I would like to update that I have reworked all my connections to be positive they are good. I have gone up from 30 AWG wire to 24 AWG on all connections and shortened them as much as possible. I have reflashed to stock and back.
I still cannot get this Zephyr to glitch. Sorry, I haven't gotten around to photos, but I'm confident in my soldering. I took some, but I can't get them in focus or well lit. I included my ECC generation log in case anyone spots errors.
I have yet to wire POST_OUT and CPU_PLL_BYPASS with LEDs.
C:\Users\Jordan\Documents\My Dropbox\Reset HAck>python common\imgbuild\build.py
nand6.bin SMC_dec.bin common\cdxell\CDjasper common\xell\xell-gggggg.bin
* found flash image, unpacking...
ECC'ed - will unecc.
Found 2BL (build 4578) at 00008000
Found 4BL (build 8453) at 0000ff20
Found 5BL (build 1888) at 000156a0
* found decrypted SMC
* found decrypted CD
* found XeLL binary, must be linked to 1c000000
* we found the following parts:
CD (image): 8453
CD (decrypted): 8453
* checking for proper 1BL key... ok
* checking if all files decrypted properly... ok
* checking required versions... ok
* this image will be valid *only* for: zephyr
* patching SMC...
patchset "Zephyr, version 1.10" matches, 1 patch(es)
* constructing new image...
* base size: 6c000
* No separate recovery Xell available!
* Flash Layout:
0x00000000..0x000001ff (0x00000200 bytes) Header
0x00000200..0x00000fff (0x00000e00 bytes) Padding
0x00001000..0x00003fff (0x00003000 bytes) SMC
0x00004000..0x00007fff (0x00004000 bytes) Keyvault
0x00008000..0x0000ff1f (0x00007f20 bytes) CB_A 4578
0x0000ff20..0x00015f1f (0x00006000 bytes) CD 8453
0x00015f20..0x000bffff (0x000aa0e0 bytes) Padding
0x000c0000..0x000fffff (0x00040000 bytes) Xell (backup)
0x00100000..0x0013ffff (0x00040000 bytes) Xell (main)
* Encoding ECC...
------------- Written into output/image_00000000.ecc
How do you tell exactly what they are doing?
I'm sorry, I don't understand your question.