Remove All Ads from XDA
Find Your Device:
Or Continue to Thread: Pixel fastboot secret commands…
1st May 2017, 12:43 PM
harshal10398's Avatar
OP Junior Member
Thanks Meter: 51
 
More
Pixel fastboot secret commands and bootloader RIPping
Hey there folks, i was trying to find the white bootlogo of pixel in the bootloader img and exploring stuff meanwhile i came through some interesting fastboot secrets....
on a linux machine...
Code:
strings bootloader-marlin-8996-012001-1702151126.img | grep "flashing"
gives output:
Code:
cmd_flashing_get_unlock_bootloader_nonce
cmd_flashing_unlock_bootloader
cmd_flashing_lock_bootloader
%s: flashing kernel
%s: flashing ramdisk
%s: invalid flashing type
invalid flashing type
flashing unlock
flashing lock
flashing lock_critical
flashing unlock_critical
flashing get_unlock_ability
flashing get_unlock_bootloader_nonce
flashing unlock_bootloader
flashing lock_bootloader
Code:
strings bootloader-marlin-8996-012001-1702151126.img | grep "oem"
gives output:
Code:
cmd_oem_flag_batt_disable_safty_timer
cmd_oem_flag_htc_radio_debug_func
cmd_oem_flag_batt_for_pa_test
cmd_oem_flag_batt_disable_tbatt_protect
cmd_oem_flag_batt_keep_charge_on
cmd_oem_flag_uart
cmd_oem_flag_batt_test_pwr_supply
	 cmd_oem_dsir add=0x%x, value=0x%x
	 fastboot oem dsir 53
	 fastboot oem dsiw 51 FF
Usage: oem get_ks_token [frp|ftm|download] [reboot count]
	Reset the stored oem panel in device info
cmd_oem_ramdump failed
oem unlock is not allowed
write_allow_oem_unlock failed
oem reboot-download
oem reboot-ftm
oem rebootRUU
oem listpartition
oem listram
oem dmesg
oem last_dmesg
oem update_emmc_partition
oem read_mmc
oem write_mmc
oem test_emmc
oem ufs_get_lun
oem ufs_set_lun
oem erase_phone_storage
oem unlock
oem lock
oem device-info
oem show-barcodes
oem ramdump
oem getcolorid
oem setcolorid
oem getcid
oem setcid
oem enable-charger-screen
oem disable-charger-screen
oem off-mode-charge
oem select-display-panel
oem readconfig
oem writeconfig
oem easydump
oem readunlock
oem dumpDataCode
oem dsiw
oem dsir
oem ddrtest
oem dump_ram_full
oem get_ks_token
oem get_anti_theft_status
oem sha1sum
oem readmeid
oem refurbish
oem batt_enable_bms_charger_log
oem batt_disable_tbatt_protect
oem batt_enable_fast_charge
oem batt_test_pwr_supply
oem batt_for_pa_test
oem batt_disable_safty_timer
oem batt_keep_charge_on
oem uart
oem htc_radio_debug_func
oem htcramdump
oem autordump2storage
cmd_oem_easydump
cmd_oem_flag_autordump2storage
cmd_oem_flag_batt_enable_bms_charger_log
cmd_oem_flag_batt_enable_fast_charge
cmd_oem_ramdump
cmd_oem_flag_htcramdump
oemerr_%x
 androidboot.oem_unlock_support=
oemerr_99
Usage: oem ddrtest 0x<addr> 0x<size> <round> [<break>]
Default test: oem ddrtest 0 0 0
ABT_Propdata_oem
NOCError_Propdata_oem
BIMCError_Propdata_oem
use_oem_external_hdcp
oem_pshold_config
/tz/oem
oem=M
/secboot/oem_secapp
/secboot/oem_general
/tz/oem
macchiato_read_oem_pk_hash() failed {0x%x}
oem_pshold_config
ABT_Propdata_oem
NOCError_Propdata_oem
BIMCError_Propdata_oem
i dont want to fire up my device by giving random commands so if you are curious enough and have a spare device, i'd love to know further outputs...
for example the command:
fastboot flashing unlock_critical (will it forcefully unlock?? even verizon???)

please share output of this command if you are on unlocked bootloader (this can help me to find out splash image and other hidden partitions)
fastboot oem listpartition

so far i found two image like files (.rgb) inside bootloader...
dead_battery.rgb
dead_battery_charging.rgb


Thanks in advance if you are going to help me...
The Following 6 Users Say Thank You to harshal10398 For This Useful Post: [ View ] Gift harshal10398 Ad-Free