| android 9 | android 10(+) | |
|---|---|---|
| ums312/ums512/ud710 (not-fused or public key) | splloader+uboot+sml+trustos+vbmeta | splloader+uboot+sml+trustos+teecfg+vbmeta |
| ums312/ums512/ud710 (fused) | uboot+sml+trustos+vbmeta see note for splloader information |
uboot+sml+trustos+teecfg+vbmeta see note for splloader information |
| other cpu (not-fused or public key) | splloader+uboot+sml+trustos+vbmeta | splloader+uboot+sml+trustos+teecfg+vbmeta |
| other cpu (fused) | UNSUPPORTED | UNSUPPORTED |
This method works with both unlocked and locked BL, but wiping userdata might be still needed. (vmbeta change will affect data encryption)
| android 9 | android 10(+) | android 14(+) / kernel 5.15(+) | |
|---|---|---|---|
| ums312/ums512/ud710 (not-fused or public key) | splloader+uboot+sml+trustos+vbmeta+(boot)+(recovery) | splloader+uboot+sml+trustos+teecfg+vbmeta+(boot)+(recovery) | splloader+uboot+sml+trustos+teecfg+vbmeta+(init_boot)+(boot)+(recovery) |
| ums312/ums512/ud710 (fused) | uboot+sml+trustos+vbmeta+(boot)+(recovery) see note for splloader information |
uboot+sml+trustos+teecfg+vbmeta+(boot)+(recovery) see note for splloader information |
uboot+sml+trustos+teecfg+vbmeta+(init_boot)+(boot)+(recovery) see note for splloader information |
| other cpu (not-fused or public key) | splloader+uboot+sml+trustos+vbmeta+(boot)+(recovery) | splloader+uboot+sml+trustos+teecfg+vbmeta+(boot)+(recovery) | splloader+uboot+sml+trustos+teecfg+vbmeta+(init_boot)+(boot)+(recovery) |
| other cpu (fused) | UNSUPPORTED | UNSUPPORTED | UNSUPPORTED |
on android 9/10, use gen_spl-unlock-legacy (source_code|windows_prebuilt) to get patched splloader, then process with CVE-2022-38691
on android 11(+), use gen_spl-unlock (source_code|windows_prebuilt) to get patched splloader, then process with CVE-2022-38691
use noavb_v3/resign_v3
if resign in main branch not work for you, try use resign in a9_boot_with_recovery_cpio branch
