• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

S20 far from defense grade security. this is off my official status s20 bought at a samsung store in

trentd

Lurker
Aug 16, 2020
4
1
2020-08-16 13:57:29.286: EmergencyBase - setReadyToStart [true]
2020-08-16 13:57:29.287: EmergencyBase - clearBootTime
2020-08-16 13:57:29.287: EmergencyServiceStarter - onStartCommand() Intent { act=com.samsung.intent.action.EMERGENCY_CHECK_ABNORMAL_STATE cmp=com.sec.android.emergencymode.service/.EmergencyServiceStarter (has extras) }
2020-08-16 13:57:29.284: EmergencyServiceStarter - Service is started during booting. abnormal state will be check on bootCompleted.
2020-08-16 13:57:29.304: EmerPackageController - getResolutionWait : false
2020-08-16 13:57:29.305: ConfigurationChangedReceiver - onReceive : android.intent.action.CONFIGURATION_CHANGED
2020-08-16 13:57:29.311: EmergencyFactory - resolutionChanged
2020-08-16 13:57:53.760: EmergencyReceiver - EmergencyReceiver [android.intent.action.BOOT_COMPLETED]
2020-08-16 13:57:53.761: EmergencyBase - setBootTime
2020-08-16 13:57:53.761: EmergencyBase - FCState : false
2020-08-16 13:57:53.761: EmergencyBase - EM_MODE : false
2020-08-16 13:57:53.762: EmergencyBase - setReadyToStart [true]
2020-08-16 13:57:53.762: EmergencyFactory - unregisterEmergencyReceiver
2020-08-16 13:57:53.762: EmergencyFactory - No Recovery State, EmergencyServiceStarter stopSelf and unregister receiver
2020-08-16 13:57:53.765: EmergencyFactory - unregisterEmergencyReceiver mEmergencyStateReceiverKnox e : java.lang.IllegalArgumentException: Receiver not registered: null

07-02 12:44:16:338 FactoryTest : [FactoryTestBroadcastReceiver$ModuleCommon](15229) EFS_FACTORYAPP_ROOT PATH : /efs/FactoryApp/
07-02 12:44:16:346 FactoryTest : [ModuleCommon$readFactoryMode](15229) mode: ON
07-02 12:44:16:348 FactoryTest : [FactoryTestBroadcastReceiver$onReceive](15229) KEYSTRING_BLOCK is already existed...
07-02 12:44:16:349 FactoryTest : [FactoryTestBroadcastReceiver$initFailhist](15229) Failhist Version is not V3
07-02 12:44:17:356 FactoryTest : [FactoryTestBroadcastReceiver$onReceive](15229) onReceive action=android.intent.action.BOOT_COMPLETED
07-02 12:44:17:357 FactoryTest : [FactoryTestBroadcastReceiver$ModuleCommon](15229) EFS_FACTORYAPP_ROOT PATH : /efs/FactoryApp/
07-02 12:44:17:359 FactoryTest : [ModuleCommon$readFactoryMode](15229) mode: ON
07-02 12:44:17:359 FactoryTest : [FactoryTestBroadcastReceiver$onReceive](15229) KEYSTRING_BLOCK is already existed...
07-02 12:44:17:361 FactoryTest : [FactoryTestBroadcastReceiver$onReceive](15229) Boot completed, IS_FACTORY_BINARY = USER MODE
07-02 12:44:17:383 FactoryTest : [FtUtil$isEMATCmd](15229) Unknown error
07-02 12:44:17:384 FactoryTest : [ModuleCommon$connectedJIG](15229) ...
07-02 12:44:17:385 FactoryTest : [ModuleCommon$connectedJIG](15229) cable_type = ANYWAY_JIG
07-02 12:44:17:397 FactoryTest : [ModuleCommon$connectedJIG](15229) value = No VPS, JIG_ON = JIG, JIG_ON_1KOHM = FACTORY UART
07-02 12:44:17:400 FactoryTest : [ModuleCommon$connectedJIG](15229) adc_value = null
07-02 12:44:17:463 FactoryTest : [ModuleCommon$connectedJIG](15229) raw_adc_value = null
07-02 12:44:17:463 FactoryTest : [ModuleCommon$isRunningFtClient](15229) RUNNING_FTCLIENT : false
07-02 12:44:17:464 FactoryTest : [FactoryTestBroadcastReceiver$startDummyFtClientForBootCompleted](15229) start DummyFtClient service for APO
07-02 12:44:17:487 FactoryTest : [FactoryTestBroadcastReceiver$onReceive](15229) Stop at_distributor
07-02 12:44:17:487 FactoryTest : [FactoryTestBroadcastReceiver$onReceive](15229) stop at_distributor
07-02 12:44:17:496 FactoryTest : [FactoryTestBroadcastReceiver$onReceive](15229) stop sec_diag_uart_log
07-02 12:44:17:504 FactoryTest : [ModuleCommon$disableFtClient](15229) ...
07-02 12:44:17:509 FactoryTest : [DummyFtClient$onCreate](15229) Create DummyFtClient service
07-02 12:44:17:510 FactoryTest : [ModuleCommon$isConnectionModeNone](15229) mConnectionMode = gsm
07-02 12:44:17:510 FactoryTest : [DummyFtClient$onStartCommand](15229) ...
07-02 12:44:17:510 FactoryTest : [DummyFtClient$sendBootCompletedAndFinish](15229) ...
07-02 12:44:17:511 FactoryTest : [ModuleCommon$isConnectionModeNone](15229) mConnectionMode = gsm
07-02 12:44:17:511 FactoryTest : [IPCWriterToSecPhoneService$ResponseWriter](15229) Create IPCWriterToSecPhoneService
07-02 12:44:17:512 FactoryTest : [IPCWriterToSecPhoneService$connectToSecPhoneService](15229)
07-02 12:44:17:517 FactoryTest : [IPCWriterToSecPhoneService$onServiceConnected](15229) connected done
07-02 12:44:17:518 FactoryTest : [IPCWriterToSecPhoneService$write](15229) Send Response Message to SecPhone
07-02 12:44:17:518 FactoryTest : [IPCWriterToSecPhoneService$write](15229) Response
07-02 12:44:17:527 FactoryTest : [IPCWriterToSecPhoneService$handleMessage](15229) Send BOOTING COMPLETED done
07-02 12:44:20:519 FactoryTest : [IPCWriterToSecPhoneService$disConnectSecPhoneService](16317)
07-02 12:44:23:420 FactoryTest : [ProtectedFactoryTestBroadcastReceiver$onReceive](15229) onReceive action=com.samsung.intent.action.SECPHONE_READY
07-02 12:44:23:421 FactoryTest : [ProtectedFactoryTestBroadcastReceiver$onReceive](15229) com.samsung.intent.action.SECPHONE_READY
07-02 10:14:32:533 FactoryTest : [DummyFtClient$onDestroy](15229) Destroy DummyFtClient service
07-02 10:14:32:534 FactoryTest : [ModuleCommon$isConnectionModeNone](15229) mConnectionMode = gsm
07-02 10:14:32:535 FactoryTest : [ModuleCommon$isRunningFtClient](15229) RUNNING_FTCLIENT : false
07-02 10:14:32:535 FactoryTest : [DummyFtClient$onDestroy](15229) kill process

<6>[ 0.000000] [0: swapper: 0] Booting Linux on physical CPU 0x0000000000 [0x51df805e]
<5>[ 0.000000] [0: swapper: 0] Linux version 4.19.81-17868283 (dpi@SWDH7012) (clang version 8.0.12 for Android NDK) #1 SMP PREEMPT Mon Jan 27 00:54:56 KST 2020
<6>[ 0.000000] [0: swapper: 0] Machine model: Samsung Z3Q PROJECT - PV3 Rev05 (board-id,15) for HM1 EVT1
<6>[ 0.000000] [0: swapper: 0] sec_hw_param:sec_hw_rev_setup() androidboot.revision f
<6>[ 0.000000] [0: swapper: 0] androidboot.revision f
<6>[ 0.000000] [0: swapper: 0] androidboot.revision f
<3>[ 0.000000] [0: swapper: 0] charging_night_mode : 0x0(0)
<3>[ 0.000000] [0: swapper: 0] temp_control_test : 0x0(0)
<6>[ 0.000000] [0: swapper: 0] set_afc_mode: afc_mode is 0x30
<6>[ 0.000000] [0: swapper: 0] pd_disable: pd_hv_disable is 0x30
<6>[ 0.000000] [0: swapper: 0] set_uart_mode: uart_mode is 0x02
<6>[ 0.000000] [0: swapper: 0] sapa: read_sapa_param param_time:0
<3>[ 0.000000] [0: swapper: 0] wireless_ic() : ic_info(0x00000000), chip_id(0x00), fw_ver(0x0000), fw_mode(0x0)
<6>[ 0.000000] [0: swapper: 0] OF: fdt: Reserved memory: skip to reserve memory for node 'sec_debug_rdx_bootdev@0'
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000fe000000, size 28 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node qseecom_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created DMA memory pool at 0x00000000ffc00000, size 0 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node mailbox_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000fd800000, size 8 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node sdsp_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000fc800000, size 16 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node qseecom_ta_region, compatible id shared-dma-pool:thinking:
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000fa800000, size 32 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node linux,cma, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000f9800000, size 16 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node sp_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000f9400000, size 4 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node cdsp_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000f8400000, size 16 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node user_contig_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000eac00000, size 216 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node secure_display_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000e9800000, size 20 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node cnss_wlan_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000e7000000, size 40 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node mem_dump_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000e6400000, size 12 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node adsp_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x0000000087800000, size 26 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_cdsp_region@87800000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x0000000089200000, size 21 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_slpi_region@88c00000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008a700000, size 44 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_adsp_region@8a100000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008d300000, size 1 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_spss_region@8be00000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008d400000, size 5 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_npu_region@86900000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008d900000, size 5 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_video_region@86e00000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008de00000, size 5 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_cvp_region@87300000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e300000, size 5 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_camera_region@86200000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e800000, size 1 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_wlan_fw_region@86700000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e900000, size 0 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_ipa_fw_region@86800000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e910000, size 0 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_ipa_gsi_region@86810000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e91a000, size 0 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_gpu_region@8681a000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008ea00000, size 70 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node cdsp_secure_heap@8bf00000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000009f000000, size 8 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node sec_debug_region@0, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000009fb00000, size 0 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node hdm_region@9FB00000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x00000000a0001000, size 0 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node kaslr_region@A0001000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x00000000b0100000, size 1 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node tima_region@B0100000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x00000000b0200000, size 2 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node rkp_region@B0200000, compatible id removed-dma-pool
<7>[ 0.000000] [0: swapper: 0] On node 0 totalpages: 3043653
<7>[ 0.000000] [0: swapper: 0] Normal zone: 49128 pages used for memmap
<7>[ 0.000000] [0: swapper: 0] Normal zone: 0 pages reserved
<7>[ 0.000000] [0: swapper: 0] Normal zone: 3043653 pages, LIFO batch:63
<6>[ 0.000000] [0: swapper: 0] psci: probing for conduit method from DT.
<6>[ 0.000000] [0: swapper: 0] psci: PSCIv1.1 detected in firmware.
<6>[ 0.000000] [0: swapper: 0] psci: Using standard PSCI v0.2 function IDs
<6>[ 0.000000] [0: swapper: 0] psci: MIGRATE_INFO_TYPE not supported.
<6>[ 0.000000] [0: swapper: 0] psci: SMC Calling Convention v1.1
<5>[ 0.000000] [0: swapper: 0] random: fast init done
<5>[ 0.000000] [0: swapper: 0] random: get_random_bytes called from start_kernel+0xa0/0x6e4 with crng_init=1
<6>[ 0.000000] [0: swapper: 0] percpu: Embedded 24 pages/cpu s60760 r8192 d29352 u98304
<7>[ 0.000000] [0: swapper: 0] pcpu-alloc: s60760 r8192 d29352 u98304 alloc=24*4096
<7>[ 0.000000] [0: swapper: 0] pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 [0] 4 [0] 5 [0] 6 [0] 7
<6>[ 0.000000] [0: swapper: 0] Detected VIPT I-cache on CPU0
<6>[ 0.000000] [0: swapper: 0] CPU features: kernel page table isolation disabled by kernel configuration
<6>[ 0.000000] [0: swapper: 0] CPU features: detected: Speculative Store Bypassing Safe (SSBS)
<6>[ 0.000000] [0: swapper: 0] Built 1 zonelists, mobility grouping on. Total pages: 2994525
<5>[ 0.000000] [0: swapper: 0] Kernel command line: rcupdate.rcu_expedited=1 rcu_nocbs=0-7 console=null androidboot.hardware=qcom androidboot.memcg=1 lpm_levels.sleep_disabled=1 video=vfb:640x400,bpp=32,memsize=3072000 msm_rtb.filter=0x237 service_locator.enable=1 androidboot.usbcontroller=a600000.dwc3 swiotlb=2048 printk.devkmsg=on firmware_class.path=/vendor/firmware_mnt/image androidboot.verifiedbootstate=green androidboot.keymaster=1 androidboot.ulcnt=0 androidboot.vbmeta.device=PARTUUID=4b7a15d6-322c-42ac-8110-88b7da0c5d77 androidboot.vbmeta.avb_version=1.0 androidboot.vbmeta.device_state=locked androidboot.vbmeta.hash_alg=sha256 androidboot.vbmeta.size=17472 androidboot.vbmeta.digest=8162641d4a1d1fe3ec76f97df6774a0cbf06cf59f47ba364da7302df8e32af4c androidboot.vbmeta.invalidate_on_error=yes androidboot.veritymode=enforcing androidboot.bootdevice=1d84000.ufshc androidboot.boot_devices=soc/1d84000.ufshc androidboot.serialno=00000000000 androidboot.baseband=mdm msm_drm.dsi_display0=ss_dsi_panel_S6E3HAB_AMB687TZ01_WQHD: lcd_id=0x812104 androidboot.dtbo_idx=3 androidboot.dtb_idx=0 androidboot.sec_atd.tty=/dev/ttyHS8 androidboot.revision=15 androidboot.ap_serial=0x00000000 ccic_info=1 fg_reset=1 sec_log=0x200000@0x9F200000 sec_dbg=0x1FF000@0x9F000000 sec_dbg_ex_info=0x1000@0x9F1FF000 androidboot.debug_level=0x4f4c sec_debug.enable=0 sec_debug.enable_user=0 msm_rtb.enable=0 androidboot.cp_debug_level=0x55FF sec_debug.enable_cp_debug=0 softdog.soft_margin=1000 softdog.soft_panic=1 androidboot.cp_reserved_mem=off androidboot.reserve_mem_region=0x0 androidboot.force_upload=0x0 androidboot.upload_offset=9438196 sec_debug.dump_sink=0x0 androidboot.boot_recovery=0 androidboot.carrierid.param.offset=9437644 androidboot.carrierid=XAC androidboot.sales.param.offset=9437648 androidboot.sales_code=XAC androidboot.prototype.param.offset=9437660 androidboot.im.param.offset=9437232 androidboot.me.param.offset=9437312 androidboot.sn.param.offset=9437392 androidboot.pr.param.offset=9437472 androidboot.sku.para
<3>[ 0.000000] [0: swapper: 0] [SDE] get_lcd_attached : LCD_ID = 0x812104
<6>[ 0.000000] [0: swapper: 0] set_ccic_info: ccic_info: 0x0001
<6>[ 0.000000] [0: swapper: 0] sec_bat_get_fg_reset, fg_reset:1
<6>[ 0.000000] [0: swapper: 0] sec_debug_sched_log:sec_dbg_setup() str=@0x9F000000
<6>[ 0.000000] [0: swapper: 0] sec_debug_sched_log:sec_dbg_setup() secdbg_paddr = 0x000000009f000000
<6>[ 0.000000] [0: swapper: 0] sec_debug_sched_log:sec_dbg_setup() secdbg_size = 0x1ff000
<6>[ 0.000000] [0: swapper: 0] sec_debug_user_reset:sec_debug_ex_info_setup() ex info phy=0x9f1ff000, size=0x1000
<6>[ 0.000000] [0: swapper: 0] log_buf_len individual max cpu contribution: 131072 bytes
<6>[ 0.000000] [0: swapper: 0] log_buf_len total cpu_extra contributions: 917504 bytes
<6>[ 0.000000] [0: swapper: 0] log_buf_len min size: 131072 bytes
<6>[ 0.000000] [0: swapper: 0] log_buf_len: 1048576 bytes
<6>[ 0.000000] [0: swapper: 0] early log buf free: 117376(89%)
<6>[ 0.000000] [0: swapper: 0] Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes)
<6>[ 0.000000] [0: swapper: 0] Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes)
<6>[ 0.000000] [0: swapper: 0] Memory: 10343008K/12174612K available (26110K kernel code, 5184K rwdata, 11252K rodata, 6144K init, 11964K bss, 1413812K reserved, 417792K cma-reserved)
<6>[ 0.000000] [0: swapper: 0] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1
<4>[ 0.000000] [0: swapper: 0]
<4>[ 0.000000] [0: swapper: 0] **********************************************************
<4>[ 0.000000] [0: swapper: 0] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
<4>[ 0.000000] [0: swapper: 0] ** **
<4>[ 0.000000] [0: swapper: 0] ** trace_printk() being used. Allocating extra memory. **
<4>[ 0.000000] [0: swapper: 0] ** **
<4>[ 0.000000] [0: swapper: 0] ** This means that this is a DEBUG kernel and it is **
<4>[ 0.000000] [0: swapper: 0] ** unsafe for production use. **
<4>[ 0.000000] [0: swapper: 0] ** **
<4>[ 0.000000] [0: swapper: 0] ** If you see this message and you are not debugging **
<4>[ 0.000000] [0: swapper: 0] ** the kernel, report this immediately to your vendor! **
<4>[ 0.000000] [0: swapper: 0] ** **
<4>[ 0.000000] [0: swapper: 0] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
<4>[ 0.000000] [0: swapper: 0] **********************************************************
<6>[ 0.000000] [0: swapper/0: 0] rcu: Preemptible hierarchical RCU implementation.
<6>[ 0.000000] [0: swapper/0: 0] rcu: RCU dyntick-idle grace-period acceleration is enabled.
<6>[ 0.000000] [0: swapper/0: 0] All grace periods are expedited (rcu_expedited).
<6>[ 0.000000] [0: swapper/0: 0] Tasks RCU enabled.
<6>[ 0.000000] [0: swapper/0: 0] NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0
<6>[ 0.000000] [0: swapper/0: 0] GICv3: Distributor has no Range Selector support
<6>[ 0.000000] [0: swapper/0: 0] GICv3: no VLPI support, no direct LPI support
<4>[ 0.000000] [0: swapper/0: 0] ITS: No ITS available, not enabling LPIs
<6>[ 0.000000] [0: swapper/0: 0] rcu: Offload RCU callbacks from CPUs: 0-7.
<6>[ 0.000000] [0: swapper/0: 0] Successfully registered dummy reset controller for cpucc_clocks
<6>[ 0.000000] [0: swapper/0: 0] Successfully registered dummy clock controller for cpucc_clocks
<6>[ 0.000000] [0: swapper/0: 0] arch_timer: cp15 and mmio timer(s) running at 19.20MHz (virt/virt).
<6>[ 0.000000] [0: swapper/0: 0] clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x46d987e47, max_idle_ns: 440795202767 ns
<6>[ 0.000003] [0: swapper/0: 0] sched_clock: 56 bits at 19MHz, resolution 52ns, wraps every 4398046511078ns
<6>[ 0.000024] [0: swapper/0: 0] clocksource: Switched to clocksource arch_sys_counter
<6>[ 0.002299] [0: swapper/0: 0] Calibrating delay loop (skipped), value calculated using timer frequency.. 38.40 BogoMIPS (lpj=76800)
<6>[ 0.002316] [0: swapper/0: 0] pid_max: default: 32768 minimum: 301
<6>[ 0.002380] [0: swapper/0: 0] SYSREG, after zeroing out master key, mk=0
<6>[ 0.002461] [0: swapper/0: 0] Security Framework initialized
<6>[ 0.002480] [0: swapper/0: 0] SELinux: Initializing.
<6>[ 0.002635] [0: swapper/0: 0] Mount-cache hash table entries: 32768 (order: 6, 262144 bytes)
<6>[ 0.002671] [0: swapper/0: 0] Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes)
<4>[ 0.009016] [0: swapper/0: 0] NOHZ: local_softirq_pending 02
<6>[ 0.011172] [0: swapper/0: 1] ASID allocator initialised with 65536 entries
<4>[ 0.012311] [0: swapper/0: 0] NOHZ: local_softirq_pending 02
<6>[ 0.013330] [0: swapper/0: 1] rcu: Hierarchical SRCU implementation.
<4>[ 0.018268] [0: swapper/0: 1] shmbridge isn't enabled
<3>[ 0.018282] [0: swapper/0: 1] Tima bridge registration is successful
<6>[ 0.018439] [0: swapper/0: 1] [SDE] samsung_panel_initialize : ss_dsi_panel_S6E3HAB_AMB687TZ01_WQHD done..
<6>[ 0.020862] [0: swapper/0: 1] smp: Bringing up secondary CPUs ...
<6>[ 0.030723] [1: swapper/1: 0] Detected VIPT I-cache on CPU1
<6>[ 0.030796] [1: swapper/1: 0] CPU1: Booted secondary processor 0x0000000100 [0x51df805e]
<6>[ 0.040527] [2: swapper/2: 0] Detected VIPT I-cache on CPU2
<6>[ 0.040571] [2: swapper/2: 0] CPU2: Booted secondary processor 0x0000000200 [0x51df805e]
<6>[ 0.050316] [3: swapper/3: 0] Detected VIPT I-cache on CPU3
<6>[ 0.050356] [3: swapper/3: 0] CPU3: Booted secondary processor 0x0000000300 [0x51df805e]
<6>[ 0.060347] [4: swapper/4: 0] CPU features: enabling workaround for Mismatched cache type
<6>[ 0.060369] [4: swapper/4: 0] CPU features: detected: Hardware dirty bit management
<6>[ 0.060387] [4: swapper/4: 0] Detected PIPT I-cache on CPU4
<4>[ 0.060424] [4: swapper/4: 0] CPU features: Unsupported CPU feature variation detected.
<6>[ 0.060477] [4: swapper/4: 0] CPU4: Booted secondary processor 0x0000000400 [0x411fd0d0]
<6>[ 0.070691] [5: swapper/5: 0] Detected PIPT I-cache on CPU5
<6>[ 0.070773] [5: swapper/5: 0] CPU5: Booted secondary processor 0x0000000500 [0x411fd0d0]
<6>[ 0.080820] [6: swapper/6: 0] Detected PIPT I-cache on CPU6
<6>[ 0.080903] [6: swapper/6: 0] CPU6: Booted secondary processor 0x0000000600 [0x411fd0d0]
<6>[ 0.091008] [7: swapper/7: 0] Detected PIPT I-cache on CPU7
<6>[ 0.091050] [7: swapper/7: 0] CPU7: Booted secondary processor 0x0000000700 [0x411fd0d0]
<6>[ 0.091202] [0: swapper/0: 1] smp: Brought up 1 node, 8 CPUs
<6>[ 0.091270] [0: swapper/0: 1] SMP: Total of 8 processors activated.
<6>[ 0.091281] [0: swapper/0: 1] CPU features: detected: GIC system register CPU interface
<6>[ 0.091290] [0: swapper/0: 1] CPU features: detected: Privileged Access Never
<6>[ 0.091299] [0: swapper/0: 1] CPU features: detected: User Access Override
<6>[ 0.091308] [0: swapper/0: 1] CPU features: detected: 32-bit EL0 Support
<6>[ 0.091317] [0: swapper/0: 1] CPU features: detected: RAS Extension Support
<6>[ 0.091579] [0: swapper/0: 1] CPU: All CPU(s) started at EL1
<6>[ 0.091631] [0: migration/0: 17] alternatives: patching kernel code
<3>[ 0.092764] [0: swapper/0: 1] scm_enable_mem_protection: SCM call failed
<5>[ 0.181794] [4: swapper/0: 1] Registered cp15_barrier emulation handler
<5>[ 0.181814] [4: swapper/0: 1] Registered setend emulation handler
<6>[ 0.182373] [5: swapper/0: 1] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
<6>[ 0.182389] [5: swapper/0: 1] futex hash table entries: 2048 (order: 5, 131072 bytes)
<6>[ 0.187383] [5: swapper/0: 1] pinctrl core: initialized pinctrl subsystem
<4>[ 0.187616] [5: swapper/0: 1]
<4>[ 0.187623] [5: swapper/0: 1] *************************************************************
<4>[ 0.187629] [5: swapper/0: 1] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
<4>[ 0.187635] [5: swapper/0: 1] ** **
<4>[ 0.187641] [5: swapper/0: 1] ** IOMMU DebugFS SUPPORT HAS BEEN ENABLED IN THIS KERNEL **
<4>[ 0.187646] [5: swapper/0: 1] ** **
<4>[ 0.187652] [5: swapper/0: 1] ** This means that this kernel is built to expose internal **
<4>[ 0.187658] [5: swapper/0: 1] ** IOMMU data structures, which may compromise security on **
<4>[ 0.187663] [5: swapper/0: 1] ** your system. **
<4>[ 0.187669] [5: swapper/0: 1] ** **
<4>[ 0.187674] [5: swapper/0: 1] ** If you see this message and you are not debugging the **
<4>[ 0.187680] [5: swapper/0: 1] ** kernel, report this immediately to your vendor! **
<4>[ 0.187686] [5: swapper/0: 1] ** **
<4>[ 0.187691] [5: swapper/0: 1] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
<4>[ 0.187697] [5: swapper/0: 1] *************************************************************
<6>[ 0.188124] [5: swapper/0: 1] NET: Registered protocol family 16
<6>[ 0.188157] [5: swapper/0: 1] sec_log_buf:__sec_log_buf_prepare() printk virtual addrs phy=0x000000009f200000
<6>[ 0.188176] [5: swapper/0: 1] sec_log_buf:__sec_log_buf_prepare() buf base virtual addrs 0x(____ptrval____) phy=0x000000009f200000
<6>[ 0.190399] [5: swapper/0: 1] schedtune: configured to support 6 boost groups
<6>[ 0.190461] [5: swapper/0: 1] audit: initializing netlink subsys (enabled)
<6>[ 0.191916] [6: swapper/0: 1] cpuidle: using governor menu
<6>[ 0.192080] [5: swapper/0: 1] cpuidle: using governor qcom
<6>[ 0.192149] [5: swapper/0: 1] NET: Registered protocol family 42
<6>[ 0.193300] [5: swapper/0: 1] vdso: 2 pages (1 code @ (____ptrval____), 1 data @ (____ptrval____))
<6>[ 0.193310] [5: swapper/0: 1] hw-breakpoint: found 6 breakpoint and 4 watchpoint registers.
<6>[ 0.195430] [5: swapper/0: 1] DMA: preallocated 4096 KiB pool for atomic allocations
<6>[ 0.196228] [5: swapper/0: 1] DMA: preallocated 256 KiB pool for atomic allocations
<6>[ 0.196572] [4: swapper/0: 1] exit: IPA_USB init success!
<0>[ 0.196717] [4: swapper/0: 1] sec_debug:__sec_debug_dt_addr_init() restart_reason addr : 0x(____ptrval____)(0xa3cfd65c)
<0>[ 0.196787] [4: swapper/0: 1] sec_debug:__sec_debug_dt_addr_init() upload_cause addr : 0x(____ptrval____)(0xa3d0566c)
<3>[ 0.196797] [4: swapper/0: 1] (sec_debug_set_upload_magic) 776655ee
<6>[ 0.196803] [4: swapper/0: 1] sec_debug:sec_debug_set_qc_dload_magic() on=1
<3>[ 0.196811] [4: swapper/0: 1] set_dload_mode <1> ( ffffff80086f3164 )
<0>[ 0.197072] [4: swapper/0: 1] sec_debug:sec_debug_set_upload_cause() cafebabe
<6>[ 0.197655] [4: swapper/0: 1] sec_crashkey:__sec_crashkey_parse_dt_replace_keymap() use default keymap
 
  • Like
Reactions: Deleted User
<6>[ 0.000000] [0: swapper: 0] Booting Linux on physical CPU 0x0000000000 [0x51df805e]
<5>[ 0.000000] [0: swapper: 0] Linux version 4.19.81-17868283 (dpi@SWDH7012) (clang version 8.0.12 for Android NDK) #1 SMP PREEMPT Mon Jan 27 00:54:56 KST 2020
<6>[ 0.000000] [0: swapper: 0] Machine model: Samsung Z3Q PROJECT - PV3 Rev05 (board-id,15) for HM1 EVT1
<6>[ 0.000000] [0: swapper: 0] sec_hw_param:sec_hw_rev_setup() androidboot.revision f
<6>[ 0.000000] [0: swapper: 0] androidboot.revision f
<6>[ 0.000000] [0: swapper: 0] androidboot.revision f
<3>[ 0.000000] [0: swapper: 0] charging_night_mode : 0x0(0)
<3>[ 0.000000] [0: swapper: 0] temp_control_test : 0x0(0)
<6>[ 0.000000] [0: swapper: 0] set_afc_mode: afc_mode is 0x30
<6>[ 0.000000] [0: swapper: 0] pd_disable: pd_hv_disable is 0x30
<6>[ 0.000000] [0: swapper: 0] set_uart_mode: uart_mode is 0x02
<6>[ 0.000000] [0: swapper: 0] sapa: read_sapa_param param_time:0
<3>[ 0.000000] [0: swapper: 0] wireless_ic() : ic_info(0x00000000), chip_id(0x00), fw_ver(0x0000), fw_mode(0x0)
<6>[ 0.000000] [0: swapper: 0] OF: fdt: Reserved memory: skip to reserve memory for node 'sec_debug_rdx_bootdev@0'
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000fe000000, size 28 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node qseecom_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created DMA memory pool at 0x00000000ffc00000, size 0 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node mailbox_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000fd800000, size 8 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node sdsp_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000fc800000, size 16 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node qseecom_ta_region, compatible id shared-dma-pool:thinking:
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000fa800000, size 32 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node linux,cma, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000f9800000, size 16 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node sp_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000f9400000, size 4 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node cdsp_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000f8400000, size 16 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node user_contig_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000eac00000, size 216 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node secure_display_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000e9800000, size 20 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node cnss_wlan_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000e7000000, size 40 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node mem_dump_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Reserved memory: created CMA memory pool at 0x00000000e6400000, size 12 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node adsp_region, compatible id shared-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x0000000087800000, size 26 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_cdsp_region@87800000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x0000000089200000, size 21 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_slpi_region@88c00000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008a700000, size 44 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_adsp_region@8a100000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008d300000, size 1 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_spss_region@8be00000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008d400000, size 5 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_npu_region@86900000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008d900000, size 5 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_video_region@86e00000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008de00000, size 5 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_cvp_region@87300000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e300000, size 5 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_camera_region@86200000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e800000, size 1 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_wlan_fw_region@86700000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e900000, size 0 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_ipa_fw_region@86800000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e910000, size 0 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_ipa_gsi_region@86810000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008e91a000, size 0 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node pil_gpu_region@8681a000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000008ea00000, size 70 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node cdsp_secure_heap@8bf00000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000009f000000, size 8 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node sec_debug_region@0, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x000000009fb00000, size 0 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node hdm_region@9FB00000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x00000000a0001000, size 0 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node kaslr_region@A0001000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x00000000b0100000, size 1 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node tima_region@B0100000, compatible id removed-dma-pool
<6>[ 0.000000] [0: swapper: 0] Removed memory: created DMA memory pool at 0x00000000b0200000, size 2 MiB
<6>[ 0.000000] [0: swapper: 0] OF: reserved mem: initialized node rkp_region@B0200000, compatible id removed-dma-pool
<7>[ 0.000000] [0: swapper: 0] On node 0 totalpages: 3043653
<7>[ 0.000000] [0: swapper: 0] Normal zone: 49128 pages used for memmap
<7>[ 0.000000] [0: swapper: 0] Normal zone: 0 pages reserved
<7>[ 0.000000] [0: swapper: 0] Normal zone: 3043653 pages, LIFO batch:63
<6>[ 0.000000] [0: swapper: 0] psci: probing for conduit method from DT.
<6>[ 0.000000] [0: swapper: 0] psci: PSCIv1.1 detected in firmware.
<6>[ 0.000000] [0: swapper: 0] psci: Using standard PSCI v0.2 function IDs
<6>[ 0.000000] [0: swapper: 0] psci: MIGRATE_INFO_TYPE not supported.
<6>[ 0.000000] [0: swapper: 0] psci: SMC Calling Convention v1.1
<5>[ 0.000000] [0: swapper: 0] random: fast init done
<5>[ 0.000000] [0: swapper: 0] random: get_random_bytes called from start_kernel+0xa0/0x6e4 with crng_init=1
<6>[ 0.000000] [0: swapper: 0] percpu: Embedded 24 pages/cpu s60760 r8192 d29352 u98304
<7>[ 0.000000] [0: swapper: 0] pcpu-alloc: s60760 r8192 d29352 u98304 alloc=24*4096
<7>[ 0.000000] [0: swapper: 0] pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 [0] 4 [0] 5 [0] 6 [0] 7
<6>[ 0.000000] [0: swapper: 0] Detected VIPT I-cache on CPU0
<6>[ 0.000000] [0: swapper: 0] CPU features: kernel page table isolation disabled by kernel configuration
<6>[ 0.000000] [0: swapper: 0] CPU features: detected: Speculative Store Bypassing Safe (SSBS)
<6>[ 0.000000] [0: swapper: 0] Built 1 zonelists, mobility grouping on. Total pages: 2994525
<5>[ 0.000000] [0: swapper: 0] Kernel command line: rcupdate.rcu_expedited=1 rcu_nocbs=0-7 console=null androidboot.hardware=qcom androidboot.memcg=1 lpm_levels.sleep_disabled=1 video=vfb:640x400,bpp=32,memsize=3072000 msm_rtb.filter=0x237 service_locator.enable=1 androidboot.usbcontroller=a600000.dwc3 swiotlb=2048 printk.devkmsg=on firmware_class.path=/vendor/firmware_mnt/image androidboot.verifiedbootstate=green androidboot.keymaster=1 androidboot.ulcnt=0 androidboot.vbmeta.device=PARTUUID=4b7a15d6-322c-42ac-8110-88b7da0c5d77 androidboot.vbmeta.avb_version=1.0 androidboot.vbmeta.device_state=locked androidboot.vbmeta.hash_alg=sha256 androidboot.vbmeta.size=17472 androidboot.vbmeta.digest=8162641d4a1d1fe3ec76f97df6774a0cbf06cf59f47ba364da7302df8e32af4c androidboot.vbmeta.invalidate_on_error=yes androidboot.veritymode=enforcing androidboot.bootdevice=1d84000.ufshc androidboot.boot_devices=soc/1d84000.ufshc androidboot.serialno=00000000000 androidboot.baseband=mdm msm_drm.dsi_display0=ss_dsi_panel_S6E3HAB_AMB687TZ01_WQHD: lcd_id=0x812104 androidboot.dtbo_idx=3 androidboot.dtb_idx=0 androidboot.sec_atd.tty=/dev/ttyHS8 androidboot.revision=15 androidboot.ap_serial=0x00000000 ccic_info=1 fg_reset=1 sec_log=0x200000@0x9F200000 sec_dbg=0x1FF000@0x9F000000 sec_dbg_ex_info=0x1000@0x9F1FF000 androidboot.debug_level=0x4f4c sec_debug.enable=0 sec_debug.enable_user=0 msm_rtb.enable=0 androidboot.cp_debug_level=0x55FF sec_debug.enable_cp_debug=0 softdog.soft_margin=1000 softdog.soft_panic=1 androidboot.cp_reserved_mem=off androidboot.reserve_mem_region=0x0 androidboot.force_upload=0x0 androidboot.upload_offset=9438196 sec_debug.dump_sink=0x0 androidboot.boot_recovery=0 androidboot.carrierid.param.offset=9437644 androidboot.carrierid=XAC androidboot.sales.param.offset=9437648 androidboot.sales_code=XAC androidboot.prototype.param.offset=9437660 androidboot.im.param.offset=9437232 androidboot.me.param.offset=9437312 androidboot.sn.param.offset=9437392 androidboot.pr.param.offset=9437472 androidboot.sku.para
<3>[ 0.000000] [0: swapper: 0] [SDE] get_lcd_attached : LCD_ID = 0x812104
<6>[ 0.000000] [0: swapper: 0] set_ccic_info: ccic_info: 0x0001
<6>[ 0.000000] [0: swapper: 0] sec_bat_get_fg_reset, fg_reset:1
<6>[ 0.000000] [0: swapper: 0] sec_debug_sched_log:sec_dbg_setup() str=@0x9F000000
<6>[ 0.000000] [0: swapper: 0] sec_debug_sched_log:sec_dbg_setup() secdbg_paddr = 0x000000009f000000
<6>[ 0.000000] [0: swapper: 0] sec_debug_sched_log:sec_dbg_setup() secdbg_size = 0x1ff000
<6>[ 0.000000] [0: swapper: 0] sec_debug_user_reset:sec_debug_ex_info_setup() ex info phy=0x9f1ff000, size=0x1000
<6>[ 0.000000] [0: swapper: 0] log_buf_len individual max cpu contribution: 131072 bytes
<6>[ 0.000000] [0: swapper: 0] log_buf_len total cpu_extra contributions: 917504 bytes
<6>[ 0.000000] [0: swapper: 0] log_buf_len min size: 131072 bytes
<6>[ 0.000000] [0: swapper: 0] log_buf_len: 1048576 bytes
<6>[ 0.000000] [0: swapper: 0] early log buf free: 117376(89%)
<6>[ 0.000000] [0: swapper: 0] Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes)
<6>[ 0.000000] [0: swapper: 0] Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes)
<6>[ 0.000000] [0: swapper: 0] Memory: 10343008K/12174612K available (26110K kernel code, 5184K rwdata, 11252K rodata, 6144K init, 11964K bss, 1413812K reserved, 417792K cma-reserved)
<6>[ 0.000000] [0: swapper: 0] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1
<4>[ 0.000000] [0: swapper: 0]
<4>[ 0.000000] [0: swapper: 0] **********************************************************
<4>[ 0.000000] [0: swapper: 0] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
<4>[ 0.000000] [0: swapper: 0] ** **
<4>[ 0.000000] [0: swapper: 0] ** trace_printk() being used. Allocating extra memory. **
<4>[ 0.000000] [0: swapper: 0] ** **
<4>[ 0.000000] [0: swapper: 0] ** This means that this is a DEBUG kernel and it is **
<4>[ 0.000000] [0: swapper: 0] ** unsafe for production use. **
<4>[ 0.000000] [0: swapper: 0] ** **
<4>[ 0.000000] [0: swapper: 0] ** If you see this message and you are not debugging **
<4>[ 0.000000] [0: swapper: 0] ** the kernel, report this immediately to your vendor! **
<4>[ 0.000000] [0: swapper: 0] ** **
<4>[ 0.000000] [0: swapper: 0] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
<4>[ 0.000000] [0: swapper: 0] **********************************************************
<6>[ 0.000000] [0: swapper/0: 0] rcu: Preemptible hierarchical RCU implementation.
<6>[ 0.000000] [0: swapper/0: 0] rcu: RCU dyntick-idle grace-period acceleration is enabled.
<6>[ 0.000000] [0: swapper/0: 0] All grace periods are expedited (rcu_expedited).
<6>[ 0.000000] [0: swapper/0: 0] Tasks RCU enabled.
<6>[ 0.000000] [0: swapper/0: 0] NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0
<6>[ 0.000000] [0: swapper/0: 0] GICv3: Distributor has no Range Selector support
<6>[ 0.000000] [0: swapper/0: 0] GICv3: no VLPI support, no direct LPI support
<4>[ 0.000000] [0: swapper/0: 0] ITS: No ITS available, not enabling LPIs
<6>[ 0.000000] [0: swapper/0: 0] rcu: Offload RCU callbacks from CPUs: 0-7.
<6>[ 0.000000] [0: swapper/0: 0] Successfully registered dummy reset controller for cpucc_clocks
<6>[ 0.000000] [0: swapper/0: 0] Successfully registered dummy clock controller for cpucc_clocks
<6>[ 0.000000] [0: swapper/0: 0] arch_timer: cp15 and mmio timer(s) running at 19.20MHz (virt/virt).
<6>[ 0.000000] [0: swapper/0: 0] clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x46d987e47, max_idle_ns: 440795202767 ns
<6>[ 0.000003] [0: swapper/0: 0] sched_clock: 56 bits at 19MHz, resolution 52ns, wraps every 4398046511078ns
<6>[ 0.000024] [0: swapper/0: 0] clocksource: Switched to clocksource arch_sys_counter
<6>[ 0.002299] [0: swapper/0: 0] Calibrating delay loop (skipped), value calculated using timer frequency.. 38.40 BogoMIPS (lpj=76800)
<6>[ 0.002316] [0: swapper/0: 0] pid_max: default: 32768 minimum: 301
<6>[ 0.002380] [0: swapper/0: 0] SYSREG, after zeroing out master key, mk=0
<6>[ 0.002461] [0: swapper/0: 0] Security Framework initialized
<6>[ 0.002480] [0: swapper/0: 0] SELinux: Initializing.
<6>[ 0.002635] [0: swapper/0: 0] Mount-cache hash table entries: 32768 (order: 6, 262144 bytes)
<6>[ 0.002671] [0: swapper/0: 0] Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes)
<4>[ 0.009016] [0: swapper/0: 0] NOHZ: local_softirq_pending 02
<6>[ 0.011172] [0: swapper/0: 1] ASID allocator initialised with 65536 entries
<4>[ 0.012311] [0: swapper/0: 0] NOHZ: local_softirq_pending 02
<6>[ 0.013330] [0: swapper/0: 1] rcu: Hierarchical SRCU implementation.
<4>[ 0.018268] [0: swapper/0: 1] shmbridge isn't enabled
<3>[ 0.018282] [0: swapper/0: 1] Tima bridge registration is successful
<6>[ 0.018439] [0: swapper/0: 1] [SDE] samsung_panel_initialize : ss_dsi_panel_S6E3HAB_AMB687TZ01_WQHD done..
<6>[ 0.020862] [0: swapper/0: 1] smp: Bringing up secondary CPUs ...
<6>[ 0.030723] [1: swapper/1: 0] Detected VIPT I-cache on CPU1
<6>[ 0.030796] [1: swapper/1: 0] CPU1: Booted secondary processor 0x0000000100 [0x51df805e]
<6>[ 0.040527] [2: swapper/2: 0] Detected VIPT I-cache on CPU2
<6>[ 0.040571] [2: swapper/2: 0] CPU2: Booted secondary processor 0x0000000200 [0x51df805e]
<6>[ 0.050316] [3: swapper/3: 0] Detected VIPT I-cache on CPU3
<6>[ 0.050356] [3: swapper/3: 0] CPU3: Booted secondary processor 0x0000000300 [0x51df805e]
<6>[ 0.060347] [4: swapper/4: 0] CPU features: enabling workaround for Mismatched cache type
<6>[ 0.060369] [4: swapper/4: 0] CPU features: detected: Hardware dirty bit management
<6>[ 0.060387] [4: swapper/4: 0] Detected PIPT I-cache on CPU4
<4>[ 0.060424] [4: swapper/4: 0] CPU features: Unsupported CPU feature variation detected.
<6>[ 0.060477] [4: swapper/4: 0] CPU4: Booted secondary processor 0x0000000400 [0x411fd0d0]
<6>[ 0.070691] [5: swapper/5: 0] Detected PIPT I-cache on CPU5
<6>[ 0.070773] [5: swapper/5: 0] CPU5: Booted secondary processor 0x0000000500 [0x411fd0d0]
<6>[ 0.080820] [6: swapper/6: 0] Detected PIPT I-cache on CPU6
<6>[ 0.080903] [6: swapper/6: 0] CPU6: Booted secondary processor 0x0000000600 [0x411fd0d0]
<6>[ 0.091008] [7: swapper/7: 0] Detected PIPT I-cache on CPU7
<6>[ 0.091050] [7: swapper/7: 0] CPU7: Booted secondary processor 0x0000000700 [0x411fd0d0]
<6>[ 0.091202] [0: swapper/0: 1] smp: Brought up 1 node, 8 CPUs
<6>[ 0.091270] [0: swapper/0: 1] SMP: Total of 8 processors activated.
<6>[ 0.091281] [0: swapper/0: 1] CPU features: detected: GIC system register CPU interface
<6>[ 0.091290] [0: swapper/0: 1] CPU features: detected: Privileged Access Never
<6>[ 0.091299] [0: swapper/0: 1] CPU features: detected: User Access Override
<6>[ 0.091308] [0: swapper/0: 1] CPU features: detected: 32-bit EL0 Support
<6>[ 0.091317] [0: swapper/0: 1] CPU features: detected: RAS Extension Support
<6>[ 0.091579] [0: swapper/0: 1] CPU: All CPU(s) started at EL1
<6>[ 0.091631] [0: migration/0: 17] alternatives: patching kernel code
<3>[ 0.092764] [0: swapper/0: 1] scm_enable_mem_protection: SCM call failed
<5>[ 0.181794] [4: swapper/0: 1] Registered cp15_barrier emulation handler
<5>[ 0.181814] [4: swapper/0: 1] Registered setend emulation handler
<6>[ 0.182373] [5: swapper/0: 1] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
<6>[ 0.182389] [5: swapper/0: 1] futex hash table entries: 2048 (order: 5, 131072 bytes)
<6>[ 0.187383] [5: swapper/0: 1] pinctrl core: initialized pinctrl subsystem
<4>[ 0.187616] [5: swapper/0: 1]
<4>[ 0.187623] [5: swapper/0: 1] *************************************************************
<4>[ 0.187629] [5: swapper/0: 1] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
<4>[ 0.187635] [5: swapper/0: 1] ** **
<4>[ 0.187641] [5: swapper/0: 1] ** IOMMU DebugFS SUPPORT HAS BEEN ENABLED IN THIS KERNEL **
<4>[ 0.187646] [5: swapper/0: 1] ** **
<4>[ 0.187652] [5: swapper/0: 1] ** This means that this kernel is built to expose internal **
<4>[ 0.187658] [5: swapper/0: 1] ** IOMMU data structures, which may compromise security on **
<4>[ 0.187663] [5: swapper/0: 1] ** your system. **
<4>[ 0.187669] [5: swapper/0: 1] ** **
<4>[ 0.187674] [5: swapper/0: 1] ** If you see this message and you are not debugging the **
<4>[ 0.187680] [5: swapper/0: 1] ** kernel, report this immediately to your vendor! **
<4>[ 0.187686] [5: swapper/0: 1] ** **
<4>[ 0.187691] [5: swapper/0: 1] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
<4>[ 0.187697] [5: swapper/0: 1] *************************************************************
<6>[ 0.188124] [5: swapper/0: 1] NET: Registered protocol family 16
<6>[ 0.188157] [5: swapper/0: 1] sec_log_buf:__sec_log_buf_prepare() printk virtual addrs phy=0x000000009f200000
<6>[ 0.188176] [5: swapper/0: 1] sec_log_buf:__sec_log_buf_prepare() buf base virtual addrs 0x(____ptrval____) phy=0x000000009f200000
<6>[ 0.190399] [5: swapper/0: 1] schedtune: configured to support 6 boost groups
<6>[ 0.190461] [5: swapper/0: 1] audit: initializing netlink subsys (enabled)
<6>[ 0.191916] [6: swapper/0: 1] cpuidle: using governor menu
<6>[ 0.192080] [5: swapper/0: 1] cpuidle: using governor qcom
<6>[ 0.192149] [5: swapper/0: 1] NET: Registered protocol family 42
<6>[ 0.193300] [5: swapper/0: 1] vdso: 2 pages (1 code @ (____ptrval____), 1 data @ (____ptrval____))
<6>[ 0.193310] [5: swapper/0: 1] hw-breakpoint: found 6 breakpoint and 4 watchpoint registers.
<6>[ 0.195430] [5: swapper/0: 1] DMA: preallocated 4096 KiB pool for atomic allocations
<6>[ 0.196228] [5: swapper/0: 1] DMA: preallocated 256 KiB pool for atomic allocations
<6>[ 0.196572] [4: swapper/0: 1] exit: IPA_USB init success!
<0>[ 0.196717] [4: swapper/0: 1] sec_debug:__sec_debug_dt_addr_init() restart_reason addr : 0x(____ptrval____)(0xa3cfd65c)
<0>[ 0.196787] [4: swapper/0: 1] sec_debug:__sec_debug_dt_addr_init() upload_cause addr : 0x(____ptrval____)(0xa3d0566c)
<3>[ 0.196797] [4: swapper/0: 1] (sec_debug_set_upload_magic) 776655ee
<6>[ 0.196803] [4: swapper/0: 1] sec_debug:sec_debug_set_qc_dload_magic() on=1
<3>[ 0.196811] [4: swapper/0: 1] set_dload_mode <1> ( ffffff80086f3164 )
<0>[ 0.197072] [4: swapper/0: 1] sec_debug:sec_debug_set_upload_cause() cafebabe
<6>[ 0.197655] [4: swapper/0: 1] sec_crashkey:__sec_crashkey_parse_dt_replace_keymap() use default keymap

Lemme guess, bought from a Samsung store in Vancouver.
 
Upvote 0
This is the only one you need to read. "Kernal page table isolation has been disabled by kernel configuration" my s20 is vulnerable to io attacks and that's exactly what has happened. Its status is official and I bought it at a samsung store

Lemme guess, bought from a Samsung store in Vancouver.
Yes

And what has "infected" my s20 is on the LG i bought as well. It came off my Google drive or home network perhaps?
 

Attachments

  • 20200813_085615.jpg
    20200813_085615.jpg
    656.9 KB · Views: 688
  • 20200813_085615.jpg
    20200813_085615.jpg
    656.9 KB · Views: 457
Upvote 0
In addition to what @Hadron said, please use the 'code' tag to put your zillion-line logs in. Also, there's no need for multiple threads about the same issue; just add them to existing posts/threads [by using 'edit' or 'reply'].

Things will be much easier to read, and make sense of, that way!
 
  • Like
Reactions: marctronixx
Upvote 0
REMOVED By Moderator

Well you really don't know much about how to ask for help. In fact it's taking a lot of restraint right now not to tell you that if that's your attitude you can do your own research. Do remember that nobody here is under any obligation to help you.

That said, thank you for identifying the one line in the log dump that you were interested in. If there is any other reason you think that this phone is "infected", or your previous one, knowing that might help too. The more information you give (provided it's not hidden in a few hundred lines of irrelevant stuff ;)) the more likely someone will be able to help.

From what I know the main use of KPTI is to mitigate the "meltdown" vulnerability in x86-architecture processors. One of the 3 core types used in the s865 is vulnerable to that, unless Qualcomm have made some modifications to mitigate that (I've not been able to find any information on that), so barring that it would seem reasonable for this to be enabled. But I can't guarantee that Samsung haven't disabled it themselves in order to squeeze a little extra out of benchmarks for marketing purposes. Since the s20 where I am is based on a different SoC there would be no point in my asking someone to check their log files to compare, but maybe there's an s865 s20 (or Note 20) owner here who can compare notes. My guess though is that this is something Samsung have done rather than some piece of malware modifying the kernel config (which I have to agree would be disappointing).
 
Last edited by a moderator:
Upvote 0
Um I've done my research and I've been in contact with samsung for 2 months. I could post the dualdar logs or the access key logs or the shared token files or the knox logs i can't open and all the stuff I have to prove samsung knows and tried to fix it remotely or deleted my emails and installedsecuritycertificateson my phone in order to work on it usinga hidden work profile or the Italian developerwho's Linux if is in my boot logs. Ive done my research. This is to ruin samsung
Screenshot_20200806-205139_Settings.jpg


10 gigs of data approx wanting to sync on to my device about the size of a new os id say. Those aren't my files

10 gigs of data approx wanting to sync on to my device about the size of a new os id say. Those aren't my files
The really questionable link I was sent when this all started
 

Attachments

  • Screenshot_20200810-113922_Messages.jpg
    Screenshot_20200810-113922_Messages.jpg
    163.9 KB · Views: 500
  • Screenshot_20200810-113745_Messages.jpg
    Screenshot_20200810-113745_Messages.jpg
    187.2 KB · Views: 613
  • Screenshot_20200810-113922_Messages.jpg
    Screenshot_20200810-113922_Messages.jpg
    163.9 KB · Views: 432
  • 20200704_143041.jpg
    20200704_143041.jpg
    501.8 KB · Views: 494
  • 20200723_112538.jpg
    20200723_112538.jpg
    525.5 KB · Views: 433
  • Screenshot_20200811-034836_Messenger.jpg
    Screenshot_20200811-034836_Messenger.jpg
    180.7 KB · Views: 551
Upvote 0
ummmmmmm ok what are we supposed to be looking for????? seems ok to me.

edit: this is why you should keep the same kind of issues in one thread. i alerted the mods to merge your threads so that the conversation can be in one place....rather then hopping from one thread to another.
 
Last edited:
Upvote 0
I see you have ringed an email address in one of those screenshots. That is Rodolfo Giometti, who is the maintainer of the Linux PPS system, so it's entirely reasonable that an operating system based on the Linux kernel might include reference to him in the code or logs. Nothing to panic about there.
 
Upvote 0
<4>[ 0.000000] [0: swapper: 0] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
<4>[ 0.000000] [0: swapper: 0] ** **
<4>[ 0.000000] [0: swapper: 0] ** trace_printk() being used. Allocating extra memory. **
<4>[ 0.000000] [0: swapper: 0] ** **
<4>[ 0.000000] [0: swapper: 0] ** This means that this is a DEBUG kernel and it is **
<4>[ 0.000000] [0: swapper: 0] ** unsafe for production use. **
<4>[ 0.000000] [0: swapper: 0] ** **
<4>[ 0.000000] [0: swapper: 0] ** If you see this message and you are not debugging **
<4>[ 0.000000] [0: swapper: 0] ** the kernel, report this immediately to your vendor! **
<4>[ 0.000000] [0: swapper: 0] ** **
<4>[ 0.000000] [0: swapper: 0] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **

I've seen this before on some Samsung phones i've had to repair and process. Whomever sold you the original device left a debugging kernel on it.
The reason you get all this UART output is because a special kernel is installed. Have you checked the download mode to see if any tokens are mentioned? Maybe "factory binary mode allowed"
Looks like you got an engineering sample phone instead of plain ole stock ROM
 
Upvote 0
I fought for an entire year with Samsung and Verizon. Because of these exact vulnerabilities my phone (and it’s replacement) we’re shipped with, my entire life was hacked. I had connected my phone to my laptop using the MyPhone app and it was a disaster. The hacker stole my identity, cloned my ETSY profile and hijacked my store deposits, created bank accounts under my business entity, took pics from our phone cameras (and I say “our” bc once in one phone they used “connect to nearby devices” and connected my phone to every smart device in our home and cars and then disabled the toggle button so I could not turn it or BT off). I filed SIX IC3 forms with the FBI, shut down my business, spent over $12k and it destroyed my family and our privacy and security. All because Samsung was careless and I didn’t know what to look for and thought I was purchasing a secure phone. I became suspicious when a flash would go off on my camera at random times and every time I used my facial recognition or finger ID. Then there was the day 3 business accounts showed up at BofA and all my ETSY $ disappeared. It’s not a joke. And YES it is negligent of them to ship phones with vulnerabilities open. And NO. I WILL NOT EVER USE AN ANDROID AGAIN! Android Developers we’re zero help when this was happening to us. Nobody helped us and EVERYONE ridiculed me. I still sting from the treatment we received from the dev communities. I may just be a seamstress but I LIVED through this nightmare as did my family (and my husband works at Intel) amd we can ALL attest to the long term effects it had on our lives. We would file a lawsuit as I have MORE than enough evidence piled up, but I choose life. And warn to NEVER buy Samsung. Good luck to you. And if you suspect something is wrong don’t let others tell you there’s not. I could have saved a lot of money, my credit, and my health had I listened to the facts I was witnessing myself. If it shouldn’t be happening, something is WRONG. Go Apple! And again, no thanks to Android Dev who closed all my tickets as “in feasible” without a single word of advice.
 
Upvote 0
Sefani, don't blame Android, it's Samsung who seem to clearly be at fault here. Here's what should give you back control of your phone/life.

1) On a computer, change the password of the Google account you use on your phone. (And Samsung one as well if you have one)

2 Factory data reset the Samsung - this will remove all apps and data, returning the phone to factory fresh state.

3) Buy a new phone and sign in with the google account (new password) DO NOT use the old number (sim card)

3) Get a new mobile number (sim card)

Talk to the banks in person to open new accounts and close all your current ones (I know it's a pain but it's a clean start).

Now change passwords on Etsy and all other compromised accounts and enable 2 factor authentication wherever possible.

If I've missed anything, I'm sure someone will fill in the gaps.
 
Upvote 0
Sorry I’m new to posting and meant to send my reply to the original poster rather than Lurker. Please excuse my ignorance. Best regards, SP
Don't worry: you posted to the thread, and the information posted may be useful to others. So this is a perfectly fine contribution. This is a forum for discussing Android devices, apps and software, and that includes criticism of devices, software and companies where you think they deserve it.

"Lurker" is just an auto-generated title for people who have not made many posts. That's all it means, and as people make more posts the title changes (a few of us have custom titles as well).
 
Upvote 0
I completely agree with "lurker" I've got this on my android as well and it has allowed access to a lot of my devices which have also been compromised. Wanna know what this sort of exploit can do to a flieght of drones running an android based operating system? It's not pretty. That's just a small example of some of the issues. ANDROID has gotten to open-sourced for its own good and will ultimately be its demise in the end. Even comparing say app stores from Android and Apple is phenomenal the amount of exploits in Google compared to Apple. Also permissions for example I why give me the permissions tabs if they are just going to be Greyed out so I don't have a choice either way. I'm not an apple fan boy either but android is just way to easy to run a muck on with no way to fix it in reality.maybe temporarily but nothing sticks. I feel there needs to be a new os developed that is somewhere in the neighborhood in between. Where one has a choice for say a lock down mode which has great encryption that cannot be tampered with or you can have your full throttle mode. Android has way to many varieties and builds. Get one build right first how bout.
 
Upvote 0

BEST TECH IN 2023

We've been tracking upcoming products and ranking the best tech since 2007. Thanks for trusting our opinion: we get rewarded through affiliate links that earn us a commission and we invite you to learn more about us.

Smartphones