1. Are you ready for the Galaxy S20? Here is everything we know so far!

S20 far from defense grade security. this is off my official status s20 bought at a samsung store in

Discussion in 'Android Lounge' started by trentd, Aug 18, 2020.

  1. trentd

    trentd Lurker
    Thread Starter

    2020-08-16 13:57:29.286: EmergencyBase - setReadyToStart [true]
    2020-08-16 13:57:29.287: EmergencyBase - clearBootTime
    2020-08-16 13:57:29.287: EmergencyServiceStarter - onStartCommand() Intent { act=com.samsung.intent.action.EMERGENCY_CHECK_ABNORMAL_STATE cmp=com.sec.android.emergencymode.service/.EmergencyServiceStarter (has extras) }
    2020-08-16 13:57:29.284: EmergencyServiceStarter - Service is started during booting. abnormal state will be check on bootCompleted.
    2020-08-16 13:57:29.304: EmerPackageController - getResolutionWait : false
    2020-08-16 13:57:29.305: ConfigurationChangedReceiver - onReceive : android.intent.action.CONFIGURATION_CHANGED
    2020-08-16 13:57:29.311: EmergencyFactory - resolutionChanged
    2020-08-16 13:57:53.760: EmergencyReceiver - EmergencyReceiver [android.intent.action.BOOT_COMPLETED]
    2020-08-16 13:57:53.761: EmergencyBase - setBootTime
    2020-08-16 13:57:53.761: EmergencyBase - FCState : false
    2020-08-16 13:57:53.761: EmergencyBase - EM_MODE : false
    2020-08-16 13:57:53.762: EmergencyBase - setReadyToStart [true]
    2020-08-16 13:57:53.762: EmergencyFactory - unregisterEmergencyReceiver
    2020-08-16 13:57:53.762: EmergencyFactory - No Recovery State, EmergencyServiceStarter stopSelf and unregister receiver
    2020-08-16 13:57:53.765: EmergencyFactory - unregisterEmergencyReceiver mEmergencyStateReceiverKnox e : java.lang.IllegalArgumentException: Receiver not registered: null

    07-02 12:44:16:338 FactoryTest : [FactoryTestBroadcastReceiver$ModuleCommon](15229) EFS_FACTORYAPP_ROOT PATH : /efs/FactoryApp/
    07-02 12:44:16:346 FactoryTest : [ModuleCommon$readFactoryMode](15229) mode: ON
    07-02 12:44:16:348 FactoryTest : [FactoryTestBroadcastReceiver$onReceive](15229) KEYSTRING_BLOCK is already existed...
    07-02 12:44:16:349 FactoryTest : [FactoryTestBroadcastReceiver$initFailhist](15229) Failhist Version is not V3
    07-02 12:44:17:356 FactoryTest : [FactoryTestBroadcastReceiver$onReceive](15229) onReceive action=android.intent.action.BOOT_COMPLETED
    07-02 12:44:17:357 FactoryTest : [FactoryTestBroadcastReceiver$ModuleCommon](15229) EFS_FACTORYAPP_ROOT PATH : /efs/FactoryApp/
    07-02 12:44:17:359 FactoryTest : [ModuleCommon$readFactoryMode](15229) mode: ON
    07-02 12:44:17:359 FactoryTest : [FactoryTestBroadcastReceiver$onReceive](15229) KEYSTRING_BLOCK is already existed...
    07-02 12:44:17:361 FactoryTest : [FactoryTestBroadcastReceiver$onReceive](15229) Boot completed, IS_FACTORY_BINARY = USER MODE
    07-02 12:44:17:383 FactoryTest : [FtUtil$isEMATCmd](15229) Unknown error
    07-02 12:44:17:384 FactoryTest : [ModuleCommon$connectedJIG](15229) ...
    07-02 12:44:17:385 FactoryTest : [ModuleCommon$connectedJIG](15229) cable_type = ANYWAY_JIG
    07-02 12:44:17:397 FactoryTest : [ModuleCommon$connectedJIG](15229) value = No VPS, JIG_ON = JIG, JIG_ON_1KOHM = FACTORY UART
    07-02 12:44:17:400 FactoryTest : [ModuleCommon$connectedJIG](15229) adc_value = null
    07-02 12:44:17:463 FactoryTest : [ModuleCommon$connectedJIG](15229) raw_adc_value = null
    07-02 12:44:17:463 FactoryTest : [ModuleCommon$isRunningFtClient](15229) RUNNING_FTCLIENT : false
    07-02 12:44:17:464 FactoryTest : [FactoryTestBroadcastReceiver$startDummyFtClientForBootCompleted](15229) start DummyFtClient service for APO
    07-02 12:44:17:487 FactoryTest : [FactoryTestBroadcastReceiver$onReceive](15229) Stop at_distributor
    07-02 12:44:17:487 FactoryTest : [FactoryTestBroadcastReceiver$onReceive](15229) stop at_distributor
    07-02 12:44:17:496 FactoryTest : [FactoryTestBroadcastReceiver$onReceive](15229) stop sec_diag_uart_log
    07-02 12:44:17:504 FactoryTest : [ModuleCommon$disableFtClient](15229) ...
    07-02 12:44:17:509 FactoryTest : [DummyFtClient$onCreate](15229) Create DummyFtClient service
    07-02 12:44:17:510 FactoryTest : [ModuleCommon$isConnectionModeNone](15229) mConnectionMode = gsm
    07-02 12:44:17:510 FactoryTest : [DummyFtClient$onStartCommand](15229) ...
    07-02 12:44:17:510 FactoryTest : [DummyFtClient$sendBootCompletedAndFinish](15229) ...
    07-02 12:44:17:511 FactoryTest : [ModuleCommon$isConnectionModeNone](15229) mConnectionMode = gsm
    07-02 12:44:17:511 FactoryTest : [IPCWriterToSecPhoneService$ResponseWriter](15229) Create IPCWriterToSecPhoneService
    07-02 12:44:17:512 FactoryTest : [IPCWriterToSecPhoneService$connectToSecPhoneService](15229)
    07-02 12:44:17:517 FactoryTest : [IPCWriterToSecPhoneService$onServiceConnected](15229) connected done
    07-02 12:44:17:518 FactoryTest : [IPCWriterToSecPhoneService$write](15229) Send Response Message to SecPhone
    07-02 12:44:17:518 FactoryTest : [IPCWriterToSecPhoneService$write](15229) Response
    07-02 12:44:17:527 FactoryTest : [IPCWriterToSecPhoneService$handleMessage](15229) Send BOOTING COMPLETED done
    07-02 12:44:20:519 FactoryTest : [IPCWriterToSecPhoneService$disConnectSecPhoneService](16317)
    07-02 12:44:23:420 FactoryTest : [ProtectedFactoryTestBroadcastReceiver$onReceive](15229) onReceive action=com.samsung.intent.action.SECPHONE_READY
    07-02 12:44:23:421 FactoryTest : [ProtectedFactoryTestBroadcastReceiver$onReceive](15229) com.samsung.intent.action.SECPHONE_READY
    07-02 10:14:32:533 FactoryTest : [DummyFtClient$onDestroy](15229) Destroy DummyFtClient service
    07-02 10:14:32:534 FactoryTest : [ModuleCommon$isConnectionModeNone](15229) mConnectionMode = gsm
    07-02 10:14:32:535 FactoryTest : [ModuleCommon$isRunningFtClient](15229) RUNNING_FTCLIENT : false
    07-02 10:14:32:535 FactoryTest : [DummyFtClient$onDestroy](15229) kill process

    <6>[ 0.000000] [0: swapper: 0] Booting Linux on physical CPU 0x0000000000 [0x51df805e]
    <5>[ 0.000000] [0: swapper: 0] Linux version 4.19.81-17868283 (dpi@SWDH7012) (clang version 8.0.12 for Android NDK) #1 SMP PREEMPT Mon Jan 27 00:54:56 KST 2020
    <6>[ 0.000000] [0: swapper: 0] Machine model: Samsung Z3Q PROJECT - PV3 Rev05 (board-id,15) for HM1 EVT1
    <6>[ 0.000000] [0: swapper: 0] sec_hw_param:sec_hw_rev_setup() androidboot.revision f
    <6>[ 0.000000] [0: swapper: 0] androidboot.revision f
    <6>[ 0.000000] [0: swapper: 0] androidboot.revision f
    <3>[ 0.000000] [0: swapper: 0] charging_night_mode : 0x0(0)
    <3>[ 0.000000] [0: swapper: 0] temp_control_test : 0x0(0)
    <6>[ 0.000000] [0: swapper: 0] set_afc_mode: afc_mode is 0x30
    <6>[ 0.000000] [0: swapper: 0] pd_disable: pd_hv_disable is 0x30
    <6>[ 0.000000] [0: swapper: 0] set_uart_mode: uart_mode is 0x02
    <6>[ 0.000000] [0: swapper: 0] sapa: read_sapa_param param_time:0
    <3>[ 0.000000] [0: swapper: 0] wireless_ic() : ic_info(0x00000000), chip_id(0x00), fw_ver(0x0000), fw_mode(0x0)
    <6>[ 0.000000] [0: swapper: 0] OF: fdt: Reserved memory: skip to reserve memory for node 'sec_debug_rdx_bootdev@0'
    <6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000fe000000, size 28 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node qseecom_region, compatible id shared-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Reserved memory: created DMA memory pool at 0x00000000ffc00000, size 0 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node mailbox_region, compatible id shared-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000fd800000, size 8 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node sdsp_region, compatible id shared-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000fc800000, size 16 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node qseecom_ta_region, compatible id shared-dma-pool:thinking:
    <6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000fa800000, size 32 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node linux,cma, compatible id shared-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000f9800000, size 16 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node sp_region, compatible id shared-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000f9400000, size 4 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node cdsp_region, compatible id shared-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000f8400000, size 16 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node user_contig_region, compatible id shared-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000eac00000, size 216 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node secure_display_region, compatible id shared-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000e9800000, size 20 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node cnss_wlan_region, compatible id shared-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000e7000000, size 40 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node mem_dump_region, compatible id shared-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000e6400000, size 12 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node adsp_region, compatible id shared-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x0000000087800000, size 26 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_cdsp_region@87800000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x0000000089200000, size 21 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_slpi_region@88c00000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008a700000, size 44 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_adsp_region@8a100000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008d300000, size 1 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_spss_region@8be00000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008d400000, size 5 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_npu_region@86900000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008d900000, size 5 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_video_region@86e00000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008de00000, size 5 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_cvp_region@87300000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e300000, size 5 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_camera_region@86200000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e800000, size 1 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_wlan_fw_region@86700000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e900000, size 0 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_ipa_fw_region@86800000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e910000, size 0 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_ipa_gsi_region@86810000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e91a000, size 0 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_gpu_region@8681a000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008ea00000, size 70 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node cdsp_secure_heap@8bf00000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000009f000000, size 8 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node sec_debug_region@0, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000009fb00000, size 0 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node hdm_region@9FB00000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x00000000a0001000, size 0 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node kaslr_region@A0001000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x00000000b0100000, size 1 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node tima_region@B0100000, compatible id removed-dma-pool
    <6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x00000000b0200000, size 2 MiB
    <6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node rkp_region@B0200000, compatible id removed-dma-pool
    <7>[ 0.000000] [0: swapper: 0] On node 0 totalpages: 3043653
    <7>[ 0.000000] [0: swapper: 0] Normal zone: 49128 pages used for memmap
    <7>[ 0.000000] [0: swapper: 0] Normal zone: 0 pages reserved
    <7>[ 0.000000] [0: swapper: 0] Normal zone: 3043653 pages, LIFO batch:63
    <6>[ 0.000000] [0: swapper: 0] psci: probing for conduit method from DT.
    <6>[ 0.000000] [0: swapper: 0] psci: PSCIv1.1 detected in firmware.
    <6>[ 0.000000] [0: swapper: 0] psci: Using standard PSCI v0.2 function IDs
    <6>[ 0.000000] [0: swapper: 0] psci: MIGRATE_INFO_TYPE not supported.
    <6>[ 0.000000] [0: swapper: 0] psci: SMC Calling Convention v1.1
    <5>[ 0.000000] [0: swapper: 0] random: fast init done
    <5>[ 0.000000] [0: swapper: 0] random: get_random_bytes called from start_kernel+0xa0/0x6e4 with crng_init=1
    <6>[ 0.000000] [0: swapper: 0] percpu: Embedded 24 pages/cpu s60760 r8192 d29352 u98304
    <7>[ 0.000000] [0: swapper: 0] pcpu-alloc: s60760 r8192 d29352 u98304 alloc=24*4096
    <7>[ 0.000000] [0: swapper: 0] pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 [0] 4 [0] 5 [0] 6 [0] 7
    <6>[ 0.000000] [0: swapper: 0] Detected VIPT I-cache on CPU0
    <6>[ 0.000000] [0: swapper: 0] CPU features: kernel page table isolation disabled by kernel configuration
    <6>[ 0.000000] [0: swapper: 0] CPU features: detected: Speculative Store Bypassing Safe (SSBS)
    <6>[ 0.000000] [0: swapper: 0] Built 1 zonelists, mobility grouping on. Total pages: 2994525
    <5>[ 0.000000] [0: swapper: 0] Kernel command line: rcupdate.rcu_expedited=1 rcu_nocbs=0-7 console=null androidboot.hardware=qcom androidboot.memcg=1 lpm_levels.sleep_disabled=1 video=vfb:640x400,bpp=32,memsize=3072000 msm_rtb.filter=0x237 service_locator.enable=1 androidboot.usbcontroller=a600000.dwc3 swiotlb=2048 printk.devkmsg=on firmware_class.path=/vendor/firmware_mnt/image androidboot.verifiedbootstate=green androidboot.keymaster=1 androidboot.ulcnt=0 androidboot.vbmeta.device=PARTUUID=4b7a15d6-322c-42ac-8110-88b7da0c5d77 androidboot.vbmeta.avb_version=1.0 androidboot.vbmeta.device_state=locked androidboot.vbmeta.hash_alg=sha256 androidboot.vbmeta.size=17472 androidboot.vbmeta.digest=8162641d4a1d1fe3ec76f97df6774a0cbf06cf59f47ba364da7302df8e32af4c androidboot.vbmeta.invalidate_on_error=yes androidboot.veritymode=enforcing androidboot.bootdevice=1d84000.ufshc androidboot.boot_devices=soc/1d84000.ufshc androidboot.serialno=00000000000 androidboot.baseband=mdm msm_drm.dsi_display0=ss_dsi_panel_S6E3HAB_AMB687TZ01_WQHD: lcd_id=0x812104 androidboot.dtbo_idx=3 androidboot.dtb_idx=0 androidboot.sec_atd.tty=/dev/ttyHS8 androidboot.revision=15 androidboot.ap_serial=0x00000000 ccic_info=1 fg_reset=1 sec_log=0x200000@0x9F200000 sec_dbg=0x1FF000@0x9F000000 sec_dbg_ex_info=0x1000@0x9F1FF000 androidboot.debug_level=0x4f4c sec_debug.enable=0 sec_debug.enable_user=0 msm_rtb.enable=0 androidboot.cp_debug_level=0x55FF sec_debug.enable_cp_debug=0 softdog.soft_margin=1000 softdog.soft_panic=1 androidboot.cp_reserved_mem=off androidboot.reserve_mem_region=0x0 androidboot.force_upload=0x0 androidboot.upload_offset=9438196 sec_debug.dump_sink=0x0 androidboot.boot_recovery=0 androidboot.carrierid.param.offset=9437644 androidboot.carrierid=XAC androidboot.sales.param.offset=9437648 androidboot.sales_code=XAC androidboot.prototype.param.offset=9437660 androidboot.im.param.offset=9437232 androidboot.me.param.offset=9437312 androidboot.sn.param.offset=9437392 androidboot.pr.param.offset=9437472 androidboot.sku.para
    <3>[ 0.000000] [0: swapper: 0] [SDE] get_lcd_attached : LCD_ID = 0x812104
    <6>[ 0.000000] [0: swapper: 0] set_ccic_info: ccic_info: 0x0001
    <6>[ 0.000000] [0: swapper: 0] sec_bat_get_fg_reset, fg_reset:1
    <6>[ 0.000000] [0: swapper: 0] sec_debug_sched_log:sec_dbg_setup() str=@0x9F000000
    <6>[ 0.000000] [0: swapper: 0] sec_debug_sched_log:sec_dbg_setup() secdbg_paddr = 0x000000009f000000
    <6>[ 0.000000] [0: swapper: 0] sec_debug_sched_log:sec_dbg_setup() secdbg_size = 0x1ff000
    <6>[ 0.000000] [0: swapper: 0] sec_debug_user_reset:sec_debug_ex_info_setup() ex info phy=0x9f1ff000, size=0x1000
    <6>[ 0.000000] [0: swapper: 0] log_buf_len individual max cpu contribution: 131072 bytes
    <6>[ 0.000000] [0: swapper: 0] log_buf_len total cpu_extra contributions: 917504 bytes
    <6>[ 0.000000] [0: swapper: 0] log_buf_len min size: 131072 bytes
    <6>[ 0.000000] [0: swapper: 0] log_buf_len: 1048576 bytes
    <6>[ 0.000000] [0: swapper: 0] early log buf free: 117376(89%)
    <6>[ 0.000000] [0: swapper: 0] Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes)
    <6>[ 0.000000] [0: swapper: 0] Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes)
    <6>[ 0.000000] [0: swapper: 0] Memory: 10343008K/12174612K available (26110K kernel code, 5184K rwdata, 11252K rodata, 6144K init, 11964K bss, 1413812K reserved, 417792K cma-reserved)
    <6>[ 0.000000] [0: swapper: 0] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1
    <4>[ 0.000000] [0: swapper: 0]
    <4>[ 0.000000] [0: swapper: 0] **********************************************************
    <4>[ 0.000000] [0: swapper: 0] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
    <4>[ 0.000000] [0: swapper: 0] ** **
    <4>[ 0.000000] [0: swapper: 0] ** trace_printk() being used. Allocating extra memory. **
    <4>[ 0.000000] [0: swapper: 0] ** **
    <4>[ 0.000000] [0: swapper: 0] ** This means that this is a DEBUG kernel and it is **
    <4>[ 0.000000] [0: swapper: 0] ** unsafe for production use. **
    <4>[ 0.000000] [0: swapper: 0] ** **
    <4>[ 0.000000] [0: swapper: 0] ** If you see this message and you are not debugging **
    <4>[ 0.000000] [0: swapper: 0] ** the kernel, report this immediately to your vendor! **
    <4>[ 0.000000] [0: swapper: 0] ** **
    <4>[ 0.000000] [0: swapper: 0] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
    <4>[ 0.000000] [0: swapper: 0] **********************************************************
    <6>[ 0.000000] [0: swapper/0: 0] rcu: Preemptible hierarchical RCU implementation.
    <6>[ 0.000000] [0: swapper/0: 0] rcu: RCU dyntick-idle grace-period acceleration is enabled.
    <6>[ 0.000000] [0: swapper/0: 0] All grace periods are expedited (rcu_expedited).
    <6>[ 0.000000] [0: swapper/0: 0] Tasks RCU enabled.
    <6>[ 0.000000] [0: swapper/0: 0] NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0
    <6>[ 0.000000] [0: swapper/0: 0] GICv3: Distributor has no Range Selector support
    <6>[ 0.000000] [0: swapper/0: 0] GICv3: no VLPI support, no direct LPI support
    <4>[ 0.000000] [0: swapper/0: 0] ITS: No ITS available, not enabling LPIs
    <6>[ 0.000000] [0: swapper/0: 0] rcu: Offload RCU callbacks from CPUs: 0-7.
    <6>[ 0.000000] [0: swapper/0: 0] Successfully registered dummy reset controller for cpucc_clocks
    <6>[ 0.000000] [0: swapper/0: 0] Successfully registered dummy clock controller for cpucc_clocks
    <6>[ 0.000000] [0: swapper/0: 0] arch_timer: cp15 and mmio timer(s) running at 19.20MHz (virt/virt).
    <6>[ 0.000000] [0: swapper/0: 0] clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x46d987e47, max_idle_ns: 440795202767 ns
    <6>[ 0.000003] [0: swapper/0: 0] sched_clock: 56 bits at 19MHz, resolution 52ns, wraps every 4398046511078ns
    <6>[ 0.000024] [0: swapper/0: 0] clocksource: Switched to clocksource arch_sys_counter
    <6>[ 0.002299] [0: swapper/0: 0] Calibrating delay loop (skipped), value calculated using timer frequency.. 38.40 BogoMIPS (lpj=76800)
    <6>[ 0.002316] [0: swapper/0: 0] pid_max: default: 32768 minimum: 301
    <6>[ 0.002380] [0: swapper/0: 0] SYSREG, after zeroing out master key, mk=0
    <6>[ 0.002461] [0: swapper/0: 0] Security Framework initialized
    <6>[ 0.002480] [0: swapper/0: 0] SELinux: Initializing.
    <6>[ 0.002635] [0: swapper/0: 0] Mount-cache hash table entries: 32768 (order: 6, 262144 bytes)
    <6>[ 0.002671] [0: swapper/0: 0] Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes)
    <4>[ 0.009016] [0: swapper/0: 0] NOHZ: local_softirq_pending 02
    <6>[ 0.011172] [0: swapper/0: 1] ASID allocator initialised with 65536 entries
    <4>[ 0.012311] [0: swapper/0: 0] NOHZ: local_softirq_pending 02
    <6>[ 0.013330] [0: swapper/0: 1] rcu: Hierarchical SRCU implementation.
    <4>[ 0.018268] [0: swapper/0: 1] shmbridge isn't enabled
    <3>[ 0.018282] [0: swapper/0: 1] Tima bridge registration is successful
    <6>[ 0.018439] [0: swapper/0: 1] [SDE] samsung_panel_initialize : ss_dsi_panel_S6E3HAB_AMB687TZ01_WQHD done..
    <6>[ 0.020862] [0: swapper/0: 1] smp: Bringing up secondary CPUs ...
    <6>[ 0.030723] [1: swapper/1: 0] Detected VIPT I-cache on CPU1
    <6>[ 0.030796] [1: swapper/1: 0] CPU1: Booted secondary processor 0x0000000100 [0x51df805e]
    <6>[ 0.040527] [2: swapper/2: 0] Detected VIPT I-cache on CPU2
    <6>[ 0.040571] [2: swapper/2: 0] CPU2: Booted secondary processor 0x0000000200 [0x51df805e]
    <6>[ 0.050316] [3: swapper/3: 0] Detected VIPT I-cache on CPU3
    <6>[ 0.050356] [3: swapper/3: 0] CPU3: Booted secondary processor 0x0000000300 [0x51df805e]
    <6>[ 0.060347] [4: swapper/4: 0] CPU features: enabling workaround for Mismatched cache type
    <6>[ 0.060369] [4: swapper/4: 0] CPU features: detected: Hardware dirty bit management
    <6>[ 0.060387] [4: swapper/4: 0] Detected PIPT I-cache on CPU4
    <4>[ 0.060424] [4: swapper/4: 0] CPU features: Unsupported CPU feature variation detected.
    <6>[ 0.060477] [4: swapper/4: 0] CPU4: Booted secondary processor 0x0000000400 [0x411fd0d0]
    <6>[ 0.070691] [5: swapper/5: 0] Detected PIPT I-cache on CPU5
    <6>[ 0.070773] [5: swapper/5: 0] CPU5: Booted secondary processor 0x0000000500 [0x411fd0d0]
    <6>[ 0.080820] [6: swapper/6: 0] Detected PIPT I-cache on CPU6
    <6>[ 0.080903] [6: swapper/6: 0] CPU6: Booted secondary processor 0x0000000600 [0x411fd0d0]
    <6>[ 0.091008] [7: swapper/7: 0] Detected PIPT I-cache on CPU7
    <6>[ 0.091050] [7: swapper/7: 0] CPU7: Booted secondary processor 0x0000000700 [0x411fd0d0]
    <6>[ 0.091202] [0: swapper/0: 1] smp: Brought up 1 node, 8 CPUs
    <6>[ 0.091270] [0: swapper/0: 1] SMP: Total of 8 processors activated.
    <6>[ 0.091281] [0: swapper/0: 1] CPU features: detected: GIC system register CPU interface
    <6>[ 0.091290] [0: swapper/0: 1] CPU features: detected: Privileged Access Never
    <6>[ 0.091299] [0: swapper/0: 1] CPU features: detected: User Access Override
    <6>[ 0.091308] [0: swapper/0: 1] CPU features: detected: 32-bit EL0 Support
    <6>[ 0.091317] [0: swapper/0: 1] CPU features: detected: RAS Extension Support
    <6>[ 0.091579] [0: swapper/0: 1] CPU: All CPU(s) started at EL1
    <6>[ 0.091631] [0: migration/0: 17] alternatives: patching kernel code
    <3>[ 0.092764] [0: swapper/0: 1] scm_enable_mem_protection: SCM call failed
    <5>[ 0.181794] [4: swapper/0: 1] Registered cp15_barrier emulation handler
    <5>[ 0.181814] [4: swapper/0: 1] Registered setend emulation handler
    <6>[ 0.182373] [5: swapper/0: 1] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
    <6>[ 0.182389] [5: swapper/0: 1] futex hash table entries: 2048 (order: 5, 131072 bytes)
    <6>[ 0.187383] [5: swapper/0: 1] pinctrl core: initialized pinctrl subsystem
    <4>[ 0.187616] [5: swapper/0: 1]
    <4>[ 0.187623] [5: swapper/0: 1] *************************************************************
    <4>[ 0.187629] [5: swapper/0: 1] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
    <4>[ 0.187635] [5: swapper/0: 1] ** **
    <4>[ 0.187641] [5: swapper/0: 1] ** IOMMU DebugFS SUPPORT HAS BEEN ENABLED IN THIS KERNEL **
    <4>[ 0.187646] [5: swapper/0: 1] ** **
    <4>[ 0.187652] [5: swapper/0: 1] ** This means that this kernel is built to expose internal **
    <4>[ 0.187658] [5: swapper/0: 1] ** IOMMU data structures, which may compromise security on **
    <4>[ 0.187663] [5: swapper/0: 1] ** your system. **
    <4>[ 0.187669] [5: swapper/0: 1] ** **
    <4>[ 0.187674] [5: swapper/0: 1] ** If you see this message and you are not debugging the **
    <4>[ 0.187680] [5: swapper/0: 1] ** kernel, report this immediately to your vendor! **
    <4>[ 0.187686] [5: swapper/0: 1] ** **
    <4>[ 0.187691] [5: swapper/0: 1] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
    <4>[ 0.187697] [5: swapper/0: 1] *************************************************************
    <6>[ 0.188124] [5: swapper/0: 1] NET: Registered protocol family 16
    <6>[ 0.188157] [5: swapper/0: 1] sec_log_buf:__sec_log_buf_prepare() printk virtual addrs phy=0x000000009f200000
    <6>[ 0.188176] [5: swapper/0: 1] sec_log_buf:__sec_log_buf_prepare() buf base virtual addrs 0x(____ptrval____) phy=0x000000009f200000
    <6>[ 0.190399] [5: swapper/0: 1] schedtune: configured to support 6 boost groups
    <6>[ 0.190461] [5: swapper/0: 1] audit: initializing netlink subsys (enabled)
    <6>[ 0.191916] [6: swapper/0: 1] cpuidle: using governor menu
    <6>[ 0.192080] [5: swapper/0: 1] cpuidle: using governor qcom
    <6>[ 0.192149] [5: swapper/0: 1] NET: Registered protocol family 42
    <6>[ 0.193300] [5: swapper/0: 1] vdso: 2 pages (1 code @ (____ptrval____), 1 data @ (____ptrval____))
    <6>[ 0.193310] [5: swapper/0: 1] hw-breakpoint: found 6 breakpoint and 4 watchpoint registers.
    <6>[ 0.195430] [5: swapper/0: 1] DMA: preallocated 4096 KiB pool for atomic allocations
    <6>[ 0.196228] [5: swapper/0: 1] DMA: preallocated 256 KiB pool for atomic allocations
    <6>[ 0.196572] [4: swapper/0: 1] exit: IPA_USB init success!
    <0>[ 0.196717] [4: swapper/0: 1] sec_debug:__sec_debug_dt_addr_init() restart_reason addr : 0x(____ptrval____)(0xa3cfd65c)
    <0>[ 0.196787] [4: swapper/0: 1] sec_debug:__sec_debug_dt_addr_init() upload_cause addr : 0x(____ptrval____)(0xa3d0566c)
    <3>[ 0.196797] [4: swapper/0: 1] (sec_debug_set_upload_magic) 776655ee
    <6>[ 0.196803] [4: swapper/0: 1] sec_debug:sec_debug_set_qc_dload_magic() on=1
    <3>[ 0.196811] [4: swapper/0: 1] set_dload_mode <1> ( ffffff80086f3164 )
    <0>[ 0.197072] [4: swapper/0: 1] sec_debug:sec_debug_set_upload_cause() cafebabe
    <6>[ 0.197655] [4: swapper/0: 1] sec_crashkey:__sec_crashkey_parse_dt_replace_keymap() use default keymap
     


    Madasa likes this.
  2. Hadron

    Hadron Smoke me a kipper...
    VIP Member

    Please tell us what you are actually concerned about rather than just dumping log files with no explanation of why you are doing it.
     
    marctronixx, MrJavi, Bearsyzf and 2 others like this.
  3. Trom

    Trom Well-Known Member

    Lemme guess, bought from a Samsung store in Vancouver.
     
  4. trentd

    trentd Lurker
    Thread Starter

    This is the only one you need to read. "Kernal page table isolation has been disabled by kernel configuration" my s20 is vulnerable to io attacks and that's exactly what has happened. Its status is official and I bought it at a samsung store

    Yes

    And what has "infected" my s20 is on the LG i bought as well. It came off my Google drive or home network perhaps?
     

    Attached Files:

  5. MoodyBlues

    MoodyBlues Compassion is cool!
    VIP Member

    In addition to what @Hadron said, please use the 'code' tag to put your zillion-line logs in. Also, there's no need for multiple threads about the same issue; just add them to existing posts/threads [by using 'edit' or 'reply'].

    Things will be much easier to read, and make sense of, that way!
     
    marctronixx likes this.
  6. trentd

    trentd Lurker
    Thread Starter

    [Respect those trying to help you]
     
    #6 trentd, Aug 18, 2020
    Last edited by a moderator: Aug 19, 2020
  7. Hadron

    Hadron Smoke me a kipper...
    VIP Member

    Well you really don't know much about how to ask for help. In fact it's taking a lot of restraint right now not to tell you that if that's your attitude you can do your own research. Do remember that nobody here is under any obligation to help you.

    That said, thank you for identifying the one line in the log dump that you were interested in. If there is any other reason you think that this phone is "infected", or your previous one, knowing that might help too. The more information you give (provided it's not hidden in a few hundred lines of irrelevant stuff ;)) the more likely someone will be able to help.

    From what I know the main use of KPTI is to mitigate the "meltdown" vulnerability in x86-architecture processors. One of the 3 core types used in the s865 is vulnerable to that, unless Qualcomm have made some modifications to mitigate that (I've not been able to find any information on that), so barring that it would seem reasonable for this to be enabled. But I can't guarantee that Samsung haven't disabled it themselves in order to squeeze a little extra out of benchmarks for marketing purposes. Since the s20 where I am is based on a different SoC there would be no point in my asking someone to check their log files to compare, but maybe there's an s865 s20 (or Note 20) owner here who can compare notes. My guess though is that this is something Samsung have done rather than some piece of malware modifying the kernel config (which I have to agree would be disappointing).
     
    #7 Hadron, Aug 18, 2020
    Last edited by a moderator: Aug 19, 2020
  8. trentd

    trentd Lurker
    Thread Starter

    Um I've done my research and I've been in contact with samsung for 2 months. I could post the dualdar logs or the access key logs or the shared token files or the knox logs i can't open and all the stuff I have to prove samsung knows and tried to fix it remotely or deleted my emails and installedsecuritycertificateson my phone in order to work on it usinga hidden work profile or the Italian developerwho's Linux if is in my boot logs. Ive done my research. This is to ruin samsung Screenshot_20200806-205139_Settings.jpg

    10 gigs of data approx wanting to sync on to my device about the size of a new os id say. Those aren't my files

    The really questionable link I was sent when this all started
     

    Attached Files:

  9. mikedt

    mikedt 你好

    Maybe you should avoid Samsung phones in future?
     
  10. ocnbrze

    ocnbrze DON'T PANIC!!!!!!!!!

    ummmmmmm ok what are we supposed to be looking for????? seems ok to me.

    edit: this is why you should keep the same kind of issues in one thread. i alerted the mods to merge your threads so that the conversation can be in one place....rather then hopping from one thread to another.
     
    #10 ocnbrze, Aug 19, 2020
    Last edited: Aug 19, 2020
    MoodyBlues, MrJavi and marctronixx like this.
  11. Hadron

    Hadron Smoke me a kipper...
    VIP Member

    I see you have ringed an email address in one of those screenshots. That is Rodolfo Giometti, who is the maintainer of the Linux PPS system, so it's entirely reasonable that an operating system based on the Linux kernel might include reference to him in the code or logs. Nothing to panic about there.
     
    MoodyBlues, ocnbrze and Davdi like this.
  12. johnny doe

    johnny doe Lurker

    <4>[ 0.000000] [0: swapper: 0] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
    <4>[ 0.000000] [0: swapper: 0] ** **
    <4>[ 0.000000] [0: swapper: 0] ** trace_printk() being used. Allocating extra memory. **
    <4>[ 0.000000] [0: swapper: 0] ** **
    <4>[ 0.000000] [0: swapper: 0] ** This means that this is a DEBUG kernel and it is **
    <4>[ 0.000000] [0: swapper: 0] ** unsafe for production use. **
    <4>[ 0.000000] [0: swapper: 0] ** **
    <4>[ 0.000000] [0: swapper: 0] ** If you see this message and you are not debugging **
    <4>[ 0.000000] [0: swapper: 0] ** the kernel, report this immediately to your vendor! **
    <4>[ 0.000000] [0: swapper: 0] ** **
    <4>[ 0.000000] [0: swapper: 0] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **

    I've seen this before on some Samsung phones i've had to repair and process. Whomever sold you the original device left a debugging kernel on it.
    The reason you get all this UART output is because a special kernel is installed. Have you checked the download mode to see if any tokens are mentioned? Maybe "factory binary mode allowed"
    Looks like you got an engineering sample phone instead of plain ole stock ROM
     
    Davdi, Hadron and Madasa like this.
Loading...

Share This Page

Loading...