08-20210301在WIN10下通过网口给华为海思Hi3516DV300刷机(鸿蒙系统)
2021/3/5 11:03

https://bbs.elecfans.com/jishu_2002000_1_1.html
[经验] 【HarmonyOS HiSpark AI Camera】初遇鸿蒙系统——2.uboot、kernel、fs文件系统烧写

开发板:【HarmonyOS HiSpark AI Camera】
串口/SSH工具:Xshell-7(Build 0056)
USB转串口驱动:CH340请自行安装
烧录工具:Hi3516-HiTool.zip。HiTool版本:5.2.7
烧录方式:通过交换机/路由器中转。(我这里直连没有测试成功,将直连网线改了一条交叉网线也不行!)

(对于Hi3516DV300有系统:)
1、通过串口将eMMC擦除全器件:(HiTool需要独占串口)

PC与板端配置:
传输方式:串口
本地PC配置:串口/COM6(以你的电脑的实际配置为准!)
烧写eMMC→擦除全器件

擦写之前,请关闭XShell,不然会出现警告:
Can not connect to the Serial Port! It may be in use.

关闭XShell之后,还需要重新拔(等大概5秒钟)插USB一次。

All devices erased successfully!
The images are erased successfully, which took 3 分29 秒!

2、通过串口烧写uboot:

需要重新拔(等大概5秒钟)插USB一次。

烧写成功,共耗时39秒。

3、配置uboot:
在Xshell6中配置步骤:
setenv ethact eth0
setenv  ethaddr 00:11:22:33:44:55
setenv  ipaddr 192.168.0.10
setenv serverip 192.168.0.149
saveenv

在WIN10的命令行中输入:ipconfig/all
可以找到自己的局域网IP地址:192.168.0.149(以你自己的电脑实际为准!)

hisilicon # 
hisilicon # 
hisilicon # print
arch=arm
baudrate=115200
board=hi3516dv300
board_name=hi3516dv300
bootcmd=run distro_bootcmd
bootdelay=2
cpu=armv7
ethact=eth0
soc=hi3516dv300
stderr=serial
stdin=serial
stdout=serial
vendor=hisilicon
verify=n

Environment size: 211/262140 bytes
hisilicon # 
hisilicon # setenv ethact eth0
hisilicon # setenv  ethaddr 00:11:22:33:44:55
hisilicon # setenv  ipaddr 192.168.0.10
hisilicon # setenv serverip 192.168.0.149
hisilicon # saveenv
Saving Environment to MMC... Writing to MMC(0)... OK
hisilicon # 
hisilicon # print
arch=arm
baudrate=115200
board=hi3516dv300
board_name=hi3516dv300
bootcmd=run distro_bootcmd
bootdelay=2
cpu=armv7
ethact=eth0
ethaddr=00:11:22:33:44:55
ipaddr=192.168.0.10
serverip=192.168.0.149
soc=hi3516dv300
stderr=serial
stdin=serial
stdout=serial
vendor=hisilicon
verify=n

Environment size: 280/262140 bytes
hisilicon #

https://bbs.elecfans.com/jishu_1992907_1_1.html
[资料] 【HarmonyOS HiSpark AI Camera】环境变量

4、通过网口给Hi3516DV300刷机(uboot可以不用刷)
使用网线将【HarmonyOS HiSpark AI Camera】和交换机/交换机连接在一起。

HiTool配置:
PC与板端配置:
传输方式:网口(推荐)
本地PC配置:服务器IP(192.168.0.149)。这个是自动出现的,没有出现就点击刷新!(需要给通过USB给开发板上电!)
板端配置:
IP地址:192.168.0.10(和你在uboot中的配置相同。记住和你的本地PC地址同一网段,并且没有被占用)
子网掩码:255.255.255.0
网关:192.168.0.1(记住和你的本地PC地址同一网段的网关)
物理地址:00:11:22:33:44:55(参考设置。和你在uboot中的配置相同)

开发板的设置配置完成后,点击“管理”按钮下面的“保存”。以便下次备用!

烧写,烧写之前需要关闭XShell!

虽然Hitool是通过网口给Hi3516DV300的eMMC刷机的,但是应该还是需要使用串口来传递数据(控制信息?同步信息?校验信息?)

关闭XShell之后,还需要重新拔(等大概5秒钟)插USB一次。
烧写成功,耗时56秒。(大概1分钟上下!)

hisilicon # 
hisilicon # print
arch=arm
baudrate=115200
board=hi3516dv300
board_name=hi3516dv300
bootcmd=run distro_bootcmd
bootdelay=2
cpu=armv7
ethact=eth0
ethaddr=00:11:22:33:44:55
ipaddr=192.168.0.10
serverip=192.168.0.149
soc=hi3516dv300
stderr=serial
stdin=serial
stdout=serial
vendor=hisilicon
verify=n

Environment size: 280/262140 bytes
hisilicon # 
hisilicon # 
hisilicon # 
hisilicon # 
hisilicon # 
hisilicon # setenv bootcmd "mmc read 0x0 0x80000000 0x800 0x4800; go 0x80000000";
hisilicon # setenv bootargs "console=ttyAMA0,115200n8 root=emmc fstype=vfat rootaddr=10M rootsize=15M rw";
hisilicon # 
hisilicon # saveenv
Saving Environment to MMC... Writing to MMC(0)... OK
hisilicon # 
hisilicon # print
arch=arm
baudrate=115200
board=hi3516dv300
board_name=hi3516dv300
bootargs=console=ttyAMA0,115200n8 root=emmc fstype=vfat rootaddr=10M rootsize=15M rw
bootcmd=mmc read 0x0 0x80000000 0x800 0x4800; go 0x80000000
bootdelay=2
cpu=armv7
ethact=eth0
ethaddr=00:11:22:33:44:55
ipaddr=192.168.0.10
serverip=192.168.0.149
soc=hi3516dv300
stderr=serial
stdin=serial
stdout=serial
vendor=hisilicon
verify=n

Environment size: 398/262140 bytes
hisilicon #

hisilicon # 
hisilicon # reset
resetting ...

System startup

Uncompress Ok!

U-Boot 2020.01 (Sep 01 2020 - 09:25:23 +0800)hi3516dv300

DRAM:  MMC:   
EMMC/MMC/SD controller initialization.
scan edges:2 p2f:6 f2p:1
mix set temp-phase 3
scan elemnts: startp:2 endp:114
Tuning SampleClock. mix set phase:[03/07] ele:[13d/15]
MMC/SD Card:
    MID:         0x15
    Read Block:  512 Bytes
    Write Block: 512 Bytes
    Chip Size:   7456M Bytes (High Capacity)
    Name:        "8GTF4"
    Chip Type:   MMC
    Version:     0.0
    Speed:       100000000Hz
    Bus Width:   4bit
himci: 0 (eMMC)
Loading Environment from MMC... OK
In:    serial
Out:   serial
Err:   serial
Net:   eth0
Hit any key to stop autoboot:  0

MMC read: dev # 0, block # 2048, count 18432 ... 18432 blocks read: OK
45.22 MB/s
## Starting application at 0x80000000 ...

******************Welcome******************

Processor   : Cortex-A7 * 2
Run Mode    : SMP
GIC Rev     : GICv2
build time  : Feb 26 2021 15:41:49
Kernel      : Huawei LiteOS 2.0.0.35/debug

*******************************************

main core booting up...
[ERR][HDF:E/hcs_blob_if]CheckHcsBlobLength: the blobLength: 13128, byteAlign: 1, totalSize: -13108
releasing 1 secondary cores
cpu 0 entering scheduler
random dev init ...
cpu 1 entering scheduler
proc fs init ...
Mount procfs finished.
MMC dev init ...[ERR]No console dev used.
[ERR]No console dev used.
mem dev init ...
spi nor flash init ...
spinor_get_dev_id(56): Spi(cs0) have no device.
Cs[0] have no device!!!
spinor_get_dev_id(56): Spi(cs1) have no device.
Cs[1] have no device!!!
hifmc100_attach(130): Error:spinor scan fail!
net init ...

tcpip_init start

tcpip_init end
Ethernet start.hisi_eth: User did not set phy mode, use default=rmii
disk_init : register /dev/mmcblk0 ok!
hisi_eth: User did not set phy addr, auto scan...
No OTP data, festa PHY use default ATE parameters!
festa PHY wait autotrim done timeout! 
Detected phy addr 1, phyid: 0x1cc816
spinor_get_dev_id(56): Spi(cs0) have no device.
Cs[0] have no device!!!
spinor_get_dev_id(56): Spi(cs1) have no device.
Cs[1] have no device!!!
hifmc100_attach(130): Error:spinor scan fail!
Link is Up - 100Mbps/Full

************************************************************
usb init ...

******** usb_init in **********
usb v3.05 2019-11-20 10:40
xhci_init (xhci0): 64 bytes context size, 32-bit DMA
usb_bus_attach (usbus0): 5.0Gbps Super Speed USB v3.0
spinor_get_dev_id(56): Spi(cs0) have no device.
Cs[0] have no device!!!
spinor_get_dev_id(56): Spi(cs1) have no device.
Cs[1] have no device!!!
hifmc100_attach(130): Error:spinor scan fail!
******** usb_init ok**********

Date:Feb 26 2021.
Time:15:42:43.
ugen0.1: <vendor 0x0000> at usbus0
OsMountRootfs start ...
device_set_usb_desc (uhub0): <vendor 0x0000 XHCI root HUB, class 9/0, rev 3.00/1.00, addr 1> on usbus0
disk_init : register /dev/mmcblk0 ok!
DiskAddPart : register /dev/mmcblk0p0 ok!
DiskAddPart : register /dev/mmcblk0p1 ok!
DiskAddPart : register /dev/mmcblk0p2 ok!
Format to FAT32, 64 sectors per cluster.
OsMountRootfs end ...
g_mmz_start=0x88000000, g_mmz_size=0x180
mmz param= anonymous,0,0x88000000,384M
<6>Hisilicon Media Memory Zone Manager
Load hifb.ko OK!
uhub_attach (uhub0): 1 port with 1 removable, self powered
[VERSION]:Hi3881V100R001C00SPC020 2020-07-16 23:15:00
oam_main_init SUCCESSFULLY!
wal_customize_init SUCCESSFULLY!
oal_main_init SUCCESSFULLY
frw_main_init SUCCESSFULLY!
hi_wifi_plat_init SUCCESSFULLY
sdio probe:pull up power on gpio
hcc_hmac_init SUCCESSFULLY
plat_firmware_init SUCCESSFULLY
Device is Ready!
wlan_pm_open SUCCESSFULLY!!
hmac_main_init SUCCESSULLY
get rates from device
wal_main_init SUCCESSFULLY
hi_wifi_host_init SUCCESSFULLY
Hi3881 DRV insmod SUCCESSFULLY!
[ERR][HDF:E/HDF_LOG_TAG]HdfWifiDriverInit:init chip 0 success!
sdk init end
cat log shell end
[Init] ****/****/****/****/OpenHarmony/****/****/3/OpenHarmony 1.0/debug
[Init] DoMount, failed for vfat /dev/mmcblk0 /sdcard rw,umask=000, err -1.
[ERR]Failed to find block driver /dev/mmcblk1
[Init] DoMount, failed for vfat /dev/mmcblk1 /sdcard rw,umask=000, err -1.
[Init] start service shell succeed, pid 3.
OHOS # [Init] start service apphilogcat succeed, pid 4.
[Init] start service foundation succeed, pid 5.
01-01 00:00:10.510 5 29 I 01800/Samgr: Initialize Registry!
01-01 00:00:10.532 5 29 I 00000/(null): Init pms service success
01-01 00:00:10.549 5 29 I 00000/(null): Init ipcAuth feature success
01-01 00:00:10.555 5 29 I 00000/(null): Init pms inner feature success
01-01 00:00:10.555 5 29 I 00000/(null): Init pms lite feature success
01-01 00:00:10.614 5 29 I 01300/abilityms: AbilityManagerService::Init(43): ams start result is successfully
01-01 00:00:10.620 5 29 I 01300/abilityms: AbilityMgrFeature::Init(70): ams feature init success
01-01 00:00:10.620 5 29 I 01300/abilityms: AbilityInnerFeature::Init(60): ams inner feature init success
01-01 00:00:10.665 5 29 D 00000/(null): BundleMS start success
01-01 00:00:10.670 5 29 D 00000/(null): BundleMS inner feature start success
01-01 00:00:10.670 5 29 D 00000/(null): BundleMS feature start success
01-01 00:00:10.732 5 29 D 00000/(null): [DMSLITE][Init:86][dms service start success]

01-01 00:00:10.736 5 29 I 01800/Samgr: Bootstrap core services(count:5).
01-01 00:00:10.744 5 29 I 01800/Samgr: Init service:samgr TaskPool:0x2002a8e0
[UnRegisteDeathCallback : 960]Wrong cbId:4294967295.
[UnRegisteDeathCallback : 960]Wrong cbId:4294967295.
[UnRegisteDeathCallback : 960]Wrong cbId:4294967295.
01-01 00:00:10.802 5 36 D 01800/Samgr: RegisterRemoteFeatures<bundlems, BmsInnerFeature> ret:0
01-01 00:00:10.802 5 36 D 01800/Samgr: RegisterIdentity <bundlems, BmsFeature> pid<5> <36, 1> 
01-01 00:00:10.802 5 36 D 01800/Samgr: RegisterRemoteFeatures<bundlems, BmsFeature> ret:0
01-01 00:00:10.802 5 36 D 01800/Samgr: RegisterIdentity <permissionms, PmsFeature> pid<5> <36, 2> 
01-01 00:00:10.802 5 36 D 01800/Samgr: RegisterRemoteFeatures<permissionms, PmsFeature> ret:0
01-01 00:00:10.802 5 36 D 01800/Samgr: RegisterIdentity <abilityms, AmsFeature> pid<5> <36, 3> 
01-01 00:00:10.802 5 36 D 01800/Samgr: RegisterRemoteFeatures<abilityms, AmsFeature> ret:0
01-01 00:00:10.802 5 36 D 01800/Samgr: RegisterIdentity <abilityms, AmsInnerFeature> pid<5> <36, 4> 
[DISCOVERY] InitLocalDeviceInfo ok
01-01 00:00:10.802 5 36 D 01800/Samgr: RegisterRemoteFeatures<abilityms, AmsInnerFeature> ret:0
01-01 00:00:10.802 5 36 I 01800/Samgr: Register endpoint<ipc receive> and iunknown finished! remain<0> iunknown!
[DISCOVERY] CoapReadHandle coin select begin
[AUTH] StartBus StartListener fail
[DISCOVERY] InitService BusManager(1) fail
[DISCOVERY] InitService ok
[DISCOVERY] PublishCallback publishId=1, result=0
01-01 00:00:10.955 5 34 D 00000/(null): [DMSLITE][RegisterTcpCallback:85][Register failed, errCode = -1]

01-01 00:00:10.955 5 34 I 00000/(null): [DMSLITE][OnPublishSuccess:115][dms service publish success]

01-01 00:00:10.955 5 34 I 01800/Samgr: Init service dtbschedsrv <time: 224ms> success!
01-01 00:00:10.955 5 34 I 01800/Samgr: Initialized all core system services!
01-01 00:00:10.955 5 34 I 01800/Samgr: Goto next boot step failed! errno:-9
[Init] start service bundle_daemon succeed, pid 6.
01-01 00:00:11.241 6 39 E 01100/bundle_deamon: BundleDaemon::Init(52): register default feature api success[UnRegisteDeathCallback : 960]Wrong cbId:4294967295.
[UnRegisteDeathCallback : 960]Wrong cbId:4294967295.

01-01 00:00:11.241 6 39 I 01800/Samgr: Init service:bundle_daemon TaskPool:0x21176c10
01-01 00:00:11.241 6 40 I 01800/Samgr: Initialize Registry!
01-01 00:00:11.242 5 30 I 01800/Samgr: Register Endpoint<6, 41, 0>
01-01 00:00:11.242 5 30 D 01800/Samgr: Register Feature<bundle_daemon, (null)> pid<6>, id<41, 0> ret:0
01-01 00:00:11.243 6 41 D 01800/Samgr: RegisterRemoteFeatures<bundle_daemon, (null)> ret:0
01-01 00:00:11.243 6 41 I 01800/Samgr: Register endpoint<ipc client> and iunknown finished! remain<0> iunknown!
01-01 00:00:11.243 5 30 D 01800/Samgr: Register Feature<bundle_daemon, (null)> pid<6>, id<41, 0> ret:0
01-01 00:00:11.243 6 40 I 01800/Samgr: Register server sa<bundle_daemon, (null)> id<4294967295, 0> retry:1 ret:0!
01-01 00:00:11.243 6 40 I 01800/Samgr: Init service bundle_daemon <time: 2ms> success!
01-01 00:00:11.243 6 40 I 01800/Samgr: Initialized all core system services!
01-01 00:00:11.243 6 40 I 01800/Samgr: Goto next boot step failed! errno:-9
01-01 00:00:11.273 5 33 I 01800/Samgr: Create proxy[0x1fe2c890]<bundle_daemon, (null), 41, 0>
01-01 00:00:11.274 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 8
01-01 00:00:11.333 5 33 I 00000/(null): current mode is 0!
[ERR]Unsupported API sysconf
01-01 00:00:11.367 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:140] :sign head: size: 8409, blockNum:0x2
01-01 00:00:11.391 5 33 E 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:168] :find block type: 20000002
01-01 00:00:11.391 5 33 E 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:168] :find block type: 20000000
write file switch /storage/data/log/hilog1.txt
01-01 00:00:11.392 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:189] :type: 536870912, len: 3409, offset: 4968 signoffset: 43408
01-01 00:00:11.408 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:220] :buf begin
01-01 00:00:11.550 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:909] :load root ca success
01-01 00:00:11.570 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:613] :ParseSignedData 0
01-01 00:00:11.570 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1300] :Parse pkcs#7 signed data success
01-01 00:00:11.570 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:793] :To filter one signer's cert
01-01 00:00:11.578 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:797] :Found signer's low level cert
01-01 00:00:11.578 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:1083] :pkcs7 parse message sucess
01-01 00:00:11.578 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:1098] :get cert Type : 2
01-01 00:00:11.578 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1022] :signer : 1
01-01 00:00:11.926 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:996] :Verify signers cert chain root cert success
01-01 00:00:11.926 5 33 D 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1035] :Verify : 0
01-01 00:00:11.926 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:1019] :Verify certs success
01-01 00:00:11.973 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:189] :type: 536870914, len: 4944, offset: 24 signoffset: 43408
01-01 00:00:11.988 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:220] :buf begin
01-01 00:00:11.988 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify_hap.c:143] :signBuf 30 4944
write file switch /storage/data/log/hilog2.txt
01-01 00:00:11.989 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify_hap.c:332] :finish
01-01 00:00:11.989 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:1026] :VerifyRawHash success
01-01 00:00:11.989 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:862] :get signer signature len : 70
01-01 00:00:11.989 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:291] :signer context hash equal with attr hash
01-01 00:00:12.063 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:892] :Verify signer signature success

01-01 00:00:12.093 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:545] :Parse signed data certs success
01-01 00:00:12.093 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:613] :ParseSignedData 0
01-01 00:00:12.093 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1300] :Parse pkcs#7 signed data success
01-01 00:00:12.093 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:793] :To filter one signer's cert
01-01 00:00:12.093 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:797] :Found signer's low level cert
01-01 00:00:12.093 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:489] :pkcs7 parse message sucess
01-01 00:00:12.093 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1022] :signer : 1
[Init] start service appspawn succeed, pid 7.
[UnRegisteDeathCallback : 960]Wrong cbId:4294967295.
[UnRegisteDeathCallback : 960]Wrong cbId:4294967295.
01-01 00:00:12.245 7 43 I 00000/(null): [appspawn] get service name appspawn.
01-01 00:00:12.248 7 43 I 00000/(null): [appspawn] main, entering wait.
01-01 00:00:12.248 5 30 D 01800/Samgr: Register Feature<appspawn, (null)> pid<7>, id<45, 0> ret:0
01-01 00:00:12.248 7 45 D 01800/Samgr: RegisterRemoteFeatures<appspawn, (null)> ret:0
01-01 00:00:12.248 7 45 I 01800/Samgr: Register endpoint<ipc client> and iunknown finished! remain<0> iunknown!
01-01 00:00:12.248 5 30 D 01800/Samgr: Register Feature<appspawn, (null)> pid<7>, id<45, 0> ret:0
write file switch /storage/data/log/hilog1.txt
01-01 00:00:12.248 7 44 I 01800/Samgr: Register server sa<appspawn, (null)> id<4294967295, 0> retry:1 ret:0!
01-01 00:00:12.248 7 44 I 00000/(null): [appspawn] get service name appspawn.
01-01 00:00:12.248 7 44 I 01800/Samgr: Init service appspawn <time: 3ms> success!
01-01 00:00:12.248 7 44 I 01800/Samgr: Initialized all core system services!
01-01 00:00:12.248 7 44 I 00000/(null): [appspawn] get service name appspawn.
01-01 00:00:12.248 7 44 I 01800/Samgr: Goto next boot step failed! errno:-9
01-01 00:00:12.413 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:996] :Verify signers cert chain root cert success
01-01 00:00:12.413 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:979] :find crl
01-01 00:00:12.413 5 33 D 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1035] :Verify : 0
01-01 00:00:12.413 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:495] :Verify certs success
01-01 00:00:12.413 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:381] :profile source name : huawei system apps
01-01 00:00:12.413 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:862] :get signer signature len : 70
01-01 00:00:12.413 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:291] :signer context hash equal with attr hash
01-01 00:00:12.491 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:892] :Verify signer signature success

01-01 00:00:12.492 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:596] :GetEcPk *len 65
01-01 00:00:12.492 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:827] :cert consistent
01-01 00:00:12.492 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:1007] :verfiy app source success
01-01 00:00:12.497 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:1189] :file len: 52470
write file switch /storage/data/log/hilog2.txt
01-01 00:00:12.499 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:1217] :free verify rst data
01-01 00:00:12.521 5 33 I 00000/(null): create ZipFile instance
01-01 00:00:12.521 5 33 I 00000/(null): open: /system/internal/setting.hap
01-01 00:00:12.545 5 33 I 00000/(null): parse 8 central entries from /system/internal/setting.hap
01-01 00:00:12.545 5 33 I 00000/(null): extract file config.json
01-01 00:00:12.556 5 33 I 00000/(null): unzip with inflated
01-01 00:00:12.696 6 40 I 00000/(null): create ZipFile instance
01-01 00:00:12.696 6 40 I 00000/(null): open: /system/internal/setting.hap
01-01 00:00:12.729 6 40 I 00000/(null): parse 8 central entries from /system/internal/setting.hap
01-01 00:00:12.740 6 40 I 00000/(null): extract file config.json
01-01 00:00:12.740 6 40 I 00000/(null): get entry by name: config.json
01-01 00:00:12.740 6 40 D 00000/(null): get entry successed
01-01 00:00:12.745 6 40 I 00000/(null): unzip with inflated
01-01 00:00:12.745 6 40 I 00000/(null): seek to entry start 0x0000002d
01-01 00:00:12.748 6 40 I 00000/(null): unzip with inflated success
01-01 00:00:12.762 6 40 I 00000/(null): extract file libsetting.so
01-01 00:00:12.762 6 40 I 00000/(null): get entry by name: libsetting.so
01-01 00:00:12.762 6 40 D 00000/(null): get entry successed
01-01 00:00:12.774 6 40 I 00000/(null): unzip with inflated
01-01 00:00:12.979 6 40 I 00000/(null): unzip with inflated success
01-01 00:00:13.025 6 40 I 00000/(null): seek to entry start 0x00006e71
01-01 00:00:13.028 6 40 I 00000/(null): unzip with inflated success
01-01 00:00:13.057 6 40 I 00000/(null): unzip with inflated success
01-01 00:00:13.071 6 40 I 00000/(null): extract file res/assets/resources/base/image/enter.png
01-01 00:00:13.071 6 40 I 00000/(null): get entry by name: res/assets/resources/base/image/enter.png
01-01 00:00:13.081 6 40 I 00000/(null): unzip with inflated success
01-01 00:00:13.110 6 40 I 00000/(null): extract file res/assets/resources/base/image/forward.png
[Init] start service media_server succeed, pid 8.
01-01 00:00:13.110 6 40 D 00000/(null): get entry successed
write file switch /storage/data/log/hilog1.txt
01-01 00:00:13.118 6 40 I 00000/(null): unzip with inflated
01-01 00:00:13.118 6 40 I 00000/(null): seek to entry start 0x00007c0c
01-01 00:00:13.121 6 40 I 00000/(null): unzip with inflated success
01-01 00:00:13.153 6 40 I 00000/(null): extract file res/assets/resources/rawfile/wpa_supplicant.conf
01-01 00:00:13.153 6 40 I 00000/(null): get entry by name: res/assets/resources/rawfile/wpa_supplicant.conf
01-01 00:00:13.153 6 40 D 00000/(null): get entry successed
01-01 00:00:13.165 6 40 I 00000/(null): unzip with inflated
01-01 00:00:13.240 6 40 I 00000/(null): unzip with inflated
01-01 00:00:13.240 6 40 I 00000/(null): seek to entry start 0x00007e2d
01-01 00:00:13.393 6 40 I 00000/(null): unzip with inflated success
01-01 00:00:13.416 6 40 I 00000/(null): close: /system/internal/setting.hap
01-01 00:00:13.479 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 1
01-01 00:00:13.496 5 32 D 01300/abilityms: AbilityMgrHandler::TerminateApp(233): start
01-01 00:00:13.509 5 32 D 01300/abilityms: AppTerminateTask::Execute(29): start
01-01 00:00:13.537 5 32 I 01300/abilityms: AppManager::TerminateAppProcess(66): app record is not find
01-01 00:00:13.546 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 3
01-01 00:00:13.561 5 32 E 01300/abilityms: AbilityMissionStack::RemoveMissionRecord(68): missionRecord is null
01-01 00:00:13.561 5 32 E 01300/abilityms: AbilityStackManager::GetTopPageAbility(69): topMissionStack is nullptr
01-01 00:00:13.729 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 4
01-01 00:00:13.841 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 4
01-01 00:00:13.882 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 1
01-01 00:00:13.907 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 1
01-01 00:00:14.018 5 33 I 00000/(null): current mode is 0!
01-01 00:00:14.170 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:613] :ParseSignedData 0
[Init] start service wms_server succeed, pid 9.
write file switch /storage/data/log/hilog2.txt
01-01 00:00:14.170 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1300] :Parse pkcs#7 signed data success
01-01 00:00:14.170 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:793] :To filter one signer's cert
01-01 00:00:14.170 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:797] :Found signer's low level cert
01-01 00:00:14.170 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:1083] :pkcs7 parse message sucess
01-01 00:00:14.170 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:1098] :get cert Type : 2
01-01 00:00:14.170 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1022] :signer : 1
01-01 00:00:14.490 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:996] :Verify signers cert chain root cert success
01-01 00:00:14.490 5 33 D 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1035] :Verify : 0
01-01 00:00:14.536 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:189] :type: 536870914, len: 5284, offset: 24 signoffset: 31362
01-01 00:00:14.563 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:220] :buf begin
01-01 00:00:14.563 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify_hap.c:143] :signBuf 30 5284
01-01 00:00:14.563 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:862] :get signer signature len : 71
01-01 00:00:14.563 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:291] :signer context hash equal with attr hash
01-01 00:00:14.697 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:545] :Parse signed data certs success
01-01 00:00:14.697 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:613] :ParseSignedData 0
01-01 00:00:14.697 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1300] :Parse pkcs#7 signed data success
write file switch /storage/data/log/hilog1.txt
01-01 00:00:14.697 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:793] :To filter one signer's cert
01-01 00:00:14.697 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:797] :Found signer's low level cert
01-01 00:00:14.697 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:489] :pkcs7 parse message sucess
01-01 00:00:14.698 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1022] :signer : 1
01-01 00:00:15.020 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:996] :Verify signers cert chain root cert success
01-01 00:00:15.020 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:979] :find crl
01-01 00:00:15.020 5 33 D 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1035] :Verify : 0
01-01 00:00:15.098 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:993] :verify prof get content success
01-01 00:00:15.099 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:827] :cert consistent
01-01 00:00:15.099 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:895] :check app sign cert ret : 0
01-01 00:00:15.099 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:1007] :verfiy app source success
01-01 00:00:15.117 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:1217] :free verify rst data[Init] main, entering wait.

01-01 00:00:15.117 5 33 I 00000/(null): create ZipFile instance
01-01 00:00:15.117 5 33 I 00000/(null): open: /system/internal/launcher.hap
01-01 00:00:15.169 5 33 I 00000/(null): parse 4 central entries from /system/internal/launcher.hap
01-01 00:00:15.169 5 33 I 00000/(null): extract file config.json
01-01 00:00:15.169 5 33 I 00000/(null): get entry by name: config.json
01-01 00:00:15.169 5 33 D 00000/(null): get entry successed
01-01 00:00:15.194 5 33 I 00000/(null): unzip with inflated
01-01 00:00:15.216 5 33 I 00000/(null): close: /system/internal/launcher.hap
write file switch /storage/data/log/hilog2.txt
01-01 00:00:15.244 6 40 I 00000/(null): create ZipFile instance
01-01 00:00:15.244 6 40 I 00000/(null): open: /system/internal/launcher.hap
01-01 00:00:15.343 6 40 I 00000/(null): parse 4 central entries from /system/internal/launcher.hap
01-01 00:00:15.474 6 40 I 00000/(null): extract file config.json
[DISPLAY I/] LayerInitialize: layer initialize success
01-01 00:00:15.474 6 40 I 00000/(null): get entry by name: config.json
Media server initialize succeed.
01-01 00:00:15.474 6 40 D 00000/(null): get entry successed
01-01 00:00:15.507 6 40 I 00000/(null): unzip with inflated
01-01 00:00:15.507 6 40 I 00000/(null): seek to entry start 0x0000002d
01-01 00:00:15.521 6 40 I 00000/(null): unzip with inflated success
01-01 00:00:15.559 6 40 I 00000/(null): extract file liblauncher.so
01-01 00:00:15.594 6 40 I 00000/(null): seek to entry start 0x000001f5
01-01 00:00:16.081 6 40 I 00000/(null): get entry by name: res/drawable/weather.png
01-01 00:00:16.089 6 40 I 00000/(null): unzip with inflated
01-01 00:00:16.089 6 40 I 00000/(null): seek to entry start 0x0000740a
01-01 00:00:16.095 6 40 I 00000/(null): unzip with inflated success
01-01 00:00:16.105 6 40 I 00000/(null): close: /system/internal/launcher.hap
01-01 00:00:16.109 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 1
01-01 00:00:16.109 5 32 D 01300/abilityms: AbilityMgrHandler::TerminateApp(233): start
01-01 00:00:16.109 5 32 D 01300/abilityms: AppTerminateTask::Execute(29): start
01-01 00:00:16.109 5 32 I 01300/abilityms: AppManager::TerminateAppProcess(66): app record is not find
01-01 00:00:16.109 5 32 E 01300/abilityms: AbilityMissionStack::RemoveMissionRecord(68): missionRecord is null
01-01 00:00:16.331 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:613] :ParseSignedData 0
01-01 00:00:16.331 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1300] :Parse pkcs#7 signed data success
01-01 00:00:16.331 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:793] :To filter one signer's cert
01-01 00:00:16.331 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:797] :Found signer's low level cert
write file switch /storage/data/log/hilog1.txt
01-01 00:00:16.331 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:1083] :pkcs7 parse message sucess
01-01 00:00:16.332 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:1098] :get cert Type : 2
01-01 00:00:16.332 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1022] :signer : 1
01-01 00:00:16.646 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:996] :Verify signers cert chain root cert success
01-01 00:00:16.646 5 33 D 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1035] :Verify : 0
01-01 00:00:16.681 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify_hap.c:53] :alg: 6 wholelen: 22
01-01 00:00:16.683 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:189] :type: 536870914, len: 4940, offset: 24 signoffset: 46421
01-01 00:00:16.703 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:220] :buf begin
01-01 00:00:16.703 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify_hap.c:143] :signBuf 30 4940
01-01 00:00:16.703 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify_hap.c:332] :finish
01-01 00:00:16.800 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:545] :Parse signed data certs success
01-01 00:00:16.800 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:613] :ParseSignedData 0
01-01 00:00:16.800 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1300] :Parse pkcs#7 signed data success
01-01 00:00:16.800 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:793] :To filter one signer's cert
01-01 00:00:16.800 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:797] :Found signer's low level cert
01-01 00:00:16.800 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:489] :pkcs7 parse message sucess
write file switch /storage/data/log/hilog2.txt
01-01 00:00:16.800 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1022] :signer : 1
01-01 00:00:17.113 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:996] :Verify signers cert chain root cert success
01-01 00:00:17.113 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:979] :find crl
01-01 00:00:17.113 5 33 D 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:1035] :Verify : 0
01-01 00:00:17.113 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:495] :Verify certs success
01-01 00:00:17.113 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:381] :profile source name : huawei system apps
01-01 00:00:17.113 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:862] :get signer signature len : 71
01-01 00:00:17.113 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:291] :signer context hash equal with attr hash
01-01 00:00:17.192 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/mbedtls_pkcs7.c:892] :Verify signer signature success

01-01 00:00:17.193 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:827] :cert consistent
01-01 00:00:17.193 5 33 I 00000/(null): [../../base/security/frameworks/app_verify/src/app_verify.c:850] :dev cert consistent
01-01 00:00:17.200 5 33 I 00000/(null): create ZipFile instance
01-01 00:00:17.240 5 33 I 00000/(null): parse 14 central entries from /system/internal/camera.hap
01-01 00:00:17.240 5 33 I 00000/(null): extract file config.json
01-01 00:00:17.240 5 33 I 00000/(null): get entry by name: config.json
01-01 00:00:17.252 5 33 I 00000/(null): close: /system/internal/camera.hap
01-01 00:00:17.268 6 40 I 00000/(null): create ZipFile instance
01-01 00:00:17.268 6 40 I 00000/(null): open: /system/internal/camera.hap
01-01 00:00:17.293 6 40 I 00000/(null): parse 14 central entries from /system/internal/camera.hap
01-01 00:00:17.335 6 40 I 00000/(null): extract file config.json
[DISPLAY I/] HdmiStart: start hdmi success
write file switch /storage/data/log/hilog1.txt
01-01 00:00:17.335 6 40 I 00000/(null): get entry by name: config.json
01-01 00:00:17.335 6 40 D 00000/(null): get entry successed
01-01 00:00:17.347 6 40 I 00000/(null): unzip with inflated
01-01 00:00:17.347 6 40 I 00000/(null): seek to entry start 0x0000002d
01-01 00:00:17.350 6 40 I 00000/(null): unzip with inflated success
01-01 00:00:17.367 6 40 I 00000/(null): extract file libcameraApp.so
01-01 00:00:17.367 6 40 I 00000/(null): get entry by name: libcameraApp.so
01-01 00:00:17.590 6 40 I 00000/(null): unzip with inflated
01-01 00:00:17.590 6 40 I 00000/(null): seek to entry start 0x00004f31
01-01 00:00:17.689 6 40 I 00000/(null): unzip with inflated success
01-01 00:00:17.725 6 40 I 00000/(null): seek to entry start 0x00006402
01-01 00:00:17.768 6 40 I 00000/(null): seek to entry start 0x00006ae5
01-01 00:00:17.810 6 40 I 00000/(null): seek to entry start 0x00007952
01-01 00:00:17.846 6 40 I 00000/(null): seek to entry start 0x00008132
01-01 00:00:17.882 6 40 I 00000/(null): seek to entry start 0x000088b3
01-01 00:00:17.917 6 40 I 00000/(null): seek to entry start 0x00008e7a
01-01 00:00:17.953 6 40 I 00000/(null): seek to entry start 0x0000951e
01-01 00:00:17.989 6 40 I 00000/(null): unzip with inflated
01-01 00:00:18.055 6 40 I 00000/(null): get entry by name: res/image/camera/ic_timer.png
01-01 00:00:18.062 6 40 I 00000/(null): unzip with inflated
01-01 00:00:18.062 6 40 I 00000/(null): seek to entry start 0x0000b253
01-01 00:00:18.075 6 40 I 00000/(null): close: /system/internal/camera.hap
01-01 00:00:18.079 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 1
01-01 00:00:18.079 5 32 D 01300/abilityms: AbilityMgrHandler::TerminateApp(233): start
01-01 00:00:18.079 5 32 D 01300/abilityms: AppTerminateTask::Execute(29): start
01-01 00:00:18.079 5 32 I 01300/abilityms: AppManager::TerminateAppProcess(66): app record is not find
01-01 00:00:18.079 5 32 E 01300/abilityms: AbilityMissionStack::RemoveMissionRecord(68): missionRecord is null
01-01 00:00:18.079 5 32 E 01300/abilityms: AbilityStackManager::GetTopPageAbility(69): topMissionStack is nullptr
write file switch /storage/data/log/hilog2.txt
01-01 00:00:18.096 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 3
01-01 00:00:18.126 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 4
01-01 00:00:18.139 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 2
01-01 00:00:18.210 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 4
01-01 00:00:18.226 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 1
01-01 00:00:18.249 6 40 I 01100/bundle_deamon: BundleDaemon::Invoke(102): bundle_daemon invoke start 1
01-01 00:00:18.287 5 32 D 01300/abilityms: AbilityMgrHandler::OnServiceInited(122): start
01-01 00:00:18.288 5 32 I 01300/abilityms: WMSClient::WaitUntilWmsReady(35): wait for window manager service start
[DISPLAY E/] CheckHdmiConnect: HI_MPI_HDMI_GetSinkCapability failure, ret = 0xa0288005!
[DISPLAY I/] LcdIntfInit: hdmi disconnected
[DISPLAY I/] StartVoLayer: start vo layer success
[DISPLAY I/] PrintLayerInfo: layerInfo:
[DISPLAY I/] PrintLayerInfo: type = 0
[DISPLAY I/] PrintLayerInfo: width = 960
[DISPLAY I/] PrintLayerInfo: height = 480
[DISPLAY I/] PrintLayerInfo: bpp = 16
[DISPLAY I/] PrintLayerInfo: pixFormat = 9
[DISPLAY I/] OpenGraphicLayer: open graphic layer success, layerId = 0!
[DISPLAY I/] GfxInitialize: gfx initialize success
01-01 00:00:18.910 9 48 I 01800/Samgr: Bootstrap core services(count:1).
[UnRegisteDeathCallback : 960]Wrong cbId:4294967295.
[UnRegisteDeathCallback : 960]Wrong cbId:4294967295.
GetInputInterface: enter
GetInputInterface: exit succ
OpenInputDevice: open dev1 succ
RegisterReportCallback: create monitor thread succ, index = 1
RegisterReportCallback: device1 register callback succ, callbackNum = 1
OpenInputDevice: dev2 does not exist
01-01 00:00:18.910 9 48 I 01800/Samgr: Init service:WMS TaskPool:0x22e31ea0
01-01 00:00:18.910 9 50 I 01800/Samgr: Initialize Registry!
01-01 00:00:18.911 5 30 I 01800/Samgr: Register Endpoint<9, 49, 0>
01-01 00:00:18.911 5 30 D 01800/Samgr: Register Feature<WMS, (null)> pid<9>, id<49, 0> ret:0
01-01 00:00:18.911 9 49 D 01800/Samgr: RegisterRemoteFeatures<WMS, (null)> ret:0
01-01 00:00:18.911 9 49 I 01800/Samgr: Register endpoint<ipc client> and iunknown finished! remain<0> iunknown!
01-01 00:00:18.911 5 30 D 01800/Samgr: Register Feature<WMS, (null)> pid<9>, id<49, 0> ret:0
01-01 00:00:18.912 9 50 I 01800/Samgr: Register server sa<WMS, (null)> id<4294967295, 0> retry:1 ret:0!
01-01 00:00:18.912 9 50 I 01800/Samgr: Init service WMS <time: 3047ms> success!
01-01 00:00:18.912 9 50 I 01800/Samgr: Initialized all core system services!
01-01 00:00:18.912 9 50 I 01800/Samgr: Goto next boot step failed! errno:-9
01-01 00:00:19.117 5 32 I 01800/Samgr: Create proxy[0x1ff51370]<WMS, (null), 49, 0>
01-01 00:00:19.117 5 32 D 01300/abilityms: AbilityMgrHandler::StartAbility(178): start
01-01 00:00:19.118 5 32 D 01300/abilityms: AbilityStackManager::GeneratePageAbility(35): launcher jumps to default or default jumps to launcher
write file switch /storage/data/log/hilog1.txt
01-01 00:00:19.118 5 32 D 01300/abilityms: AbilityMissionRecord::AbilityMissionRecord(29): Constuctor
01-01 00:00:19.132 5 32 D 01300/abilityms: PageAbilityRecord::PageAbilityRecord(42): Constructor
01-01 00:00:19.132 5 32 D 01300/abilityms: AbilityStartTask::Execute(73): topAbility is nullptr or not active
01-01 00:00:19.139 5 32 D 01300/abilityms: AppSpawnClient::SpawnProcess(68): start
01-01 00:00:19.139 5 32 I 01800/Samgr: Create proxy[0x1fe2cf30]<appspawn, (null), 45, 0>
01-01 00:00:19.139 7 44 I 00000/(null): [appspawn] msg<com.huawei.launcher,,81604378625,101,101>
01-01 00:00:19.146 7 44 I 00000/(null): [appspawn] invoke, reply pid 10.
01-01 00:00:19.146 5 32 D 01300/abilityms: AppManager::StartAppProcess(42): start app name:com.huawei.launcher, token: 81604378625
01-01 00:00:19.723 10 54 I 00000/(null): AbilityThread::ThreadMain enter
01-01 00:00:19.730 5 30 D 01800/Samgr: Find Feature<abilityms, AmsFeature> id<36, 3> ret:0
01-01 00:00:19.730 10 54 I 01800/Samgr: Create remote sa proxy[0x21547e40]<abilityms, AmsFeature> id<36,3>!
01-01 00:00:19.730 10 54 I 00000/(null): AbilityThread::ThreadMain start loop
01-01 00:00:19.743 5 32 D 01300/abilityms: AbilityMgrHandler::AttachBundle(201): start
01-01 00:00:19.743 5 32 D 01300/abilityms: AbilityAttachTask::Execute(33): start
01-01 00:00:19.743 5 32 D 01300/abilityms: AbilityThreadClient::Initialize(62): token(81604378625) bundleName(com.huawei.launcher) success
[DISPLAY I/] GfxInitialize: gfx initialize success
01-01 00:00:19.762 10 54 I 00000/(null): Start app init
01-01 00:00:19.819 10 54 I 00000/(null): RegisterAbility MainAbility
01-01 00:00:19.819 10 54 I 00000/(null): RegisterAbilitySlice MainAbilitySlice
01-01 00:00:19.827 10 54 I 00000/(null): Set env ret: 0, App init end
01-01 00:00:19.833 10 54 I 00000/(null): perform transact ability state to [3]
01-01 00:00:19.833 10 54 I 00000/(null): Create ability success [MainAbility]
01-01 00:00:19.833 10 54 I 00000/(null): Hal and UI init
01-01 00:00:19.894 10 54 I 01800/Samgr: Bootstrap core services(count:0).
01-01 00:00:19.894 10 54 I 01800/Samgr: Initialized all core system services!
write file switch /storage/data/log/hilog2.txt
01-01 00:00:19.894 10 54 I 01800/Samgr: Goto next boot step failed! errno:-9
01-01 00:00:19.894 5 30 D 01800/Samgr: Judge Auth<WMS, (null)> ret:0
01-01 00:00:19.894 5 30 D 01800/Samgr: Find Feature<WMS, (null)> id<49, 0> ret:0
01-01 00:00:19.895 10 54 I 01800/Samgr: Create remote sa proxy[0x21558d50]<WMS, (null)> id<49,0>!
01-01 00:00:20.531 10 54 I 00000/(null): Create UITaskPost thread
01-01 00:00:20.532 10 54 I 00000/(null): Ability Init
01-01 00:00:20.532 10 56 I 00000/(null): start UITaskPost loop
01-01 00:00:20.538 10 54 I 00000/(null): Ability OnStart
01-01 00:00:20.538 10 54 I 00000/(null): AbilitySlice Init
01-01 00:00:20.538 10 54 I 00000/(null): AbilitySlice OnStart
01-01 00:00:20.693 10 54 I 00000/(null): [GetFeatureApi S:permissionms F:PmsFeature]: BEGIN

01-01 00:00:20.694 10 54 I 00000/(null): [QueryInterface CLIENT_PROXY_VER S:permissionms, F:PmsFeature]: is 0x21057da0

01-01 00:00:20.698 5 31 I 00000/(null): Enter ID_CHECK, [callerPid: 10][callerUid: 101]
01-01 00:00:20.698 10 54 I 00000/(null): [Release api S:permissionms, F:PmsFeature]: is 0x21057da0 ref:1

01-01 00:00:20.701 5 30 D 01800/Samgr: Judge Auth<bundlems, BmsFeature> ret:0
[DISPLAY I/] GrallocInitialize: gralloc initialize success
01-01 00:00:20.702 5 30 D 01800/Samgr: Find Feature<bundlems, BmsFeature> id<36, 1> ret:0
01-01 00:00:20.702 10 54 I 01800/Samgr: Create remote sa proxy[0x21057e40]<bundlems, BmsFeature> id<36,1>!
01-01 00:00:20.702 10 54 I 00000/(null): [GetFeatureApi S:permissionms F:PmsFeature]: BEGIN

01-01 00:00:20.702 10 54 I 00000/(null): [QueryInterface CLIENT_PROXY_VER S:permissionms, F:PmsFeature]: is 0x21057da0

01-01 00:00:20.702 5 31 I 00000/(null): Enter ID_CHECK, [callerPid: 10][callerUid: 101]
01-01 00:00:20.702 10 54 I 00000/(null): [Release api S:permissionms, F:PmsFeature]: is 0x21057da0 ref:1

[DISPLAY I/] GrallocInitialize: gralloc initialize success
01-01 00:00:21.524 10 54 I 00000/(null): Ability OnActive
01-01 00:00:21.524 10 54 I 00000/(null): AbilitySlice OnActive
01-01 00:00:21.524 10 54 I 00000/(null): perform transact ability state done [3]
01-01 00:00:21.524 5 32 I 01300/abilityms: AbilityMgrFeature::Invoke(84): ams invoke called
01-01 00:00:21.524 5 32 D 01300/abilityms: AbilityMgrHandler::AbilityTransaction(219): start
write file switch /storage/data/log/hilog1.txt
01-01 00:00:21.524 5 32 D 01300/abilityms: AbilityWorker::AbilityTransaction(85): ability token(81604378624), state(3)
01-01 00:00:21.524 5 32 D 01300/abilityms: AbilityActivateTask::Execute(26): start

OHOS # 
OHOS # 
OHOS #

[END] 2021/3/5 15:25:18

08-20210305在WIN10下通过网口给华为海思Hi3516DV300刷机(鸿蒙系统)相关推荐

  1. 在WIN10下通过网口给华为海思Hi3516DV300刷机(鸿蒙系统)

    08-20210301在WIN10下通过网口给华为海思Hi3516DV300刷机(鸿蒙系统) 2021/3/5 11:03 https://bbs.elecfans.com/jishu_2002000 ...

  2. 05-20210301在WIN10下通过串口给华为海思Hi3516DV300刷机(鸿蒙系统)

    05-20210301在WIN10下通过串口给华为海思Hi3516DV300刷机(鸿蒙系统) 2021/3/1 15:11 (!!!!请严重注意,串口烧录需要花很久很久的时间:2小时6分41秒.) h ...

  3. 05-20210222在WIN10下通过串口给华为海思Hi3518EV300刷机(鸿蒙系统)

    05-20210222在WIN10下通过串口给华为海思Hi3518EV300刷机(鸿蒙系统) 2021/2/23 17:38 1.串口刷机工具下载:HiTool-HM-5.4.9-win32-x86_ ...

  4. 07-20210305在WIN10下通过USB口给华为海思Hi3516DV300刷机(鸿蒙系统)

    07-20210305在WIN10下通过USB口给华为海思Hi3516DV300刷机(鸿蒙系统) 2021/3/5 17:26 https://blog.csdn.net/cocoron/articl ...

  5. 56-20210402华为海思Hi3516DV300的linux系统下读取TF卡(eMMC模式)

    56-20210402华为海思Hi3516DV300的linux系统下读取TF卡(eMMC模式) 2021/4/2 15:02 https://xueqiu.com/7970718062/159110 ...

  6. 61-20210407华为海思Hi3516DV300的linux系统下控制GPIO口(标准linux模式点亮LED灯)

    61-20210407华为海思Hi3516DV300的linux系统下控制GPIO口(标准linux模式点亮LED灯) 2021/4/7 15:13 https://xueqiu.com/797071 ...

  7. 12-20210225华为海思Hi3518EV300在鸿蒙系统下测试WIFI(AP+STATION模式)

    12-20210225华为海思Hi3518EV300在鸿蒙系统下测试WIFI(AP+STATION模式) 2021/2/25 10:45 [HarmonyOS HiSpark_IPC_DIY开发套件] ...

  8. 11-20210225华为海思Hi3518EV300在鸿蒙系统下测试摄像头(拍照+录像)

    11-20210225华为海思Hi3518EV300在鸿蒙系统下测试摄像头(拍照+录像) 2021/2/25 9:37 将Hi3518EV300在鸿蒙系统下配置为UVC模式,原厂(华为海思/江苏润和) ...

  9. Win10下adb连接到华为Mate10 Pro手机

    这里假设你已在Win10下安装好adb驱动,按照以下步骤进行adb连接操作: 1. 打开开发人员选项 打开手机的"设置"->"系统"->" ...

最新文章

  1. (iOS-基本知识)Category VS Extension 原理详解
  2. JQuery 常用积累(六)ZTree
  3. 软考考试仅剩几天,如何冲刺?
  4. VTK:PolyData之ImplicitSelectionLoop
  5. c 复杂的前置后置面试题_采摘后18小时直达货架,利农集团用后置仓“直连”生鲜电商...
  6. 装×失败的后果。。。 | 今日最佳
  7. CentOS新增用户并授予sudo权限
  8. (1)FPGA面试题Setup和Holdup时间
  9. 【第二周】结对编程(宫丽君和林莉):四则运算
  10. 热烈祝贺:关于OpenJDK8 LINUX版本输入法候选框不能跟随光标移动的BUG及解决办法,已上报Oracle
  11. Java学Web——day09【SQL多表联合查询】
  12. 抖音有这样一个姑娘她活成了大家都想要的样子
  13. 苏州大学 计算机网络,苏州大学计算机网络与通信期末考试卷-20210517192500.docx-原创力文档...
  14. iphone链接android热点好卡,热点连接问题
  15. 马少平、周枫、王小川、楼天城、唐文斌……清华计算机系与AI的40年
  16. Hibernate对象与对象的关系
  17. 【Python】音乐可视化播放器(PyQt5 + matplotlib.animation)
  18. corda理解(一)
  19. testbed笔记:基类或者成员对象的构造函数调用问题
  20. 地方债开闸引来资金“活水”,开启公债体制重大变革

热门文章

  1. 《灰故事》:他用曲笔描绘着我们
  2. 2017282110258--高级软件工程--齐爽爽第一次作业
  3. android手势第一次设置密码_android实现手势密码
  4. 单例模式在JavaScript与TypeScript中的几种设计方式
  5. ProxySQL 配置详解及读写分离(+GTID)等功能说明 (完整篇)1
  6. SHA1WithRSA签名使用openssl 实现
  7. IDEA安装后无法启动
  8. Docker/Docker-Compose部署Django
  9. 动态规划之0-1背包问题(思路详解+表格演示过程+最优解打印方法+详细代码)
  10. 2022年11月骨传导耳机排名,骨传导蓝牙耳机品牌怎么选?