::13283328
kernel::bootloader::address::14331904
kernel::bootloader::size::0
kernel::body::signature::valid
kernel::verified
# OK
#     TPM=0x00010005 this=0x00010005
#   Verify /dev/mmcblk0p2 with VBLOCK_B: 
+ futility verify -P --publickey VBLOCK_B kern_0
kernel::keyblock::valid
kernel::keyblock::size::1208
kernel::keyblock::signature::valid
kernel::keyblock::signature::size::512
kernel::keyblock::signature::data_size::632
kernel::keyblock::flags::7::!DEV:DEV:!REC
kernel::keyblock::data_key::algorithm::4::RSA2048 SHA256
kernel::keyblock::data_key::version::1
kernel::keyblock::data_key::sha1_sum::2525a18936f802592086b3dbfdcb739e2dafd309
kernel::preamble::valid
kernel::preamble::signature::valid
kernel::preamble::size::64328
kernel::preamble::header_version::2.2
kernel::preamble::kernel_version::5
kernel::preamble::flags::0
kernel::body::address::1048576
kernel::body::size::13283328
kernel::bootloader::address::14331904
kernel::bootloader::size::0
kernel::body::signature::valid
kernel::verified
# OK
#     TPM=0x00010005 this=0x00010005
#   Verify /dev/mmcblk0p2 with recoverykey.vbpubk: 
+ futility verify -P --publickey recoverykey.vbpubk kern_0
kernel::keyblock::valid
kernel::keyblock::size::1208
kernel::keyblock::signature::invalid
kernel::keyblock::signature::size::512
kernel::keyblock::signature::data_size::632
kernel::keyblock::flags::7::!DEV:DEV:!REC
kernel::keyblock::data_key::algorithm::4::RSA2048 SHA256
kernel::keyblock::data_key::version::1
kernel::keyblock::data_key::sha1_sum::2525a18936f802592086b3dbfdcb739e2dafd309
kernel::preamble::valid
kernel::preamble::signature::valid
kernel::preamble::size::64328
kernel::preamble::header_version::2.2
kernel::preamble::kernel_version::5
kernel::preamble::flags::0
kernel::body::address::1048576
kernel::body::size::13283328
kernel::bootloader::address::14331904
kernel::bootloader::size::0
kernel::body::signature::valid
# FAILED
# copying /dev/mmcblk0p4 to kern_1...
+ dd if=/dev/mmcblk0p4 of=kern_1
65536+0 records in
65536+0 records out
33554432 bytes (34 MB, 32 MiB) copied, 0.286749 s, 117 MB/s
# Kernel /dev/mmcblk0p4: 
+ futility vbutil_keyblock --unpack kern_1
Keyblock file:        kern_1
Signature             ignored
Flags:                7  !DEV DEV !REC
Data key algorithm:   4 RSA2048 SHA256
Data key version:     1
Data key sha1sum:     2525a18936f802592086b3dbfdcb739e2dafd309
# OK
#   Verify /dev/mmcblk0p4 with VBLOCK_A: 
+ futility verify -P --publickey VBLOCK_A kern_1
kernel::keyblock::valid
kernel::keyblock::size::1208
kernel::keyblock::signature::valid
kernel::keyblock::signature::size::512
kernel::keyblock::signature::data_size::632
kernel::keyblock::flags::7::!DEV:DEV:!REC
kernel::keyblock::data_key::algorithm::4::RSA2048 SHA256
kernel::keyblock::data_key::version::1
kernel::keyblock::data_key::sha1_sum::2525a18936f802592086b3dbfdcb739e2dafd309
kernel::preamble::valid
kernel::preamble::signature::valid
kernel::preamble::size::64328
kernel::preamble::header_version::2.2
kernel::preamble::kernel_version::5
kernel::preamble::flags::0
kernel::body::address::1048576
kernel::body::size::13283328
kernel::bootloader::address::14331904
kernel::bootloader::size::0
kernel::body::signature::valid
kernel::verified
# OK
#     TPM=0x00010005 this=0x00010005
#   Verify /dev/mmcblk0p4 with VBLOCK_B: 
+ futility verify -P --publickey VBLOCK_B kern_1
kernel::keyblock::valid
kernel::keyblock::size::1208
kernel::keyblock::signature::valid
kernel::keyblock::signature::size::512
kernel::keyblock::signature::data_size::632
kernel::keyblock::flags::7::!DEV:DEV:!REC
kernel::keyblock::data_key::algorithm::4::RSA2048 SHA256
kernel::keyblock::data_key::version::1
kernel::keyblock::data_key::sha1_sum::2525a18936f802592086b3dbfdcb739e2dafd309
kernel::preamble::valid
kernel::preamble::signature::valid
kernel::preamble::size::64328
kernel::preamble::header_version::2.2
kernel::preamble::kernel_version::5
kernel::preamble::flags::0
kernel::body::address::1048576
kernel::body::size::13283328
kernel::bootloader::address::14331904
kernel::bootloader::size::0
kernel::body::signature::valid
kernel::verified
# OK
#     TPM=0x00010005 this=0x00010005
#   Verify /dev/mmcblk0p4 with recoverykey.vbpubk: 
+ futility verify -P --publickey recoverykey.vbpubk kern_1
kernel::keyblock::valid
kernel::keyblock::size::1208
kernel::keyblock::signature::invalid
kernel::keyblock::signature::size::512
kernel::keyblock::signature::data_size::632
kernel::keyblock::flags::7::!DEV:DEV:!REC
kernel::keyblock::data_key::algorithm::4::RSA2048 SHA256
kernel::keyblock::data_key::version::1
kernel::keyblock::data_key::sha1_sum::2525a18936f802592086b3dbfdcb739e2dafd309
kernel::preamble::valid
kernel::preamble::signature::valid
kernel::preamble::size::64328
kernel::preamble::header_version::2.2
kernel::preamble::kernel_version::5
kernel::preamble::flags::0
kernel::body::address::1048576
kernel::body::size::13283328
kernel::bootloader::address::14331904
kernel::bootloader::size::0
kernel::body::signature::valid
# FAILED
# copying /dev/mmcblk0p6 to kern_2...
+ dd if=/dev/mmcblk0p6 of=kern_2
1+0 records in
1+0 records out
512 bytes copied, 0.00227154 s, 225 kB/s
# Kernel /dev/mmcblk0p6: 
+ futility vbutil_keyblock --unpack kern_2
Invalid keyblock file: kern_2
ERROR: Unpack: vbutil_keyblock: Error reading keyblock.
# FAILED
+ od -Ax -tx1 kern_2 | head
000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
*
000200
# Report UMA metrics: System firmware matched OS bundled firmware.
