· 5 years ago · Dec 08, 2020, 09:36 AM
1[0: 0.687]
2[0: 0.688] Samsung S-Boot 4.0 for SM-A202F (Sep 25 2020 - 18:56:57 34672703)
3[0: 0.696] EXYNOS7885 EVT 0.2 (Base on ARM CortexA50)
4[0: 0.701] 3072MB / Rev 3 / A202FXXU3BTI7 / (PKG_ID 0xe7885000) / LOT_ID NN75S / SHIP /PINRST (0x10000)
5[0: 0.711] __if_pmic_rev_init - MUIC API is not ready!
6[0: 0.717] PMUDBG_CENTRAL_SEQ_*: apsoc 0x0 mif 0x0 apm 0x0
7[0: 0.723] PMUDBG_CL0_*: cpu0 0x0 cpu1 0x0 l2 0x0 noncpu 0x0
8[0: 0.729] PMUDBG_CL2_*: cpu0 0x0 cpu1 0x0
9[0: 0.733] PMUDBG_CL1_*: cpu0 0x0 cpu1 0x0 cpu2 0x0 cpu3 0x0 l2 0x0 noncpu 0x0
10[0: 0.741] RST_STAT: 0x10000
11[0: 0.744] s5p_check_dump_gpr: set sp loading flag
12[0: 0.749] MMU: enable start
13[0: 0.753] MMU: enable done
14[0: 0.755] [MUIC] muic_register_s2mu106_apis
15[0: 0.761] Try 0 : [MUIC] muic_test1:0x001.
16[0: 0.766] -> matched(s2mu106).
17[0: 0.769] init_multi_microusb_ic Active MUIC 0x01
18[0: 0.775] s2mu106_muic_get_adc_value: ADC:0x00
19[0: 0.781] s2mu106_init_microusb_ic: MUIC: Enable BC1.2
20[0: 0.788] s2mu106_init_microusb_ic: MUIC: CONTROL writing success.
21[0: 0.797] s2mu106_init_microusb_ic: MUIC: CONTROL:0x17
22[0: 0.804] s2mu106_init_microusb_ic: MUIC: TIMING3: 0x8d
23[0: 0.816] s2mu106_muic_get_attached_device: INT[1:0xa1, 2:0x05]
24[0: 0.823] s2mu106_muic_get_attached_device: DEV[1:0x80, 2:0x00, 3:0x00]
25[0: 0.832] get_vbvolt: apple: 0x06, dev3: 0x00
26[0: 0.837] get_vbvolt: vbvolt: 0x02
27[0: 0.840] s2mu106_muic_get_attached_device: redetect
28[0: 0.848] get_vbvolt: apple: 0x06, dev3: 0x00
29[0: 0.853] get_vbvolt: vbvolt: 0x02
30[0: 0.863] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
31[0: 0.882] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
32[0: 0.900] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
33[0: 0.919] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
34[0: 0.938] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
35[0: 0.957] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
36[0: 0.975] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
37[0: 0.994] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
38[0: 1. 13] s2mu106_muic_get_attached_device_ex: det completed after 80 msec
39[0: 1. 27] s2mu106_muic_get_attached_device_ex: INT[1:0x03, 2:0x04]
40[0: 1. 33] s2mu106_muic_get_attached_device_ex: DEV[1:0x04, 2:0x00, 3:0x00]
41[0: 1. 43] ccic_register_s2mu106:
42[0: 1. 46] ccic_is_s2mu106:
43[0: 1. 50] ccic_is_s2mu106: reg:b2 - val:00 ret:00
44[0: 1. 57] ccic_register_s2mu106: 0x1 = 0x2
45[0: 1. 62] ccic_register_s2mu106: 0x2 = 0x9b
46[0: 1. 68] ccic_register_s2mu106: 0x3 = 0x98
47[0: 1. 74] ccic_register_s2mu106: 0x4 = 0x90
48[0: 1. 79] ccic_register_s2mu106: 0x5 = 0x99
49[0: 1. 85] ccic_register_s2mu106: 0x6 = 0x88
50[0: 1. 91] ccic_register_s2mu106: 0x7 = 0x47
51[0: 1. 96] ccic_register_s2mu106: 0x8 = 0xa
52[0: 1.102] ccic_register_s2mu106: 0x9 = 0x0
53[0: 1.108] ccic_register_s2mu106: 0xa = 0xe
54[0: 1.113] ccic_register_s2mu106: 0xb = 0xd
55[0: 1.119] ccic_register_s2mu106: 0xc = 0x90
56[0: 1.125] ccic_register_s2mu106: 0x18 = 0xe2
57[0: 1.130] ccic_register_s2mu106: 0xb2 = 0x0
58[0: 1.144] get_vbvolt: apple: 0x06, dev3: 0x00
59[0: 1.149] get_vbvolt: vbvolt: 0x02
60[0: 1.155] ccic_register_s2mu106: BEFORE VBUS(2)
61[0: 1.161] s2mu106_ccic_check_jig1: S2MU106_REG_RID at POWER ON : 0
62[0: 1.169] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
63[0: 1.181] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
64[0: 1.194] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
65[0: 1.206] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
66[0: 1.218] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
67[0: 1.231] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
68[0: 1.243] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
69[0: 1.256] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
70[0: 1.268] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
71[0: 1.281] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
72[0: 1.293] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
73[0: 1.306] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
74[0: 1.318] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
75[0: 1.330] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
76[0: 1.343] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
77[0: 1.355] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
78[0: 1.368] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
79[0: 1.380] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
80[0: 1.393] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
81[0: 1.405] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
82[0: 1.418] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
83[0: 1.430] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
84[0: 1.442] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
85[0: 1.455] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
86[0: 1.467] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
87[0: 1.480] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
88[0: 1.492] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
89[0: 1.505] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
90[0: 1.517] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
91[0: 1.529] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
92[0: 1.542] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
93[0: 1.554] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
94[0: 1.567] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
95[0: 1.579] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
96[0: 1.592] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
97[0: 1.604] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
98[0: 1.617] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
99[0: 1.629] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
100[0: 1.641] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
101[0: 1.654] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
102[0: 1.666] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
103[0: 1.679] s2mu106_ccic_check_jig1: S2MU106_REG_RID at FIRST : 0
104[0: 1.919] s2mu106_ccic_check_jig2: S2MU106_REG_RID at SECOND : 0
105[0: 1.927] s2mu106 found.
106[0: 1.930] mach_board_initialize: Active ccic device.
107[0: 1.935] ifconn_init: CCIC Mode
108[0: 1.938] ifconn_get_jig_status: CCIC Mode
109[0: 1.943] ccic_read_adc:
110[0: 1.946] s2mu106_read_adc:
111[0: 1.950] s2mu106_read_adc: RID = 00(RID_0)
112[0: 1.955] ifconn_is_ccic_jig_device: rid=00
113[0: 1.959] ccic_wait_auth:
114[0: 1.960] s2mu106_muic_get_adc_value: ADC:0x00
115[0: 1.960] ccic_read_adc:
116[0: 1.960] s2mu106_read_adc:
117[0: 1.962] s2mu106_read_adc: RID = 00(RID_0)
118[0: 1.962] board_ccic_check_uart: jig_adc=00, cc_adc=00
119[0: 1.962] ccic_read_adc:
120[0: 1.962] s2mu106_read_adc:
121[0: 1.963] s2mu106_read_adc: RID = 00(RID_0)
122[0: 2.101] load Secure Payload done.
123[0: 2.111]
124Chip ID : 670d6c4d1082
125[0: 2.111] EL3 Monitor information:
126[0: 2.111] No tag info No git info ilkyungkim
127
128[0: 2.111] DREX_CALIBRATION3: 0xb000017
129[0: 2.111] MMC Init
130[0: 2.111] MMC0 400Khz 1 bit mode
131[0: 2.130] EXT_CSD structure version 8
132[0: 2.131] cardtype: 0x00000007
133[0: 2.131] MMC RST_n_FUNCTION was already enabled
134[0: 2.131] mmc->card_caps: 0x00000f11
135[0: 2.131] mmc->host_caps: 0x00000f11
136[0: 2.131] !!!Enter 8 Bit DDR mode.!!!
137[0: 2.132] MMC0 52Mhz 8bit DDR mode
138[0: 2.132] MMC0 capacity = 61071360
139[0: 2.132] MMC0 vendor: 0x15
140[0: 2.132] MMC0 PNM: 0x424a54443452
141[0: 2.132] MMC0 MD: 2020 5
142[0: 2.132] MMC0 FW: 0x03
143[0: 2.139] MMC0(0x15) LVD reset count : 0
144[0: 2.139]
145[Debug Info.]
146[0: 2.139] S-BOOT : VERSION_-+L0
147[0: 2.145] GetSignerVer : SignerVer02
148[0: 2.145] - read_bl1
149[0: 2.145] blk_bread_bootsector: MMC mode
150[0: 2.150] Verify_Signature_With_Signingtype 0x90d20130 5184@0x90d10000, 256@0x90d20030
151[0: 2.152] pit_check_signature (PIT) valid.
152[0: 2.160] PARAM ENV VERSION: v1.0..
153[0: 2.162] blk_bread_bootsectorB: MMC mode in 2nd partition
154[0: 2.162] MMC0 emmc_bootpart_2_open: 2nd partition open
155[0: 2.164] MMC0 emmc_bootpart_2_close: 2nd partition close
156[0: 2.166] initialize_ddi_data: usable! (88:0x303), warranty reason : (0x0e03)
157[0: 2.166] MAGIC_RAM_BASE: d56f9933, MAGIC_RAM_BASE2: 5617dcf7, ompin: 0
158[0: 2.166] [ldfw] Pass LDFW partition!
159[0: 2.166] [ldfw] read whole CM partition from the storage
160[0: 2.267] ldfw: 0th ldfw's version 0x40191220 name : CryptoManagerV40
161[0: 2.267] ldfw: 1th ldfw's version 0x20181224 name : fmp_fw_V20
162[0: 2.267] ldfw: 2th ldfw's version 0x20191209 name : drm_fw
163[0: 2.267] ldfw: 3th ldfw's version 0x24190110 name : srpmb_fw
164[0: 2.267] ldfw: 4th ldfw's version 0x20181224 name : hdcp_fw
165[0: 2.267] ldfw: 5th ldfw's version 0x20150828 name : tail_fw
166[0: 2.267] GetSignerVer : SignerVer02
167[0: 2.267] ldfw: init ldfw(s). whole ldfws size 0x3ec210
168[0: 2.338] [ldfw] try to init 5 ldfw(s). except 0 ldfw 5 ldfw(s) have been inited done.
169[0: 2.353] [TEEGRIS] register handler1, ret = 0x0
170[0: 2.363] [TEEGRIS] register handler2, ret = 0x0
171[0: 2.363] [TEEGRIS] disable handler registeration, ret = 0x0
172[0: 2.363] [OTP] MODEL_ID read start
173[0: 2.363] [OTP] MODEL_ID read value: 0x37
174[0: 2.363] [OTP] BAN_ROM_SEC_BOOT_KEY read start
175[0: 2.363] [OTP] BAN_ROM_SEC_BOOT_KEY read value: 0x0
176[0: 2.363] [OTP] USE_ROM_SEC_BOOT_KEY read: start
177[0: 2.363] [OTP] USE_ROM_SEC_BOOT_KEY read value: 0x0
178[0: 2.363] [OTP] ENABLE_AES read start
179[0: 2.363] [OTP] ENABLE_AES read value: 0x0
180[0: 2.363] [OTP] PREORDER read start
181[0: 2.363] [OTP] PREORDER read value: 0x1
182[0: 2.363] [OTP] ANTIRBK_NS_AP0 read start
183[0: 2.363] [OTP] ANTIRBK_NS_AP0 read value: 0x3
184[0: 2.363] [OTP] COMMERCIAL read start
185[0: 2.363] [OTP] COMMERCIAL read value: 0x1
186[0: 2.363] [OTP] TEST read start
187[0: 2.363] [OTP] TEST read value: 0x0
188[0: 2.363] [OTP] WARRANTY read start
189[0: 2.363] [OTP] WARRANTY read value: 0x1
190[0: 2.363] [OTP] JTAG_SW_LOCK read start
191[0: 2.363] [OTP] JTAG_SW_LOCK read value: 0x1
192[0: 2.363] [OTP] CUSTOM_FLAG read start (6)
193[0: 2.363] [OTP] CUSTOM_FLAG read value: 0x0
194[0: 2.363] [OTP] CUSTOM_FLAG read start (7)
195[0: 2.363] [OTP] CUSTOM_FLAG read value: 0x1
196[0: 2.363] [OTP] CUSTOM_FLAG read start (8)
197[0: 2.363] [OTP] CUSTOM_FLAG read value: 0x1
198[0: 2.363] [OTP] CUSTOM_FLAG read start (9)
199[0: 2.363] [OTP] CUSTOM_FLAG read value: 0x0
200[0: 2.363] [OTP] ENABLE_ANTIRBK read start
201[0: 2.364] [OTP] ENABLE_ANTIRBK read value: 0x1
202[0: 2.364] [OTP] USE_PREORDER_KEY read start
203[0: 2.364] [OTP] USE_PREORDER_KEY read value: 0x1
204[0: 2.364] [OTP] ENABLE_MODEL_ID read start
205[0: 2.364] [OTP] ENABLE_MODEL_ID read value: 0x1
206[0: 2.364] [OTP] CUSTOM_FLAG read start (15)
207[0: 2.364] [OTP] CUSTOM_FLAG read value: 0x1
208[0: 2.364] [OTP] CUSTOM_FLAG read start (16)
209[0: 2.364] [OTP] CUSTOM_FLAG read value: 0x0
210[0: 2.364] [EFUSE] SMC Read the 0x0 ...
211[0: 2.364] [EFUSE] SMC Read Count value: 3
212[0: 2.364] [EFUSE] SMC Read the 0x1 ...
213[0: 2.364] [EFUSE] SMC Read Count value: 1
214[0: 2.364] [EFUSE] SMC Read the 0x2 ...
215[0: 2.364] [EFUSE] SMC Read Count value: 0
216[0: 2.364] [EFUSE] SMC Read the 0x3 ...
217[0: 2.364] [EFUSE] SMC Read Count value: 1
218[0: 2.364] [OTP] JTAG_KEY check start
219[0: 2.364] [OTP] JTAG_KEY check: valid key
220[0: 2.364] (1,55) vs (1,55)
221[0: 2.364] JTAG_LOCK is already enabled in this device.
222[0: 2.364] [EFUSE] Already fused for Market status
223[0: 2.364] check_secure_ch_key_prov_flag : Flag is detected
224[0: 2.364] [EFUSE] This is commercial device.
225[0: 2.364] Secure camera - invalid fastcall id ffffffff
226[0: 2.364] blk_rpmb_open: MMC mode
227[0: 2.364] MMC0 RPMB emmc_rpmb_open:
228[0: 2.365] blk_rpmb_read_data: MMC mode
229[0: 2.366] HMAC compare success
230[0: 2.366] RPMB: HMAC:
231[0: 2.366]
232[0: 2.366] MMC0 RPMB Get DATA success
233
234initialize_secdata_rpmb: usable! (0x52504d42), 1
235[0: 2.366] set_fuse_history : no reason
236[0: 2.366] fuse history 0x1
237[0: 2.366] blk_rpmb_close: MMC mode
238[0: 2.367] MMC0 RPMB emmc_rpmb_close:
239[0: 2.367] blk_rpmb_open: MMC mode
240[0: 2.367] MMC0 RPMB emmc_rpmb_open:
241[0: 2.368] blk_rpmb_read_data: MMC mode
242[0: 2.369] HMAC compare success
243[0: 2.369] RPMB: HMAC:
244[0: 2.369]
245[0: 2.369] MMC0 RPMB Get DATA success
246
247blk_rpmb_close: MMC mode
248[0: 2.369] MMC0 RPMB emmc_rpmb_close:
249[0: 2.369] blk_rpmb_open: MMC mode
250[0: 2.369] MMC0 RPMB emmc_rpmb_open:
251[0: 2.370] blk_rpmb_read_data: MMC mode
252[0: 2.371] HMAC compare success
253[0: 2.371] RPMB: HMAC:
254[0: 2.371]
255[0: 2.371] MMC0 RPMB Get DATA success
256
257blk_rpmb_read_data: MMC mode
258[0: 2.373] HMAC compare success
259[0: 2.373] RPMB: HMAC:
260[0: 2.373]
261[0: 2.373] MMC0 RPMB Get DATA success
262
263blk_rpmb_close: MMC mode
264[0: 2.373] MMC0 RPMB emmc_rpmb_close:
265[0: 2.373] blk_rpmb_open: MMC mode
266[0: 2.373] MMC0 RPMB emmc_rpmb_open:
267[0: 2.374] blk_rpmb_read_data: MMC mode
268[0: 2.375] HMAC compare success
269[0: 2.375] RPMB: HMAC:
270[0: 2.375]
271[0: 2.375] MMC0 RPMB Get DATA success
272
273blk_rpmb_read_data: MMC mode
274[0: 2.377] HMAC compare success
275[0: 2.377] RPMB: HMAC:
276[0: 2.377]
277[0: 2.377] MMC0 RPMB Get DATA success
278
279blk_rpmb_close: MMC mode
280[0: 2.377] MMC0 RPMB emmc_rpmb_close:
281[0: 2.377]
282[0: 2.377] blk_rpmb_open: MMC mode
283[0: 2.377] MMC0 RPMB emmc_rpmb_open:
284[0: 2.378] blk_rpmb_read_data: MMC mode
285[0: 2.379] HMAC compare success
286[0: 2.379] RPMB: HMAC:
287[0: 2.379]
288[0: 2.379] MMC0 RPMB Get DATA success
289
290ace_hash_sha_digest: passed.(0)
291[0: 2.379] [KG] valid hash.
292[0: 2.379] [KG] 'Checking' state.
293[0: 2.379] blk_rpmb_close: MMC mode
294[0: 2.379] MMC0 RPMB emmc_rpmb_close:
295[0: 2.379] get_sec_secu_cond
296[0: 2.379] DDR SIZE: 3G
297[0: 2.379] LPDDR4 manufacturer : Micron
298[0: 2.379] PRO_ID : 4010000
299[0: 2.399] [TMU: 0] 24
300[0: 2.419] [TMU: 1] 23
301[0: 2.419] set_rdx_mask: 0x20000
302[0: 2.419] set_rdx_mask: 0xa0000
303[0: 2.419] check_reset_reason: RamBase: d56f9933 / INF2: 0 / INF3: 0 / RST: 10000
304[0: 2.419] set_reset_reason: reason as 7
305[0: 2.419] update_rcnt: not supported
306[0: 2.419] [MUIC] print_init_regs
307[0: 2.424] CTRL[1:17, 2:0x9d, 3:0xdd]
308[0: 2.426] INTMASK[1:0x00, 2:0x00]
309[0: 2.430] DEV_TYPE[1:0x80, 2:0x00, 3:0x00]
310[0: 2.432] MAN_SW[0x00]
311[0: 2.433] RST[0x00]
312[0: 2.433]
313[0: 2.433] adc_read_temp temp_adc = 2178, temp = 20
314[0: 2.433] adc_read_temp: write battery temp data : 0x14(20)
315[0: 2.436] init_ific: s2mu106 0x11 (rev:0x1)
316[0: 2.438] keep_charger_status : 0x95 : 0xa5
317[0: 2.444] ifconn_get_jig_status_vb: CCIC Mode
318[0: 2.444] ccic_read_adc:
319[0: 2.444] s2mu106_read_adc:
320[0: 2.445] s2mu106_read_adc: RID = 00(RID_0)
321[0: 2.448] get_vbvolt: apple: 0x06, dev3: 0x00
322[0: 2.448] get_vbvolt: vbvolt: 0x02
323[0: 2.448] ifconn_is_ccic_jig_device_vb: rid=00 vbus=2
324[0: 2.465] [DEBUG]disable_factory_mode: DISABLE FACTORY MODE
325[0: 2.469] kick_charger_watchdog: CHG fault status : x00
326[0: 2.470] kick_charger_watchdog: CHG_CTRL0 : x01
327[0: 2.474] set_charger_watchdog: state(1), reg_data(0x1b)
328[0: 2.475] [DEBUG]set_regulation_voltage: S2MU106_CHG_CTRL5 => 0x3c
329[0: 2.478] [DEBUG]set_regulation_voltage: float_voltage change to 4350, 0x5a
330[0: 2.485] set_charger_current : S2MU106_CHG_CTRL7 : (2000)0x27
331[0: 2.485] ifconn_get_charger_status:
332[0: 2.488] get_vbvolt: apple: 0x06, dev3: 0x00
333[0: 2.488] get_vbvolt: vbvolt: 0x02
334[0: 2.488] ccic_read_adc:
335[0: 2.488] s2mu106_read_adc:
336[0: 2.489] s2mu106_read_adc: RID = 00(RID_0)
337[0: 2.489] ccic_is_valid_charger: default ID + VB
338[0: 2.489] ifconn_get_charger_status: valid_charger=1
339[0: 2.494] set_cool_charger_current : S2MU106_CHG_CTRL6 : (450)0x88
340[0: 2.494] ifconn_is_hc_cable:
341[0: 2.494] ifconn_get_device:
342[0: 2.496] s2mu106_muic_get_adc_value: ADC:0x00
343[0: 2.496] ifconn_is_muic_jig_device: adc=0x00
344[0: 2.496] ccic_read_adc:
345[0: 2.496] s2mu106_read_adc:
346[0: 2.497] s2mu106_read_adc: RID = 00(RID_0)
347[0: 2.497] ifconn_is_ccic_jig_device: rid=00
348[0: 2.497] ifconn_is_hc_cable: adc=0x1f
349[0: 2.500] get_vbvolt: apple: 0x06, dev3: 0x00
350[0: 2.500] get_vbvolt: vbvolt: 0x02
351[0: 2.506] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
352[0: 2.517] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
353[0: 2.529] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
354[0: 2.540] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
355[0: 2.551] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
356[0: 2.563] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
357[0: 2.574] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
358[0: 2.585] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
359[0: 2.597] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
360[0: 2.608] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
361[0: 2.620] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
362[0: 2.631] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
363[0: 2.642] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
364[0: 2.654] s2mu106_muic_get_attached_device_ex: det completed after 130 msec
365[0: 2.660] s2mu106_muic_get_attached_device_ex: INT[1:0xa3, 2:0x04]
366[0: 2.660] s2mu106_muic_get_attached_device_ex: DEV[1:0x04, 2:0x00, 3:0x00]
367[0: 2.664] set_precharge_current: set charge current(in:500, out:450)
368[0: 2.668] set_charger_current : S2MU106_CHG_CTRL7 : (450)0x08
369[0: 2.668] ifconn_get_charger_status:
370[0: 2.671] get_vbvolt: apple: 0x06, dev3: 0x00
371[0: 2.671] get_vbvolt: vbvolt: 0x02
372[0: 2.671] ccic_read_adc:
373[0: 2.671] s2mu106_read_adc:
374[0: 2.672] s2mu106_read_adc: RID = 00(RID_0)
375[0: 2.672] ccic_is_valid_charger: default ID + VB
376[0: 2.672] ifconn_get_charger_status: valid_charger=1
377[0: 2.676] set_input_current : S2MU106_CHG_CTRL1 : 0x12
378[0: 2.680] set_charger_state : S2MU106_CHG_CTRL0 : 0x3
379[0: 2.682] ReadFGRegisterWord: REG(0x5) = 0x89c
380[0: 2.685] ReadFGRegisterWord: REG(0x5) = 0x89c
381[0: 2.685] fuel_gauge_read_vcell: vbat (4282)
382[0: 2.689] set_charger_state : S2MU106_CHG_CTRL0 : 0x1
383[0: 2.739] ifconn_get_device:
384[0: 2.740] s2mu106_muic_get_adc_value: ADC:0x00
385[0: 2.740] ifconn_is_muic_jig_device: adc=0x00
386[0: 2.740] ccic_read_adc:
387[0: 2.740] s2mu106_read_adc:
388[0: 2.742] s2mu106_read_adc: RID = 00(RID_0)
389[0: 2.742] ifconn_is_ccic_jig_device: rid=00
390[0: 2.745] jig_switch_control: 0x25 -> 0x50
391[0: 2.749] jig_switch_control: POR state = 0x00, 0x1E = 0x 3, data_ver = 0x2(0x2), factory_mode(0), jig_status(0)
392[0: 2.752] ReadFGRegisterWord: REG(0x5) = 0x89c
393[0: 2.755] ReadFGRegisterWord: REG(0x5) = 0x89c
394[0: 2.755] fuel_gauge_read_vcell: vbat (4282)
395[0: 2.755] jig_switch_control: Fuelgauge is Already initialized
396[0: 2.759] set_charger_state : S2MU106_CHG_CTRL0 : 0x3
397[0: 2.761] ReadFGRegisterWord: REG(0x9) = 0x3f62
398[0: 2.764] ReadFGRegisterWord: REG(0x9) = 0x3f62
399[0: 2.764] fuel_gauge_read_soc_four_digits: raw capacity (0x3f62:9903)
400[0: 2.767] ReadFGRegisterWord: REG(0x5) = 0x89c
401[0: 2.770] ReadFGRegisterWord: REG(0x5) = 0x89c
402[0: 2.770] fuel_gauge_read_vcell: vbat (4282)
403[0: 2.770] init_fuel_gauge: SOC(9903), VCELL(4282)
404[0: 2.770] PMIC_ID = 0x04
405[0: 2.770] PMIC_INT1 = 0x63 PWRONF PWRONR ACOKR PWRON1S
406[0: 2.770] PMIC_INT2 = 0x15 RTC60S RTCA0 RTC1S
407[0: 2.770] PMIC_INT3 = 0xc0 MRBF MRBR
408[0: 2.770] PMIC_STATUS1 = 0x06 JIGONB ACOK
409[0: 2.770] PMIC_STATUS2 = 0x00
410[0: 2.770] PMIC_PWRONSRC = 0x04 ACOK
411[0: 2.770] PMIC_OFFSRC = 0x10 PWRHOLD
412[0: 2.770] PMIC_RTC_CTRL = 0x02
413[0: 2.770] PMIC_RTC_SMPL = 0x03
414[0: 2.771] RTC TIME: 2020-12-08 08:11:44(0x04)AM
415[0: 2.771] PMIC MON[0] = [0x15: 0x35]
416[0: 2.771] PMIC MON[1] = [0x29: 0xc5]
417[0: 2.771] PMIC MON[2] = [0x1b: 0x39]
418[0: 2.771] PMIC MON[3] = [0x4f: 0x3c]
419[0: 2.771] PMIC MON[4] = [0x2d: 0x3c]
420[0: 2.771] PMIC MON[5] = [0x19: 0x42]
421[0: 2.771] PMIC MON[6] = [0x17: 0x58]
422[0: 2.771] PMIC MON[7] = [0x19: 0x4c]
423[0: 2.771] s5p_check_keypad: 0x11000000
424[0: 2.778] s2mu106_muic_get_attached_device: INT[1:0xa3, 2:0x04]
425[0: 2.778] s2mu106_muic_get_attached_device: DEV[1:0x80, 2:0x00, 3:0x00]
426[0: 2.781] get_vbvolt: apple: 0x06, dev3: 0x00
427[0: 2.781] get_vbvolt: vbvolt: 0x02
428[0: 2.781] s2mu106_muic_get_attached_device: redetect
429[0: 2.783] get_vbvolt: apple: 0x06, dev3: 0x00
430[0: 2.783] get_vbvolt: vbvolt: 0x02
431[0: 2.789] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
432[0: 2.801] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
433[0: 2.812] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
434[0: 2.824] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
435[0: 2.835] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
436[0: 2.846] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
437[0: 2.858] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
438[0: 2.869] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
439[0: 2.880] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
440[0: 2.892] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
441[0: 2.903] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
442[0: 2.914] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
443[0: 2.926] s2mu106_muic_get_attached_device_ex: det runnig, retry after 10 msec
444[0: 2.937] s2mu106_muic_get_attached_device_ex: det completed after 130 msec
445[0: 2.944] s2mu106_muic_get_attached_device_ex: INT[1:0x03, 2:0x04]
446[0: 2.944] s2mu106_muic_get_attached_device_ex: DEV[1:0x04, 2:0x00, 3:0x00]
447[0: 2.946] s5p_check_keypad: download mode
448[0: 2.946] s5p_reset_reboot_mode
449[0: 2.946] keypad_download: dn key are pressed
450[0: 2.946] s5p_check_reboot_mode: INFORM3 = 0 ... skip
451[0: 2.952] [EMC]Token does not exist
452[0: 2.952] get_force_upload_mode: param value: 0x0
453[0: 2.952] s5p_check_upload: DL: 4f4c FU: 1
454[0: 2.952] 0x4f4c: MRST enabled
455[0: 2.952] s5p_check_upload: RamBase: d56f9933 / INF2: 0 / INF3: 0 / RST: 10000
456[0: 2.953] s2mu106_muic_get_adc_value: ADC:0x1f
457[0: 2.953] s5p_check_upload: debug level is LO! (fu: 1, mask: 0x40)
458[0: 2.953] get_force_upload_mode: param value: 0x0
459[0: 2.953] get_force_upload_mode: param value: 0x0
460[0: 2.953] s5p_check_upload: disable dump_gpr
461[0: 2.953] Disable dumpGPR - 0x0
462[0: 2.953] s5p_check_download: 1
463[0: 2.957] set_charger_state : S2MU106_CHG_CTRL0 : 0x1
464[0: 2.957] ifconn_get_charger_status:
465[0: 2.960] get_vbvolt: apple: 0x06, dev3: 0x00
466[0: 2.960] get_vbvolt: vbvolt: 0x02
467[0: 2.960] ccic_read_adc:
468[0: 2.960] s2mu106_read_adc:
469[0: 2.961] s2mu106_read_adc: RID = 00(RID_0)
470[0: 2.961] ccic_is_valid_charger: default ID + VB
471[0: 2.961] ifconn_get_charger_status: valid_charger=1
472[0: 2.965] set_input_current : S2MU106_CHG_CTRL1 : 0x12
473[0: 2.965] AST_DLOAD..
474[0: 2.965] 0x4f4c: MRST enabled
475[0: 2.965] parallel_download_init: started
476[0: 3. 19] [V3_SMP][v3_smp_post_init(348)]:nslot = 8
477[0: 3. 19] buf_init[0] pbuf:c0000000, lock:8f371be0
478[0: 3. 19] buf_init[1] pbuf:c1e00000, lock:8f371bf8
479[0: 3. 19] buf_init[2] pbuf:c3c00000, lock:8f371c10
480[0: 3. 19] buf_init[3] pbuf:c5a00000, lock:8f371c28
481[0: 3. 19] buf_init[4] pbuf:c7800000, lock:8f371c40
482[0: 3. 19] buf_init[5] pbuf:c9600000, lock:8f371c58
483[0: 3. 19] buf_init[6] pbuf:cb400000, lock:8f371c70
484[0: 3. 19] buf_init[7] pbuf:cd200000, lock:8f371c88
485[0: 3. 19] smp_boot
486[0: 3. 19] smp_init
487[0: 3. 19] read_clusterid
488[0: 3. 19] next_available_cpu: started
489[0: 3. 19] [boot_exynos] Powers up core(1)
490[1: 3. 20] Cortex-A53 CPU(1) has been booted
491[1: 3. 20] [V3_SMP][v3_smp_thread_handler(314)]: smp started
492[0: 3. 31] v3_smp_post_init: waiting for thread_sync
493[0: 3. 31] v3_smp_post_init: thread synced
494[0: 3. 31] parallel_download_init: completed successfully
495[0: 3. 34] s2mu106_set_usb_vbus_out: MUIC: CONTROL: 0x17
496[0: 3. 38] s2mu106_set_usb_vbus_out: MUIC: CONTROL: 0x13
497[1: 3. 41] [V3_SMP][v3_smp_thread_handler(324)]: hand shake done
498[0: 3. 43] s2mu106_set_usb_vbus_out: MUIC: MANUAL_SW1: [0x24]
499[0: 3. 43] challenge_size is 0 0
500[0: 3. 43] [CC MODE] Failed. Invalid Magic
501[0: 3. 43]
502: Entering usb mode for SM-A202F (1)..
503[0: 3. 43] RPMB : LOCK state (0)
504[0: 3. 55] read 'warning_SVB.jpg'(291590) completed.
505[0: 3.117] LoadJPEG took 61 msec
506[0: 3.122] init_display_clk: 12061020( 0), 1206183C( 2)
507[0: 3.122] init_display_clk: 14800120( 10), 14801828( 1)
508[0: 3.122] exynos7885_dual_mipi_phy_control, 1
509[0: 3.226] dsi_read: da: 11,
510[0: 3.227] dsi_read: db: 62,
511[0: 3.227] dsi_read: dc: 30,
512[0: 3.227] 11, 62, 30, 0x116230
513[0: 3.227] 1st panel CU IC.
514[0: 4.315] read 'download_L.jpg'(95933) completed.
515[0: 4.353] LoadJPEG took 38 msec
516ODIN MODE
517DOWNLOAD SPEED: FAST
518PRODUCT NAME: SM-A202F
519CURRENT BINARY: Custom (0x303)
520KG STATE : Checking[0: 4.368] challenge_size is 0 0
521FRP LOCK: OFF
522[0: 4.369] RPMB : LOCK state (0)
523OEM LOCK: OFF(U)
524Secure Download : Enabled
525CCIC = S2MU106
526CARRIER_ID:
527WARRANTY VOID: 1 (0x0e03)
528RP SWREV: B:3 K:3 S:3
529DID = 670d6c4d1082
530[0: 4.383] blk_power_notification: MMC PON - SHORT, ret: 0
531[0: 4.383] blk_burstmode_enable: MMC mode
532[0: 4.383] usbctl_start: sys_bootm: 20001
533[0: 4.383] board_set_dev_pm: hello! I'm USB.(1)
534[0: 4.385] calling exynos_usb_init_core
535[0: 4.385] after calling exynos_usb_init_core
536[0: 4.385] usb: usb_runstop_device (1)
537[0: 4.405] usb: exynos_usb_handle_reset_int -->
538[0: 22.316] usb: exynos_usb_handle_reset_int -->
539[0: 23.711] usb:Configuration success SPEED(0)
540[0: 517.563] process_packet: id=100, data=0
541[0: 517.596] blk_bwrite: MMC mode
542[0: 517.596] checksum_enable write complete value : 0
543[0: 517.596] NeedChecksum clear
544[0: 517.596] get_v3_protocol_ver (5, 3)
545[0: 517.596] process_packet: id=100, data=5
546[0: 517.596] packet data size is changed to 1048576.
547[0: 517.596] process_packet: id=100, data=2
548[0: 517.899] process_packet: id=101, data=1
549[0: 517.904] process_packet: id=101, data=2
550[0: 517.905] process_packet: id=101, data=2
551[0: 517.905] process_packet: id=101, data=2
552[0: 517.905] process_packet: id=101, data=2
553[0: 517.906] process_packet: id=101, data=2
554[0: 517.906] process_packet: id=101, data=2
555[0: 517.906] process_packet: id=101, data=2
556[0: 517.907] process_packet: id=101, data=2
557[0: 517.907] process_packet: id=101, data=2
558[0: 517.907] process_packet: id=101, data=2
559[0: 517.908] process_packet: id=101, data=2
560[0: 517.908] process_packet: id=101, data=2
561[0: 517.908] process_packet: id=101, data=2
562[0: 517.909] process_packet: id=101, data=2
563[0: 517.909] process_packet: id=101, data=2
564[0: 517.909] process_packet: id=101, data=2
565[0: 517.910] process_packet: id=101, data=2
566[0: 517.910] process_packet: id=101, data=3
567[0: 518. 13] process_packet: id=102, data=0
568[0: 518. 14] process_packet: id=102, data=2
569[0: 519. 84] process_packet: id=102, data=3
570[0: 519.335] process_packet: id=102, data=0
571[0: 519.335] process_packet: id=102, data=2
572[0: 519.509] process_packet: id=102, data=3
573[1: 519.509] avb_footer.c:41: ERROR: Footer magic is incorrect.
574pit.c:2477: ERROR: RECOVERY: Error validating footer.
575RECOVERY : Error validating footer.
576[1: 519.509] GetSignerVer : None
577[1: 519.509] Verify_Signature_With_Signingtype 0x90d20130 36163328@0xb0000000, 256@0x90d20030
578[0: 519.610] process_packet: id=103, data=0
579[1: 519.650] Verify_Signature_With_Signingtype: failed.(-18022398)
580[1: 519.650] pit_check_signature (RECOVERY) invalid.
581[1: 519.650] RPMB : LOCK state (0)
582[1: 519.652] blk_bwrite_bootsectorB: MMC mode in 2nd partition
583[1: 519.652] MMC0 emmc_bootpart_2_open: 2nd partition open
584[1: 519.654] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
585[1: 519.654] MMC0 emmc_bootpart_2_close: 2nd partition close
586[1: 519.657] if_ddi_data: succeeded. (0x303)
587[1: 519.658] update_image_status_auth: Status of RECOVERY image has been updated to custom(0x 3)
588[1: 519.658] set_ddi_kernel_type : RECOVERY, 0x4
589[1: 519.660] blk_bwrite_bootsectorB: MMC mode in 2nd partition
590[1: 519.660] MMC0 emmc_bootpart_2_open: 2nd partition open
591[1: 519.662] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
592[1: 519.662] MMC0 emmc_bootpart_2_close: 2nd partition close
593[1: 519.665] if_ddi_data: succeeded. (0x307)
594[1: 519.666] custom binary! kernel rp skip checking..
595[1: 519.666] GetSignerVer : None
596[1: 519.666] blk_bwrite: MMC mode
597[1: 519.668] blk_berase: MMC mode
598[1: 519.668] MMC0 START: 301056 BLOCK: 108544
599[1: 519.669] MMC0 wait for erase done.
600it can take several second.
601[1: 519.674] ..blk_bwrite: MMC mode
602[1: 520.179]
603pit_flash_binary: 'RECOVERY' is flashed fully.
604[1: 520.179] flash_data_from_v3_smp_layer: flash binary is RECOVERY
605[0: 520.179] blk_bwrite: MMC mode
606[0: 520.183] blk_bwrite: MMC mode
607[0: 520.187] blk_bwrite: MMC mode
608[0: 520.193] blk_power_notification: MMC PON - LONG, ret: 0
609[0: 0.687]
610[0: 0.689] Samsung S-Boot 4.0 for SM-A202F (Sep 25 2020 - 18:56:57 34672703)
611[0: 0.696] EXYNOS7885 EVT 0.2 (Base on ARM CortexA50)
612[0: 0.701] 3072MB / Rev 3 / A202FXXU3BTI7 / (PKG_ID 0xe7885000) / LOT_ID NN75S / SHIP /PINRST (0x10000)
613[0: 0.711] __if_pmic_rev_init - MUIC API is not ready!
614[0: 0.718] PMUDBG_CENTRAL_SEQ_*: apsoc 0x0 mif 0x0 apm 0x0
615[0: 0.723] PMUDBG_CL0_*: cpu0 0x0 cpu1 0x0 l2 0x0 noncpu 0x0
616[0: 0.729] PMUDBG_CL2_*: cpu0 0x0 cpu1 0x0
617[0: 0.734] PMUDBG_CL1_*: cpu0 0x0 cpu1 0x0 cpu2 0x0 cpu3 0x0 l2 0x0 noncpu 0x0
618[0: 0.741] RST_STAT: 0x10000
619[0: 0.744] s5p_check_dump_gpr: set sp loading flag
620[0: 0.749] MMU: enable start
621[0: 0.753] MMU: enable done
622[0: 0.756] [MUIC] muic_register_s2mu106_apis
623[0: 0.762] Try 0 : [MUIC] muic_test1:0x001.
624[0: 0.766] -> matched(s2mu106).
625[0: 0.769] init_multi_microusb_ic Active MUIC 0x01
626[0: 0.776] s2mu106_muic_get_adc_value: ADC:0x1f
627[0: 0.782] s2mu106_init_microusb_ic: MUIC: Enable BC1.2
628[0: 0.788] s2mu106_init_microusb_ic: MUIC: CONTROL writing success.
629[0: 0.797] s2mu106_init_microusb_ic: MUIC: CONTROL:0x17
630[0: 0.805] s2mu106_init_microusb_ic: MUIC: TIMING3: 0x8d
631[0: 0.817] s2mu106_muic_get_attached_device: INT[1:0xa3, 2:0x84]
632[0: 0.823] s2mu106_muic_get_attached_device: DEV[1:0x00, 2:0x00, 3:0x00]
633[0: 0.832] get_vbvolt: apple: 0x00, dev3: 0x00
634[0: 0.837] get_vbvolt: vbvolt: 0x00
635[0: 0.841] ccic_register_s2mu106:
636[0: 0.844] ccic_is_s2mu106:
637[0: 0.849] ccic_is_s2mu106: reg:b2 - val:00 ret:00
638[0: 0.855] ccic_register_s2mu106: 0x1 = 0x2
639[0: 0.860] ccic_register_s2mu106: 0x2 = 0x9b
640[0: 0.866] ccic_register_s2mu106: 0x3 = 0x98
641[0: 0.872] ccic_register_s2mu106: 0x4 = 0x90
642[0: 0.878] ccic_register_s2mu106: 0x5 = 0x99
643[0: 0.883] ccic_register_s2mu106: 0x6 = 0x88
644[0: 0.889] ccic_register_s2mu106: 0x7 = 0x47
645[0: 0.895] ccic_register_s2mu106: 0x8 = 0xa
646[0: 0.900] ccic_register_s2mu106: 0x9 = 0x0
647[0: 0.906] ccic_register_s2mu106: 0xa = 0xe
648[0: 0.912] ccic_register_s2mu106: 0xb = 0xd
649[0: 0.917] ccic_register_s2mu106: 0xc = 0x90
650[0: 0.923] ccic_register_s2mu106: 0x18 = 0xe2
651[0: 0.929] ccic_register_s2mu106: 0xb2 = 0x0
652[0: 0.943] get_vbvolt: apple: 0x00, dev3: 0x00
653[0: 0.947] get_vbvolt: vbvolt: 0x00
654[0: 0.953] ccic_register_s2mu106: BEFORE VBUS(0)
655[0: 0.960] s2mu106 found.
656[0: 0.963] mach_board_initialize: Active ccic device.
657[0: 0.968] ifconn_init: CCIC Mode
658[0: 0.972] ifconn_get_jig_status: CCIC Mode
659[0: 0.976] ccic_read_adc:
660[0: 0.979] s2mu106_read_adc:
661[0: 0.984] s2mu106_read_adc: RID = 00(RID_0)
662[0: 0.988] ifconn_is_ccic_jig_device: rid=00
663[0: 0.993] ccic_wait_auth:
664[0: 0.994] s2mu106_muic_get_adc_value: ADC:0x1f
665[0: 0.994] ccic_read_adc:
666[0: 0.994] s2mu106_read_adc:
667[0: 0.995] s2mu106_read_adc: RID = 00(RID_0)
668[0: 0.995] board_ccic_check_uart: jig_adc=1f, cc_adc=00
669[0: 0.995] ccic_read_adc:
670[0: 0.995] s2mu106_read_adc:
671[0: 0.997] s2mu106_read_adc: RID = 00(RID_0)
672[0: 0.997] ifconn_com_to_open:
673[0: 0.999] s2mu106_set_muic_uart_early: MUIC: MAN_SW1[0x00]
674[0: 1.137] load Secure Payload done.
675[0: 1.147]
676Chip ID : 670d6c4d1082
677[0: 1.147] EL3 Monitor information:
678[0: 1.147] No tag info No git info ilkyungkim
679
680[0: 1.147] DREX_CALIBRATION3: 0xb000017
681[0: 1.147] MMC Init
682[0: 1.147] MMC0 400Khz 1 bit mode
683[0: 1.166] EXT_CSD structure version 8
684[0: 1.166] cardtype: 0x00000007
685[0: 1.166] MMC RST_n_FUNCTION was already enabled
686[0: 1.167] mmc->card_caps: 0x00000f11
687[0: 1.167] mmc->host_caps: 0x00000f11
688[0: 1.167] !!!Enter 8 Bit DDR mode.!!!
689[0: 1.168] MMC0 52Mhz 8bit DDR mode
690[0: 1.168] MMC0 capacity = 61071360
691[0: 1.168] MMC0 vendor: 0x15
692[0: 1.168] MMC0 PNM: 0x424a54443452
693[0: 1.168] MMC0 MD: 2020 5
694[0: 1.168] MMC0 FW: 0x03
695[0: 1.175] MMC0(0x15) LVD reset count : 0
696[0: 1.175]
697[Debug Info.]
698[0: 1.175] S-BOOT : VERSION_-+L0
699[0: 1.181] GetSignerVer : SignerVer02
700[0: 1.181] - read_bl1
701[0: 1.181] blk_bread_bootsector: MMC mode
702[0: 1.185] Verify_Signature_With_Signingtype 0x90d20130 5184@0x90d10000, 256@0x90d20030
703[0: 1.187] pit_check_signature (PIT) valid.
704[0: 1.195] PARAM ENV VERSION: v1.0..
705[0: 1.197] blk_bread_bootsectorB: MMC mode in 2nd partition
706[0: 1.197] MMC0 emmc_bootpart_2_open: 2nd partition open
707[0: 1.199] MMC0 emmc_bootpart_2_close: 2nd partition close
708[0: 1.201] initialize_ddi_data: usable! (89:0x307), warranty reason : (0x0e03)
709[0: 1.201] MAGIC_RAM_BASE: d56f9933, MAGIC_RAM_BASE2: 5617dcf7, ompin: 0
710[0: 1.201] [ldfw] Pass LDFW partition!
711[0: 1.201] [ldfw] read whole CM partition from the storage
712[0: 1.302] ldfw: 0th ldfw's version 0x40191220 name : CryptoManagerV40
713[0: 1.302] ldfw: 1th ldfw's version 0x20181224 name : fmp_fw_V20
714[0: 1.302] ldfw: 2th ldfw's version 0x20191209 name : drm_fw
715[0: 1.302] ldfw: 3th ldfw's version 0x24190110 name : srpmb_fw
716[0: 1.302] ldfw: 4th ldfw's version 0x20181224 name : hdcp_fw
717[0: 1.302] ldfw: 5th ldfw's version 0x20150828 name : tail_fw
718[0: 1.302] GetSignerVer : SignerVer02
719[0: 1.302] ldfw: init ldfw(s). whole ldfws size 0x3ec210
720[0: 1.373] [ldfw] try to init 5 ldfw(s). except 0 ldfw 5 ldfw(s) have been inited done.
721[0: 1.388] [TEEGRIS] register handler1, ret = 0x0
722[0: 1.398] [TEEGRIS] register handler2, ret = 0x0
723[0: 1.398] [TEEGRIS] disable handler registeration, ret = 0x0
724[0: 1.398] [OTP] MODEL_ID read start
725[0: 1.398] [OTP] MODEL_ID read value: 0x37
726[0: 1.398] [OTP] BAN_ROM_SEC_BOOT_KEY read start
727[0: 1.398] [OTP] BAN_ROM_SEC_BOOT_KEY read value: 0x0
728[0: 1.398] [OTP] USE_ROM_SEC_BOOT_KEY read: start
729[0: 1.398] [OTP] USE_ROM_SEC_BOOT_KEY read value: 0x0
730[0: 1.398] [OTP] ENABLE_AES read start
731[0: 1.398] [OTP] ENABLE_AES read value: 0x0
732[0: 1.398] [OTP] PREORDER read start
733[0: 1.398] [OTP] PREORDER read value: 0x1
734[0: 1.398] [OTP] ANTIRBK_NS_AP0 read start
735[0: 1.398] [OTP] ANTIRBK_NS_AP0 read value: 0x3
736[0: 1.398] [OTP] COMMERCIAL read start
737[0: 1.398] [OTP] COMMERCIAL read value: 0x1
738[0: 1.398] [OTP] TEST read start
739[0: 1.398] [OTP] TEST read value: 0x0
740[0: 1.398] [OTP] WARRANTY read start
741[0: 1.398] [OTP] WARRANTY read value: 0x1
742[0: 1.398] [OTP] JTAG_SW_LOCK read start
743[0: 1.398] [OTP] JTAG_SW_LOCK read value: 0x1
744[0: 1.398] [OTP] CUSTOM_FLAG read start (6)
745[0: 1.398] [OTP] CUSTOM_FLAG read value: 0x0
746[0: 1.398] [OTP] CUSTOM_FLAG read start (7)
747[0: 1.398] [OTP] CUSTOM_FLAG read value: 0x1
748[0: 1.398] [OTP] CUSTOM_FLAG read start (8)
749[0: 1.398] [OTP] CUSTOM_FLAG read value: 0x1
750[0: 1.398] [OTP] CUSTOM_FLAG read start (9)
751[0: 1.398] [OTP] CUSTOM_FLAG read value: 0x0
752[0: 1.398] [OTP] ENABLE_ANTIRBK read start
753[0: 1.398] [OTP] ENABLE_ANTIRBK read value: 0x1
754[0: 1.398] [OTP] USE_PREORDER_KEY read start
755[0: 1.398] [OTP] USE_PREORDER_KEY read value: 0x1
756[0: 1.398] [OTP] ENABLE_MODEL_ID read start
757[0: 1.398] [OTP] ENABLE_MODEL_ID read value: 0x1
758[0: 1.398] [OTP] CUSTOM_FLAG read start (15)
759[0: 1.398] [OTP] CUSTOM_FLAG read value: 0x1
760[0: 1.398] [OTP] CUSTOM_FLAG read start (16)
761[0: 1.399] [OTP] CUSTOM_FLAG read value: 0x0
762[0: 1.399] [EFUSE] SMC Read the 0x0 ...
763[0: 1.399] [EFUSE] SMC Read Count value: 3
764[0: 1.399] [EFUSE] SMC Read the 0x1 ...
765[0: 1.399] [EFUSE] SMC Read Count value: 1
766[0: 1.399] [EFUSE] SMC Read the 0x2 ...
767[0: 1.399] [EFUSE] SMC Read Count value: 0
768[0: 1.399] [EFUSE] SMC Read the 0x3 ...
769[0: 1.399] [EFUSE] SMC Read Count value: 1
770[0: 1.399] [OTP] JTAG_KEY check start
771[0: 1.399] [OTP] JTAG_KEY check: valid key
772[0: 1.399] (1,55) vs (1,55)
773[0: 1.399] JTAG_LOCK is already enabled in this device.
774[0: 1.399] [EFUSE] Already fused for Market status
775[0: 1.399] check_secure_ch_key_prov_flag : Flag is detected
776[0: 1.399] [EFUSE] This is commercial device.
777[0: 1.399] Secure camera - invalid fastcall id ffffffff
778[0: 1.399] blk_rpmb_open: MMC mode
779[0: 1.399] MMC0 RPMB emmc_rpmb_open:
780[0: 1.399] blk_rpmb_read_data: MMC mode
781[0: 1.400] HMAC compare success
782[0: 1.400] RPMB: HMAC:
783[0: 1.400]
784[0: 1.400] MMC0 RPMB Get DATA success
785
786initialize_secdata_rpmb: usable! (0x52504d42), 1
787[0: 1.400] set_fuse_history : no reason
788[0: 1.400] fuse history 0x1
789[0: 1.400] blk_rpmb_close: MMC mode
790[0: 1.400] MMC0 RPMB emmc_rpmb_close:
791[0: 1.400] blk_rpmb_open: MMC mode
792[0: 1.400] MMC0 RPMB emmc_rpmb_open:
793[0: 1.401] blk_rpmb_read_data: MMC mode
794[0: 1.403] HMAC compare success
795[0: 1.403] RPMB: HMAC:
796[0: 1.403]
797[0: 1.403] MMC0 RPMB Get DATA success
798
799blk_rpmb_close: MMC mode
800[0: 1.403] MMC0 RPMB emmc_rpmb_close:
801[0: 1.403] blk_rpmb_open: MMC mode
802[0: 1.403] MMC0 RPMB emmc_rpmb_open:
803[0: 1.404] blk_rpmb_read_data: MMC mode
804[0: 1.405] HMAC compare success
805[0: 1.405] RPMB: HMAC:
806[0: 1.405]
807[0: 1.405] MMC0 RPMB Get DATA success
808
809blk_rpmb_read_data: MMC mode
810[0: 1.406] HMAC compare success
811[0: 1.406] RPMB: HMAC:
812[0: 1.406]
813[0: 1.406] MMC0 RPMB Get DATA success
814
815blk_rpmb_close: MMC mode
816[0: 1.407] MMC0 RPMB emmc_rpmb_close:
817[0: 1.407] blk_rpmb_open: MMC mode
818[0: 1.407] MMC0 RPMB emmc_rpmb_open:
819[0: 1.408] blk_rpmb_read_data: MMC mode
820[0: 1.409] HMAC compare success
821[0: 1.409] RPMB: HMAC:
822[0: 1.409]
823[0: 1.409] MMC0 RPMB Get DATA success
824
825blk_rpmb_read_data: MMC mode
826[0: 1.410] HMAC compare success
827[0: 1.410] RPMB: HMAC:
828[0: 1.410]
829[0: 1.410] MMC0 RPMB Get DATA success
830
831blk_rpmb_close: MMC mode
832[0: 1.410] MMC0 RPMB emmc_rpmb_close:
833[0: 1.410]
834[0: 1.410] blk_rpmb_open: MMC mode
835[0: 1.410] MMC0 RPMB emmc_rpmb_open:
836[0: 1.411] blk_rpmb_read_data: MMC mode
837[0: 1.413] HMAC compare success
838[0: 1.413] RPMB: HMAC:
839[0: 1.413]
840[0: 1.413] MMC0 RPMB Get DATA success
841
842ace_hash_sha_digest: passed.(0)
843[0: 1.413] [KG] valid hash.
844[0: 1.413] [KG] 'Checking' state.
845[0: 1.413] blk_rpmb_close: MMC mode
846[0: 1.413] MMC0 RPMB emmc_rpmb_close:
847[0: 1.413] get_sec_secu_cond
848[0: 1.413] DDR SIZE: 3G
849[0: 1.413] LPDDR4 manufacturer : Micron
850[0: 1.413] PRO_ID : 4010000
851[0: 1.433] [TMU: 0] 31
852[0: 1.453] [TMU: 1] 31
853[0: 1.453] set_rdx_mask: 0x20000
854[0: 1.453] set_rdx_mask: 0xa0000
855[0: 1.453] check_reset_reason: RamBase: d56f9933 / INF2: 0 / INF3: 0 / RST: 10000
856[0: 1.453] set_reset_reason: reason as 5
857[0: 1.453] update_rcnt: not supported
858[0: 1.453] [MUIC] print_init_regs
859[0: 1.457] CTRL[1:17, 2:0x9d, 3:0xdd]
860[0: 1.460] INTMASK[1:0x00, 2:0x00]
861[0: 1.464] DEV_TYPE[1:0x00, 2:0x00, 3:0x00]
862[0: 1.465] MAN_SW[0x00]
863[0: 1.467] RST[0x00]
864[0: 1.467]
865[0: 1.467] adc_read_temp temp_adc = 2037, temp = 25
866[0: 1.467] adc_read_temp: write battery temp data : 0x19(25)
867[0: 1.469] init_ific: s2mu106 0x11 (rev:0x1)
868[0: 1.472] keep_charger_status : 0x95 : 0xa5
869[0: 1.478] ifconn_get_jig_status_vb: CCIC Mode
870[0: 1.478] ccic_read_adc:
871[0: 1.478] s2mu106_read_adc:
872[0: 1.479] s2mu106_read_adc: RID = 00(RID_0)
873[0: 1.482] get_vbvolt: apple: 0x00, dev3: 0x00
874[0: 1.482] get_vbvolt: vbvolt: 0x00
875[0: 1.482] ifconn_is_ccic_jig_device_vb: rid=00 vbus=0
876[0: 1.499] [DEBUG]disable_factory_mode: DISABLE FACTORY MODE
877[0: 1.502] kick_charger_watchdog: CHG fault status : x00
878[0: 1.504] kick_charger_watchdog: CHG_CTRL0 : x01
879[0: 1.508] set_charger_watchdog: state(1), reg_data(0x1b)
880[0: 1.509] [DEBUG]set_regulation_voltage: S2MU106_CHG_CTRL5 => 0x5a
881[0: 1.511] [DEBUG]set_regulation_voltage: float_voltage change to 4350, 0x5a
882[0: 1.519] set_charger_current : S2MU106_CHG_CTRL7 : (2000)0x27
883[0: 1.519] ifconn_get_charger_status:
884[0: 1.521] get_vbvolt: apple: 0x00, dev3: 0x00
885[0: 1.521] get_vbvolt: vbvolt: 0x00
886[0: 1.521] ccic_read_adc:
887[0: 1.521] s2mu106_read_adc:
888[0: 1.523] s2mu106_read_adc: RID = 00(RID_0)
889[0: 1.523] ccic_is_valid_charger: Invalid charger
890[0: 1.523] ifconn_get_charger_status: valid_charger=0
891[0: 1.528] set_cool_charger_current : S2MU106_CHG_CTRL6 : (450)0x88
892[0: 1.528] ifconn_is_hc_cable:
893[0: 1.528] ifconn_get_device:
894[0: 1.529] s2mu106_muic_get_adc_value: ADC:0x1f
895[0: 1.529] ifconn_is_muic_jig_device: adc=0x1f
896[0: 1.529] ccic_read_adc:
897[0: 1.529] s2mu106_read_adc:
898[0: 1.531] s2mu106_read_adc: RID = 00(RID_0)
899[0: 1.531] ifconn_is_ccic_jig_device: rid=00
900[0: 1.531] ifconn_is_hc_cable: adc=0x1f
901[0: 1.533] get_vbvolt: apple: 0x00, dev3: 0x00
902[0: 1.533] get_vbvolt: vbvolt: 0x00
903[0: 1.533] s2mu106_muic_get_attached_device_ex: no vbus
904[0: 1.535] set_precharge_current: set charge current(in:500, out:450)
905[0: 1.538] set_charger_current : S2MU106_CHG_CTRL7 : (450)0x08
906[0: 1.542] set_charger_state : S2MU106_CHG_CTRL0 : 0x3
907[0: 1.545] ReadFGRegisterWord: REG(0x5) = 0x880
908[0: 1.548] ReadFGRegisterWord: REG(0x5) = 0x880
909[0: 1.548] fuel_gauge_read_vcell: vbat (4250)
910[0: 1.551] set_charger_state : S2MU106_CHG_CTRL0 : 0x1
911[0: 1.601] ifconn_get_device:
912[0: 1.603] s2mu106_muic_get_adc_value: ADC:0x1f
913[0: 1.603] ifconn_is_muic_jig_device: adc=0x1f
914[0: 1.603] ccic_read_adc:
915[0: 1.603] s2mu106_read_adc:
916[0: 1.604] s2mu106_read_adc: RID = 00(RID_0)
917[0: 1.604] ifconn_is_ccic_jig_device: rid=00
918[0: 1.608] jig_switch_control: 0x25 -> 0x50
919[0: 1.612] jig_switch_control: POR state = 0x00, 0x1E = 0x 3, data_ver = 0x2(0x2), factory_mode(0), jig_status(0)
920[0: 1.615] ReadFGRegisterWord: REG(0x5) = 0x880
921[0: 1.618] ReadFGRegisterWord: REG(0x5) = 0x880
922[0: 1.618] fuel_gauge_read_vcell: vbat (4250)
923[0: 1.618] jig_switch_control: Fuelgauge is Already initialized
924[0: 1.621] set_charger_state : S2MU106_CHG_CTRL0 : 0x3
925[0: 1.624] ReadFGRegisterWord: REG(0x9) = 0x3f52
926[0: 1.627] ReadFGRegisterWord: REG(0x9) = 0x3f52
927[0: 1.627] fuel_gauge_read_soc_four_digits: raw capacity (0x3f52:9893)
928[0: 1.629] ReadFGRegisterWord: REG(0x5) = 0x880
929[0: 1.632] ReadFGRegisterWord: REG(0x5) = 0x880
930[0: 1.632] fuel_gauge_read_vcell: vbat (4250)
931[0: 1.632] init_fuel_gauge: SOC(9893), VCELL(4250)
932[0: 1.632] PMIC_ID = 0x04
933[0: 1.632] PMIC_INT1 = 0xd3 PWRONF PWRONR ACOKF PWRON1S MRB
934[0: 1.632] PMIC_INT2 = 0x11 RTC60S RTC1S
935[0: 1.632] PMIC_INT3 = 0xc0 MRBF MRBR
936[0: 1.632] PMIC_STATUS1 = 0x1b PWRON JIGONB MRB RSVD
937[0: 1.632] PMIC_STATUS2 = 0x00
938[0: 1.632] PMIC_PWRONSRC = 0x08 MRST
939[0: 1.632] PMIC_OFFSRC = 0x00
940[0: 1.632] PMIC_RTC_CTRL = 0x02
941[0: 1.632] PMIC_RTC_SMPL = 0x03
942[0: 1.634] RTC TIME: 2020-12-08 08:21:03(0x04)AM
943[0: 1.634] PMIC MON[0] = [0x17: 0x58]
944[0: 1.634] PMIC MON[1] = [0x19: 0x4c]
945[0: 1.634] PMIC MON[2] = [0x09: 0x00]
946[0: 1.634] PMIC MON[3] = [0x04: 0xff]
947[0: 1.634] PMIC MON[4] = [0x0c: 0x14]
948[0: 1.634] PMIC MON[5] = [0x0e: 0x44]
949[0: 1.634] PMIC MON[6] = [0x0c: 0x14]
950[0: 1.634] PMIC MON[7] = [0x0e: 0x44]
951[0: 1.634] s5p_check_keypad: 0x10100000
952[0: 1.634] s5p_check_keypad: recovery mode
953[0: 1.634] blk_bwrite: MMC mode
954[0: 1.636] blk_bwrite: MMC mode
955[0: 1.640] set_oneshot_recovery: recovery mode set! sys_bootm=0x80000
956[0: 1.640] s5p_check_reboot_mode: INFORM3 = 0 ... skip
957[0: 1.647] [EMC]Token does not exist
958[0: 1.647] get_force_upload_mode: param value: 0x0
959[0: 1.647] s5p_check_upload: DL: 4f4c FU: 1
960[0: 1.647] 0x4f4c: MRST enabled
961[0: 1.647] s5p_check_upload: RamBase: d56f9933 / INF2: 0 / INF3: 0 / RST: 10000
962[0: 1.649] s2mu106_muic_get_adc_value: ADC:0x1f
963[0: 1.649] s5p_check_upload: debug level is LO! (fu: 1, mask: 0x440)
964[0: 1.649] get_force_upload_mode: param value: 0x0
965[0: 1.649] get_force_upload_mode: param value: 0x0
966[0: 1.649] s5p_check_upload: disable dump_gpr
967[0: 1.649] Disable dumpGPR - 0x0
968[0: 1.649] ccic_wait_auth:
969[0: 1.650] s2mu106_muic_get_adc_value: ADC:0x1f
970[0: 1.650] ccic_read_adc:
971[0: 1.650] s2mu106_read_adc:
972[0: 1.651] s2mu106_read_adc: RID = 00(RID_0)
973[0: 1.651] s2mu106_check_jig_adc_value_ex: jig_adc=1f, cc_adc=00
974[0: 1.651] ifconn_check_jig_adc_value: ret[0]
975[0: 1.651] s5p_check_download: 0
976[0: 1.652] mach_board_main: recovery set!(0x80000)
977[0: 1.658] s2mu106_muic_get_attached_device: INT[1:0x00, 2:0x00]
978[0: 1.658] s2mu106_muic_get_attached_device: DEV[1:0x00, 2:0x00, 3:0x00]
979[0: 1.661] get_vbvolt: apple: 0x00, dev3: 0x00
980[0: 1.661] get_vbvolt: vbvolt: 0x00
981[0: 1.661] ccic_get_jig_status:
982[0: 1.661] ccic_read_adc:
983[0: 1.661] s2mu106_read_adc:
984[0: 1.662] s2mu106_read_adc: RID = 00(RID_0)
985[0: 1.662] ifconn_get_charger_status:
986[0: 1.665] get_vbvolt: apple: 0x00, dev3: 0x00
987[0: 1.665] get_vbvolt: vbvolt: 0x00
988[0: 1.665] ccic_read_adc:
989[0: 1.665] s2mu106_read_adc:
990[0: 1.667] s2mu106_read_adc: RID = 00(RID_0)
991[0: 1.667] ccic_is_valid_charger: Invalid charger
992[0: 1.667] ifconn_get_charger_status: valid_charger=0
993[0: 1.667] adc_read_temp temp_adc = 2036, temp = 25
994[0: 1.667] adc_read_temp: write battery temp data : 0x19(25)
995[0: 1.668] check_pm_status: bat_temp=25, chg=0
996[0: 1.668] check_pm_status: charger is not detected
997[0: 1.671] ReadFGRegisterWord: REG(0x5) = 0x880
998[0: 1.673] ReadFGRegisterWord: REG(0x5) = 0x880
999[0: 1.673] fuel_gauge_read_vcell: vbat (4250)
1000[0: 1.673] check_pm_status: voltage(0) is ok
1001[0: 1.673] check_pm_status: 7 sec reset, continue.
1002[0: 1.673] bl_vib
1003[0: 1.821] LoadJPEG took 46 msec
1004[0: 1.832] read 'booting_warning.jpg'(49516) completed.
1005[0: 1.842] LoadJPEG took 10 msec
1006[0: 1.843] init_display_clk: 12061020( 0), 1206183C( 2)
1007[0: 1.843] init_display_clk: 14800120( 10), 14801828( 1)
1008[0: 1.843] exynos7885_dual_mipi_phy_control, 1
1009[0: 1.947] dsi_read: da: 11,
1010[0: 1.948] dsi_read: db: 62,
1011[0: 1.948] dsi_read: dc: 30,
1012[0: 1.948] 11, 62, 30, 0x116230
1013[0: 1.948] 1st panel CU IC.
1014[0: 2. 13] set_tzpc_secureport: successfully protected 0
1015[0: 2. 67] blk_bwrite: MMC mode
1016[0: 2. 68] blk_bwrite: MMC mode
1017[0: 2. 72] blk_bwrite: MMC mode
1018[0: 2. 75] blk_bwrite: MMC mode
1019[0: 2. 79] Set debug level to low(4f4c)
1020[0: 2. 79] blk_bwrite: MMC mode
1021[0: 2. 82] Set upload mode to disable(0)
1022[0: 2. 82] Disable dumpGPR - 0x0
1023[0: 2. 82] load_kernel: disable dump_gpr
1024[0: 2. 82] 0x4f4c: MRST enabled
1025[0: 2. 83] load_kernel: loading boot image from 301056..
1026[0: 2. 85] kernel size = 0x1bcd800, ramdisk size = 0x6af000
1027[0: 2. 85] Backup dtbo_size:0x0, dtbo_actual:0x0
1028[0: 2. 85] RPMB : LOCK state (0)
1029[0: 2. 85] patch_month_year : 11.20 , os_version : 10.0.0
1030[0: 2. 85] [CM] set os_version & patch_month_year: start
1031[0: 2. 85] [CM] set os_version & patch_month_year: success
1032[0: 2. 85] device_locked : 0
1033[0: 2. 85] [CM] set device_state: start
1034[0: 2. 85] [CM] set device_state: success
1035[0: 2. 85] verified_boot_state : 2
1036[0: 2. 85] [CM] set boot_state: start
1037[0: 2. 85] [CM] set boot_state: success
1038[0: 2. 85] [Fchandler]Jenkins build #21
1039[0: 2. 85] avbops functions are set successfully
1040[0: 2. 85] RPMB : LOCK state (0)
1041[0: 2. 85] avb_slot_verify.c:818: DEBUG: Loading vbmeta struct from partition 'VBMETA'.
1042avb_slot_verify.c:935: ERROR: VBMETA: Error verifying vbmeta image: OK_NOT_SIGNED
1043avb_slot_verify.c:1100: DEBUG: VBMETA: VERIFICATION_DISABLED bit is set.
1044avb_slot_verify.c:705: DEBUG: bootloader: Loading entire partition.
1045blk_bread_bootsector: MMC mode
1046[0: 2.141] RPMB : LOCK state (0)
1047[0: 2.141] avb_slot_verify.c:705: DEBUG: cm: Loading entire partition.
1048RPMB : LOCK state (0)
1049[0: 2.243] avb_slot_verify.c:705: DEBUG: dtb: Loading entire partition.
1050RPMB : LOCK state (0)
1051[0: 2.342] avb_slot_verify.c:705: DEBUG: dtbo: Loading entire partition.
1052RPMB : LOCK state (0)
1053[0: 2.444] avb_slot_verify.c:705: DEBUG: recovery: Loading entire partition.
1054RPMB : LOCK state (0)
1055[0: 3. 86] [AVB 2.0 ERR] authentication fail [ret: 0x3] (orange)
1056[0: 3. 86] avb_main : Check Samsung Secure Info
1057[0: 3. 98] GetSignerVer : None
1058[0: 3. 98] Verify_Signature_With_Signingtype 0x90d20130 272@0xb0000000, 256@0x90d20030
1059[0: 3. 99] Verify_Signature_With_Signingtype: failed.(-18022398)
1060[0: 3. 99] pit_check_signature (VBMETA) invalid.
1061[0: 3. 99] set_ddi_kernel_type : VBMETA, 0x200
1062[0: 3. 99] No need to update kernel type.
1063[0: 3. 99] make_security_decisions : (VBMETA)
1064[0: 3. 99] [KG] Non-block cases
1065[0: 3. 99] RPMB : LOCK state (0)
1066[0: 3. 99] [CC MODE] Failed. Invalid Magic
1067[0: 3. 99] save_wb_snapshot: already saved
1068[0: 3. 99] [EFUSE] warranty bit is already set.
1069[0: 3. 99] avb_footer.c:41: ERROR: Footer magic is incorrect.
1070check_samsung_secure_info : Error validating footer (recovery)
1071[0: 3.731] footer is abnormal: 6
1072[0: 3.731] update_image_status_auth: Status for RECOVERY image is already custom
1073[0: 3.731] set_ddi_kernel_type : RECOVERY, 0x8
1074[0: 3.733] blk_bwrite_bootsectorB: MMC mode in 2nd partition
1075[0: 3.733] MMC0 emmc_bootpart_2_open: 2nd partition open
1076[0: 3.735] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
1077[0: 3.735] MMC0 emmc_bootpart_2_close: 2nd partition close
1078[0: 3.738] if_ddi_data: succeeded. (0x30f)
1079[0: 3.739] make_security_decisions : (RECOVERY)
1080[0: 3.739] [KG] Non-block cases
1081[0: 3.739] RPMB : LOCK state (0)
1082[0: 3.739] [CC MODE] Failed. Invalid Magic
1083[0: 3.739] save_wb_snapshot: already saved
1084[0: 3.739] [EFUSE] warranty bit is already set.
1085[0: 3.745] Verify_Signature_With_Signingtype 0x90d20130 90636@0xb0000000, 256@0x90d20030
1086[0: 3.748] pit_check_signature (DTB) valid.
1087[0: 3.750] blk_bwrite_bootsectorB: MMC mode in 2nd partition
1088[0: 3.750] MMC0 emmc_bootpart_2_open: 2nd partition open
1089[0: 3.752] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
1090[0: 3.752] MMC0 emmc_bootpart_2_close: 2nd partition close
1091[0: 3.755] if_ddi_data: succeeded. (0x30f)
1092[0: 3.756] update_image_status_info: DTB image status has been updated to 0x 2
1093[0: 3.756] update_image_status_auth: Status for DTB image is already official
1094[0: 3.756] set_ddi_kernel_type : DTB, 0x0
1095[0: 3.756] No need to update kernel type.
1096[0: 3.756] KERNEL RB count: DEVICE:3, BINARY:3 (DTB)
1097[0: 3.763] Verify_Signature_With_Signingtype 0x90d20130 188940@0xb0000000, 256@0x90d20030
1098[0: 3.766] pit_check_signature (DTBO) valid.
1099[0: 3.768] blk_bwrite_bootsectorB: MMC mode in 2nd partition
1100[0: 3.768] MMC0 emmc_bootpart_2_open: 2nd partition open
1101[0: 3.770] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
1102[0: 3.770] MMC0 emmc_bootpart_2_close: 2nd partition close
1103[0: 3.773] if_ddi_data: succeeded. (0x30f)
1104[0: 3.774] update_image_status_info: DTBO image status has been updated to 0x 2
1105[0: 3.774] update_image_status_auth: Status for DTBO image is already official
1106[0: 3.774] set_ddi_kernel_type : DTBO, 0x0
1107[0: 3.774] No need to update kernel type.
1108[0: 3.774] KERNEL RB count: DEVICE:3, BINARY:3 (DTBO)
1109[0: 3.774] avb_main : vbmeta type : 3
1110[0: 3.774] get_sign_info: (VBMETA)
1111[0: 3.785] GetSignerVer : None
1112[0: 3.790] read 'svb_orange.jpg'(72593) completed.
1113[0: 3.836] LoadJPEG took 45 msec
1114[0: 3.888] LoadJPEG took 46 msec
1115[0: 3.898] read 'booting_warning.jpg'(49516) completed.
1116[0: 3.908] LoadJPEG took 10 msec
1117avb_cmdline : root=PARTUUID=52444E41-494F-2044-7379-7374656D0000 androidboot.verifiedbootstate=orange
1118[0: 4.321] [TIMA trusted boot]: SEAndroid MAGIC failure (recovery.img)
1119[0: 4.321] [CM] erase public_key: start
1120[0: 4.321] [CM] erase public_key: success
1121[0: 4.379] [UFDT] FINDING DTB ENTRY
1122[0: 4.385] [UFDT] Find DT Entry[0]: Rev:(S:0, E:255, D:3)
1123[0: 4.386] [UFDT] FINDING DTBO ENTRY
1124[0: 4.386] [DTH] dt table header check Fail: <unknown error>
1125[0: 4.386]
1126[0: 4.386] Samsung S-Boot 4.0 for SM-A202F (Sep 25 2020 - 18:56:57 34672703)
1127[0: 4.386] EXYNOS7885 EVT 0.2 (Base on ARM CortexA50)
1128[0: 4.386] 3072MB / Rev 3 / A202FXXU3BTI7 / (PKG_ID 0xe7885000) / LOT_ID N0000 / SHIP /PINRST (0x10000)
1129[0: 4.386] Re init board for bootloader exceptionException: do_handler_sync: DABT_EL1(esr: 0x96000010)
1130[0: 4.886] PSTATE : [<600002c5>] ESR : [<96000010>]
1131[0: 4.886] PC : [<8f037b18>] LR : [<8f037c54>]
1132SP : [<8f16f940>]
1133[0: 4.886] r0: 8f348918 r1 : 8f16f480 r2 : 91a0ddb6
1134[0: 4.886] r3: 43 r4 : a r5 : bc600100
1135[0: 4.886] r6: 8f16f940 r7 : 8f16f940 r8 : cccccccccccccccd
1136[0: 4.886] r9: 8f16f2a0 r10 : 32 r11 : 0
1137[0: 4.886] r12: 5f643367006c616d r13 : 6700307472656c61 r14 : 7472656c615f6433
1138[0: 4.887] r15: 6c615f6433670031 r16 : 0 r17 : 0
1139[0: 4.887] r18: 8f35b1b0 r19 : 8f348918 r20 : 0
1140[0: 4.887] r21: 8f16fa08 r22 : b0000000 r23 : 8f171c80
1141[0: 4.887] r24: 8f0ec000 r25 : 49800 r26 : 8f170158
1142[0: 4.887] r27: 82354810 r28 : 8f171460 r29 : 8f16f940
1143[0: 4.887] ===========================================
1144[0: 4.887] call_do_upload: go to upload mode
1145[0: 4.887] ===========================================
1146[0: 4.887] get_force_upload_mode: param value: 0x0
1147[0: 4.887] call_do_upload: just reboot for user
1148[0: 4.887] s5p_restart_handler ('N':bl_exception)
1149
1150[0: 4.887] s5p_restart_handler bl_exception 5
1151[0: 4.887] blk_close: MMC mode
1152[0: 5.288] Disable dumpGPR - 0x0
1153[0: 5.288] reset_prepare_board: disable asserting rstdisable L1/L2 cache
1154[0: 5.288] Disable dumpGPR - 0x0
1155[0: 0.687]
1156[0: 0.689] Samsung S-Boot 4.0 for SM-A202F (Sep 25 2020 - 18:56:57 34672703)
1157[0: 0.696] EXYNOS7885 EVT 0.2 (Base on ARM CortexA50)
1158[0: 0.701] 3072MB / Rev 3 / A202FXXU3BTI7 / (PKG_ID 0xe7885000) / LOT_ID NN75S / SHIP /SW_RST (0x20000000)
1159[0: 0.711] __if_pmic_rev_init - MUIC API is not ready!
1160[0: 0.718] PMUDBG_CENTRAL_SEQ_*: apsoc 0x0 mif 0x0 apm 0x0
1161[0: 0.724] PMUDBG_CL0_*: cpu0 0x104c0000 cpu1 0x104c0000 l2 0x10050000 noncpu 0x140000
1162[0: 0.732] PMUDBG_CL2_*: cpu0 0x104c0000 cpu1 0x104c0000
1163[0: 0.737] PMUDBG_CL1_*: cpu0 0x70000 cpu1 0x104c0000 cpu2 0x104c0000 cpu3 0x104c0000 l2 0x0 noncpu 0xc0000
1164[0: 0.747] RST_STAT: 0x20000000
1165[0: 0.751] s5p_check_dump_gpr: set sp loading flag
1166[0: 0.756] MMU: enable start
1167[0: 0.759] MMU: enable done
1168[0: 0.762] [MUIC] muic_register_s2mu106_apis
1169[0: 0.768] Try 0 : [MUIC] muic_test1:0x001.
1170[0: 0.772] -> matched(s2mu106).
1171[0: 0.776] init_multi_microusb_ic Active MUIC 0x01
1172[0: 0.782] s2mu106_muic_get_adc_value: ADC:0x1f
1173[0: 0.788] s2mu106_init_microusb_ic: MUIC: Enable BC1.2
1174[0: 0.795] s2mu106_init_microusb_ic: MUIC: CONTROL writing success.
1175[0: 0.803] s2mu106_init_microusb_ic: MUIC: CONTROL:0x17
1176[0: 0.811] s2mu106_init_microusb_ic: MUIC: TIMING3: 0x8d
1177[0: 0.823] s2mu106_muic_get_attached_device: INT[1:0x00, 2:0x00]
1178[0: 0.829] s2mu106_muic_get_attached_device: DEV[1:0x00, 2:0x00, 3:0x00]
1179[0: 0.839] get_vbvolt: apple: 0x00, dev3: 0x00
1180[0: 0.844] get_vbvolt: vbvolt: 0x00
1181[0: 0.847] ccic_register_s2mu106:
1182[0: 0.851] ccic_is_s2mu106:
1183[0: 0.855] ccic_is_s2mu106: reg:b2 - val:00 ret:00
1184[0: 0.861] ccic_register_s2mu106: 0x1 = 0x2
1185[0: 0.867] ccic_register_s2mu106: 0x2 = 0x9b
1186[0: 0.873] ccic_register_s2mu106: 0x3 = 0x98
1187[0: 0.878] ccic_register_s2mu106: 0x4 = 0x90
1188[0: 0.884] ccic_register_s2mu106: 0x5 = 0x99
1189[0: 0.890] ccic_register_s2mu106: 0x6 = 0x88
1190[0: 0.896] ccic_register_s2mu106: 0x7 = 0x47
1191[0: 0.901] ccic_register_s2mu106: 0x8 = 0xa
1192[0: 0.907] ccic_register_s2mu106: 0x9 = 0x0
1193[0: 0.912] ccic_register_s2mu106: 0xa = 0xe
1194[0: 0.918] ccic_register_s2mu106: 0xb = 0xd
1195[0: 0.924] ccic_register_s2mu106: 0xc = 0x90
1196[0: 0.929] ccic_register_s2mu106: 0x18 = 0xe2
1197[0: 0.935] ccic_register_s2mu106: 0xb2 = 0x0
1198[0: 0.949] get_vbvolt: apple: 0x00, dev3: 0x00
1199[0: 0.954] get_vbvolt: vbvolt: 0x00
1200[0: 0.960] ccic_register_s2mu106: BEFORE VBUS(0)
1201[0: 0.967] s2mu106 found.
1202[0: 0.970] mach_board_initialize: Active ccic device.
1203[0: 0.975] ifconn_init: CCIC Mode
1204[0: 0.979] ifconn_get_jig_status: CCIC Mode
1205[0: 0.983] ccic_read_adc:
1206[0: 0.986] s2mu106_read_adc:
1207[0: 0.990] s2mu106_read_adc: RID = 00(RID_0)
1208[0: 0.995] ifconn_is_ccic_jig_device: rid=00
1209[0: 0.999] ccic_wait_auth:
1210[0: 1. 1] s2mu106_muic_get_adc_value: ADC:0x1f
1211[0: 1. 1] ccic_read_adc:
1212[0: 1. 1] s2mu106_read_adc:
1213[0: 1. 2] s2mu106_read_adc: RID = 00(RID_0)
1214[0: 1. 2] board_ccic_check_uart: jig_adc=1f, cc_adc=00
1215[0: 1. 2] ccic_read_adc:
1216[0: 1. 2] s2mu106_read_adc:
1217[0: 1. 3] s2mu106_read_adc: RID = 00(RID_0)
1218[0: 1. 3] ifconn_com_to_open:
1219[0: 1. 6] s2mu106_set_muic_uart_early: MUIC: MAN_SW1[0x00]
1220[0: 1.143] load Secure Payload done.
1221[0: 1.153]
1222Chip ID : 670d6c4d1082
1223[0: 1.153] EL3 Monitor information:
1224[0: 1.153] No tag info No git info ilkyungkim
1225
1226[0: 1.153] DREX_CALIBRATION3: 0xb001717
1227[0: 1.153] MMC Init
1228[0: 1.153] MMC0 400Khz 1 bit mode
1229[0: 1.368] EXT_CSD structure version 8
1230[0: 1.368] cardtype: 0x00000007
1231[0: 1.368] MMC RST_n_FUNCTION was already enabled
1232[0: 1.368] mmc->card_caps: 0x00000f11
1233[0: 1.369] mmc->host_caps: 0x00000f11
1234[0: 1.369] !!!Enter 8 Bit DDR mode.!!!
1235[0: 1.369] MMC0 52Mhz 8bit DDR mode
1236[0: 1.369] MMC0 capacity = 61071360
1237[0: 1.369] MMC0 vendor: 0x15
1238[0: 1.369] MMC0 PNM: 0x424a54443452
1239[0: 1.369] MMC0 MD: 2020 5
1240[0: 1.369] MMC0 FW: 0x03
1241[0: 1.374] MMC0(0x15) LVD reset count : 0
1242[0: 1.374]
1243[Debug Info.]
1244[0: 1.374] S-BOOT : VERSION_-+L0
1245[0: 1.379] GetSignerVer : SignerVer02
1246[0: 1.379] - read_bl1
1247[0: 1.379] blk_bread_bootsector: MMC mode
1248[0: 1.388] Verify_Signature_With_Signingtype 0x90d20130 5184@0x90d10000, 256@0x90d20030
1249[0: 1.390] pit_check_signature (PIT) valid.
1250[0: 1.397] PARAM ENV VERSION: v1.0..
1251[0: 1.400] blk_bread_bootsectorB: MMC mode in 2nd partition
1252[0: 1.400] MMC0 emmc_bootpart_2_open: 2nd partition open
1253[0: 1.402] MMC0 emmc_bootpart_2_close: 2nd partition close
1254[0: 1.404] initialize_ddi_data: usable! (89:0x30f), warranty reason : (0x0e03)
1255[0: 1.404] MAGIC_RAM_BASE: 0, MAGIC_RAM_BASE2: 61685f6f, ompin: 0
1256[0: 1.404] [ldfw] Pass LDFW partition!
1257[0: 1.404] [ldfw] read whole CM partition from the storage
1258[0: 1.504] ldfw: 0th ldfw's version 0x40191220 name : CryptoManagerV40
1259[0: 1.504] ldfw: 1th ldfw's version 0x20181224 name : fmp_fw_V20
1260[0: 1.504] ldfw: 2th ldfw's version 0x20191209 name : drm_fw
1261[0: 1.504] ldfw: 3th ldfw's version 0x24190110 name : srpmb_fw
1262[0: 1.504] ldfw: 4th ldfw's version 0x20181224 name : hdcp_fw
1263[0: 1.504] ldfw: 5th ldfw's version 0x20150828 name : tail_fw
1264[0: 1.504] GetSignerVer : SignerVer02
1265[0: 1.504] ldfw: init ldfw(s). whole ldfws size 0x3ec210
1266[0: 1.575] [ldfw] try to init 5 ldfw(s). except 0 ldfw 5 ldfw(s) have been inited done.
1267[0: 1.591] [TEEGRIS] register handler1, ret = 0x0
1268[0: 1.600] [TEEGRIS] register handler2, ret = 0x0
1269[0: 1.600] [TEEGRIS] disable handler registeration, ret = 0x0
1270[0: 1.600] [OTP] MODEL_ID read start
1271[0: 1.600] [OTP] MODEL_ID read value: 0x37
1272[0: 1.600] [OTP] BAN_ROM_SEC_BOOT_KEY read start
1273[0: 1.600] [OTP] BAN_ROM_SEC_BOOT_KEY read value: 0x0
1274[0: 1.600] [OTP] USE_ROM_SEC_BOOT_KEY read: start
1275[0: 1.600] [OTP] USE_ROM_SEC_BOOT_KEY read value: 0x0
1276[0: 1.600] [OTP] ENABLE_AES read start
1277[0: 1.600] [OTP] ENABLE_AES read value: 0x0
1278[0: 1.600] [OTP] PREORDER read start
1279[0: 1.600] [OTP] PREORDER read value: 0x1
1280[0: 1.600] [OTP] ANTIRBK_NS_AP0 read start
1281[0: 1.601] [OTP] ANTIRBK_NS_AP0 read value: 0x3
1282[0: 1.601] [OTP] COMMERCIAL read start
1283[0: 1.601] [OTP] COMMERCIAL read value: 0x1
1284[0: 1.601] [OTP] TEST read start
1285[0: 1.601] [OTP] TEST read value: 0x0
1286[0: 1.601] [OTP] WARRANTY read start
1287[0: 1.601] [OTP] WARRANTY read value: 0x1
1288[0: 1.601] [OTP] JTAG_SW_LOCK read start
1289[0: 1.601] [OTP] JTAG_SW_LOCK read value: 0x1
1290[0: 1.601] [OTP] CUSTOM_FLAG read start (6)
1291[0: 1.601] [OTP] CUSTOM_FLAG read value: 0x0
1292[0: 1.601] [OTP] CUSTOM_FLAG read start (7)
1293[0: 1.601] [OTP] CUSTOM_FLAG read value: 0x1
1294[0: 1.601] [OTP] CUSTOM_FLAG read start (8)
1295[0: 1.601] [OTP] CUSTOM_FLAG read value: 0x1
1296[0: 1.601] [OTP] CUSTOM_FLAG read start (9)
1297[0: 1.601] [OTP] CUSTOM_FLAG read value: 0x0
1298[0: 1.601] [OTP] ENABLE_ANTIRBK read start
1299[0: 1.601] [OTP] ENABLE_ANTIRBK read value: 0x1
1300[0: 1.601] [OTP] USE_PREORDER_KEY read start
1301[0: 1.601] [OTP] USE_PREORDER_KEY read value: 0x1
1302[0: 1.601] [OTP] ENABLE_MODEL_ID read start
1303[0: 1.601] [OTP] ENABLE_MODEL_ID read value: 0x1
1304[0: 1.601] [OTP] CUSTOM_FLAG read start (15)
1305[0: 1.601] [OTP] CUSTOM_FLAG read value: 0x1
1306[0: 1.601] [OTP] CUSTOM_FLAG read start (16)
1307[0: 1.601] [OTP] CUSTOM_FLAG read value: 0x0
1308[0: 1.601] [EFUSE] SMC Read the 0x0 ...
1309[0: 1.601] [EFUSE] SMC Read Count value: 3
1310[0: 1.601] [EFUSE] SMC Read the 0x1 ...
1311[0: 1.601] [EFUSE] SMC Read Count value: 1
1312[0: 1.601] [EFUSE] SMC Read the 0x2 ...
1313[0: 1.601] [EFUSE] SMC Read Count value: 0
1314[0: 1.601] [EFUSE] SMC Read the 0x3 ...
1315[0: 1.601] [EFUSE] SMC Read Count value: 1
1316[0: 1.601] [OTP] JTAG_KEY check start
1317[0: 1.601] [OTP] JTAG_KEY check: valid key
1318[0: 1.601] (1,55) vs (1,55)
1319[0: 1.601] JTAG_LOCK is already enabled in this device.
1320[0: 1.601] [EFUSE] Already fused for Market status
1321[0: 1.601] check_secure_ch_key_prov_flag : Flag is detected
1322[0: 1.601] [EFUSE] This is commercial device.
1323[0: 1.601] Secure camera - invalid fastcall id ffffffff
1324[0: 1.601] blk_rpmb_open: MMC mode
1325[0: 1.601] MMC0 RPMB emmc_rpmb_open:
1326[0: 1.602] blk_rpmb_read_data: MMC mode
1327[0: 1.604] HMAC compare success
1328[0: 1.604] RPMB: HMAC:
1329[0: 1.604]
1330[0: 1.604] MMC0 RPMB Get DATA success
1331
1332initialize_secdata_rpmb: usable! (0x52504d42), 1
1333[0: 1.604] set_fuse_history : no reason
1334[0: 1.604] fuse history 0x1
1335[0: 1.604] blk_rpmb_close: MMC mode
1336[0: 1.604] MMC0 RPMB emmc_rpmb_close:
1337[0: 1.604] blk_rpmb_open: MMC mode
1338[0: 1.604] MMC0 RPMB emmc_rpmb_open:
1339[0: 1.605] blk_rpmb_read_data: MMC mode
1340[0: 1.606] HMAC compare success
1341[0: 1.606] RPMB: HMAC:
1342[0: 1.606]
1343[0: 1.606] MMC0 RPMB Get DATA success
1344
1345blk_rpmb_close: MMC mode
1346[0: 1.606] MMC0 RPMB emmc_rpmb_close:
1347[0: 1.606] blk_rpmb_open: MMC mode
1348[0: 1.606] MMC0 RPMB emmc_rpmb_open:
1349[0: 1.607] blk_rpmb_read_data: MMC mode
1350[0: 1.609] HMAC compare success
1351[0: 1.609] RPMB: HMAC:
1352[0: 1.609]
1353[0: 1.609] MMC0 RPMB Get DATA success
1354
1355blk_rpmb_read_data: MMC mode
1356[0: 1.610] HMAC compare success
1357[0: 1.610] RPMB: HMAC:
1358[0: 1.610]
1359[0: 1.610] MMC0 RPMB Get DATA success
1360
1361blk_rpmb_close: MMC mode
1362[0: 1.610] MMC0 RPMB emmc_rpmb_close:
1363[0: 1.610] blk_rpmb_open: MMC mode
1364[0: 1.610] MMC0 RPMB emmc_rpmb_open:
1365[0: 1.611] blk_rpmb_read_data: MMC mode
1366[0: 1.612] HMAC compare success
1367[0: 1.612] RPMB: HMAC:
1368[0: 1.612]
1369[0: 1.612] MMC0 RPMB Get DATA success
1370
1371blk_rpmb_read_data: MMC mode
1372[0: 1.614] HMAC compare success
1373[0: 1.614] RPMB: HMAC:
1374[0: 1.614]
1375[0: 1.614] MMC0 RPMB Get DATA success
1376
1377blk_rpmb_close: MMC mode
1378[0: 1.614] MMC0 RPMB emmc_rpmb_close:
1379[0: 1.614]
1380[0: 1.614] blk_rpmb_open: MMC mode
1381[0: 1.614] MMC0 RPMB emmc_rpmb_open:
1382[0: 1.615] blk_rpmb_read_data: MMC mode
1383[0: 1.616] HMAC compare success
1384[0: 1.616] RPMB: HMAC:
1385[0: 1.616]
1386[0: 1.616] MMC0 RPMB Get DATA success
1387
1388ace_hash_sha_digest: passed.(0)
1389[0: 1.616] [KG] valid hash.
1390[0: 1.616] [KG] 'Checking' state.
1391[0: 1.616] blk_rpmb_close: MMC mode
1392[0: 1.616] MMC0 RPMB emmc_rpmb_close:
1393[0: 1.616] get_sec_secu_cond
1394[0: 1.616] DDR SIZE: 3G
1395[0: 1.616] LPDDR4 manufacturer : Micron
1396[0: 1.616] PRO_ID : 4010000
1397[0: 1.636] [TMU: 0] 30
1398[0: 1.656] [TMU: 1] 30
1399[0: 1.656] set_rdx_mask: 0x20000
1400[0: 1.656] set_rdx_mask: 0xa0000
1401[0: 1.657] check_reset_reason: RamBase: 0 / INF2: 12345678 / INF3: abc0ead5 / RST: 20000000
1402[0: 1.657] set_reset_reason: reason as 5
1403[0: 1.657] update_rcnt: not supported
1404[0: 1.657] [MUIC] print_init_regs
1405[0: 1.661] CTRL[1:17, 2:0x9d, 3:0xdd]
1406[0: 1.663] INTMASK[1:0x00, 2:0x00]
1407[0: 1.667] DEV_TYPE[1:0x00, 2:0x00, 3:0x00]
1408[0: 1.669] MAN_SW[0x00]
1409[0: 1.670] RST[0x00]
1410[0: 1.670]
1411[0: 1.670] adc_read_temp temp_adc = 2035, temp = 25
1412[0: 1.670] adc_read_temp: write battery temp data : 0x19(25)
1413[0: 1.673] init_ific: s2mu106 0x11 (rev:0x1)
1414[0: 1.675] keep_charger_status : 0x95 : 0xa5
1415[0: 1.681] ifconn_get_jig_status_vb: CCIC Mode
1416[0: 1.681] ccic_read_adc:
1417[0: 1.681] s2mu106_read_adc:
1418[0: 1.683] s2mu106_read_adc: RID = 00(RID_0)
1419[0: 1.685] get_vbvolt: apple: 0x00, dev3: 0x00
1420[0: 1.685] get_vbvolt: vbvolt: 0x00
1421[0: 1.685] ifconn_is_ccic_jig_device_vb: rid=00 vbus=0
1422[0: 1.702] [DEBUG]disable_factory_mode: DISABLE FACTORY MODE
1423[0: 1.706] kick_charger_watchdog: CHG fault status : x00
1424[0: 1.707] kick_charger_watchdog: CHG_CTRL0 : x03
1425[0: 1.711] set_charger_watchdog: state(1), reg_data(0x1b)
1426[0: 1.712] [DEBUG]set_regulation_voltage: S2MU106_CHG_CTRL5 => 0x5a
1427[0: 1.715] [DEBUG]set_regulation_voltage: float_voltage change to 4350, 0x5a
1428[0: 1.722] set_charger_current : S2MU106_CHG_CTRL7 : (2000)0x27
1429[0: 1.722] ifconn_get_charger_status:
1430[0: 1.725] get_vbvolt: apple: 0x00, dev3: 0x00
1431[0: 1.725] get_vbvolt: vbvolt: 0x00
1432[0: 1.725] ccic_read_adc:
1433[0: 1.725] s2mu106_read_adc:
1434[0: 1.726] s2mu106_read_adc: RID = 00(RID_0)
1435[0: 1.726] ccic_is_valid_charger: Invalid charger
1436[0: 1.726] ifconn_get_charger_status: valid_charger=0
1437[0: 1.731] set_cool_charger_current : S2MU106_CHG_CTRL6 : (450)0x88
1438[0: 1.731] ifconn_is_hc_cable:
1439[0: 1.731] ifconn_get_device:
1440[0: 1.733] s2mu106_muic_get_adc_value: ADC:0x1f
1441[0: 1.733] ifconn_is_muic_jig_device: adc=0x1f
1442[0: 1.733] ccic_read_adc:
1443[0: 1.733] s2mu106_read_adc:
1444[0: 1.734] s2mu106_read_adc: RID = 00(RID_0)
1445[0: 1.734] ifconn_is_ccic_jig_device: rid=00
1446[0: 1.734] ifconn_is_hc_cable: adc=0x1f
1447[0: 1.737] get_vbvolt: apple: 0x00, dev3: 0x00
1448[0: 1.737] get_vbvolt: vbvolt: 0x00
1449[0: 1.737] s2mu106_muic_get_attached_device_ex: no vbus
1450[0: 1.738] set_precharge_current: set charge current(in:500, out:450)
1451[0: 1.742] set_charger_current : S2MU106_CHG_CTRL7 : (450)0x08
1452[0: 1.746] set_charger_state : S2MU106_CHG_CTRL0 : 0x3
1453[0: 1.748] ReadFGRegisterWord: REG(0x5) = 0x8851
1454[0: 1.751] ReadFGRegisterWord: REG(0x5) = 0x8851
1455[0: 1.751] fuel_gauge_read_vcell: vbat (4259)
1456[0: 1.755] set_charger_state : S2MU106_CHG_CTRL0 : 0x1
1457[0: 1.805] ifconn_get_device:
1458[0: 1.806] s2mu106_muic_get_adc_value: ADC:0x1f
1459[0: 1.806] ifconn_is_muic_jig_device: adc=0x1f
1460[0: 1.806] ccic_read_adc:
1461[0: 1.806] s2mu106_read_adc:
1462[0: 1.808] s2mu106_read_adc: RID = 00(RID_0)
1463[0: 1.808] ifconn_is_ccic_jig_device: rid=00
1464[0: 1.812] jig_switch_control: 0x25 -> 0x50
1465[0: 1.816] jig_switch_control: POR state = 0x00, 0x1E = 0x 3, data_ver = 0x2(0x2), factory_mode(0), jig_status(0)
1466[0: 1.818] ReadFGRegisterWord: REG(0x5) = 0x8851
1467[0: 1.821] ReadFGRegisterWord: REG(0x5) = 0x8851
1468[0: 1.821] fuel_gauge_read_vcell: vbat (4259)
1469[0: 1.821] jig_switch_control: Fuelgauge is Already initialized
1470[0: 1.825] set_charger_state : S2MU106_CHG_CTRL0 : 0x3
1471[0: 1.828] ReadFGRegisterWord: REG(0x9) = 0x3f4f
1472[0: 1.830] ReadFGRegisterWord: REG(0x9) = 0x3f4f
1473[0: 1.830] fuel_gauge_read_soc_four_digits: raw capacity (0x3f4f:9891)
1474[0: 1.833] ReadFGRegisterWord: REG(0x5) = 0x8851
1475[0: 1.836] ReadFGRegisterWord: REG(0x5) = 0x8851
1476[0: 1.836] fuel_gauge_read_vcell: vbat (4259)
1477[0: 1.836] init_fuel_gauge: SOC(9891), VCELL(4259)
1478[0: 1.836] PMIC_ID = 0x04
1479[0: 1.836] PMIC_INT1 = 0x00
1480[0: 1.836] PMIC_INT2 = 0x10 RTC1S
1481[0: 1.836] PMIC_INT3 = 0xc0 MRBF MRBR
1482[0: 1.836] PMIC_STATUS1 = 0x1b PWRON JIGONB MRB RSVD
1483[0: 1.836] PMIC_STATUS2 = 0x00
1484[0: 1.836] PMIC_PWRONSRC = 0x08 MRST
1485[0: 1.836] PMIC_OFFSRC = 0x00
1486[0: 1.836] PMIC_RTC_CTRL = 0x02
1487[0: 1.836] PMIC_RTC_SMPL = 0x03
1488[0: 1.837] RTC TIME: 2020-12-08 08:21:10(0x04)AM
1489[0: 1.837] PMIC MON[0] = [0x0c: 0x14]
1490[0: 1.837] PMIC MON[1] = [0x0e: 0x44]
1491[0: 1.837] PMIC MON[2] = [0x09: 0x00]
1492[0: 1.837] PMIC MON[3] = [0x04: 0xff]
1493[0: 1.837] PMIC MON[4] = [0x0c: 0x14]
1494[0: 1.837] PMIC MON[5] = [0x0e: 0x44]
1495[0: 1.837] PMIC MON[6] = [0x0c: 0x14]
1496[0: 1.837] PMIC MON[7] = [0x0e: 0x44]
1497[0: 1.837] s5p_check_keypad: 0x10100000
1498[0: 1.837] s5p_check_keypad: recovery mode
1499[0: 1.837] blk_bwrite: MMC mode
1500[0: 1.840] blk_bwrite: MMC mode
1501[0: 1.843] set_oneshot_recovery: recovery mode set! sys_bootm=0x80000
1502[0: 1.843] s5p_check_reboot_mode: INFORM3 = abc0ead5 ... skip
1503[0: 1.851] [EMC]Token does not exist
1504[0: 1.851] get_force_upload_mode: param value: 0x0
1505[0: 1.851] s5p_check_upload: DL: 4f4c FU: 1
1506[0: 1.851] 0x4f4c: MRST enabled
1507[0: 1.851] s5p_check_upload: RamBase: 0 / INF2: 12345678 / INF3: abc0ead5 / RST: 20000000
1508[0: 1.852] s2mu106_muic_get_adc_value: ADC:0x1f
1509[0: 1.852] s5p_check_upload: debug level is LO! (fu: 1, mask: 0x0)
1510[0: 1.852] get_force_upload_mode: param value: 0x0
1511[0: 1.852] get_force_upload_mode: param value: 0x0
1512[0: 1.852] s5p_check_upload: disable dump_gpr
1513[0: 1.852] Disable dumpGPR - 0x0
1514[0: 1.852] s5p_check_download: 0
1515[0: 1.852] mach_board_main: recovery set!(0x80000)
1516[0: 1.859] s2mu106_muic_get_attached_device: INT[1:0x00, 2:0x00]
1517[0: 1.859] s2mu106_muic_get_attached_device: DEV[1:0x00, 2:0x00, 3:0x00]
1518[0: 1.862] get_vbvolt: apple: 0x00, dev3: 0x00
1519[0: 1.862] get_vbvolt: vbvolt: 0x00
1520[0: 1.862] ccic_get_jig_status:
1521[0: 1.862] ccic_read_adc:
1522[0: 1.862] s2mu106_read_adc:
1523[0: 1.863] s2mu106_read_adc: RID = 00(RID_0)
1524[0: 1.863] ifconn_get_charger_status:
1525[0: 1.866] get_vbvolt: apple: 0x00, dev3: 0x00
1526[0: 1.866] get_vbvolt: vbvolt: 0x00
1527[0: 1.866] ccic_read_adc:
1528[0: 1.866] s2mu106_read_adc:
1529[0: 1.867] s2mu106_read_adc: RID = 00(RID_0)
1530[0: 1.867] ccic_is_valid_charger: Invalid charger
1531[0: 1.867] ifconn_get_charger_status: valid_charger=0
1532[0: 1.867] adc_read_temp temp_adc = 2033, temp = 25
1533[0: 1.867] adc_read_temp: write battery temp data : 0x19(25)
1534[0: 1.868] check_pm_status: bat_temp=25, chg=0
1535[0: 1.868] check_pm_status: normal reset, do not enter LPM mode.
1536[0: 1.871] ReadFGRegisterWord: REG(0x5) = 0x8851
1537[0: 1.874] ReadFGRegisterWord: REG(0x5) = 0x8851
1538[0: 1.874] fuel_gauge_read_vcell: vbat (4259)
1539[0: 1.874] bl_vib
1540[0: 2. 21] LoadJPEG took 46 msec
1541[0: 2. 30] read 'booting_warning.jpg'(49516) completed.
1542[0: 2. 41] LoadJPEG took 10 msec
1543[0: 2. 42] init_display_clk: 12061020( 0), 1206183C( 2)
1544[0: 2. 42] init_display_clk: 14800120( 10), 14801828( 1)
1545[0: 2. 42] exynos7885_dual_mipi_phy_control, 1
1546[0: 2.146] dsi_read: da: 11,
1547[0: 2.146] dsi_read: db: 62,
1548[0: 2.146] dsi_read: dc: 30,
1549[0: 2.146] 11, 62, 30, 0x116230
1550[0: 2.146] 1st panel CU IC.
1551[0: 2.211] set_tzpc_secureport: successfully protected 0
1552[0: 2.265] blk_bwrite: MMC mode
1553[0: 2.267] blk_bwrite: MMC mode
1554[0: 2.269] blk_bwrite: MMC mode
1555[0: 2.273] blk_bwrite: MMC mode
1556[0: 2.276] Set debug level to low(4f4c)
1557[0: 2.276] blk_bwrite: MMC mode
1558[0: 2.280] Set upload mode to disable(0)
1559[0: 2.280] Disable dumpGPR - 0x0
1560[0: 2.280] load_kernel: disable dump_gpr
1561[0: 2.280] 0x4f4c: MRST enabled
1562[0: 2.280] load_kernel: loading boot image from 301056..
1563[0: 2.284] kernel size = 0x1bcd800, ramdisk size = 0x6af000
1564[0: 2.284] Backup dtbo_size:0x0, dtbo_actual:0x0
1565[0: 2.284] RPMB : LOCK state (0)
1566[0: 2.284] patch_month_year : 11.20 , os_version : 10.0.0
1567[0: 2.284] [CM] set os_version & patch_month_year: start
1568[0: 2.284] [CM] set os_version & patch_month_year: success
1569[0: 2.284] device_locked : 0
1570[0: 2.284] [CM] set device_state: start
1571[0: 2.284] [CM] set device_state: success
1572[0: 2.284] verified_boot_state : 2
1573[0: 2.284] [CM] set boot_state: start
1574[0: 2.284] [CM] set boot_state: success
1575[0: 2.284] [Fchandler]Jenkins build #21
1576[0: 2.284] avbops functions are set successfully
1577[0: 2.284] RPMB : LOCK state (0)
1578[0: 2.284] avb_slot_verify.c:818: DEBUG: Loading vbmeta struct from partition 'VBMETA'.
1579avb_slot_verify.c:935: ERROR: VBMETA: Error verifying vbmeta image: OK_NOT_SIGNED
1580avb_slot_verify.c:1100: DEBUG: VBMETA: VERIFICATION_DISABLED bit is set.
1581avb_slot_verify.c:705: DEBUG: bootloader: Loading entire partition.
1582blk_bread_bootsector: MMC mode
1583[0: 2.340] RPMB : LOCK state (0)
1584[0: 2.340] avb_slot_verify.c:705: DEBUG: cm: Loading entire partition.
1585RPMB : LOCK state (0)
1586[0: 2.442] avb_slot_verify.c:705: DEBUG: dtb: Loading entire partition.
1587RPMB : LOCK state (0)
1588[0: 2.540] avb_slot_verify.c:705: DEBUG: dtbo: Loading entire partition.
1589RPMB : LOCK state (0)
1590[0: 2.638] avb_slot_verify.c:705: DEBUG: recovery: Loading entire partition.
1591RPMB : LOCK state (0)
1592[0: 3.280] [AVB 2.0 ERR] authentication fail [ret: 0x3] (orange)
1593[0: 3.280] avb_main : Check Samsung Secure Info
1594[0: 3.292] GetSignerVer : None
1595[0: 3.292] Verify_Signature_With_Signingtype 0x90d20130 272@0xb0000000, 256@0x90d20030
1596[0: 3.293] Verify_Signature_With_Signingtype: failed.(-18022398)
1597[0: 3.293] pit_check_signature (VBMETA) invalid.
1598[0: 3.293] set_ddi_kernel_type : VBMETA, 0x200
1599[0: 3.293] No need to update kernel type.
1600[0: 3.293] make_security_decisions : (VBMETA)
1601[0: 3.293] [KG] Non-block cases
1602[0: 3.293] RPMB : LOCK state (0)
1603[0: 3.293] [CC MODE] Failed. Invalid Magic
1604[0: 3.293] save_wb_snapshot: already saved
1605[0: 3.293] [EFUSE] warranty bit is already set.
1606[0: 3.293] avb_footer.c:41: ERROR: Footer magic is incorrect.
1607check_samsung_secure_info : Error validating footer (recovery)
1608[0: 3.925] footer is abnormal: 6
1609[0: 3.925] update_image_status_auth: Status for RECOVERY image is already custom
1610[0: 3.925] set_ddi_kernel_type : RECOVERY, 0x8
1611[0: 3.925] No need to update kernel type.
1612[0: 3.925] make_security_decisions : (RECOVERY)
1613[0: 3.925] [KG] Non-block cases
1614[0: 3.925] RPMB : LOCK state (0)
1615[0: 3.925] [CC MODE] Failed. Invalid Magic
1616[0: 3.925] save_wb_snapshot: already saved
1617[0: 3.925] [EFUSE] warranty bit is already set.
1618[0: 3.931] Verify_Signature_With_Signingtype 0x90d20130 90636@0xb0000000, 256@0x90d20030
1619[0: 3.933] pit_check_signature (DTB) valid.
1620[0: 3.936] blk_bwrite_bootsectorB: MMC mode in 2nd partition
1621[0: 3.936] MMC0 emmc_bootpart_2_open: 2nd partition open
1622[0: 3.938] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
1623[0: 3.938] MMC0 emmc_bootpart_2_close: 2nd partition close
1624[0: 3.943] if_ddi_data: succeeded. (0x30f)
1625[0: 3.944] update_image_status_info: DTB image status has been updated to 0x 2
1626[0: 3.944] update_image_status_auth: Status for DTB image is already official
1627[0: 3.944] set_ddi_kernel_type : DTB, 0x0
1628[0: 3.944] No need to update kernel type.
1629[0: 3.944] KERNEL RB count: DEVICE:3, BINARY:3 (DTB)
1630[0: 3.951] Verify_Signature_With_Signingtype 0x90d20130 188940@0xb0000000, 256@0x90d20030
1631[0: 3.954] pit_check_signature (DTBO) valid.
1632[0: 3.956] blk_bwrite_bootsectorB: MMC mode in 2nd partition
1633[0: 3.956] MMC0 emmc_bootpart_2_open: 2nd partition open
1634[0: 3.958] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
1635[0: 3.958] MMC0 emmc_bootpart_2_close: 2nd partition close
1636[0: 3.961] if_ddi_data: succeeded. (0x30f)
1637[0: 3.962] update_image_status_info: DTBO image status has been updated to 0x 2
1638[0: 3.962] update_image_status_auth: Status for DTBO image is already official
1639[0: 3.962] set_ddi_kernel_type : DTBO, 0x0
1640[0: 3.962] No need to update kernel type.
1641[0: 3.962] KERNEL RB count: DEVICE:3, BINARY:3 (DTBO)
1642[0: 3.962] avb_main : vbmeta type : 3
1643[0: 3.962] get_sign_info: (VBMETA)
1644[0: 3.972] GetSignerVer : None
1645[0: 3.978] read 'svb_orange.jpg'(72593) completed.
1646[0: 4. 23] LoadJPEG took 45 msec
1647[0: 4. 76] LoadJPEG took 45 msec
1648[0: 4. 84] read 'booting_warning.jpg'(49516) completed.
1649[0: 4. 94] LoadJPEG took 10 msec
1650avb_cmdline : root=PARTUUID=52444E41-494F-2044-7379-7374656D0000 androidboot.verifiedbootstate=orange
1651[0: 4.507] [TIMA trusted boot]: SEAndroid MAGIC failure (recovery.img)
1652[0: 4.507] [CM] erase public_key: start
1653[0: 4.507] [CM] erase public_key: success
1654[0: 4.566] [UFDT] FINDING DTB ENTRY
1655[0: 4.572] [UFDT] Find DT Entry[0]: Rev:(S:0, E:255, D:3)
1656[0: 4.573] [UFDT] FINDING DTBO ENTRY
1657[0: 4.573] [DTH] dt table header check Fail: <unknown error>
1658[0: 4.573]
1659[0: 4.573] Samsung S-Boot 4.0 for SM-A202F (Sep 25 2020 - 18:56:57 34672703)
1660[0: 4.573] EXYNOS7885 EVT 0.2 (Base on ARM CortexA50)
1661[0: 4.573] 3072MB / Rev 3 / A202FXXU3BTI7 / (PKG_ID 0xe7885000) / LOT_ID N0000 / SHIP /SW_RST (0x20000000)
1662[0: 4.573] Re init board for bootloader exceptionException: do_handler_sync: DABT_EL1(esr: 0x96000010)
1663[0: 5. 73] PSTATE : [<800002c5>] ESR : [<96000010>]
1664[0: 5. 73] PC : [<8f037b18>] LR : [<8f037c54>]
1665SP : [<8f16f940>]
1666[0: 5. 73] r0: 8f348918 r1 : 8f16f4c2 r2 : 91a14500
1667[0: 5. 73] r3: 0 r4 : a r5 : bc600100
1668[0: 5. 73] r6: 8f16f940 r7 : 91a14542 r8 : 20202020203a305b
1669[0: 5. 73] r9: 5d3337352e342020 r10 : 64205d4854445b20 r11 : 20656c6261742074
1670[0: 5. 73] r12: 6320726564616568 r13 : 696146206b636568 r14 : 6e6b6e753c203a6c
1671[0: 5. 73] r15: 6f727265206e776f r16 : 0 r17 : 0
1672[0: 5. 73] r18: 8f35b1b0 r19 : 8f348918 r20 : 0
1673[0: 5. 73] r21: 8f16fa08 r22 : b0000000 r23 : 8f171c80
1674[0: 5. 73] r24: 8f0ec000 r25 : 49800 r26 : 8f170158
1675[0: 5. 73] r27: 823ac810 r28 : 8f171460 r29 : 8f16f940
1676[0: 5. 73] ===========================================
1677[0: 5. 73] call_do_upload: go to upload mode
1678[0: 5. 73] ===========================================
1679[0: 5. 73] get_force_upload_mode: param value: 0x0
1680[0: 5. 73] call_do_upload: just reboot for user
1681[0: 5. 73] s5p_restart_handler ('N':bl_exception)
1682
1683[0: 5. 73] s5p_restart_handler bl_exception 5
1684[0: 5. 73] blk_close: MMC mode
1685[0: 5.474] Disable dumpGPR - 0x0
1686[0: 5.474] reset_prepare_board: disable asserting rstdisable L1/L2 cache
1687[0: 5.474] Disable dumpGPR - 0x0
1688[0: 0.687]
1689[0: 0.689] Samsung S-Boot 4.0 for SM-A202F (Sep 25 2020 - 18:56:57 34672703)
1690[0: 0.696] EXYNOS7885 EVT 0.2 (Base on ARM CortexA50)
1691[0: 0.701] 3072MB / Rev 3 / A202FXXU3BTI7 / (PKG_ID 0xe7885000) / LOT_ID NN75S / SHIP /SW_RST (0x20000000)
1692[0: 0.711] __if_pmic_rev_init - MUIC API is not ready!
1693[0: 0.718] PMUDBG_CENTRAL_SEQ_*: apsoc 0x0 mif 0x0 apm 0x0
1694[0: 0.724] PMUDBG_CL0_*: cpu0 0x104c0000 cpu1 0x104c0000 l2 0x10050000 noncpu 0x140000
1695[0: 0.732] PMUDBG_CL2_*: cpu0 0x104c0000 cpu1 0x104c0000
1696[0: 0.737] PMUDBG_CL1_*: cpu0 0x70000 cpu1 0x104c0000 cpu2 0x104c0000 cpu3 0x104c0000 l2 0x0 noncpu 0xc0000
1697[0: 0.747] RST_STAT: 0x20000000
1698[0: 0.751] s5p_check_dump_gpr: set sp loading flag
1699[0: 0.756] MMU: enable start
1700[0: 0.759] MMU: enable done
1701[0: 0.762] [MUIC] muic_register_s2mu106_apis
1702[0: 0.768] Try 0 : [MUIC] muic_test1:0x001.
1703[0: 0.772] -> matched(s2mu106).
1704[0: 0.776] init_multi_microusb_ic Active MUIC 0x01
1705[0: 0.782] s2mu106_muic_get_adc_value: ADC:0x1f
1706[0: 0.788] s2mu106_init_microusb_ic: MUIC: Enable BC1.2
1707[0: 0.795] s2mu106_init_microusb_ic: MUIC: CONTROL writing success.
1708[0: 0.803] s2mu106_init_microusb_ic: MUIC: CONTROL:0x17
1709[0: 0.811] s2mu106_init_microusb_ic: MUIC: TIMING3: 0x8d
1710[0: 0.823] s2mu106_muic_get_attached_device: INT[1:0x00, 2:0x00]
1711[0: 0.829] s2mu106_muic_get_attached_device: DEV[1:0x00, 2:0x00, 3:0x00]
1712[0: 0.839] get_vbvolt: apple: 0x00, dev3: 0x00
1713[0: 0.844] get_vbvolt: vbvolt: 0x00
1714[0: 0.847] ccic_register_s2mu106:
1715[0: 0.851] ccic_is_s2mu106:
1716[0: 0.855] ccic_is_s2mu106: reg:b2 - val:00 ret:00
1717[0: 0.861] ccic_register_s2mu106: 0x1 = 0x2
1718[0: 0.867] ccic_register_s2mu106: 0x2 = 0x9b
1719[0: 0.873] ccic_register_s2mu106: 0x3 = 0x98
1720[0: 0.878] ccic_register_s2mu106: 0x4 = 0x90
1721[0: 0.884] ccic_register_s2mu106: 0x5 = 0x99
1722[0: 0.890] ccic_register_s2mu106: 0x6 = 0x88
1723[0: 0.896] ccic_register_s2mu106: 0x7 = 0x47
1724[0: 0.901] ccic_register_s2mu106: 0x8 = 0xa
1725[0: 0.907] ccic_register_s2mu106: 0x9 = 0x0
1726[0: 0.912] ccic_register_s2mu106: 0xa = 0xe
1727[0: 0.918] ccic_register_s2mu106: 0xb = 0xd
1728[0: 0.924] ccic_register_s2mu106: 0xc = 0x90
1729[0: 0.929] ccic_register_s2mu106: 0x18 = 0xe2
1730[0: 0.935] ccic_register_s2mu106: 0xb2 = 0x0
1731[0: 0.949] get_vbvolt: apple: 0x00, dev3: 0x00
1732[0: 0.954] get_vbvolt: vbvolt: 0x00
1733[0: 0.960] ccic_register_s2mu106: BEFORE VBUS(0)
1734[0: 0.967] s2mu106 found.
1735[0: 0.970] mach_board_initialize: Active ccic device.
1736[0: 0.975] ifconn_init: CCIC Mode
1737[0: 0.979] ifconn_get_jig_status: CCIC Mode
1738[0: 0.983] ccic_read_adc:
1739[0: 0.986] s2mu106_read_adc:
1740[0: 0.990] s2mu106_read_adc: RID = 00(RID_0)
1741[0: 0.995] ifconn_is_ccic_jig_device: rid=00
1742[0: 0.999] ccic_wait_auth:
1743[0: 1. 1] s2mu106_muic_get_adc_value: ADC:0x1f
1744[0: 1. 1] ccic_read_adc:
1745[0: 1. 1] s2mu106_read_adc:
1746[0: 1. 2] s2mu106_read_adc: RID = 00(RID_0)
1747[0: 1. 2] board_ccic_check_uart: jig_adc=1f, cc_adc=00
1748[0: 1. 2] ccic_read_adc:
1749[0: 1. 2] s2mu106_read_adc:
1750[0: 1. 3] s2mu106_read_adc: RID = 00(RID_0)
1751[0: 1. 3] ifconn_com_to_open:
1752[0: 1. 6] s2mu106_set_muic_uart_early: MUIC: MAN_SW1[0x00]
1753[0: 1.143] load Secure Payload done.
1754[0: 1.153]
1755Chip ID : 670d6c4d1082
1756[0: 1.153] EL3 Monitor information:
1757[0: 1.153] No tag info No git info ilkyungkim
1758
1759[0: 1.153] DREX_CALIBRATION3: 0xb001717
1760[0: 1.153] MMC Init
1761[0: 1.153] MMC0 400Khz 1 bit mode
1762[0: 1.286] EXT_CSD structure version 8
1763[0: 1.286] cardtype: 0x00000007
1764[0: 1.286] MMC RST_n_FUNCTION was already enabled
1765[0: 1.286] mmc->card_caps: 0x00000f11
1766[0: 1.286] mmc->host_caps: 0x00000f11
1767[0: 1.287] !!!Enter 8 Bit DDR mode.!!!
1768[0: 1.287] MMC0 52Mhz 8bit DDR mode
1769[0: 1.287] MMC0 capacity = 61071360
1770[0: 1.287] MMC0 vendor: 0x15
1771[0: 1.287] MMC0 PNM: 0x424a54443452
1772[0: 1.287] MMC0 MD: 2020 5
1773[0: 1.287] MMC0 FW: 0x03
1774[0: 1.292] MMC0(0x15) LVD reset count : 0
1775[0: 1.292]
1776[Debug Info.]
1777[0: 1.292] S-BOOT : VERSION_-+L0
1778[0: 1.297] GetSignerVer : SignerVer02
1779[0: 1.297] - read_bl1
1780[0: 1.297] blk_bread_bootsector: MMC mode
1781[0: 1.305] Verify_Signature_With_Signingtype 0x90d20130 5184@0x90d10000, 256@0x90d20030
1782[0: 1.307] pit_check_signature (PIT) valid.
1783[0: 1.315] PARAM ENV VERSION: v1.0..
1784[0: 1.317] blk_bread_bootsectorB: MMC mode in 2nd partition
1785[0: 1.317] MMC0 emmc_bootpart_2_open: 2nd partition open
1786[0: 1.320] MMC0 emmc_bootpart_2_close: 2nd partition close
1787[0: 1.322] initialize_ddi_data: usable! (89:0x30f), warranty reason : (0x0e03)
1788[0: 1.322] MAGIC_RAM_BASE: 0, MAGIC_RAM_BASE2: 61685f6f, ompin: 0
1789[0: 1.322] [ldfw] Pass LDFW partition!
1790[0: 1.322] [ldfw] read whole CM partition from the storage
1791[0: 1.422] ldfw: 0th ldfw's version 0x40191220 name : CryptoManagerV40
1792[0: 1.422] ldfw: 1th ldfw's version 0x20181224 name : fmp_fw_V20
1793[0: 1.422] ldfw: 2th ldfw's version 0x20191209 name : drm_fw
1794[0: 1.422] ldfw: 3th ldfw's version 0x24190110 name : srpmb_fw
1795[0: 1.422] ldfw: 4th ldfw's version 0x20181224 name : hdcp_fw
1796[0: 1.422] ldfw: 5th ldfw's version 0x20150828 name : tail_fw
1797[0: 1.422] GetSignerVer : SignerVer02
1798[0: 1.422] ldfw: init ldfw(s). whole ldfws size 0x3ec210
1799[0: 1.493] [ldfw] try to init 5 ldfw(s). except 0 ldfw 5 ldfw(s) have been inited done.
1800[0: 1.508] [TEEGRIS] register handler1, ret = 0x0
1801[0: 1.518] [TEEGRIS] register handler2, ret = 0x0
1802[0: 1.518] [TEEGRIS] disable handler registeration, ret = 0x0
1803[0: 1.518] [OTP] MODEL_ID read start
1804[0: 1.518] [OTP] MODEL_ID read value: 0x37
1805[0: 1.518] [OTP] BAN_ROM_SEC_BOOT_KEY read start
1806[0: 1.518] [OTP] BAN_ROM_SEC_BOOT_KEY read value: 0x0
1807[0: 1.518] [OTP] USE_ROM_SEC_BOOT_KEY read: start
1808[0: 1.518] [OTP] USE_ROM_SEC_BOOT_KEY read value: 0x0
1809[0: 1.518] [OTP] ENABLE_AES read start
1810[0: 1.518] [OTP] ENABLE_AES read value: 0x0
1811[0: 1.518] [OTP] PREORDER read start
1812[0: 1.518] [OTP] PREORDER read value: 0x1
1813[0: 1.518] [OTP] ANTIRBK_NS_AP0 read start
1814[0: 1.518] [OTP] ANTIRBK_NS_AP0 read value: 0x3
1815[0: 1.518] [OTP] COMMERCIAL read start
1816[0: 1.518] [OTP] COMMERCIAL read value: 0x1
1817[0: 1.518] [OTP] TEST read start
1818[0: 1.518] [OTP] TEST read value: 0x0
1819[0: 1.518] [OTP] WARRANTY read start
1820[0: 1.518] [OTP] WARRANTY read value: 0x1
1821[0: 1.518] [OTP] JTAG_SW_LOCK read start
1822[0: 1.519] [OTP] JTAG_SW_LOCK read value: 0x1
1823[0: 1.519] [OTP] CUSTOM_FLAG read start (6)
1824[0: 1.519] [OTP] CUSTOM_FLAG read value: 0x0
1825[0: 1.519] [OTP] CUSTOM_FLAG read start (7)
1826[0: 1.519] [OTP] CUSTOM_FLAG read value: 0x1
1827[0: 1.519] [OTP] CUSTOM_FLAG read start (8)
1828[0: 1.519] [OTP] CUSTOM_FLAG read value: 0x1
1829[0: 1.519] [OTP] CUSTOM_FLAG read start (9)
1830[0: 1.519] [OTP] CUSTOM_FLAG read value: 0x0
1831[0: 1.519] [OTP] ENABLE_ANTIRBK read start
1832[0: 1.519] [OTP] ENABLE_ANTIRBK read value: 0x1
1833[0: 1.519] [OTP] USE_PREORDER_KEY read start
1834[0: 1.519] [OTP] USE_PREORDER_KEY read value: 0x1
1835[0: 1.519] [OTP] ENABLE_MODEL_ID read start
1836[0: 1.519] [OTP] ENABLE_MODEL_ID read value: 0x1
1837[0: 1.519] [OTP] CUSTOM_FLAG read start (15)
1838[0: 1.519] [OTP] CUSTOM_FLAG read value: 0x1
1839[0: 1.519] [OTP] CUSTOM_FLAG read start (16)
1840[0: 1.519] [OTP] CUSTOM_FLAG read value: 0x0
1841[0: 1.519] [EFUSE] SMC Read the 0x0 ...
1842[0: 1.519] [EFUSE] SMC Read Count value: 3
1843[0: 1.519] [EFUSE] SMC Read the 0x1 ...
1844[0: 1.519] [EFUSE] SMC Read Count value: 1
1845[0: 1.519] [EFUSE] SMC Read the 0x2 ...
1846[0: 1.519] [EFUSE] SMC Read Count value: 0
1847[0: 1.519] [EFUSE] SMC Read the 0x3 ...
1848[0: 1.519] [EFUSE] SMC Read Count value: 1
1849[0: 1.519] [OTP] JTAG_KEY check start
1850[0: 1.519] [OTP] JTAG_KEY check: valid key
1851[0: 1.519] (1,55) vs (1,55)
1852[0: 1.519] JTAG_LOCK is already enabled in this device.
1853[0: 1.519] [EFUSE] Already fused for Market status
1854[0: 1.519] check_secure_ch_key_prov_flag : Flag is detected
1855[0: 1.519] [EFUSE] This is commercial device.
1856[0: 1.519] Secure camera - invalid fastcall id ffffffff
1857[0: 1.519] blk_rpmb_open: MMC mode
1858[0: 1.519] MMC0 RPMB emmc_rpmb_open:
1859[0: 1.519] blk_rpmb_read_data: MMC mode
1860[0: 1.521] HMAC compare success
1861[0: 1.521] RPMB: HMAC:
1862[0: 1.521]
1863[0: 1.521] MMC0 RPMB Get DATA success
1864
1865initialize_secdata_rpmb: usable! (0x52504d42), 1
1866[0: 1.521] set_fuse_history : no reason
1867[0: 1.521] fuse history 0x1
1868[0: 1.521] blk_rpmb_close: MMC mode
1869[0: 1.521] MMC0 RPMB emmc_rpmb_close:
1870[0: 1.521] blk_rpmb_open: MMC mode
1871[0: 1.521] MMC0 RPMB emmc_rpmb_open:
1872[0: 1.522] blk_rpmb_read_data: MMC mode
1873[0: 1.523] HMAC compare success
1874[0: 1.523] RPMB: HMAC:
1875[0: 1.523]
1876[0: 1.523] MMC0 RPMB Get DATA success
1877
1878blk_rpmb_close: MMC mode
1879[0: 1.523] MMC0 RPMB emmc_rpmb_close:
1880[0: 1.523] blk_rpmb_open: MMC mode
1881[0: 1.523] MMC0 RPMB emmc_rpmb_open:
1882[0: 1.524] blk_rpmb_read_data: MMC mode
1883[0: 1.526] HMAC compare success
1884[0: 1.526] RPMB: HMAC:
1885[0: 1.526]
1886[0: 1.526] MMC0 RPMB Get DATA success
1887
1888blk_rpmb_read_data: MMC mode
1889[0: 1.527] HMAC compare success
1890[0: 1.527] RPMB: HMAC:
1891[0: 1.527]
1892[0: 1.527] MMC0 RPMB Get DATA success
1893
1894blk_rpmb_close: MMC mode
1895[0: 1.527] MMC0 RPMB emmc_rpmb_close:
1896[0: 1.527] blk_rpmb_open: MMC mode
1897[0: 1.527] MMC0 RPMB emmc_rpmb_open:
1898[0: 1.528] blk_rpmb_read_data: MMC mode
1899[0: 1.529] HMAC compare success
1900[0: 1.529] RPMB: HMAC:
1901[0: 1.529]
1902[0: 1.529] MMC0 RPMB Get DATA success
1903
1904blk_rpmb_read_data: MMC mode
1905[0: 1.531] HMAC compare success
1906[0: 1.531] RPMB: HMAC:
1907[0: 1.531]
1908[0: 1.531] MMC0 RPMB Get DATA success
1909
1910blk_rpmb_close: MMC mode
1911[0: 1.531] MMC0 RPMB emmc_rpmb_close:
1912[0: 1.531]
1913[0: 1.531] blk_rpmb_open: MMC mode
1914[0: 1.531] MMC0 RPMB emmc_rpmb_open:
1915[0: 1.532] blk_rpmb_read_data: MMC mode
1916[0: 1.533] HMAC compare success
1917[0: 1.533] RPMB: HMAC:
1918[0: 1.533]
1919[0: 1.533] MMC0 RPMB Get DATA success
1920
1921ace_hash_sha_digest: passed.(0)
1922[0: 1.533] [KG] valid hash.
1923[0: 1.533] [KG] 'Checking' state.
1924[0: 1.533] blk_rpmb_close: MMC mode
1925[0: 1.533] MMC0 RPMB emmc_rpmb_close:
1926[0: 1.533] get_sec_secu_cond
1927[0: 1.533] DDR SIZE: 3G
1928[0: 1.533] LPDDR4 manufacturer : Micron
1929[0: 1.533] PRO_ID : 4010000
1930[0: 1.553] [TMU: 0] 31
1931[0: 1.573] [TMU: 1] 30
1932[0: 1.573] set_rdx_mask: 0x20000
1933[0: 1.573] set_rdx_mask: 0xa0000
1934[0: 1.573] check_reset_reason: RamBase: 0 / INF2: 12345678 / INF3: abc0ead5 / RST: 20000000
1935[0: 1.573] set_reset_reason: reason as 5
1936[0: 1.573] update_rcnt: not supported
1937[0: 1.573] [MUIC] print_init_regs
1938[0: 1.578] CTRL[1:17, 2:0x9d, 3:0xdd]
1939[0: 1.580] INTMASK[1:0x00, 2:0x00]
1940[0: 1.584] DEV_TYPE[1:0x00, 2:0x00, 3:0x00]
1941[0: 1.586] MAN_SW[0x00]
1942[0: 1.587] RST[0x00]
1943[0: 1.587]
1944[0: 1.587] adc_read_temp temp_adc = 2031, temp = 25
1945[0: 1.587] adc_read_temp: write battery temp data : 0x19(25)
1946[0: 1.590] init_ific: s2mu106 0x11 (rev:0x1)
1947[0: 1.592] keep_charger_status : 0x95 : 0xa5
1948[0: 1.598] ifconn_get_jig_status_vb: CCIC Mode
1949[0: 1.598] ccic_read_adc:
1950[0: 1.598] s2mu106_read_adc:
1951[0: 1.599] s2mu106_read_adc: RID = 00(RID_0)
1952[0: 1.602] get_vbvolt: apple: 0x00, dev3: 0x00
1953[0: 1.602] get_vbvolt: vbvolt: 0x00
1954[0: 1.602] ifconn_is_ccic_jig_device_vb: rid=00 vbus=0
1955[0: 1.619] [DEBUG]disable_factory_mode: DISABLE FACTORY MODE
1956[0: 1.623] kick_charger_watchdog: CHG fault status : x00
1957[0: 1.624] kick_charger_watchdog: CHG_CTRL0 : x03
1958[0: 1.628] set_charger_watchdog: state(1), reg_data(0x1b)
1959[0: 1.629] [DEBUG]set_regulation_voltage: S2MU106_CHG_CTRL5 => 0x5a
1960[0: 1.632] [DEBUG]set_regulation_voltage: float_voltage change to 4350, 0x5a
1961[0: 1.639] set_charger_current : S2MU106_CHG_CTRL7 : (2000)0x27
1962[0: 1.639] ifconn_get_charger_status:
1963[0: 1.642] get_vbvolt: apple: 0x00, dev3: 0x00
1964[0: 1.642] get_vbvolt: vbvolt: 0x00
1965[0: 1.642] ccic_read_adc:
1966[0: 1.642] s2mu106_read_adc:
1967[0: 1.643] s2mu106_read_adc: RID = 00(RID_0)
1968[0: 1.643] ccic_is_valid_charger: Invalid charger
1969[0: 1.643] ifconn_get_charger_status: valid_charger=0
1970[0: 1.648] set_cool_charger_current : S2MU106_CHG_CTRL6 : (450)0x88
1971[0: 1.648] ifconn_is_hc_cable:
1972[0: 1.648] ifconn_get_device:
1973[0: 1.650] s2mu106_muic_get_adc_value: ADC:0x1f
1974[0: 1.650] ifconn_is_muic_jig_device: adc=0x1f
1975[0: 1.650] ccic_read_adc:
1976[0: 1.650] s2mu106_read_adc:
1977[0: 1.651] s2mu106_read_adc: RID = 00(RID_0)
1978[0: 1.651] ifconn_is_ccic_jig_device: rid=00
1979[0: 1.651] ifconn_is_hc_cable: adc=0x1f
1980[0: 1.654] get_vbvolt: apple: 0x00, dev3: 0x00
1981[0: 1.654] get_vbvolt: vbvolt: 0x00
1982[0: 1.654] s2mu106_muic_get_attached_device_ex: no vbus
1983[0: 1.655] set_precharge_current: set charge current(in:500, out:450)
1984[0: 1.659] set_charger_current : S2MU106_CHG_CTRL7 : (450)0x08
1985[0: 1.663] set_charger_state : S2MU106_CHG_CTRL0 : 0x3
1986[0: 1.665] ReadFGRegisterWord: REG(0x5) = 0x87f0
1987[0: 1.668] ReadFGRegisterWord: REG(0x5) = 0x87f0
1988[0: 1.668] fuel_gauge_read_vcell: vbat (4248)
1989[0: 1.672] set_charger_state : S2MU106_CHG_CTRL0 : 0x1
1990[0: 1.722] ifconn_get_device:
1991[0: 1.723] s2mu106_muic_get_adc_value: ADC:0x1f
1992[0: 1.723] ifconn_is_muic_jig_device: adc=0x1f
1993[0: 1.723] ccic_read_adc:
1994[0: 1.723] s2mu106_read_adc:
1995[0: 1.725] s2mu106_read_adc: RID = 00(RID_0)
1996[0: 1.725] ifconn_is_ccic_jig_device: rid=00
1997[0: 1.728] jig_switch_control: 0x25 -> 0x50
1998[0: 1.732] jig_switch_control: POR state = 0x00, 0x1E = 0x 3, data_ver = 0x2(0x2), factory_mode(0), jig_status(0)
1999[0: 1.735] ReadFGRegisterWord: REG(0x5) = 0x87f0
2000[0: 1.738] ReadFGRegisterWord: REG(0x5) = 0x87f0
2001[0: 1.738] fuel_gauge_read_vcell: vbat (4248)
2002[0: 1.738] jig_switch_control: Fuelgauge is Already initialized
2003[0: 1.742] set_charger_state : S2MU106_CHG_CTRL0 : 0x3
2004[0: 1.744] ReadFGRegisterWord: REG(0x9) = 0x3f4d
2005[0: 1.747] ReadFGRegisterWord: REG(0x9) = 0x3f4d
2006[0: 1.747] fuel_gauge_read_soc_four_digits: raw capacity (0x3f4d:9890)
2007[0: 1.750] ReadFGRegisterWord: REG(0x5) = 0x87f0
2008[0: 1.753] ReadFGRegisterWord: REG(0x5) = 0x87f0
2009[0: 1.753] fuel_gauge_read_vcell: vbat (4248)
2010[0: 1.753] init_fuel_gauge: SOC(9890), VCELL(4248)
2011[0: 1.753] PMIC_ID = 0x04
2012[0: 1.753] PMIC_INT1 = 0x00
2013[0: 1.753] PMIC_INT2 = 0x10 RTC1S
2014[0: 1.753] PMIC_INT3 = 0xc0 MRBF MRBR
2015[0: 1.753] PMIC_STATUS1 = 0x1b PWRON JIGONB MRB RSVD
2016[0: 1.753] PMIC_STATUS2 = 0x00
2017[0: 1.753] PMIC_PWRONSRC = 0x08 MRST
2018[0: 1.753] PMIC_OFFSRC = 0x00
2019[0: 1.753] PMIC_RTC_CTRL = 0x02
2020[0: 1.753] PMIC_RTC_SMPL = 0x03
2021[0: 1.754] RTC TIME: 2020-12-08 08:21:16(0x04)AM
2022[0: 1.754] PMIC MON[0] = [0x0c: 0x14]
2023[0: 1.754] PMIC MON[1] = [0x0e: 0x44]
2024[0: 1.754] PMIC MON[2] = [0x09: 0x00]
2025[0: 1.754] PMIC MON[3] = [0x04: 0xff]
2026[0: 1.754] PMIC MON[4] = [0x0c: 0x14]
2027[0: 1.754] PMIC MON[5] = [0x0e: 0x44]
2028[0: 1.754] PMIC MON[6] = [0x0c: 0x14]
2029[0: 1.754] PMIC MON[7] = [0x0e: 0x44]
2030[0: 1.754] s5p_check_keypad: 0x10100000
2031[0: 1.754] s5p_check_keypad: recovery mode
2032[0: 1.754] blk_bwrite: MMC mode
2033[0: 1.756] blk_bwrite: MMC mode
2034[0: 1.760] set_oneshot_recovery: recovery mode set! sys_bootm=0x80000
2035[0: 1.760] s5p_check_reboot_mode: INFORM3 = abc0ead5 ... skip
2036[0: 1.767] [EMC]Token does not exist
2037[0: 1.767] get_force_upload_mode: param value: 0x0
2038[0: 1.767] s5p_check_upload: DL: 4f4c FU: 1
2039[0: 1.767] 0x4f4c: MRST enabled
2040[0: 1.767] s5p_check_upload: RamBase: 0 / INF2: 12345678 / INF3: abc0ead5 / RST: 20000000
2041[0: 1.768] s2mu106_muic_get_adc_value: ADC:0x1f
2042[0: 1.768] s5p_check_upload: debug level is LO! (fu: 1, mask: 0x0)
2043[0: 1.768] get_force_upload_mode: param value: 0x0
2044[0: 1.768] get_force_upload_mode: param value: 0x0
2045[0: 1.768] s5p_check_upload: disable dump_gpr
2046[0: 1.769] Disable dumpGPR - 0x0
2047[0: 1.769] s5p_check_download: 0
2048[0: 1.769] mach_board_main: recovery set!(0x80000)
2049[0: 1.775] s2mu106_muic_get_attached_device: INT[1:0x00, 2:0x00]
2050[0: 1.775] s2mu106_muic_get_attached_device: DEV[1:0x00, 2:0x00, 3:0x00]
2051[0: 1.778] get_vbvolt: apple: 0x00, dev3: 0x00
2052[0: 1.778] get_vbvolt: vbvolt: 0x00
2053[0: 1.778] ccic_get_jig_status:
2054[0: 1.778] ccic_read_adc:
2055[0: 1.778] s2mu106_read_adc:
2056[0: 1.779] s2mu106_read_adc: RID = 00(RID_0)
2057[0: 1.779] ifconn_get_charger_status:
2058[0: 1.782] get_vbvolt: apple: 0x00, dev3: 0x00
2059[0: 1.782] get_vbvolt: vbvolt: 0x00
2060[0: 1.782] ccic_read_adc:
2061[0: 1.782] s2mu106_read_adc:
2062[0: 1.784] s2mu106_read_adc: RID = 00(RID_0)
2063[0: 1.784] ccic_is_valid_charger: Invalid charger
2064[0: 1.784] ifconn_get_charger_status: valid_charger=0
2065[0: 1.784] adc_read_temp temp_adc = 2029, temp = 25
2066[0: 1.784] adc_read_temp: write battery temp data : 0x19(25)
2067[0: 1.785] check_pm_status: bat_temp=25, chg=0
2068[0: 1.785] check_pm_status: normal reset, do not enter LPM mode.
2069[0: 1.787] ReadFGRegisterWord: REG(0x5) = 0x87f0
2070[0: 1.790] ReadFGRegisterWord: REG(0x5) = 0x87f0
2071[0: 1.790] fuel_gauge_read_vcell: vbat (4248)
2072[0: 1.790] bl_vib
2073[0: 1.937] LoadJPEG took 46 msec
2074[0: 1.950] read 'booting_warning.jpg'(49516) completed.
2075[0: 1.960] LoadJPEG took 10 msec
2076[0: 1.961] init_display_clk: 12061020( 0), 1206183C( 2)
2077[0: 1.961] init_display_clk: 14800120( 10), 14801828( 1)
2078[0: 1.961] exynos7885_dual_mipi_phy_control, 1
2079[0: 2. 65] dsi_read: da: 11,
2080[0: 2. 65] dsi_read: db: 62,
2081[0: 2. 65] dsi_read: dc: 30,
2082[0: 2. 65] 11, 62, 30, 0x116230
2083[0: 2. 65] 1st panel CU IC.
2084[0: 2.130] set_tzpc_secureport: successfully protected 0
2085[0: 2.184] blk_bwrite: MMC mode
2086[0: 2.186] blk_bwrite: MMC mode
2087[0: 2.188] blk_bwrite: MMC mode
2088[0: 2.192] blk_bwrite: MMC mode
2089[0: 2.196] Set debug level to low(4f4c)
2090[0: 2.196] blk_bwrite: MMC mode
2091[0: 2.199] Set upload mode to disable(0)
2092[0: 2.199] Disable dumpGPR - 0x0
2093[0: 2.199] load_kernel: disable dump_gpr
2094[0: 2.199] 0x4f4c: MRST enabled
2095[0: 2.199] load_kernel: loading boot image from 301056..
2096[0: 2.202] kernel size = 0x1bcd800, ramdisk size = 0x6af000
2097[0: 2.202] Backup dtbo_size:0x0, dtbo_actual:0x0
2098[0: 2.202] RPMB : LOCK state (0)
2099[0: 2.202] patch_month_year : 11.20 , os_version : 10.0.0
2100[0: 2.202] [CM] set os_version & patch_month_year: start
2101[0: 2.202] [CM] set os_version & patch_month_year: success
2102[0: 2.202] device_locked : 0
2103[0: 2.202] [CM] set device_state: start
2104[0: 2.202] [CM] set device_state: success
2105[0: 2.202] verified_boot_state : 2
2106[0: 2.202] [CM] set boot_state: start
2107[0: 2.203] [CM] set boot_state: success
2108[0: 2.203] [Fchandler]Jenkins build #21
2109[0: 2.203] avbops functions are set successfully
2110[0: 2.203] RPMB : LOCK state (0)
2111[0: 2.203] avb_slot_verify.c:818: DEBUG: Loading vbmeta struct from partition 'VBMETA'.
2112avb_slot_verify.c:935: ERROR: VBMETA: Error verifying vbmeta image: OK_NOT_SIGNED
2113avb_slot_verify.c:1100: DEBUG: VBMETA: VERIFICATION_DISABLED bit is set.
2114avb_slot_verify.c:705: DEBUG: bootloader: Loading entire partition.
2115blk_bread_bootsector: MMC mode
2116[0: 2.258] RPMB : LOCK state (0)
2117[0: 2.258] avb_slot_verify.c:705: DEBUG: cm: Loading entire partition.
2118RPMB : LOCK state (0)
2119[0: 2.360] avb_slot_verify.c:705: DEBUG: dtb: Loading entire partition.
2120RPMB : LOCK state (0)
2121[0: 2.459] avb_slot_verify.c:705: DEBUG: dtbo: Loading entire partition.
2122RPMB : LOCK state (0)
2123[0: 2.558] avb_slot_verify.c:705: DEBUG: recovery: Loading entire partition.
2124RPMB : LOCK state (0)
2125[0: 3.205] [AVB 2.0 ERR] authentication fail [ret: 0x3] (orange)
2126[0: 3.205] avb_main : Check Samsung Secure Info
2127[0: 3.216] GetSignerVer : None
2128[0: 3.216] Verify_Signature_With_Signingtype 0x90d20130 272@0xb0000000, 256@0x90d20030
2129[0: 3.217] Verify_Signature_With_Signingtype: failed.(-18022398)
2130[0: 3.217] pit_check_signature (VBMETA) invalid.
2131[0: 3.217] set_ddi_kernel_type : VBMETA, 0x200
2132[0: 3.217] No need to update kernel type.
2133[0: 3.217] make_security_decisions : (VBMETA)
2134[0: 3.217] [KG] Non-block cases
2135[0: 3.217] RPMB : LOCK state (0)
2136[0: 3.217] [CC MODE] Failed. Invalid Magic
2137[0: 3.218] save_wb_snapshot: already saved
2138[0: 3.218] [EFUSE] warranty bit is already set.
2139[0: 3.218] avb_footer.c:41: ERROR: Footer magic is incorrect.
2140check_samsung_secure_info : Error validating footer (recovery)
2141[0: 3.849] footer is abnormal: 6
2142[0: 3.849] update_image_status_auth: Status for RECOVERY image is already custom
2143[0: 3.849] set_ddi_kernel_type : RECOVERY, 0x8
2144[0: 3.849] No need to update kernel type.
2145[0: 3.849] make_security_decisions : (RECOVERY)
2146[0: 3.849] [KG] Non-block cases
2147[0: 3.849] RPMB : LOCK state (0)
2148[0: 3.849] [CC MODE] Failed. Invalid Magic
2149[0: 3.849] save_wb_snapshot: already saved
2150[0: 3.849] [EFUSE] warranty bit is already set.
2151[0: 3.856] Verify_Signature_With_Signingtype 0x90d20130 90636@0xb0000000, 256@0x90d20030
2152[0: 3.858] pit_check_signature (DTB) valid.
2153[0: 3.860] blk_bwrite_bootsectorB: MMC mode in 2nd partition
2154[0: 3.860] MMC0 emmc_bootpart_2_open: 2nd partition open
2155[0: 3.862] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
2156[0: 3.862] MMC0 emmc_bootpart_2_close: 2nd partition close
2157[0: 3.866] if_ddi_data: succeeded. (0x30f)
2158[0: 3.867] update_image_status_info: DTB image status has been updated to 0x 2
2159[0: 3.867] update_image_status_auth: Status for DTB image is already official
2160[0: 3.867] set_ddi_kernel_type : DTB, 0x0
2161[0: 3.867] No need to update kernel type.
2162[0: 3.867] KERNEL RB count: DEVICE:3, BINARY:3 (DTB)
2163[0: 3.875] Verify_Signature_With_Signingtype 0x90d20130 188940@0xb0000000, 256@0x90d20030
2164[0: 3.877] pit_check_signature (DTBO) valid.
2165[0: 3.879] blk_bwrite_bootsectorB: MMC mode in 2nd partition
2166[0: 3.879] MMC0 emmc_bootpart_2_open: 2nd partition open
2167[0: 3.881] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
2168[0: 3.881] MMC0 emmc_bootpart_2_close: 2nd partition close
2169[0: 3.884] if_ddi_data: succeeded. (0x30f)
2170[0: 3.885] update_image_status_info: DTBO image status has been updated to 0x 2
2171[0: 3.885] update_image_status_auth: Status for DTBO image is already official
2172[0: 3.885] set_ddi_kernel_type : DTBO, 0x0
2173[0: 3.885] No need to update kernel type.
2174[0: 3.885] KERNEL RB count: DEVICE:3, BINARY:3 (DTBO)
2175[0: 3.885] avb_main : vbmeta type : 3
2176[0: 3.885] get_sign_info: (VBMETA)
2177[0: 3.896] GetSignerVer : None
2178[0: 3.901] read 'svb_orange.jpg'(72593) completed.
2179[0: 3.947] LoadJPEG took 45 msec
2180[0: 3.999] LoadJPEG took 45 msec
2181[0: 4. 9] read 'booting_warning.jpg'(49516) completed.
2182[0: 4. 19] LoadJPEG took 10 msec
2183avb_cmdline : root=PARTUUID=52444E41-494F-2044-7379-7374656D0000 androidboot.verifiedbootstate=orange
2184[0: 4.435] [TIMA trusted boot]: SEAndroid MAGIC failure (recovery.img)
2185[0: 4.435] [CM] erase public_key: start
2186[0: 4.435] [CM] erase public_key: success
2187[0: 4.493] [UFDT] FINDING DTB ENTRY
2188[0: 4.499] [UFDT] Find DT Entry[0]: Rev:(S:0, E:255, D:3)
2189[0: 4.500] [UFDT] FINDING DTBO ENTRY
2190[0: 4.500] [DTH] dt table header check Fail: <unknown error>
2191[0: 4.500]
2192[0: 4.500] Samsung S-Boot 4.0 for SM-A202F (Sep 25 2020 - 18:56:57 34672703)
2193[0: 4.500] EXYNOS7885 EVT 0.2 (Base on ARM CortexA50)
2194[0: 4.500] 3072MB / Rev 3 / A202FXXU3BTI7 / (PKG_ID 0xe7885000) / LOT_ID N0000 / SHIP /SW_RST (0x20000000)
2195[0: 4.500] Re init board for bootloader exceptionException: do_handler_sync: DABT_EL1(esr: 0x96000010)
2196[0: 5. 0] PSTATE : [<600002c5>] ESR : [<96000010>]
2197[0: 5. 0] PC : [<8f037b18>] LR : [<8f037c54>]
2198SP : [<8f16f940>]
2199[0: 5. 0] r0: 8f348918 r1 : 8f16f480 r2 : 91a1ac71
2200[0: 5. 0] r3: 43 r4 : a r5 : bc600100
2201[0: 5. 0] r6: 8f16f940 r7 : 8f16f940 r8 : cccccccccccccccd
2202[0: 5. 1] r9: 8f16f2a0 r10 : 32 r11 : 0
2203[0: 5. 1] r12: 5f643367006c616d r13 : 6700307472656c61 r14 : 7472656c615f6433
2204[0: 5. 1] r15: 6c615f6433670031 r16 : 0 r17 : 0
2205[0: 5. 1] r18: 8f35b1b0 r19 : 8f348918 r20 : 0
2206[0: 5. 1] r21: 8f16fa08 r22 : b0000000 r23 : 8f171c80
2207[0: 5. 1] r24: 8f0ec000 r25 : 49800 r26 : 8f170158
2208[0: 5. 1] r27: 82354810 r28 : 8f171460 r29 : 8f16f940
2209[0: 5. 1] ===========================================
2210[0: 5. 1] call_do_upload: go to upload mode
2211[0: 5. 1] ===========================================
2212[0: 5. 1] get_force_upload_mode: param value: 0x0
2213[0: 5. 1] call_do_upload: just reboot for user
2214[0: 5. 1] s5p_restart_handler ('N':bl_exception)
2215
2216[0: 5. 1] s5p_restart_handler bl_exception 5
2217[0: 5. 1] blk_close: MMC mode
2218[0: 5.402] Disable dumpGPR - 0x0
2219[0: 5.402] reset_prepare_board: disable asserting rstdisable L1/L2 cache
2220[0: 5.402] Disable dumpGPR - 0x0
2221[0: 0.687]
2222[0: 0.689] Samsung S-Boot 4.0 for SM-A202F (Sep 25 2020 - 18:56:57 34672703)
2223[0: 0.696] EXYNOS7885 EVT 0.2 (Base on ARM CortexA50)
2224[0: 0.701] 3072MB / Rev 3 / A202FXXU3BTI7 / (PKG_ID 0xe7885000) / LOT_ID NN75S / SHIP /SW_RST (0x20000000)
2225[0: 0.711] __if_pmic_rev_init - MUIC API is not ready!
2226[0: 0.718] PMUDBG_CENTRAL_SEQ_*: apsoc 0x0 mif 0x0 apm 0x0
2227[0: 0.724] PMUDBG_CL0_*: cpu0 0x104c0000 cpu1 0x104c0000 l2 0x10050000 noncpu 0x140000
2228[0: 0.732] PMUDBG_CL2_*: cpu0 0x104c0000 cpu1 0x104c0000
2229[0: 0.737] PMUDBG_CL1_*: cpu0 0x70000 cpu1 0x104c0000 cpu2 0x104c0000 cpu3 0x104c0000 l2 0x0 noncpu 0xc0000
2230[0: 0.747] RST_STAT: 0x20000000
2231[0: 0.751] s5p_check_dump_gpr: set sp loading flag
2232[0: 0.756] MMU: enable start
2233[0: 0.759] MMU: enable done
2234[0: 0.762] [MUIC] muic_register_s2mu106_apis
2235[0: 0.768] Try 0 : [MUIC] muic_test1:0x001.
2236[0: 0.772] -> matched(s2mu106).
2237[0: 0.776] init_multi_microusb_ic Active MUIC 0x01
2238[0: 0.782] s2mu106_muic_get_adc_value: ADC:0x1f
2239[0: 0.788] s2mu106_init_microusb_ic: MUIC: Enable BC1.2
2240[0: 0.795] s2mu106_init_microusb_ic: MUIC: CONTROL writing success.
2241[0: 0.803] s2mu106_init_microusb_ic: MUIC: CONTROL:0x17
2242[0: 0.811] s2mu106_init_microusb_ic: MUIC: TIMING3: 0x8d
2243[0: 0.823] s2mu106_muic_get_attached_device: INT[1:0x00, 2:0x00]
2244[0: 0.829] s2mu106_muic_get_attached_device: DEV[1:0x00, 2:0x00, 3:0x00]
2245[0: 0.839] get_vbvolt: apple: 0x00, dev3: 0x00
2246[0: 0.844] get_vbvolt: vbvolt: 0x00
2247[0: 0.847] ccic_register_s2mu106:
2248[0: 0.851] ccic_is_s2mu106:
2249[0: 0.855] ccic_is_s2mu106: reg:b2 - val:00 ret:00
2250[0: 0.861] ccic_register_s2mu106: 0x1 = 0x2
2251[0: 0.867] ccic_register_s2mu106: 0x2 = 0x9b
2252[0: 0.873] ccic_register_s2mu106: 0x3 = 0x98
2253[0: 0.878] ccic_register_s2mu106: 0x4 = 0x90
2254[0: 0.884] ccic_register_s2mu106: 0x5 = 0x99
2255[0: 0.890] ccic_register_s2mu106: 0x6 = 0x88
2256[0: 0.896] ccic_register_s2mu106: 0x7 = 0x47
2257[0: 0.901] ccic_register_s2mu106: 0x8 = 0xa
2258[0: 0.907] ccic_register_s2mu106: 0x9 = 0x0
2259[0: 0.912] ccic_register_s2mu106: 0xa = 0xe
2260[0: 0.918] ccic_register_s2mu106: 0xb = 0xd
2261[0: 0.924] ccic_register_s2mu106: 0xc = 0x90
2262[0: 0.929] ccic_register_s2mu106: 0x18 = 0xe2
2263[0: 0.935] ccic_register_s2mu106: 0xb2 = 0x0
2264[0: 0.949] get_vbvolt: apple: 0x00, dev3: 0x00
2265[0: 0.954] get_vbvolt: vbvolt: 0x00
2266[0: 0.960] ccic_register_s2mu106: BEFORE VBUS(0)
2267[0: 0.967] s2mu106 found.
2268[0: 0.970] mach_board_initialize: Active ccic device.
2269[0: 0.975] ifconn_init: CCIC Mode
2270[0: 0.979] ifconn_get_jig_status: CCIC Mode
2271[0: 0.983] ccic_read_adc:
2272[0: 0.986] s2mu106_read_adc:
2273[0: 0.990] s2mu106_read_adc: RID = 00(RID_0)
2274[0: 0.995] ifconn_is_ccic_jig_device: rid=00
2275[0: 0.999] ccic_wait_auth:
2276[0: 1. 1] s2mu106_muic_get_adc_value: ADC:0x1f
2277[0: 1. 1] ccic_read_adc:
2278[0: 1. 1] s2mu106_read_adc:
2279[0: 1. 2] s2mu106_read_adc: RID = 00(RID_0)
2280[0: 1. 2] board_ccic_check_uart: jig_adc=1f, cc_adc=00
2281[0: 1. 2] ccic_read_adc:
2282[0: 1. 2] s2mu106_read_adc:
2283[0: 1. 3] s2mu106_read_adc: RID = 00(RID_0)
2284[0: 1. 3] ifconn_com_to_open:
2285[0: 1. 6] s2mu106_set_muic_uart_early: MUIC: MAN_SW1[0x00]
2286[0: 1.143] load Secure Payload done.
2287[0: 1.153]
2288Chip ID : 670d6c4d1082
2289[0: 1.153] EL3 Monitor information:
2290[0: 1.153] No tag info No git info ilkyungkim
2291
2292[0: 1.153] DREX_CALIBRATION3: 0xb001717
2293[0: 1.153] MMC Init
2294[0: 1.153] MMC0 400Khz 1 bit mode
2295[0: 1.283] EXT_CSD structure version 8
2296[0: 1.283] cardtype: 0x00000007
2297[0: 1.283] MMC RST_n_FUNCTION was already enabled
2298[0: 1.284] mmc->card_caps: 0x00000f11
2299[0: 1.284] mmc->host_caps: 0x00000f11
2300[0: 1.284] !!!Enter 8 Bit DDR mode.!!!
2301[0: 1.285] MMC0 52Mhz 8bit DDR mode
2302[0: 1.285] MMC0 capacity = 61071360
2303[0: 1.285] MMC0 vendor: 0x15
2304[0: 1.285] MMC0 PNM: 0x424a54443452
2305[0: 1.285] MMC0 MD: 2020 5
2306[0: 1.285] MMC0 FW: 0x03
2307[0: 1.289] MMC0(0x15) LVD reset count : 0
2308[0: 1.289]
2309[Debug Info.]
2310[0: 1.289] S-BOOT : VERSION_-+L0
2311[0: 1.295] GetSignerVer : SignerVer02
2312[0: 1.295] - read_bl1
2313[0: 1.295] blk_bread_bootsector: MMC mode
2314[0: 1.303] Verify_Signature_With_Signingtype 0x90d20130 5184@0x90d10000, 256@0x90d20030
2315[0: 1.305] pit_check_signature (PIT) valid.
2316[0: 1.313] PARAM ENV VERSION: v1.0..
2317[0: 1.315] blk_bread_bootsectorB: MMC mode in 2nd partition
2318[0: 1.315] MMC0 emmc_bootpart_2_open: 2nd partition open
2319[0: 1.317] MMC0 emmc_bootpart_2_close: 2nd partition close
2320[0: 1.319] initialize_ddi_data: usable! (89:0x30f), warranty reason : (0x0e03)
2321[0: 1.319] MAGIC_RAM_BASE: 0, MAGIC_RAM_BASE2: 61685f6f, ompin: 0
2322[0: 1.319] [ldfw] Pass LDFW partition!
2323[0: 1.319] [ldfw] read whole CM partition from the storage
2324[0: 1.419] ldfw: 0th ldfw's version 0x40191220 name : CryptoManagerV40
2325[0: 1.419] ldfw: 1th ldfw's version 0x20181224 name : fmp_fw_V20
2326[0: 1.419] ldfw: 2th ldfw's version 0x20191209 name : drm_fw
2327[0: 1.419] ldfw: 3th ldfw's version 0x24190110 name : srpmb_fw
2328[0: 1.419] ldfw: 4th ldfw's version 0x20181224 name : hdcp_fw
2329[0: 1.419] ldfw: 5th ldfw's version 0x20150828 name : tail_fw
2330[0: 1.420] GetSignerVer : SignerVer02
2331[0: 1.420] ldfw: init ldfw(s). whole ldfws size 0x3ec210
2332[0: 1.490] [ldfw] try to init 5 ldfw(s). except 0 ldfw 5 ldfw(s) have been inited done.
2333[0: 1.506] [TEEGRIS] register handler1, ret = 0x0
2334[0: 1.516] [TEEGRIS] register handler2, ret = 0x0
2335[0: 1.516] [TEEGRIS] disable handler registeration, ret = 0x0
2336[0: 1.516] [OTP] MODEL_ID read start
2337[0: 1.516] [OTP] MODEL_ID read value: 0x37
2338[0: 1.516] [OTP] BAN_ROM_SEC_BOOT_KEY read start
2339[0: 1.516] [OTP] BAN_ROM_SEC_BOOT_KEY read value: 0x0
2340[0: 1.516] [OTP] USE_ROM_SEC_BOOT_KEY read: start
2341[0: 1.516] [OTP] USE_ROM_SEC_BOOT_KEY read value: 0x0
2342[0: 1.516] [OTP] ENABLE_AES read start
2343[0: 1.516] [OTP] ENABLE_AES read value: 0x0
2344[0: 1.516] [OTP] PREORDER read start
2345[0: 1.516] [OTP] PREORDER read value: 0x1
2346[0: 1.516] [OTP] ANTIRBK_NS_AP0 read start
2347[0: 1.516] [OTP] ANTIRBK_NS_AP0 read value: 0x3
2348[0: 1.516] [OTP] COMMERCIAL read start
2349[0: 1.516] [OTP] COMMERCIAL read value: 0x1
2350[0: 1.516] [OTP] TEST read start
2351[0: 1.516] [OTP] TEST read value: 0x0
2352[0: 1.516] [OTP] WARRANTY read start
2353[0: 1.516] [OTP] WARRANTY read value: 0x1
2354[0: 1.516] [OTP] JTAG_SW_LOCK read start
2355[0: 1.516] [OTP] JTAG_SW_LOCK read value: 0x1
2356[0: 1.516] [OTP] CUSTOM_FLAG read start (6)
2357[0: 1.516] [OTP] CUSTOM_FLAG read value: 0x0
2358[0: 1.516] [OTP] CUSTOM_FLAG read start (7)
2359[0: 1.516] [OTP] CUSTOM_FLAG read value: 0x1
2360[0: 1.516] [OTP] CUSTOM_FLAG read start (8)
2361[0: 1.516] [OTP] CUSTOM_FLAG read value: 0x1
2362[0: 1.516] [OTP] CUSTOM_FLAG read start (9)
2363[0: 1.516] [OTP] CUSTOM_FLAG read value: 0x0
2364[0: 1.516] [OTP] ENABLE_ANTIRBK read start
2365[0: 1.516] [OTP] ENABLE_ANTIRBK read value: 0x1
2366[0: 1.516] [OTP] USE_PREORDER_KEY read start
2367[0: 1.516] [OTP] USE_PREORDER_KEY read value: 0x1
2368[0: 1.516] [OTP] ENABLE_MODEL_ID read start
2369[0: 1.516] [OTP] ENABLE_MODEL_ID read value: 0x1
2370[0: 1.516] [OTP] CUSTOM_FLAG read start (15)
2371[0: 1.516] [OTP] CUSTOM_FLAG read value: 0x1
2372[0: 1.516] [OTP] CUSTOM_FLAG read start (16)
2373[0: 1.516] [OTP] CUSTOM_FLAG read value: 0x0
2374[0: 1.516] [EFUSE] SMC Read the 0x0 ...
2375[0: 1.516] [EFUSE] SMC Read Count value: 3
2376[0: 1.516] [EFUSE] SMC Read the 0x1 ...
2377[0: 1.516] [EFUSE] SMC Read Count value: 1
2378[0: 1.516] [EFUSE] SMC Read the 0x2 ...
2379[0: 1.516] [EFUSE] SMC Read Count value: 0
2380[0: 1.516] [EFUSE] SMC Read the 0x3 ...
2381[0: 1.516] [EFUSE] SMC Read Count value: 1
2382[0: 1.516] [OTP] JTAG_KEY check start
2383[0: 1.516] [OTP] JTAG_KEY check: valid key
2384[0: 1.516] (1,55) vs (1,55)
2385[0: 1.516] JTAG_LOCK is already enabled in this device.
2386[0: 1.516] [EFUSE] Already fused for Market status
2387[0: 1.517] check_secure_ch_key_prov_flag : Flag is detected
2388[0: 1.517] [EFUSE] This is commercial device.
2389[0: 1.517] Secure camera - invalid fastcall id ffffffff
2390[0: 1.517] blk_rpmb_open: MMC mode
2391[0: 1.517] MMC0 RPMB emmc_rpmb_open:
2392[0: 1.517] blk_rpmb_read_data: MMC mode
2393[0: 1.518] HMAC compare success
2394[0: 1.518] RPMB: HMAC:
2395[0: 1.518]
2396[0: 1.518] MMC0 RPMB Get DATA success
2397
2398initialize_secdata_rpmb: usable! (0x52504d42), 1
2399[0: 1.518] set_fuse_history : no reason
2400[0: 1.518] fuse history 0x1
2401[0: 1.518] blk_rpmb_close: MMC mode
2402[0: 1.518] MMC0 RPMB emmc_rpmb_close:
2403[0: 1.518] blk_rpmb_open: MMC mode
2404[0: 1.518] MMC0 RPMB emmc_rpmb_open:
2405[0: 1.519] blk_rpmb_read_data: MMC mode
2406[0: 1.521] HMAC compare success
2407[0: 1.521] RPMB: HMAC:
2408[0: 1.521]
2409[0: 1.521] MMC0 RPMB Get DATA success
2410
2411blk_rpmb_close: MMC mode
2412[0: 1.521] MMC0 RPMB emmc_rpmb_close:
2413[0: 1.521] blk_rpmb_open: MMC mode
2414[0: 1.521] MMC0 RPMB emmc_rpmb_open:
2415[0: 1.522] blk_rpmb_read_data: MMC mode
2416[0: 1.523] HMAC compare success
2417[0: 1.523] RPMB: HMAC:
2418[0: 1.523]
2419[0: 1.523] MMC0 RPMB Get DATA success
2420
2421blk_rpmb_read_data: MMC mode
2422[0: 1.524] HMAC compare success
2423[0: 1.524] RPMB: HMAC:
2424[0: 1.524]
2425[0: 1.524] MMC0 RPMB Get DATA success
2426
2427blk_rpmb_close: MMC mode
2428[0: 1.524] MMC0 RPMB emmc_rpmb_close:
2429[0: 1.524] blk_rpmb_open: MMC mode
2430[0: 1.524] MMC0 RPMB emmc_rpmb_open:
2431[0: 1.525] blk_rpmb_read_data: MMC mode
2432[0: 1.527] HMAC compare success
2433[0: 1.527] RPMB: HMAC:
2434[0: 1.527]
2435[0: 1.527] MMC0 RPMB Get DATA success
2436
2437blk_rpmb_read_data: MMC mode
2438[0: 1.528] HMAC compare success
2439[0: 1.528] RPMB: HMAC:
2440[0: 1.528]
2441[0: 1.528] MMC0 RPMB Get DATA success
2442
2443blk_rpmb_close: MMC mode
2444[0: 1.528] MMC0 RPMB emmc_rpmb_close:
2445[0: 1.528]
2446[0: 1.528] blk_rpmb_open: MMC mode
2447[0: 1.528] MMC0 RPMB emmc_rpmb_open:
2448[0: 1.529] blk_rpmb_read_data: MMC mode
2449[0: 1.530] HMAC compare success
2450[0: 1.530] RPMB: HMAC:
2451[0: 1.530]
2452[0: 1.530] MMC0 RPMB Get DATA success
2453
2454ace_hash_sha_digest: passed.(0)
2455[0: 1.531] [KG] valid hash.
2456[0: 1.531] [KG] 'Checking' state.
2457[0: 1.531] blk_rpmb_close: MMC mode
2458[0: 1.531] MMC0 RPMB emmc_rpmb_close:
2459[0: 1.531] get_sec_secu_cond
2460[0: 1.531] DDR SIZE: 3G
2461[0: 1.531] LPDDR4 manufacturer : Micron
2462[0: 1.531] PRO_ID : 4010000
2463[0: 1.551] [TMU: 0] 31
2464[0: 1.571] [TMU: 1] 30
2465[0: 1.571] set_rdx_mask: 0x20000
2466[0: 1.571] set_rdx_mask: 0xa0000
2467[0: 1.571] check_reset_reason: RamBase: 0 / INF2: 12345678 / INF3: abc0ead5 / RST: 20000000
2468[0: 1.571] set_reset_reason: reason as 5
2469[0: 1.571] update_rcnt: not supported
2470[0: 1.571] [MUIC] print_init_regs
2471[0: 1.575] CTRL[1:17, 2:0x9d, 3:0xdd]
2472[0: 1.578] INTMASK[1:0x00, 2:0x00]
2473[0: 1.582] DEV_TYPE[1:0x00, 2:0x00, 3:0x00]
2474[0: 1.583] MAN_SW[0x00]
2475[0: 1.584] RST[0x00]
2476[0: 1.584]
2477[0: 1.584] adc_read_temp temp_adc = 2027, temp = 25
2478[0: 1.585] adc_read_temp: write battery temp data : 0x19(25)
2479[0: 1.587] init_ific: s2mu106 0x11 (rev:0x1)
2480[0: 1.589] keep_charger_status : 0x95 : 0xa5
2481[0: 1.596] ifconn_get_jig_status_vb: CCIC Mode
2482[0: 1.596] ccic_read_adc:
2483[0: 1.596] s2mu106_read_adc:
2484[0: 1.597] s2mu106_read_adc: RID = 00(RID_0)
2485[0: 1.600] get_vbvolt: apple: 0x00, dev3: 0x00
2486[0: 1.600] get_vbvolt: vbvolt: 0x00
2487[0: 1.600] ifconn_is_ccic_jig_device_vb: rid=00 vbus=0
2488[0: 1.616] [DEBUG]disable_factory_mode: DISABLE FACTORY MODE
2489[0: 1.620] kick_charger_watchdog: CHG fault status : x00
2490[0: 1.622] kick_charger_watchdog: CHG_CTRL0 : x03
2491[0: 1.625] set_charger_watchdog: state(1), reg_data(0x1b)
2492[0: 1.627] [DEBUG]set_regulation_voltage: S2MU106_CHG_CTRL5 => 0x5a
2493[0: 1.629] [DEBUG]set_regulation_voltage: float_voltage change to 4350, 0x5a
2494[0: 1.636] set_charger_current : S2MU106_CHG_CTRL7 : (2000)0x27
2495[0: 1.636] ifconn_get_charger_status:
2496[0: 1.639] get_vbvolt: apple: 0x00, dev3: 0x00
2497[0: 1.639] get_vbvolt: vbvolt: 0x00
2498[0: 1.639] ccic_read_adc:
2499[0: 1.639] s2mu106_read_adc:
2500[0: 1.640] s2mu106_read_adc: RID = 00(RID_0)
2501[0: 1.640] ccic_is_valid_charger: Invalid charger
2502[0: 1.640] ifconn_get_charger_status: valid_charger=0
2503[0: 1.646] set_cool_charger_current : S2MU106_CHG_CTRL6 : (450)0x88
2504[0: 1.646] ifconn_is_hc_cable:
2505[0: 1.646] ifconn_get_device:
2506[0: 1.647] s2mu106_muic_get_adc_value: ADC:0x1f
2507[0: 1.647] ifconn_is_muic_jig_device: adc=0x1f
2508[0: 1.647] ccic_read_adc:
2509[0: 1.647] s2mu106_read_adc:
2510[0: 1.648] s2mu106_read_adc: RID = 00(RID_0)
2511[0: 1.648] ifconn_is_ccic_jig_device: rid=00
2512[0: 1.648] ifconn_is_hc_cable: adc=0x1f
2513[0: 1.651] get_vbvolt: apple: 0x00, dev3: 0x00
2514[0: 1.651] get_vbvolt: vbvolt: 0x00
2515[0: 1.651] s2mu106_muic_get_attached_device_ex: no vbus
2516[0: 1.652] set_precharge_current: set charge current(in:500, out:450)
2517[0: 1.656] set_charger_current : S2MU106_CHG_CTRL7 : (450)0x08
2518[0: 1.660] set_charger_state : S2MU106_CHG_CTRL0 : 0x3
2519[0: 1.663] ReadFGRegisterWord: REG(0x5) = 0x881d
2520[0: 1.665] ReadFGRegisterWord: REG(0x5) = 0x881d
2521[0: 1.665] fuel_gauge_read_vcell: vbat (4253)
2522[0: 1.669] set_charger_state : S2MU106_CHG_CTRL0 : 0x1
2523[0: 1.719] ifconn_get_device:
2524[0: 1.721] s2mu106_muic_get_adc_value: ADC:0x1f
2525[0: 1.721] ifconn_is_muic_jig_device: adc=0x1f
2526[0: 1.721] ccic_read_adc:
2527[0: 1.721] s2mu106_read_adc:
2528[0: 1.722] s2mu106_read_adc: RID = 00(RID_0)
2529[0: 1.722] ifconn_is_ccic_jig_device: rid=00
2530[0: 1.726] jig_switch_control: 0x25 -> 0x50
2531[0: 1.730] jig_switch_control: POR state = 0x00, 0x1E = 0x 3, data_ver = 0x2(0x2), factory_mode(0), jig_status(0)
2532[0: 1.733] ReadFGRegisterWord: REG(0x5) = 0x881d
2533[0: 1.735] ReadFGRegisterWord: REG(0x5) = 0x881d
2534[0: 1.735] fuel_gauge_read_vcell: vbat (4253)
2535[0: 1.735] jig_switch_control: Fuelgauge is Already initialized
2536[0: 1.739] set_charger_state : S2MU106_CHG_CTRL0 : 0x3
2537[0: 1.742] ReadFGRegisterWord: REG(0x9) = 0x3f4a
2538[0: 1.745] ReadFGRegisterWord: REG(0x9) = 0x3f4a
2539[0: 1.745] fuel_gauge_read_soc_four_digits: raw capacity (0x3f4a:9888)
2540[0: 1.747] ReadFGRegisterWord: REG(0x5) = 0x881d
2541[0: 1.750] ReadFGRegisterWord: REG(0x5) = 0x881d
2542[0: 1.750] fuel_gauge_read_vcell: vbat (4253)
2543[0: 1.750] init_fuel_gauge: SOC(9888), VCELL(4253)
2544[0: 1.750] PMIC_ID = 0x04
2545[0: 1.750] PMIC_INT1 = 0x00
2546[0: 1.750] PMIC_INT2 = 0x10 RTC1S
2547[0: 1.750] PMIC_INT3 = 0xc0 MRBF MRBR
2548[0: 1.750] PMIC_STATUS1 = 0x1b PWRON JIGONB MRB RSVD
2549[0: 1.750] PMIC_STATUS2 = 0x00
2550[0: 1.750] PMIC_PWRONSRC = 0x08 MRST
2551[0: 1.750] PMIC_OFFSRC = 0x00
2552[0: 1.750] PMIC_RTC_CTRL = 0x02
2553[0: 1.750] PMIC_RTC_SMPL = 0x03
2554[0: 1.751] RTC TIME: 2020-12-08 08:21:22(0x04)AM
2555[0: 1.751] PMIC MON[0] = [0x0c: 0x14]
2556[0: 1.751] PMIC MON[1] = [0x0e: 0x44]
2557[0: 1.751] PMIC MON[2] = [0x09: 0x00]
2558[0: 1.751] PMIC MON[3] = [0x04: 0xff]
2559[0: 1.751] PMIC MON[4] = [0x0c: 0x14]
2560[0: 1.751] PMIC MON[5] = [0x0e: 0x44]
2561[0: 1.751] PMIC MON[6] = [0x0c: 0x14]
2562[0: 1.751] PMIC MON[7] = [0x0e: 0x44]
2563[0: 1.751] s5p_check_keypad: 0x0
2564[0: 1.751] s5p_check_reboot_mode: INFORM3 = abc0ead5 ... skip
2565[0: 1.757] [EMC]Token does not exist
2566[0: 1.757] get_force_upload_mode: param value: 0x0
2567[0: 1.757] s5p_check_upload: DL: 4f4c FU: 1
2568[0: 1.757] 0x4f4c: MRST enabled
2569[0: 1.757] s5p_check_upload: RamBase: 0 / INF2: 12345678 / INF3: abc0ead5 / RST: 20000000
2570[0: 1.758] s2mu106_muic_get_adc_value: ADC:0x1f
2571[0: 1.758] s5p_check_upload: debug level is LO! (fu: 1, mask: 0x0)
2572[0: 1.758] get_force_upload_mode: param value: 0x0
2573[0: 1.758] get_force_upload_mode: param value: 0x0
2574[0: 1.758] s5p_check_upload: disable dump_gpr
2575[0: 1.758] Disable dumpGPR - 0x0
2576[0: 1.758] s5p_check_download: 0
2577[0: 1.758] mach_board_main: recovery set!(0x80000)
2578[0: 1.765] s2mu106_muic_get_attached_device: INT[1:0x00, 2:0x00]
2579[0: 1.765] s2mu106_muic_get_attached_device: DEV[1:0x00, 2:0x00, 3:0x00]
2580[0: 1.768] get_vbvolt: apple: 0x00, dev3: 0x00
2581[0: 1.768] get_vbvolt: vbvolt: 0x00
2582[0: 1.768] ccic_get_jig_status:
2583[0: 1.768] ccic_read_adc:
2584[0: 1.768] s2mu106_read_adc:
2585[0: 1.769] s2mu106_read_adc: RID = 00(RID_0)
2586[0: 1.769] ifconn_get_charger_status:
2587[0: 1.772] get_vbvolt: apple: 0x00, dev3: 0x00
2588[0: 1.772] get_vbvolt: vbvolt: 0x00
2589[0: 1.772] ccic_read_adc:
2590[0: 1.772] s2mu106_read_adc:
2591[0: 1.773] s2mu106_read_adc: RID = 00(RID_0)
2592[0: 1.773] ccic_is_valid_charger: Invalid charger
2593[0: 1.773] ifconn_get_charger_status: valid_charger=0
2594[0: 1.773] adc_read_temp temp_adc = 2026, temp = 25
2595[0: 1.773] adc_read_temp: write battery temp data : 0x19(25)
2596[0: 1.774] check_pm_status: bat_temp=25, chg=0
2597[0: 1.774] check_pm_status: normal reset, do not enter LPM mode.
2598[0: 1.777] ReadFGRegisterWord: REG(0x5) = 0x881d
2599[0: 1.780] ReadFGRegisterWord: REG(0x5) = 0x881d
2600[0: 1.780] fuel_gauge_read_vcell: vbat (4253)
2601[0: 1.780] bl_vib
2602[0: 1.927] LoadJPEG took 46 msec
2603[0: 1.940] read 'booting_warning.jpg'(49516) completed.
2604[0: 1.951] LoadJPEG took 10 msec
2605[0: 1.952] init_display_clk: 12061020( 0), 1206183C( 2)
2606[0: 1.952] init_display_clk: 14800120( 10), 14801828( 1)
2607[0: 1.952] exynos7885_dual_mipi_phy_control, 1
2608[0: 2. 56] dsi_read: da: 11,
2609[0: 2. 56] dsi_read: db: 62,
2610[0: 2. 56] dsi_read: dc: 30,
2611[0: 2. 56] 11, 62, 30, 0x116230
2612[0: 2. 56] 1st panel CU IC.
2613[0: 2.121] set_tzpc_secureport: successfully protected 0
2614[0: 2.175] blk_bwrite: MMC mode
2615[0: 2.177] blk_bwrite: MMC mode
2616[0: 2.181] blk_bwrite: MMC mode
2617[0: 2.184] blk_bwrite: MMC mode
2618[0: 2.187] Set debug level to low(4f4c)
2619[0: 2.187] blk_bwrite: MMC mode
2620[0: 2.190] Set upload mode to disable(0)
2621[0: 2.190] Disable dumpGPR - 0x0
2622[0: 2.190] load_kernel: disable dump_gpr
2623[0: 2.190] 0x4f4c: MRST enabled
2624[0: 2.190] load_kernel: loading boot image from 301056..
2625[0: 2.195] kernel size = 0x1bcd800, ramdisk size = 0x6af000
2626[0: 2.195] Backup dtbo_size:0x0, dtbo_actual:0x0
2627[0: 2.195] RPMB : LOCK state (0)
2628[0: 2.195] patch_month_year : 11.20 , os_version : 10.0.0
2629[0: 2.195] [CM] set os_version & patch_month_year: start
2630[0: 2.195] [CM] set os_version & patch_month_year: success
2631[0: 2.195] device_locked : 0
2632[0: 2.195] [CM] set device_state: start
2633[0: 2.195] [CM] set device_state: success
2634[0: 2.195] verified_boot_state : 2
2635[0: 2.195] [CM] set boot_state: start
2636[0: 2.195] [CM] set boot_state: success
2637[0: 2.195] [Fchandler]Jenkins build #21
2638[0: 2.195] avbops functions are set successfully
2639[0: 2.195] RPMB : LOCK state (0)
2640[0: 2.195] avb_slot_verify.c:818: DEBUG: Loading vbmeta struct from partition 'VBMETA'.
2641avb_slot_verify.c:935: ERROR: VBMETA: Error verifying vbmeta image: OK_NOT_SIGNED
2642avb_slot_verify.c:1100: DEBUG: VBMETA: VERIFICATION_DISABLED bit is set.
2643avb_slot_verify.c:705: DEBUG: bootloader: Loading entire partition.
2644blk_bread_bootsector: MMC mode
2645[0: 2.250] RPMB : LOCK state (0)
2646[0: 2.250] avb_slot_verify.c:705: DEBUG: cm: Loading entire partition.
2647RPMB : LOCK state (0)
2648[0: 2.352] avb_slot_verify.c:705: DEBUG: dtb: Loading entire partition.
2649RPMB : LOCK state (0)
2650[0: 2.450] avb_slot_verify.c:705: DEBUG: dtbo: Loading entire partition.
2651RPMB : LOCK state (0)
2652[0: 2.552] avb_slot_verify.c:705: DEBUG: recovery: Loading entire partition.
2653RPMB : LOCK state (0)
2654[0: 3.199] [AVB 2.0 ERR] authentication fail [ret: 0x3] (orange)
2655[0: 3.199] avb_main : Check Samsung Secure Info
2656[0: 3.210] GetSignerVer : None
2657[0: 3.210] Verify_Signature_With_Signingtype 0x90d20130 272@0xb0000000, 256@0x90d20030
2658[0: 3.211] Verify_Signature_With_Signingtype: failed.(-18022398)
2659[0: 3.211] pit_check_signature (VBMETA) invalid.
2660[0: 3.211] set_ddi_kernel_type : VBMETA, 0x200
2661[0: 3.211] No need to update kernel type.
2662[0: 3.211] make_security_decisions : (VBMETA)
2663[0: 3.211] [KG] Non-block cases
2664[0: 3.211] RPMB : LOCK state (0)
2665[0: 3.212] [CC MODE] Failed. Invalid Magic
2666[0: 3.212] save_wb_snapshot: already saved
2667[0: 3.212] [EFUSE] warranty bit is already set.
2668[0: 3.212] avb_footer.c:41: ERROR: Footer magic is incorrect.
2669check_samsung_secure_info : Error validating footer (recovery)
2670[0: 3.843] footer is abnormal: 6
2671[0: 3.843] update_image_status_auth: Status for RECOVERY image is already custom
2672[0: 3.843] set_ddi_kernel_type : RECOVERY, 0x8
2673[0: 3.843] No need to update kernel type.
2674[0: 3.843] make_security_decisions : (RECOVERY)
2675[0: 3.843] [KG] Non-block cases
2676[0: 3.843] RPMB : LOCK state (0)
2677[0: 3.843] [CC MODE] Failed. Invalid Magic
2678[0: 3.843] save_wb_snapshot: already saved
2679[0: 3.843] [EFUSE] warranty bit is already set.
2680[0: 3.850] Verify_Signature_With_Signingtype 0x90d20130 90636@0xb0000000, 256@0x90d20030
2681[0: 3.852] pit_check_signature (DTB) valid.
2682[0: 3.854] blk_bwrite_bootsectorB: MMC mode in 2nd partition
2683[0: 3.854] MMC0 emmc_bootpart_2_open: 2nd partition open
2684[0: 3.856] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
2685[0: 3.856] MMC0 emmc_bootpart_2_close: 2nd partition close
2686[0: 3.860] if_ddi_data: succeeded. (0x30f)
2687[0: 3.861] update_image_status_info: DTB image status has been updated to 0x 2
2688[0: 3.861] update_image_status_auth: Status for DTB image is already official
2689[0: 3.861] set_ddi_kernel_type : DTB, 0x0
2690[0: 3.861] No need to update kernel type.
2691[0: 3.861] KERNEL RB count: DEVICE:3, BINARY:3 (DTB)
2692[0: 3.869] Verify_Signature_With_Signingtype 0x90d20130 188940@0xb0000000, 256@0x90d20030
2693[0: 3.871] pit_check_signature (DTBO) valid.
2694[0: 3.873] blk_bwrite_bootsectorB: MMC mode in 2nd partition
2695[0: 3.873] MMC0 emmc_bootpart_2_open: 2nd partition open
2696[0: 3.875] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
2697[0: 3.875] MMC0 emmc_bootpart_2_close: 2nd partition close
2698[0: 3.878] if_ddi_data: succeeded. (0x30f)
2699[0: 3.880] update_image_status_info: DTBO image status has been updated to 0x 2
2700[0: 3.880] update_image_status_auth: Status for DTBO image is already official
2701[0: 3.880] set_ddi_kernel_type : DTBO, 0x0
2702[0: 3.880] No need to update kernel type.
2703[0: 3.880] KERNEL RB count: DEVICE:3, BINARY:3 (DTBO)
2704[0: 3.880] avb_main : vbmeta type : 3
2705[0: 3.880] get_sign_info: (VBMETA)
2706[0: 3.890] GetSignerVer : None
2707[0: 3.895] read 'svb_orange.jpg'(72593) completed.
2708[0: 3.941] LoadJPEG took 45 msec
2709[0: 13.993] LoadJPEG took 46 msec
2710[0: 14. 5] read 'booting_warning.jpg'(49516) completed.
2711[0: 14. 15] LoadJPEG took 10 msec
2712avb_cmdline : root=PARTUUID=52444E41-494F-2044-7379-7374656D0000 androidboot.verifiedbootstate=orange
2713[0: 14.431] [TIMA trusted boot]: SEAndroid MAGIC failure (recovery.img)
2714[0: 14.431] [CM] erase public_key: start
2715[0: 14.431] [CM] erase public_key: success
2716[0: 14.489] [UFDT] FINDING DTB ENTRY
2717[0: 14.496] [UFDT] Find DT Entry[0]: Rev:(S:0, E:255, D:3)
2718[0: 14.496] [UFDT] FINDING DTBO ENTRY
2719[0: 14.496] [DTH] dt table header check Fail: <unknown error>
2720[0: 14.497]
2721[0: 14.497] Samsung S-Boot 4.0 for SM-A202F (Sep 25 2020 - 18:56:57 34672703)
2722[0: 14.497] EXYNOS7885 EVT 0.2 (Base on ARM CortexA50)
2723[0: 14.497] 3072MB / Rev 3 / A202FXXU3BTI7 / (PKG_ID 0xe7885000) / LOT_ID N0000 / SHIP /SW_RST (0x20000000)
2724[0: 14.497] Re init board for bootloader exceptionException: do_handler_sync: DABT_EL1(esr: 0x96000010)
2725[0: 14.997] PSTATE : [<600002c5>] ESR : [<96000010>]
2726[0: 14.997] PC : [<8f037b18>] LR : [<8f037c54>]
2727SP : [<8f16f940>]
2728[0: 14.997] r0: 8f348918 r1 : 8f16f480 r2 : 91a212ee
2729[0: 14.997] r3: 43 r4 : a r5 : bc600100
2730[0: 14.997] r6: 8f16f940 r7 : 8f16f940 r8 : cccccccccccccccd
2731[0: 14.997] r9: 8f16f2a0 r10 : 32 r11 : 0
2732[0: 14.997] r12: 5f643367006c616d r13 : 6700307472656c61 r14 : 7472656c615f6433
2733[0: 14.997] r15: 6c615f6433670031 r16 : 0 r17 : 0
2734[0: 14.997] r18: 8f35b1b0 r19 : 8f348918 r20 : 0
2735[0: 14.997] r21: 8f16fa08 r22 : b0000000 r23 : 8f171c80
2736[0: 14.997] r24: 8f0ec000 r25 : 49800 r26 : 8f170158
2737[0: 14.997] r27: 823bc810 r28 : 8f171460 r29 : 8f16f940
2738[0: 14.997] ===========================================
2739[0: 14.997] call_do_upload: go to upload mode
2740[0: 14.997] ===========================================
2741[0: 14.997] get_force_upload_mode: param value: 0x0
2742[0: 14.997] call_do_upload: just reboot for user
2743[0: 14.997] s5p_restart_handler ('N':bl_exception)
2744
2745[0: 14.997] s5p_restart_handler bl_exception 5
2746[0: 14.997] blk_close: MMC mode
2747[0: 15.398] Disable dumpGPR - 0x0
2748[0: 15.398] reset_prepare_board: disable asserting rstdisable L1/L2 cache
2749[0: 15.398] Disable dumpGPR - 0x0
2750[0: 0.686]
2751[0: 0.688] Samsung S-Boot 4.0 for SM-A202F (Sep 25 2020 - 18:56:57 34672703)
2752[0: 0.695] EXYNOS7885 EVT 0.2 (Base on ARM CortexA50)
2753[0: 0.700] 3072MB / Rev 3 / A202FXXU3BTI7 / (PKG_ID 0xe7885000) / LOT_ID NN75S / SHIP /SW_RST (0x20000000)
2754[0: 0.710] __if_pmic_rev_init - MUIC API is not ready!
2755[0: 0.717] PMUDBG_CENTRAL_SEQ_*: apsoc 0x0 mif 0x0 apm 0x0
2756[0: 0.722] PMUDBG_CL0_*: cpu0 0x104c0000 cpu1 0x104c0000 l2 0x10050000 noncpu 0x140000
2757[0: 0.731] PMUDBG_CL2_*: cpu0 0x104c0000 cpu1 0x104c0000
2758[0: 0.736] PMUDBG_CL1_*: cpu0 0x70000 cpu1 0x104c0000 cpu2 0x104c0000 cpu3 0x104c0000 l2 0x0 noncpu 0xc0000
2759[0: 0.746] RST_STAT: 0x20000000
2760[0: 0.750] s5p_check_dump_gpr: set sp loading flag
2761[0: 0.755] MMU: enable start
2762[0: 0.758] MMU: enable done
2763[0: 0.761] [MUIC] muic_register_s2mu106_apis
2764[0: 0.767] Try 0 : [MUIC] muic_test1:0x001.
2765[0: 0.771] -> matched(s2mu106).
2766[0: 0.775] init_multi_microusb_ic Active MUIC 0x01
2767[0: 0.781] s2mu106_muic_get_adc_value: ADC:0x1f
2768[0: 0.787] s2mu106_init_microusb_ic: MUIC: Enable BC1.2
2769[0: 0.793] s2mu106_init_microusb_ic: MUIC: CONTROL writing success.
2770[0: 0.802] s2mu106_init_microusb_ic: MUIC: CONTROL:0x17
2771[0: 0.810] s2mu106_init_microusb_ic: MUIC: TIMING3: 0x8d
2772[0: 0.822] s2mu106_muic_get_attached_device: INT[1:0x00, 2:0x00]
2773[0: 0.828] s2mu106_muic_get_attached_device: DEV[1:0x00, 2:0x00, 3:0x00]
2774[0: 0.838] get_vbvolt: apple: 0x00, dev3: 0x00
2775[0: 0.842] get_vbvolt: vbvolt: 0x00
2776[0: 0.846] ccic_register_s2mu106:
2777[0: 0.850] ccic_is_s2mu106:
2778[0: 0.854] ccic_is_s2mu106: reg:b2 - val:00 ret:00
2779[0: 0.860] ccic_register_s2mu106: 0x1 = 0x2
2780[0: 0.866] ccic_register_s2mu106: 0x2 = 0x9b
2781[0: 0.872] ccic_register_s2mu106: 0x3 = 0x98
2782[0: 0.877] ccic_register_s2mu106: 0x4 = 0x90
2783[0: 0.883] ccic_register_s2mu106: 0x5 = 0x99
2784[0: 0.889] ccic_register_s2mu106: 0x6 = 0x88
2785[0: 0.894] ccic_register_s2mu106: 0x7 = 0x47
2786[0: 0.900] ccic_register_s2mu106: 0x8 = 0xa
2787[0: 0.906] ccic_register_s2mu106: 0x9 = 0x0
2788[0: 0.911] ccic_register_s2mu106: 0xa = 0xe
2789[0: 0.917] ccic_register_s2mu106: 0xb = 0xd
2790[0: 0.923] ccic_register_s2mu106: 0xc = 0x90
2791[0: 0.928] ccic_register_s2mu106: 0x18 = 0xe2
2792[0: 0.934] ccic_register_s2mu106: 0xb2 = 0x0
2793[0: 0.948] get_vbvolt: apple: 0x00, dev3: 0x00
2794[0: 0.952] get_vbvolt: vbvolt: 0x00
2795[0: 0.959] ccic_register_s2mu106: BEFORE VBUS(0)
2796[0: 0.966] s2mu106 found.
2797[0: 0.969] mach_board_initialize: Active ccic device.
2798[0: 0.974] ifconn_init: CCIC Mode
2799[0: 0.977] ifconn_get_jig_status: CCIC Mode
2800[0: 0.982] ccic_read_adc:
2801[0: 0.985] s2mu106_read_adc:
2802[0: 0.989] s2mu106_read_adc: RID = 00(RID_0)
2803[0: 0.993] ifconn_is_ccic_jig_device: rid=00
2804[0: 0.998] ccic_wait_auth:
2805[0: 0.999] s2mu106_muic_get_adc_value: ADC:0x1f
2806[0: 0.999] ccic_read_adc:
2807[0: 0.999] s2mu106_read_adc:
2808[0: 1. 1] s2mu106_read_adc: RID = 00(RID_0)
2809[0: 1. 1] board_ccic_check_uart: jig_adc=1f, cc_adc=00
2810[0: 1. 1] ccic_read_adc:
2811[0: 1. 1] s2mu106_read_adc:
2812[0: 1. 2] s2mu106_read_adc: RID = 00(RID_0)
2813[0: 1. 2] ifconn_com_to_open:
2814[0: 1. 5] s2mu106_set_muic_uart_early: MUIC: MAN_SW1[0x00]
2815[0: 1.142] load Secure Payload done.
2816[0: 1.152]
2817Chip ID : 670d6c4d1082
2818[0: 1.152] EL3 Monitor information:
2819[0: 1.152] No tag info No git info ilkyungkim
2820
2821[0: 1.152] DREX_CALIBRATION3: 0xb001717
2822[0: 1.152] MMC Init
2823[0: 1.152] MMC0 400Khz 1 bit mode
2824[0: 1.276] EXT_CSD structure version 8
2825[0: 1.276] cardtype: 0x00000007
2826[0: 1.276] MMC RST_n_FUNCTION was already enabled
2827[0: 1.276] mmc->card_caps: 0x00000f11
2828[0: 1.276] mmc->host_caps: 0x00000f11
2829[0: 1.277] !!!Enter 8 Bit DDR mode.!!!
2830[0: 1.277] MMC0 52Mhz 8bit DDR mode
2831[0: 1.277] MMC0 capacity = 61071360
2832[0: 1.277] MMC0 vendor: 0x15
2833[0: 1.277] MMC0 PNM: 0x424a54443452
2834[0: 1.277] MMC0 MD: 2020 5
2835[0: 1.277] MMC0 FW: 0x03
2836[0: 1.282] MMC0(0x15) LVD reset count : 0
2837[0: 1.282]
2838[Debug Info.]
2839[0: 1.282] S-BOOT : VERSION_-+L0
2840[0: 1.287] GetSignerVer : SignerVer02
2841[0: 1.287] - read_bl1
2842[0: 1.287] blk_bread_bootsector: MMC mode
2843[0: 1.291] Verify_Signature_With_Signingtype 0x90d20130 5184@0x90d10000, 256@0x90d20030
2844[0: 1.293] pit_check_signature (PIT) valid.
2845[0: 1.301] PARAM ENV VERSION: v1.0..
2846[0: 1.303] blk_bread_bootsectorB: MMC mode in 2nd partition
2847[0: 1.303] MMC0 emmc_bootpart_2_open: 2nd partition open
2848[0: 1.305] MMC0 emmc_bootpart_2_close: 2nd partition close
2849[0: 1.308] initialize_ddi_data: usable! (89:0x30f), warranty reason : (0x0e03)
2850[0: 1.308] MAGIC_RAM_BASE: 0, MAGIC_RAM_BASE2: 61685f6f, ompin: 0
2851[0: 1.308] [ldfw] Pass LDFW partition!
2852[0: 1.308] [ldfw] read whole CM partition from the storage
2853[0: 1.408] ldfw: 0th ldfw's version 0x40191220 name : CryptoManagerV40
2854[0: 1.408] ldfw: 1th ldfw's version 0x20181224 name : fmp_fw_V20
2855[0: 1.408] ldfw: 2th ldfw's version 0x20191209 name : drm_fw
2856[0: 1.408] ldfw: 3th ldfw's version 0x24190110 name : srpmb_fw
2857[0: 1.408] ldfw: 4th ldfw's version 0x20181224 name : hdcp_fw
2858[0: 1.408] ldfw: 5th ldfw's version 0x20150828 name : tail_fw
2859[0: 1.408] GetSignerVer : SignerVer02
2860[0: 1.408] ldfw: init ldfw(s). whole ldfws size 0x3ec210
2861[0: 1.479] [ldfw] try to init 5 ldfw(s). except 0 ldfw 5 ldfw(s) have been inited done.
2862[0: 1.494] [TEEGRIS] register handler1, ret = 0x0
2863[0: 1.504] [TEEGRIS] register handler2, ret = 0x0
2864[0: 1.504] [TEEGRIS] disable handler registeration, ret = 0x0
2865[0: 1.504] [OTP] MODEL_ID read start
2866[0: 1.504] [OTP] MODEL_ID read value: 0x37
2867[0: 1.504] [OTP] BAN_ROM_SEC_BOOT_KEY read start
2868[0: 1.504] [OTP] BAN_ROM_SEC_BOOT_KEY read value: 0x0
2869[0: 1.504] [OTP] USE_ROM_SEC_BOOT_KEY read: start
2870[0: 1.504] [OTP] USE_ROM_SEC_BOOT_KEY read value: 0x0
2871[0: 1.504] [OTP] ENABLE_AES read start
2872[0: 1.504] [OTP] ENABLE_AES read value: 0x0
2873[0: 1.504] [OTP] PREORDER read start
2874[0: 1.504] [OTP] PREORDER read value: 0x1
2875[0: 1.504] [OTP] ANTIRBK_NS_AP0 read start
2876[0: 1.504] [OTP] ANTIRBK_NS_AP0 read value: 0x3
2877[0: 1.504] [OTP] COMMERCIAL read start
2878[0: 1.504] [OTP] COMMERCIAL read value: 0x1
2879[0: 1.504] [OTP] TEST read start
2880[0: 1.504] [OTP] TEST read value: 0x0
2881[0: 1.504] [OTP] WARRANTY read start
2882[0: 1.504] [OTP] WARRANTY read value: 0x1
2883[0: 1.504] [OTP] JTAG_SW_LOCK read start
2884[0: 1.505] [OTP] JTAG_SW_LOCK read value: 0x1
2885[0: 1.505] [OTP] CUSTOM_FLAG read start (6)
2886[0: 1.505] [OTP] CUSTOM_FLAG read value: 0x0
2887[0: 1.505] [OTP] CUSTOM_FLAG read start (7)
2888[0: 1.505] [OTP] CUSTOM_FLAG read value: 0x1
2889[0: 1.505] [OTP] CUSTOM_FLAG read start (8)
2890[0: 1.505] [OTP] CUSTOM_FLAG read value: 0x1
2891[0: 1.505] [OTP] CUSTOM_FLAG read start (9)
2892[0: 1.505] [OTP] CUSTOM_FLAG read value: 0x0
2893[0: 1.505] [OTP] ENABLE_ANTIRBK read start
2894[0: 1.505] [OTP] ENABLE_ANTIRBK read value: 0x1
2895[0: 1.505] [OTP] USE_PREORDER_KEY read start
2896[0: 1.505] [OTP] USE_PREORDER_KEY read value: 0x1
2897[0: 1.505] [OTP] ENABLE_MODEL_ID read start
2898[0: 1.505] [OTP] ENABLE_MODEL_ID read value: 0x1
2899[0: 1.505] [OTP] CUSTOM_FLAG read start (15)
2900[0: 1.505] [OTP] CUSTOM_FLAG read value: 0x1
2901[0: 1.505] [OTP] CUSTOM_FLAG read start (16)
2902[0: 1.505] [OTP] CUSTOM_FLAG read value: 0x0
2903[0: 1.505] [EFUSE] SMC Read the 0x0 ...
2904[0: 1.505] [EFUSE] SMC Read Count value: 3
2905[0: 1.505] [EFUSE] SMC Read the 0x1 ...
2906[0: 1.505] [EFUSE] SMC Read Count value: 1
2907[0: 1.505] [EFUSE] SMC Read the 0x2 ...
2908[0: 1.505] [EFUSE] SMC Read Count value: 0
2909[0: 1.505] [EFUSE] SMC Read the 0x3 ...
2910[0: 1.505] [EFUSE] SMC Read Count value: 1
2911[0: 1.505] [OTP] JTAG_KEY check start
2912[0: 1.505] [OTP] JTAG_KEY check: valid key
2913[0: 1.505] (1,55) vs (1,55)
2914[0: 1.505] JTAG_LOCK is already enabled in this device.
2915[0: 1.505] [EFUSE] Already fused for Market status
2916[0: 1.505] check_secure_ch_key_prov_flag : Flag is detected
2917[0: 1.505] [EFUSE] This is commercial device.
2918[0: 1.505] Secure camera - invalid fastcall id ffffffff
2919[0: 1.505] blk_rpmb_open: MMC mode
2920[0: 1.505] MMC0 RPMB emmc_rpmb_open:
2921[0: 1.506] blk_rpmb_read_data: MMC mode
2922[0: 1.508] HMAC compare success
2923[0: 1.508] RPMB: HMAC:
2924[0: 1.508]
2925[0: 1.508] MMC0 RPMB Get DATA success
2926
2927initialize_secdata_rpmb: usable! (0x52504d42), 1
2928[0: 1.508] set_fuse_history : no reason
2929[0: 1.508] fuse history 0x1
2930[0: 1.508] blk_rpmb_close: MMC mode
2931[0: 1.508] MMC0 RPMB emmc_rpmb_close:
2932[0: 1.508] blk_rpmb_open: MMC mode
2933[0: 1.508] MMC0 RPMB emmc_rpmb_open:
2934[0: 1.509] blk_rpmb_read_data: MMC mode
2935[0: 1.510] HMAC compare success
2936[0: 1.510] RPMB: HMAC:
2937[0: 1.510]
2938[0: 1.510] MMC0 RPMB Get DATA success
2939
2940blk_rpmb_close: MMC mode
2941[0: 1.510] MMC0 RPMB emmc_rpmb_close:
2942[0: 1.510] blk_rpmb_open: MMC mode
2943[0: 1.510] MMC0 RPMB emmc_rpmb_open:
2944[0: 1.511] blk_rpmb_read_data: MMC mode
2945[0: 1.512] HMAC compare success
2946[0: 1.512] RPMB: HMAC:
2947[0: 1.512]
2948[0: 1.513] MMC0 RPMB Get DATA success
2949
2950blk_rpmb_read_data: MMC mode
2951[0: 1.514] HMAC compare success
2952[0: 1.514] RPMB: HMAC:
2953[0: 1.514]
2954[0: 1.514] MMC0 RPMB Get DATA success
2955
2956blk_rpmb_close: MMC mode
2957[0: 1.514] MMC0 RPMB emmc_rpmb_close:
2958[0: 1.514] blk_rpmb_open: MMC mode
2959[0: 1.514] MMC0 RPMB emmc_rpmb_open:
2960[0: 1.515] blk_rpmb_read_data: MMC mode
2961[0: 1.516] HMAC compare success
2962[0: 1.516] RPMB: HMAC:
2963[0: 1.516]
2964[0: 1.516] MMC0 RPMB Get DATA success
2965
2966blk_rpmb_read_data: MMC mode
2967[0: 1.517] HMAC compare success
2968[0: 1.517] RPMB: HMAC:
2969[0: 1.517]
2970[0: 1.518] MMC0 RPMB Get DATA success
2971
2972blk_rpmb_close: MMC mode
2973[0: 1.518] MMC0 RPMB emmc_rpmb_close:
2974[0: 1.518]
2975[0: 1.518] blk_rpmb_open: MMC mode
2976[0: 1.518] MMC0 RPMB emmc_rpmb_open:
2977[0: 1.519] blk_rpmb_read_data: MMC mode
2978[0: 1.520] HMAC compare success
2979[0: 1.520] RPMB: HMAC:
2980[0: 1.520]
2981[0: 1.520] MMC0 RPMB Get DATA success
2982
2983ace_hash_sha_digest: passed.(0)
2984[0: 1.520] [KG] valid hash.
2985[0: 1.520] [KG] 'Checking' state.
2986[0: 1.520] blk_rpmb_close: MMC mode
2987[0: 1.520] MMC0 RPMB emmc_rpmb_close:
2988[0: 1.520] get_sec_secu_cond
2989[0: 1.520] DDR SIZE: 3G
2990[0: 1.520] LPDDR4 manufacturer : Micron
2991[0: 1.520] PRO_ID : 4010000
2992[0: 1.540] [TMU: 0] 31
2993[0: 1.560] [TMU: 1] 30
2994[0: 1.560] set_rdx_mask: 0x20000
2995[0: 1.560] set_rdx_mask: 0xa0000
2996[0: 1.560] check_reset_reason: RamBase: 0 / INF2: 12345678 / INF3: abc0ead5 / RST: 20000000
2997[0: 1.560] set_reset_reason: reason as 5
2998[0: 1.560] update_rcnt: not supported
2999[0: 1.560] [MUIC] print_init_regs
3000[0: 1.564] CTRL[1:17, 2:0x9d, 3:0xdd]
3001[0: 1.567] INTMASK[1:0x00, 2:0x00]
3002[0: 1.571] DEV_TYPE[1:0x00, 2:0x00, 3:0x00]
3003[0: 1.573] MAN_SW[0x00]
3004[0: 1.574] RST[0x00]
3005[0: 1.574]
3006[0: 1.574] adc_read_temp temp_adc = 2019, temp = 25
3007[0: 1.574] adc_read_temp: write battery temp data : 0x19(25)
3008[0: 1.576] init_ific: s2mu106 0x11 (rev:0x1)
3009[0: 1.579] keep_charger_status : 0x95 : 0xa5
3010[0: 1.585] ifconn_get_jig_status_vb: CCIC Mode
3011[0: 1.585] ccic_read_adc:
3012[0: 1.585] s2mu106_read_adc:
3013[0: 1.586] s2mu106_read_adc: RID = 00(RID_0)
3014[0: 1.589] get_vbvolt: apple: 0x00, dev3: 0x00
3015[0: 1.589] get_vbvolt: vbvolt: 0x00
3016[0: 1.589] ifconn_is_ccic_jig_device_vb: rid=00 vbus=0
3017[0: 1.606] [DEBUG]disable_factory_mode: DISABLE FACTORY MODE
3018[0: 1.610] kick_charger_watchdog: CHG fault status : x00
3019[0: 1.611] kick_charger_watchdog: CHG_CTRL0 : x03
3020[0: 1.615] set_charger_watchdog: state(1), reg_data(0x1b)
3021[0: 1.616] [DEBUG]set_regulation_voltage: S2MU106_CHG_CTRL5 => 0x5a
3022[0: 1.619] [DEBUG]set_regulation_voltage: float_voltage change to 4350, 0x5a
3023[0: 1.626] set_charger_current : S2MU106_CHG_CTRL7 : (2000)0x27
3024[0: 1.626] ifconn_get_charger_status:
3025[0: 1.629] get_vbvolt: apple: 0x00, dev3: 0x00
3026[0: 1.629] get_vbvolt: vbvolt: 0x00
3027[0: 1.629] ccic_read_adc:
3028[0: 1.629] s2mu106_read_adc:
3029[0: 1.630] s2mu106_read_adc: RID = 00(RID_0)
3030[0: 1.630] ccic_is_valid_charger: Invalid charger
3031[0: 1.630] ifconn_get_charger_status: valid_charger=0
3032[0: 1.635] set_cool_charger_current : S2MU106_CHG_CTRL6 : (450)0x88
3033[0: 1.635] ifconn_is_hc_cable:
3034[0: 1.635] ifconn_get_device:
3035[0: 1.637] s2mu106_muic_get_adc_value: ADC:0x1f
3036[0: 1.637] ifconn_is_muic_jig_device: adc=0x1f
3037[0: 1.637] ccic_read_adc:
3038[0: 1.637] s2mu106_read_adc:
3039[0: 1.638] s2mu106_read_adc: RID = 00(RID_0)
3040[0: 1.638] ifconn_is_ccic_jig_device: rid=00
3041[0: 1.638] ifconn_is_hc_cable: adc=0x1f
3042[0: 1.641] get_vbvolt: apple: 0x00, dev3: 0x00
3043[0: 1.641] get_vbvolt: vbvolt: 0x00
3044[0: 1.641] s2mu106_muic_get_attached_device_ex: no vbus
3045[0: 1.642] set_precharge_current: set charge current(in:500, out:450)
3046[0: 1.646] set_charger_current : S2MU106_CHG_CTRL7 : (450)0x08
3047[0: 1.650] set_charger_state : S2MU106_CHG_CTRL0 : 0x3
3048[0: 1.652] ReadFGRegisterWord: REG(0x5) = 0x8815
3049[0: 1.655] ReadFGRegisterWord: REG(0x5) = 0x8815
3050[0: 1.655] fuel_gauge_read_vcell: vbat (4252)
3051[0: 1.659] set_charger_state : S2MU106_CHG_CTRL0 : 0x1
3052[0: 1.709] ifconn_get_device:
3053[0: 1.710] s2mu106_muic_get_adc_value: ADC:0x1f
3054[0: 1.710] ifconn_is_muic_jig_device: adc=0x1f
3055[0: 1.710] ccic_read_adc:
3056[0: 1.710] s2mu106_read_adc:
3057[0: 1.712] s2mu106_read_adc: RID = 00(RID_0)
3058[0: 1.712] ifconn_is_ccic_jig_device: rid=00
3059[0: 1.715] jig_switch_control: 0x25 -> 0x50
3060[0: 1.719] jig_switch_control: POR state = 0x00, 0x1E = 0x 3, data_ver = 0x2(0x2), factory_mode(0), jig_status(0)
3061[0: 1.722] ReadFGRegisterWord: REG(0x5) = 0x8815
3062[0: 1.725] ReadFGRegisterWord: REG(0x5) = 0x8815
3063[0: 1.725] fuel_gauge_read_vcell: vbat (4252)
3064[0: 1.725] jig_switch_control: Fuelgauge is Already initialized
3065[0: 1.729] set_charger_state : S2MU106_CHG_CTRL0 : 0x3
3066[0: 1.731] ReadFGRegisterWord: REG(0x9) = 0x3f44
3067[0: 1.734] ReadFGRegisterWord: REG(0x9) = 0x3f44
3068[0: 1.734] fuel_gauge_read_soc_four_digits: raw capacity (0x3f44:9885)
3069[0: 1.737] ReadFGRegisterWord: REG(0x5) = 0x8815
3070[0: 1.740] ReadFGRegisterWord: REG(0x5) = 0x8815
3071[0: 1.740] fuel_gauge_read_vcell: vbat (4252)
3072[0: 1.740] init_fuel_gauge: SOC(9885), VCELL(4252)
3073[0: 1.740] PMIC_ID = 0x04
3074[0: 1.740] PMIC_INT1 = 0x01 PWRONF
3075[0: 1.740] PMIC_INT2 = 0x10 RTC1S
3076[0: 1.740] PMIC_INT3 = 0xc0 MRBF MRBR
3077[0: 1.740] PMIC_STATUS1 = 0x0a JIGONB MRB
3078[0: 1.740] PMIC_STATUS2 = 0x00
3079[0: 1.740] PMIC_PWRONSRC = 0x08 MRST
3080[0: 1.740] PMIC_OFFSRC = 0x00
3081[0: 1.740] PMIC_RTC_CTRL = 0x02
3082[0: 1.740] PMIC_RTC_SMPL = 0x03
3083[0: 1.741] RTC TIME: 2020-12-08 08:21:38(0x04)AM
3084[0: 1.741] PMIC MON[0] = [0x0c: 0x14]
3085[0: 1.741] PMIC MON[1] = [0x0e: 0x44]
3086[0: 1.741] PMIC MON[2] = [0x09: 0x00]
3087[0: 1.741] PMIC MON[3] = [0x04: 0xff]
3088[0: 1.741] PMIC MON[4] = [0x0c: 0x14]
3089[0: 1.741] PMIC MON[5] = [0x0e: 0x44]
3090[0: 1.741] PMIC MON[6] = [0x0c: 0x14]
3091[0: 1.741] PMIC MON[7] = [0x0e: 0x44]
3092[0: 1.741] s5p_check_keypad: 0x0
3093[0: 1.741] s5p_check_reboot_mode: INFORM3 = abc0ead5 ... skip
3094[0: 1.746] [EMC]Token does not exist
3095[0: 1.746] get_force_upload_mode: param value: 0x0
3096[0: 1.746] s5p_check_upload: DL: 4f4c FU: 1
3097[0: 1.746] 0x4f4c: MRST enabled
3098[0: 1.746] s5p_check_upload: RamBase: 0 / INF2: 12345678 / INF3: abc0ead5 / RST: 20000000
3099[0: 1.748] s2mu106_muic_get_adc_value: ADC:0x1f
3100[0: 1.748] s5p_check_upload: debug level is LO! (fu: 1, mask: 0x0)
3101[0: 1.748] get_force_upload_mode: param value: 0x0
3102[0: 1.748] get_force_upload_mode: param value: 0x0
3103[0: 1.748] s5p_check_upload: disable dump_gpr
3104[0: 1.748] Disable dumpGPR - 0x0
3105[0: 1.748] s5p_check_download: 0
3106[0: 1.748] mach_board_main: recovery set!(0x80000)
3107[0: 1.755] s2mu106_muic_get_attached_device: INT[1:0x00, 2:0x00]
3108[0: 1.755] s2mu106_muic_get_attached_device: DEV[1:0x00, 2:0x00, 3:0x00]
3109[0: 1.757] get_vbvolt: apple: 0x00, dev3: 0x00
3110[0: 1.757] get_vbvolt: vbvolt: 0x00
3111[0: 1.757] ccic_get_jig_status:
3112[0: 1.757] ccic_read_adc:
3113[0: 1.757] s2mu106_read_adc:
3114[0: 1.759] s2mu106_read_adc: RID = 00(RID_0)
3115[0: 1.759] ifconn_get_charger_status:
3116[0: 1.761] get_vbvolt: apple: 0x00, dev3: 0x00
3117[0: 1.761] get_vbvolt: vbvolt: 0x00
3118[0: 1.761] ccic_read_adc:
3119[0: 1.761] s2mu106_read_adc:
3120[0: 1.763] s2mu106_read_adc: RID = 00(RID_0)
3121[0: 1.763] ccic_is_valid_charger: Invalid charger
3122[0: 1.763] ifconn_get_charger_status: valid_charger=0
3123[0: 1.763] adc_read_temp temp_adc = 2018, temp = 25
3124[0: 1.763] adc_read_temp: write battery temp data : 0x19(25)
3125[0: 1.764] check_pm_status: bat_temp=25, chg=0
3126[0: 1.764] check_pm_status: normal reset, do not enter LPM mode.
3127[0: 1.767] ReadFGRegisterWord: REG(0x5) = 0x8815
3128[0: 1.769] ReadFGRegisterWord: REG(0x5) = 0x8815
3129[0: 1.769] fuel_gauge_read_vcell: vbat (4252)
3130[0: 1.769] bl_vib
3131[0: 1.917] LoadJPEG took 46 msec
3132[0: 1.928] read 'booting_warning.jpg'(49516) completed.
3133[0: 1.938] LoadJPEG took 10 msec
3134[0: 1.939] init_display_clk: 12061020( 0), 1206183C( 2)
3135[0: 1.939] init_display_clk: 14800120( 10), 14801828( 1)
3136[0: 1.939] exynos7885_dual_mipi_phy_control, 1
3137[0: 2. 43] dsi_read: da: 11,
3138[0: 2. 44] dsi_read: db: 62,
3139[0: 2. 44] dsi_read: dc: 30,
3140[0: 2. 44] 11, 62, 30, 0x116230
3141[0: 2. 44] 1st panel CU IC.
3142[0: 2.108] set_tzpc_secureport: successfully protected 0
3143[0: 2.162] blk_bwrite: MMC mode
3144[0: 2.165] blk_bwrite: MMC mode
3145[0: 2.168] blk_bwrite: MMC mode
3146[0: 2.172] blk_bwrite: MMC mode
3147[0: 2.174] Set debug level to low(4f4c)
3148[0: 2.174] blk_bwrite: MMC mode
3149[0: 2.178] Set upload mode to disable(0)
3150[0: 2.178] Disable dumpGPR - 0x0
3151[0: 2.178] load_kernel: disable dump_gpr
3152[0: 2.178] 0x4f4c: MRST enabled
3153[0: 2.178] load_kernel: loading boot image from 301056..
3154[0: 2.182] kernel size = 0x1bcd800, ramdisk size = 0x6af000
3155[0: 2.182] Backup dtbo_size:0x0, dtbo_actual:0x0
3156[0: 2.182] RPMB : LOCK state (0)
3157[0: 2.182] patch_month_year : 11.20 , os_version : 10.0.0
3158[0: 2.182] [CM] set os_version & patch_month_year: start
3159[0: 2.182] [CM] set os_version & patch_month_year: success
3160[0: 2.182] device_locked : 0
3161[0: 2.182] [CM] set device_state: start
3162[0: 2.182] [CM] set device_state: success
3163[0: 2.182] verified_boot_state : 2
3164[0: 2.182] [CM] set boot_state: start
3165[0: 2.182] [CM] set boot_state: success
3166[0: 2.182] [Fchandler]Jenkins build #21
3167[0: 2.182] avbops functions are set successfully
3168[0: 2.182] RPMB : LOCK state (0)
3169[0: 2.182] avb_slot_verify.c:818: DEBUG: Loading vbmeta struct from partition 'VBMETA'.
3170avb_slot_verify.c:935: ERROR: VBMETA: Error verifying vbmeta image: OK_NOT_SIGNED
3171avb_slot_verify.c:1100: DEBUG: VBMETA: VERIFICATION_DISABLED bit is set.
3172avb_slot_verify.c:705: DEBUG: bootloader: Loading entire partition.
3173blk_bread_bootsector: MMC mode
3174[0: 2.238] RPMB : LOCK state (0)
3175[0: 2.238] avb_slot_verify.c:705: DEBUG: cm: Loading entire partition.
3176RPMB : LOCK state (0)
3177[0: 2.340] avb_slot_verify.c:705: DEBUG: dtb: Loading entire partition.
3178RPMB : LOCK state (0)
3179[0: 2.438] avb_slot_verify.c:705: DEBUG: dtbo: Loading entire partition.
3180RPMB : LOCK state (0)
3181[0: 2.540] avb_slot_verify.c:705: DEBUG: recovery: Loading entire partition.
3182RPMB : LOCK state (0)
3183[0: 3.182] [AVB 2.0 ERR] authentication fail [ret: 0x3] (orange)
3184[0: 3.182] avb_main : Check Samsung Secure Info
3185[0: 3.193] GetSignerVer : None
3186[0: 3.193] Verify_Signature_With_Signingtype 0x90d20130 272@0xb0000000, 256@0x90d20030
3187[0: 3.195] Verify_Signature_With_Signingtype: failed.(-18022398)
3188[0: 3.195] pit_check_signature (VBMETA) invalid.
3189[0: 3.195] set_ddi_kernel_type : VBMETA, 0x200
3190[0: 3.195] No need to update kernel type.
3191[0: 3.195] make_security_decisions : (VBMETA)
3192[0: 3.195] [KG] Non-block cases
3193[0: 3.195] RPMB : LOCK state (0)
3194[0: 3.195] [CC MODE] Failed. Invalid Magic
3195[0: 3.195] save_wb_snapshot: already saved
3196[0: 3.195] [EFUSE] warranty bit is already set.
3197[0: 3.195] avb_footer.c:41: ERROR: Footer magic is incorrect.
3198check_samsung_secure_info : Error validating footer (recovery)
3199[0: 3.826] footer is abnormal: 6
3200[0: 3.826] update_image_status_auth: Status for RECOVERY image is already custom
3201[0: 3.826] set_ddi_kernel_type : RECOVERY, 0x8
3202[0: 3.826] No need to update kernel type.
3203[0: 3.826] make_security_decisions : (RECOVERY)
3204[0: 3.826] [KG] Non-block cases
3205[0: 3.826] RPMB : LOCK state (0)
3206[0: 3.827] [CC MODE] Failed. Invalid Magic
3207[0: 3.827] save_wb_snapshot: already saved
3208[0: 3.827] [EFUSE] warranty bit is already set.
3209[0: 3.833] Verify_Signature_With_Signingtype 0x90d20130 90636@0xb0000000, 256@0x90d20030
3210[0: 3.835] pit_check_signature (DTB) valid.
3211[0: 3.837] blk_bwrite_bootsectorB: MMC mode in 2nd partition
3212[0: 3.837] MMC0 emmc_bootpart_2_open: 2nd partition open
3213[0: 3.839] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
3214[0: 3.839] MMC0 emmc_bootpart_2_close: 2nd partition close
3215[0: 3.843] if_ddi_data: succeeded. (0x30f)
3216[0: 3.844] update_image_status_info: DTB image status has been updated to 0x 2
3217[0: 3.844] update_image_status_auth: Status for DTB image is already official
3218[0: 3.844] set_ddi_kernel_type : DTB, 0x0
3219[0: 3.844] No need to update kernel type.
3220[0: 3.844] KERNEL RB count: DEVICE:3, BINARY:3 (DTB)
3221[0: 3.852] Verify_Signature_With_Signingtype 0x90d20130 188940@0xb0000000, 256@0x90d20030
3222[0: 3.855] pit_check_signature (DTBO) valid.
3223[0: 3.857] blk_bwrite_bootsectorB: MMC mode in 2nd partition
3224[0: 3.857] MMC0 emmc_bootpart_2_open: 2nd partition open
3225[0: 3.859] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
3226[0: 3.859] MMC0 emmc_bootpart_2_close: 2nd partition close
3227[0: 3.862] if_ddi_data: succeeded. (0x30f)
3228[0: 3.863] update_image_status_info: DTBO image status has been updated to 0x 2
3229[0: 3.863] update_image_status_auth: Status for DTBO image is already official
3230[0: 3.863] set_ddi_kernel_type : DTBO, 0x0
3231[0: 3.863] No need to update kernel type.
3232[0: 3.863] KERNEL RB count: DEVICE:3, BINARY:3 (DTBO)
3233[0: 3.863] avb_main : vbmeta type : 3
3234[0: 3.863] get_sign_info: (VBMETA)
3235[0: 3.873] GetSignerVer : None
3236[0: 3.879] read 'svb_orange.jpg'(72593) completed.
3237[0: 3.924] LoadJPEG took 45 msec
3238[0: 5. 12] LoadJPEG took 45 msec
3239[0: 5. 20] read 'booting_warning.jpg'(49516) completed.
3240[0: 5. 30] LoadJPEG took 10 msec
3241avb_cmdline : root=PARTUUID=52444E41-494F-2044-7379-7374656D0000 androidboot.verifiedbootstate=orange
3242[0: 5.447] [TIMA trusted boot]: SEAndroid MAGIC failure (recovery.img)
3243[0: 5.447] [CM] erase public_key: start
3244[0: 5.447] [CM] erase public_key: success
3245[0: 5.505] [UFDT] FINDING DTB ENTRY
3246[0: 5.511] [UFDT] Find DT Entry[0]: Rev:(S:0, E:255, D:3)
3247[0: 5.512] [UFDT] FINDING DTBO ENTRY
3248[0: 5.512] [DTH] dt table header check Fail: <unknown error>
3249[0: 5.512]
3250[0: 5.512] Samsung S-Boot 4.0 for SM-A202F (Sep 25 2020 - 18:56:57 34672703)
3251[0: 5.512] EXYNOS7885 EVT 0.2 (Base on ARM CortexA50)
3252[0: 5.512] 3072MB / Rev 3 / A202FXXU3BTI7 / (PKG_ID 0xe7885000) / LOT_ID N0000 / SHIP /SW_RST (0x20000000)
3253[0: 5.512] Re init board for bootloader exceptionException: do_handler_sync: DABT_EL1(esr: 0x96000010)
3254[0: 6. 12] PSTATE : [<600002c5>] ESR : [<96000010>]
3255[0: 6. 12] PC : [<8f037b18>] LR : [<8f037c54>]
3256SP : [<8f16f940>]
3257[0: 6. 12] r0: 8f348918 r1 : 8f16f480 r2 : 91a27967
3258[0: 6. 12] r3: 43 r4 : a r5 : bc600100
3259[0: 6. 12] r6: 8f16f940 r7 : 8f16f940 r8 : cccccccccccccccd
3260[0: 6. 12] r9: 8f16f2a0 r10 : 32 r11 : 0
3261[0: 6. 12] r12: 5f643367006c616d r13 : 6700307472656c61 r14 : 7472656c615f6433
3262[0: 6. 12] r15: 6c615f6433670031 r16 : 0 r17 : 0
3263[0: 6. 12] r18: 8f35b1b0 r19 : 8f348918 r20 : 0
3264[0: 6. 12] r21: 8f16fa08 r22 : b0000000 r23 : 8f171c80
3265[0: 6. 12] r24: 8f0ec000 r25 : 49800 r26 : 8f170158
3266[0: 6. 12] r27: 82398810 r28 : 8f171460 r29 : 8f16f940
3267[0: 6. 12] ===========================================
3268[0: 6. 12] call_do_upload: go to upload mode
3269[0: 6. 12] ===========================================
3270[0: 6. 12] get_force_upload_mode: param value: 0x0
3271[0: 6. 12] call_do_upload: just reboot for user
3272[0: 6. 12] s5p_restart_handler ('N':bl_exception)
3273
3274[0: 6. 12] s5p_restart_handler bl_exception 5
3275[0: 6. 12] blk_close: MMC mode
3276[0: 6.413] Disable dumpGPR - 0x0
3277[0: 6.413] reset_prepare_board: disable asserting rstdisable L1/L2 cache
3278[0: 6.413] Disable dumpGPR - 0x0
3279[0: 0.687]
3280[0: 0.689] Samsung S-Boot 4.0 for SM-A202F (Sep 25 2020 - 18:56:57 34672703)
3281[0: 0.696] EXYNOS7885 EVT 0.2 (Base on ARM CortexA50)
3282[0: 0.701] 3072MB / Rev 3 / A202FXXU3BTI7 / (PKG_ID 0xe7885000) / LOT_ID NN75S / SHIP /SW_RST (0x20000000)
3283[0: 0.711] __if_pmic_rev_init - MUIC API is not ready!
3284[0: 0.718] PMUDBG_CENTRAL_SEQ_*: apsoc 0x0 mif 0x0 apm 0x0
3285[0: 0.723] PMUDBG_CL0_*: cpu0 0x104c0000 cpu1 0x104c0000 l2 0x10050000 noncpu 0x140000
3286[0: 0.732] PMUDBG_CL2_*: cpu0 0x104c0000 cpu1 0x104c0000
3287[0: 0.737] PMUDBG_CL1_*: cpu0 0x70000 cpu1 0x104c0000 cpu2 0x104c0000 cpu3 0x104c0000 l2 0x0 noncpu 0xc0000
3288[0: 0.747] RST_STAT: 0x20000000
3289[0: 0.751] s5p_check_dump_gpr: set sp loading flag
3290[0: 0.756] MMU: enable start
3291[0: 0.759] MMU: enable done
3292[0: 0.762] [MUIC] muic_register_s2mu106_apis
3293[0: 0.768] Try 0 : [MUIC] muic_test1:0x001.
3294[0: 0.772] -> matched(s2mu106).
3295[0: 0.776] init_multi_microusb_ic Active MUIC 0x01
3296[0: 0.782] s2mu106_muic_get_adc_value: ADC:0x1f
3297[0: 0.788] s2mu106_init_microusb_ic: MUIC: Enable BC1.2
3298[0: 0.794] s2mu106_init_microusb_ic: MUIC: CONTROL writing success.
3299[0: 0.803] s2mu106_init_microusb_ic: MUIC: CONTROL:0x17
3300[0: 0.811] s2mu106_init_microusb_ic: MUIC: TIMING3: 0x8d
3301[0: 0.823] s2mu106_muic_get_attached_device: INT[1:0x00, 2:0x00]
3302[0: 0.829] s2mu106_muic_get_attached_device: DEV[1:0x00, 2:0x00, 3:0x00]
3303[0: 0.839] get_vbvolt: apple: 0x00, dev3: 0x00
3304[0: 0.843] get_vbvolt: vbvolt: 0x00
3305[0: 0.847] ccic_register_s2mu106:
3306[0: 0.851] ccic_is_s2mu106:
3307[0: 0.855] ccic_is_s2mu106: reg:b2 - val:00 ret:00
3308[0: 0.861] ccic_register_s2mu106: 0x1 = 0x2
3309[0: 0.867] ccic_register_s2mu106: 0x2 = 0x9b
3310[0: 0.873] ccic_register_s2mu106: 0x3 = 0x98
3311[0: 0.878] ccic_register_s2mu106: 0x4 = 0x90
3312[0: 0.884] ccic_register_s2mu106: 0x5 = 0x99
3313[0: 0.890] ccic_register_s2mu106: 0x6 = 0x88
3314[0: 0.895] ccic_register_s2mu106: 0x7 = 0x47
3315[0: 0.901] ccic_register_s2mu106: 0x8 = 0xa
3316[0: 0.907] ccic_register_s2mu106: 0x9 = 0x0
3317[0: 0.912] ccic_register_s2mu106: 0xa = 0xe
3318[0: 0.918] ccic_register_s2mu106: 0xb = 0xd
3319[0: 0.924] ccic_register_s2mu106: 0xc = 0x90
3320[0: 0.929] ccic_register_s2mu106: 0x18 = 0xe2
3321[0: 0.935] ccic_register_s2mu106: 0xb2 = 0x0
3322[0: 0.949] get_vbvolt: apple: 0x00, dev3: 0x00
3323[0: 0.954] get_vbvolt: vbvolt: 0x00
3324[0: 0.960] ccic_register_s2mu106: BEFORE VBUS(0)
3325[0: 0.967] s2mu106 found.
3326[0: 0.970] mach_board_initialize: Active ccic device.
3327[0: 0.975] ifconn_init: CCIC Mode
3328[0: 0.978] ifconn_get_jig_status: CCIC Mode
3329[0: 0.983] ccic_read_adc:
3330[0: 0.986] s2mu106_read_adc:
3331[0: 0.990] s2mu106_read_adc: RID = 00(RID_0)
3332[0: 0.994] ifconn_is_ccic_jig_device: rid=00
3333[0: 0.999] ccic_wait_auth:
3334[0: 1. 0] s2mu106_muic_get_adc_value: ADC:0x1f
3335[0: 1. 0] ccic_read_adc:
3336[0: 1. 0] s2mu106_read_adc:
3337[0: 1. 2] s2mu106_read_adc: RID = 00(RID_0)
3338[0: 1. 2] board_ccic_check_uart: jig_adc=1f, cc_adc=00
3339[0: 1. 2] ccic_read_adc:
3340[0: 1. 2] s2mu106_read_adc:
3341[0: 1. 3] s2mu106_read_adc: RID = 00(RID_0)
3342[0: 1. 3] ifconn_com_to_open:
3343[0: 1. 6] s2mu106_set_muic_uart_early: MUIC: MAN_SW1[0x00]
3344[0: 1.143] load Secure Payload done.
3345[0: 1.153]
3346Chip ID : 670d6c4d1082
3347[0: 1.153] EL3 Monitor information:
3348[0: 1.153] No tag info No git info ilkyungkim
3349
3350[0: 1.153] DREX_CALIBRATION3: 0xb001717
3351[0: 1.153] MMC Init
3352[0: 1.153] MMC0 400Khz 1 bit mode
3353[0: 1.275] EXT_CSD structure version 8
3354[0: 1.275] cardtype: 0x00000007
3355[0: 1.275] MMC RST_n_FUNCTION was already enabled
3356[0: 1.276] mmc->card_caps: 0x00000f11
3357[0: 1.276] mmc->host_caps: 0x00000f11
3358[0: 1.276] !!!Enter 8 Bit DDR mode.!!!
3359[0: 1.277] MMC0 52Mhz 8bit DDR mode
3360[0: 1.277] MMC0 capacity = 61071360
3361[0: 1.277] MMC0 vendor: 0x15
3362[0: 1.277] MMC0 PNM: 0x424a54443452
3363[0: 1.277] MMC0 MD: 2020 5
3364[0: 1.277] MMC0 FW: 0x03
3365[0: 1.281] MMC0(0x15) LVD reset count : 0
3366[0: 1.281]
3367[Debug Info.]
3368[0: 1.281] S-BOOT : VERSION_-+L0
3369[0: 1.287] GetSignerVer : SignerVer02
3370[0: 1.287] - read_bl1
3371[0: 1.287] blk_bread_bootsector: MMC mode
3372[0: 1.293] Verify_Signature_With_Signingtype 0x90d20130 5184@0x90d10000, 256@0x90d20030
3373[0: 1.295] pit_check_signature (PIT) valid.
3374[0: 1.303] PARAM ENV VERSION: v1.0..
3375[0: 1.305] blk_bread_bootsectorB: MMC mode in 2nd partition
3376[0: 1.305] MMC0 emmc_bootpart_2_open: 2nd partition open
3377[0: 1.307] MMC0 emmc_bootpart_2_close: 2nd partition close
3378[0: 1.309] initialize_ddi_data: usable! (89:0x30f), warranty reason : (0x0e03)
3379[0: 1.309] MAGIC_RAM_BASE: 0, MAGIC_RAM_BASE2: 61685f6f, ompin: 0
3380[0: 1.309] [ldfw] Pass LDFW partition!
3381[0: 1.309] [ldfw] read whole CM partition from the storage
3382[0: 1.410] ldfw: 0th ldfw's version 0x40191220 name : CryptoManagerV40
3383[0: 1.410] ldfw: 1th ldfw's version 0x20181224 name : fmp_fw_V20
3384[0: 1.410] ldfw: 2th ldfw's version 0x20191209 name : drm_fw
3385[0: 1.410] ldfw: 3th ldfw's version 0x24190110 name : srpmb_fw
3386[0: 1.410] ldfw: 4th ldfw's version 0x20181224 name : hdcp_fw
3387[0: 1.410] ldfw: 5th ldfw's version 0x20150828 name : tail_fw
3388[0: 1.410] GetSignerVer : SignerVer02
3389[0: 1.410] ldfw: init ldfw(s). whole ldfws size 0x3ec210
3390[0: 1.481] [ldfw] try to init 5 ldfw(s). except 0 ldfw 5 ldfw(s) have been inited done.
3391[0: 1.496] [TEEGRIS] register handler1, ret = 0x0
3392[0: 1.506] [TEEGRIS] register handler2, ret = 0x0
3393[0: 1.506] [TEEGRIS] disable handler registeration, ret = 0x0
3394[0: 1.506] [OTP] MODEL_ID read start
3395[0: 1.506] [OTP] MODEL_ID read value: 0x37
3396[0: 1.506] [OTP] BAN_ROM_SEC_BOOT_KEY read start
3397[0: 1.506] [OTP] BAN_ROM_SEC_BOOT_KEY read value: 0x0
3398[0: 1.506] [OTP] USE_ROM_SEC_BOOT_KEY read: start
3399[0: 1.506] [OTP] USE_ROM_SEC_BOOT_KEY read value: 0x0
3400[0: 1.506] [OTP] ENABLE_AES read start
3401[0: 1.506] [OTP] ENABLE_AES read value: 0x0
3402[0: 1.506] [OTP] PREORDER read start
3403[0: 1.506] [OTP] PREORDER read value: 0x1
3404[0: 1.506] [OTP] ANTIRBK_NS_AP0 read start
3405[0: 1.506] [OTP] ANTIRBK_NS_AP0 read value: 0x3
3406[0: 1.506] [OTP] COMMERCIAL read start
3407[0: 1.506] [OTP] COMMERCIAL read value: 0x1
3408[0: 1.506] [OTP] TEST read start
3409[0: 1.506] [OTP] TEST read value: 0x0
3410[0: 1.506] [OTP] WARRANTY read start
3411[0: 1.506] [OTP] WARRANTY read value: 0x1
3412[0: 1.506] [OTP] JTAG_SW_LOCK read start
3413[0: 1.506] [OTP] JTAG_SW_LOCK read value: 0x1
3414[0: 1.506] [OTP] CUSTOM_FLAG read start (6)
3415[0: 1.506] [OTP] CUSTOM_FLAG read value: 0x0
3416[0: 1.506] [OTP] CUSTOM_FLAG read start (7)
3417[0: 1.506] [OTP] CUSTOM_FLAG read value: 0x1
3418[0: 1.506] [OTP] CUSTOM_FLAG read start (8)
3419[0: 1.506] [OTP] CUSTOM_FLAG read value: 0x1
3420[0: 1.506] [OTP] CUSTOM_FLAG read start (9)
3421[0: 1.506] [OTP] CUSTOM_FLAG read value: 0x0
3422[0: 1.506] [OTP] ENABLE_ANTIRBK read start
3423[0: 1.506] [OTP] ENABLE_ANTIRBK read value: 0x1
3424[0: 1.506] [OTP] USE_PREORDER_KEY read start
3425[0: 1.506] [OTP] USE_PREORDER_KEY read value: 0x1
3426[0: 1.506] [OTP] ENABLE_MODEL_ID read start
3427[0: 1.506] [OTP] ENABLE_MODEL_ID read value: 0x1
3428[0: 1.506] [OTP] CUSTOM_FLAG read start (15)
3429[0: 1.507] [OTP] CUSTOM_FLAG read value: 0x1
3430[0: 1.507] [OTP] CUSTOM_FLAG read start (16)
3431[0: 1.507] [OTP] CUSTOM_FLAG read value: 0x0
3432[0: 1.507] [EFUSE] SMC Read the 0x0 ...
3433[0: 1.507] [EFUSE] SMC Read Count value: 3
3434[0: 1.507] [EFUSE] SMC Read the 0x1 ...
3435[0: 1.507] [EFUSE] SMC Read Count value: 1
3436[0: 1.507] [EFUSE] SMC Read the 0x2 ...
3437[0: 1.507] [EFUSE] SMC Read Count value: 0
3438[0: 1.507] [EFUSE] SMC Read the 0x3 ...
3439[0: 1.507] [EFUSE] SMC Read Count value: 1
3440[0: 1.507] [OTP] JTAG_KEY check start
3441[0: 1.507] [OTP] JTAG_KEY check: valid key
3442[0: 1.507] (1,55) vs (1,55)
3443[0: 1.507] JTAG_LOCK is already enabled in this device.
3444[0: 1.507] [EFUSE] Already fused for Market status
3445[0: 1.507] check_secure_ch_key_prov_flag : Flag is detected
3446[0: 1.507] [EFUSE] This is commercial device.
3447[0: 1.507] Secure camera - invalid fastcall id ffffffff
3448[0: 1.507] blk_rpmb_open: MMC mode
3449[0: 1.507] MMC0 RPMB emmc_rpmb_open:
3450[0: 1.507] blk_rpmb_read_data: MMC mode
3451[0: 1.508] HMAC compare success
3452[0: 1.508] RPMB: HMAC:
3453[0: 1.508]
3454[0: 1.508] MMC0 RPMB Get DATA success
3455
3456initialize_secdata_rpmb: usable! (0x52504d42), 1
3457[0: 1.508] set_fuse_history : no reason
3458[0: 1.508] fuse history 0x1
3459[0: 1.508] blk_rpmb_close: MMC mode
3460[0: 1.509] MMC0 RPMB emmc_rpmb_close:
3461[0: 1.509] blk_rpmb_open: MMC mode
3462[0: 1.509] MMC0 RPMB emmc_rpmb_open:
3463[0: 1.510] blk_rpmb_read_data: MMC mode
3464[0: 1.511] HMAC compare success
3465[0: 1.511] RPMB: HMAC:
3466[0: 1.511]
3467[0: 1.511] MMC0 RPMB Get DATA success
3468
3469blk_rpmb_close: MMC mode
3470[0: 1.511] MMC0 RPMB emmc_rpmb_close:
3471[0: 1.511] blk_rpmb_open: MMC mode
3472[0: 1.511] MMC0 RPMB emmc_rpmb_open:
3473[0: 1.512] blk_rpmb_read_data: MMC mode
3474[0: 1.513] HMAC compare success
3475[0: 1.513] RPMB: HMAC:
3476[0: 1.513]
3477[0: 1.513] MMC0 RPMB Get DATA success
3478
3479blk_rpmb_read_data: MMC mode
3480[0: 1.515] HMAC compare success
3481[0: 1.515] RPMB: HMAC:
3482[0: 1.515]
3483[0: 1.515] MMC0 RPMB Get DATA success
3484
3485blk_rpmb_close: MMC mode
3486[0: 1.515] MMC0 RPMB emmc_rpmb_close:
3487[0: 1.515] blk_rpmb_open: MMC mode
3488[0: 1.515] MMC0 RPMB emmc_rpmb_open:
3489[0: 1.516] blk_rpmb_read_data: MMC mode
3490[0: 1.517] HMAC compare success
3491[0: 1.517] RPMB: HMAC:
3492[0: 1.517]
3493[0: 1.517] MMC0 RPMB Get DATA success
3494
3495blk_rpmb_read_data: MMC mode
3496[0: 1.518] HMAC compare success
3497[0: 1.518] RPMB: HMAC:
3498[0: 1.518]
3499[0: 1.518] MMC0 RPMB Get DATA success
3500
3501blk_rpmb_close: MMC mode
3502[0: 1.518] MMC0 RPMB emmc_rpmb_close:
3503[0: 1.518]
3504[0: 1.518] blk_rpmb_open: MMC mode
3505[0: 1.518] MMC0 RPMB emmc_rpmb_open:
3506[0: 1.519] blk_rpmb_read_data: MMC mode
3507[0: 1.521] HMAC compare success
3508[0: 1.521] RPMB: HMAC:
3509[0: 1.521]
3510[0: 1.521] MMC0 RPMB Get DATA success
3511
3512ace_hash_sha_digest: passed.(0)
3513[0: 1.521] [KG] valid hash.
3514[0: 1.521] [KG] 'Checking' state.
3515[0: 1.521] blk_rpmb_close: MMC mode
3516[0: 1.521] MMC0 RPMB emmc_rpmb_close:
3517[0: 1.521] get_sec_secu_cond
3518[0: 1.521] DDR SIZE: 3G
3519[0: 1.521] LPDDR4 manufacturer : Micron
3520[0: 1.521] PRO_ID : 4010000
3521[0: 1.541] [TMU: 0] 31
3522[0: 1.561] [TMU: 1] 30
3523[0: 1.561] set_rdx_mask: 0x20000
3524[0: 1.561] set_rdx_mask: 0xa0000
3525[0: 1.561] check_reset_reason: RamBase: 0 / INF2: 12345678 / INF3: abc0ead5 / RST: 20000000
3526[0: 1.561] set_reset_reason: reason as 5
3527[0: 1.561] update_rcnt: not supported
3528[0: 1.561] [MUIC] print_init_regs
3529[0: 1.565] CTRL[1:17, 2:0x9d, 3:0xdd]
3530[0: 1.568] INTMASK[1:0x00, 2:0x00]
3531[0: 1.572] DEV_TYPE[1:0x00, 2:0x00, 3:0x00]
3532[0: 1.573] MAN_SW[0x00]
3533[0: 1.575] RST[0x00]
3534[0: 1.575]
3535[0: 1.575] adc_read_temp temp_adc = 2015, temp = 25
3536[0: 1.575] adc_read_temp: write battery temp data : 0x19(25)
3537[0: 1.577] init_ific: s2mu106 0x11 (rev:0x1)
3538[0: 1.580] keep_charger_status : 0x95 : 0xa5
3539[0: 1.586] ifconn_get_jig_status_vb: CCIC Mode
3540[0: 1.586] ccic_read_adc:
3541[0: 1.586] s2mu106_read_adc:
3542[0: 1.587] s2mu106_read_adc: RID = 00(RID_0)
3543[0: 1.590] get_vbvolt: apple: 0x00, dev3: 0x00
3544[0: 1.590] get_vbvolt: vbvolt: 0x00
3545[0: 1.590] ifconn_is_ccic_jig_device_vb: rid=00 vbus=0
3546[0: 1.607] [DEBUG]disable_factory_mode: DISABLE FACTORY MODE
3547[0: 1.611] kick_charger_watchdog: CHG fault status : x00
3548[0: 1.612] kick_charger_watchdog: CHG_CTRL0 : x03
3549[0: 1.616] set_charger_watchdog: state(1), reg_data(0x1b)
3550[0: 1.617] [DEBUG]set_regulation_voltage: S2MU106_CHG_CTRL5 => 0x5a
3551[0: 1.619] [DEBUG]set_regulation_voltage: float_voltage change to 4350, 0x5a
3552[0: 1.627] set_charger_current : S2MU106_CHG_CTRL7 : (2000)0x27
3553[0: 1.627] ifconn_get_charger_status:
3554[0: 1.629] get_vbvolt: apple: 0x00, dev3: 0x00
3555[0: 1.629] get_vbvolt: vbvolt: 0x00
3556[0: 1.629] ccic_read_adc:
3557[0: 1.629] s2mu106_read_adc:
3558[0: 1.631] s2mu106_read_adc: RID = 00(RID_0)
3559[0: 1.631] ccic_is_valid_charger: Invalid charger
3560[0: 1.631] ifconn_get_charger_status: valid_charger=0
3561[0: 1.636] set_cool_charger_current : S2MU106_CHG_CTRL6 : (450)0x88
3562[0: 1.636] ifconn_is_hc_cable:
3563[0: 1.636] ifconn_get_device:
3564[0: 1.637] s2mu106_muic_get_adc_value: ADC:0x1f
3565[0: 1.637] ifconn_is_muic_jig_device: adc=0x1f
3566[0: 1.637] ccic_read_adc:
3567[0: 1.637] s2mu106_read_adc:
3568[0: 1.639] s2mu106_read_adc: RID = 00(RID_0)
3569[0: 1.639] ifconn_is_ccic_jig_device: rid=00
3570[0: 1.639] ifconn_is_hc_cable: adc=0x1f
3571[0: 1.641] get_vbvolt: apple: 0x00, dev3: 0x00
3572[0: 1.641] get_vbvolt: vbvolt: 0x00
3573[0: 1.641] s2mu106_muic_get_attached_device_ex: no vbus
3574[0: 1.643] set_precharge_current: set charge current(in:500, out:450)
3575[0: 1.647] set_charger_current : S2MU106_CHG_CTRL7 : (450)0x08
3576[0: 1.650] set_charger_state : S2MU106_CHG_CTRL0 : 0x3
3577[0: 1.653] ReadFGRegisterWord: REG(0x5) = 0x8864
3578[0: 1.656] ReadFGRegisterWord: REG(0x5) = 0x8864
3579[0: 1.656] fuel_gauge_read_vcell: vbat (4262)
3580[0: 1.660] set_charger_state : S2MU106_CHG_CTRL0 : 0x1
3581[0: 1.710] ifconn_get_device:
3582[0: 1.711] s2mu106_muic_get_adc_value: ADC:0x1f
3583[0: 1.711] ifconn_is_muic_jig_device: adc=0x1f
3584[0: 1.711] ccic_read_adc:
3585[0: 1.711] s2mu106_read_adc:
3586[0: 1.712] s2mu106_read_adc: RID = 00(RID_0)
3587[0: 1.712] ifconn_is_ccic_jig_device: rid=00
3588[0: 1.716] jig_switch_control: 0x25 -> 0x50
3589[0: 1.720] jig_switch_control: POR state = 0x00, 0x1E = 0x 3, data_ver = 0x2(0x2), factory_mode(0), jig_status(0)
3590[0: 1.723] ReadFGRegisterWord: REG(0x5) = 0x8864
3591[0: 1.726] ReadFGRegisterWord: REG(0x5) = 0x8864
3592[0: 1.726] fuel_gauge_read_vcell: vbat (4262)
3593[0: 1.726] jig_switch_control: Fuelgauge is Already initialized
3594[0: 1.729] set_charger_state : S2MU106_CHG_CTRL0 : 0x3
3595[0: 1.732] ReadFGRegisterWord: REG(0x9) = 0x3f44
3596[0: 1.735] ReadFGRegisterWord: REG(0x9) = 0x3f44
3597[0: 1.735] fuel_gauge_read_soc_four_digits: raw capacity (0x3f44:9885)
3598[0: 1.738] ReadFGRegisterWord: REG(0x5) = 0x8864
3599[0: 1.740] ReadFGRegisterWord: REG(0x5) = 0x8864
3600[0: 1.740] fuel_gauge_read_vcell: vbat (4262)
3601[0: 1.740] init_fuel_gauge: SOC(9885), VCELL(4262)
3602[0: 1.740] PMIC_ID = 0x04
3603[0: 1.740] PMIC_INT1 = 0x42 PWRONR PWRON1S
3604[0: 1.740] PMIC_INT2 = 0x10 RTC1S
3605[0: 1.740] PMIC_INT3 = 0xc0 MRBF MRBR
3606[0: 1.740] PMIC_STATUS1 = 0x1b PWRON JIGONB MRB RSVD
3607[0: 1.740] PMIC_STATUS2 = 0x00
3608[0: 1.740] PMIC_PWRONSRC = 0x08 MRST
3609[0: 1.740] PMIC_OFFSRC = 0x00
3610[0: 1.740] PMIC_RTC_CTRL = 0x02
3611[0: 1.740] PMIC_RTC_SMPL = 0x03
3612[0: 1.742] RTC TIME: 2020-12-08 08:21:45(0x04)AM
3613[0: 1.742] PMIC MON[0] = [0x0c: 0x14]
3614[0: 1.742] PMIC MON[1] = [0x0e: 0x44]
3615[0: 1.742] PMIC MON[2] = [0x09: 0x00]
3616[0: 1.742] PMIC MON[3] = [0x04: 0xff]
3617[0: 1.742] PMIC MON[4] = [0x0c: 0x14]
3618[0: 1.742] PMIC MON[5] = [0x0e: 0x44]
3619[0: 1.742] PMIC MON[6] = [0x0c: 0x14]
3620[0: 1.742] PMIC MON[7] = [0x0e: 0x44]
3621[0: 1.742] s5p_check_keypad: 0x10100000
3622[0: 1.742] s5p_check_keypad: recovery mode
3623[0: 1.742] blk_bwrite: MMC mode
3624[0: 1.744] blk_bwrite: MMC mode
3625[0: 1.747] set_oneshot_recovery: recovery mode set! sys_bootm=0x80000
3626[0: 1.747] s5p_check_reboot_mode: INFORM3 = abc0ead5 ... skip
3627[0: 1.755] [EMC]Token does not exist
3628[0: 1.755] get_force_upload_mode: param value: 0x0
3629[0: 1.755] s5p_check_upload: DL: 4f4c FU: 1
3630[0: 1.755] 0x4f4c: MRST enabled
3631[0: 1.755] s5p_check_upload: RamBase: 0 / INF2: 12345678 / INF3: abc0ead5 / RST: 20000000
3632[0: 1.756] s2mu106_muic_get_adc_value: ADC:0x1f
3633[0: 1.756] s5p_check_upload: debug level is LO! (fu: 1, mask: 0x0)
3634[0: 1.756] get_force_upload_mode: param value: 0x0
3635[0: 1.756] get_force_upload_mode: param value: 0x0
3636[0: 1.756] s5p_check_upload: disable dump_gpr
3637[0: 1.756] Disable dumpGPR - 0x0
3638[0: 1.756] s5p_check_download: 0
3639[0: 1.756] mach_board_main: recovery set!(0x80000)
3640[0: 1.763] s2mu106_muic_get_attached_device: INT[1:0x00, 2:0x00]
3641[0: 1.763] s2mu106_muic_get_attached_device: DEV[1:0x00, 2:0x00, 3:0x00]
3642[0: 1.766] get_vbvolt: apple: 0x00, dev3: 0x00
3643[0: 1.766] get_vbvolt: vbvolt: 0x00
3644[0: 1.766] ccic_get_jig_status:
3645[0: 1.766] ccic_read_adc:
3646[0: 1.766] s2mu106_read_adc:
3647[0: 1.767] s2mu106_read_adc: RID = 00(RID_0)
3648[0: 1.767] ifconn_get_charger_status:
3649[0: 1.770] get_vbvolt: apple: 0x00, dev3: 0x00
3650[0: 1.770] get_vbvolt: vbvolt: 0x00
3651[0: 1.770] ccic_read_adc:
3652[0: 1.770] s2mu106_read_adc:
3653[0: 1.771] s2mu106_read_adc: RID = 00(RID_0)
3654[0: 1.771] ccic_is_valid_charger: Invalid charger
3655[0: 1.771] ifconn_get_charger_status: valid_charger=0
3656[0: 1.771] adc_read_temp temp_adc = 2014, temp = 25
3657[0: 1.771] adc_read_temp: write battery temp data : 0x19(25)
3658[0: 1.772] check_pm_status: bat_temp=25, chg=0
3659[0: 1.772] check_pm_status: normal reset, do not enter LPM mode.
3660[0: 1.775] ReadFGRegisterWord: REG(0x5) = 0x8864
3661[0: 1.778] ReadFGRegisterWord: REG(0x5) = 0x8864
3662[0: 1.778] fuel_gauge_read_vcell: vbat (4262)
3663[0: 1.778] bl_vib
3664[0: 1.925] LoadJPEG took 46 msec
3665[0: 1.934] read 'booting_warning.jpg'(49516) completed.
3666[0: 1.945] LoadJPEG took 10 msec
3667[0: 1.946] init_display_clk: 12061020( 0), 1206183C( 2)
3668[0: 1.946] init_display_clk: 14800120( 10), 14801828( 1)
3669[0: 1.946] exynos7885_dual_mipi_phy_control, 1
3670[0: 2. 50] dsi_read: da: 11,
3671[0: 2. 50] dsi_read: db: 62,
3672[0: 2. 50] dsi_read: dc: 30,
3673[0: 2. 50] 11, 62, 30, 0x116230
3674[0: 2. 50] 1st panel CU IC.
3675[0: 2.115] set_tzpc_secureport: successfully protected 0
3676[0: 2.169] blk_bwrite: MMC mode
3677[0: 2.171] blk_bwrite: MMC mode
3678[0: 2.173] blk_bwrite: MMC mode
3679[0: 2.177] blk_bwrite: MMC mode
3680[0: 2.180] Set debug level to low(4f4c)
3681[0: 2.180] blk_bwrite: MMC mode
3682[0: 2.184] Set upload mode to disable(0)
3683[0: 2.184] Disable dumpGPR - 0x0
3684[0: 2.184] load_kernel: disable dump_gpr
3685[0: 2.184] 0x4f4c: MRST enabled
3686[0: 2.184] load_kernel: loading boot image from 301056..
3687[0: 2.188] kernel size = 0x1bcd800, ramdisk size = 0x6af000
3688[0: 2.188] Backup dtbo_size:0x0, dtbo_actual:0x0
3689[0: 2.188] RPMB : LOCK state (0)
3690[0: 2.188] patch_month_year : 11.20 , os_version : 10.0.0
3691[0: 2.188] [CM] set os_version & patch_month_year: start
3692[0: 2.188] [CM] set os_version & patch_month_year: success
3693[0: 2.188] device_locked : 0
3694[0: 2.188] [CM] set device_state: start
3695[0: 2.188] [CM] set device_state: success
3696[0: 2.188] verified_boot_state : 2
3697[0: 2.188] [CM] set boot_state: start
3698[0: 2.188] [CM] set boot_state: success
3699[0: 2.188] [Fchandler]Jenkins build #21
3700[0: 2.188] avbops functions are set successfully
3701[0: 2.188] RPMB : LOCK state (0)
3702[0: 2.188] avb_slot_verify.c:818: DEBUG: Loading vbmeta struct from partition 'VBMETA'.
3703avb_slot_verify.c:935: ERROR: VBMETA: Error verifying vbmeta image: OK_NOT_SIGNED
3704avb_slot_verify.c:1100: DEBUG: VBMETA: VERIFICATION_DISABLED bit is set.
3705avb_slot_verify.c:705: DEBUG: bootloader: Loading entire partition.
3706blk_bread_bootsector: MMC mode
3707[0: 2.244] RPMB : LOCK state (0)
3708[0: 2.244] avb_slot_verify.c:705: DEBUG: cm: Loading entire partition.
3709RPMB : LOCK state (0)
3710[0: 2.346] avb_slot_verify.c:705: DEBUG: dtb: Loading entire partition.
3711RPMB : LOCK state (0)
3712[0: 2.445] avb_slot_verify.c:705: DEBUG: dtbo: Loading entire partition.
3713RPMB : LOCK state (0)
3714[0: 2.543] avb_slot_verify.c:705: DEBUG: recovery: Loading entire partition.
3715RPMB : LOCK state (0)
3716[0: 3.186] [AVB 2.0 ERR] authentication fail [ret: 0x3] (orange)
3717[0: 3.186] avb_main : Check Samsung Secure Info
3718[0: 3.197] GetSignerVer : None
3719[0: 3.197] Verify_Signature_With_Signingtype 0x90d20130 272@0xb0000000, 256@0x90d20030
3720[0: 3.198] Verify_Signature_With_Signingtype: failed.(-18022398)
3721[0: 3.198] pit_check_signature (VBMETA) invalid.
3722[0: 3.198] set_ddi_kernel_type : VBMETA, 0x200
3723[0: 3.198] No need to update kernel type.
3724[0: 3.198] make_security_decisions : (VBMETA)
3725[0: 3.198] [KG] Non-block cases
3726[0: 3.198] RPMB : LOCK state (0)
3727[0: 3.198] [CC MODE] Failed. Invalid Magic
3728[0: 3.198] save_wb_snapshot: already saved
3729[0: 3.198] [EFUSE] warranty bit is already set.
3730[0: 3.198] avb_footer.c:41: ERROR: Footer magic is incorrect.
3731check_samsung_secure_info : Error validating footer (recovery)
3732[0: 3.830] footer is abnormal: 6
3733[0: 3.830] update_image_status_auth: Status for RECOVERY image is already custom
3734[0: 3.830] set_ddi_kernel_type : RECOVERY, 0x8
3735[0: 3.830] No need to update kernel type.
3736[0: 3.830] make_security_decisions : (RECOVERY)
3737[0: 3.830] [KG] Non-block cases
3738[0: 3.830] RPMB : LOCK state (0)
3739[0: 3.830] [CC MODE] Failed. Invalid Magic
3740[0: 3.830] save_wb_snapshot: already saved
3741[0: 3.830] [EFUSE] warranty bit is already set.
3742[0: 3.836] Verify_Signature_With_Signingtype 0x90d20130 90636@0xb0000000, 256@0x90d20030
3743[0: 3.839] pit_check_signature (DTB) valid.
3744[0: 3.841] blk_bwrite_bootsectorB: MMC mode in 2nd partition
3745[0: 3.841] MMC0 emmc_bootpart_2_open: 2nd partition open
3746[0: 3.843] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
3747[0: 3.843] MMC0 emmc_bootpart_2_close: 2nd partition close
3748[0: 3.847] if_ddi_data: succeeded. (0x30f)
3749[0: 3.848] update_image_status_info: DTB image status has been updated to 0x 2
3750[0: 3.848] update_image_status_auth: Status for DTB image is already official
3751[0: 3.848] set_ddi_kernel_type : DTB, 0x0
3752[0: 3.848] No need to update kernel type.
3753[0: 3.848] KERNEL RB count: DEVICE:3, BINARY:3 (DTB)
3754[0: 3.855] Verify_Signature_With_Signingtype 0x90d20130 188940@0xb0000000, 256@0x90d20030
3755[0: 3.858] pit_check_signature (DTBO) valid.
3756[0: 3.860] blk_bwrite_bootsectorB: MMC mode in 2nd partition
3757[0: 3.860] MMC0 emmc_bootpart_2_open: 2nd partition open
3758[0: 3.862] MMC0 mmc_bwrite_bootsector_2 call the mmc_bwrite
3759[0: 3.862] MMC0 emmc_bootpart_2_close: 2nd partition close
3760[0: 3.865] if_ddi_data: succeeded. (0x30f)
3761[0: 3.866] update_image_status_info: DTBO image status has been updated to 0x 2
3762[0: 3.866] update_image_status_auth: Status for DTBO image is already official
3763[0: 3.866] set_ddi_kernel_type : DTBO, 0x0
3764[0: 3.866] No need to update kernel type.
3765[0: 3.866] KERNEL RB count: DEVICE:3, BINARY:3 (DTBO)
3766[0: 3.866] avb_main : vbmeta type : 3
3767[0: 3.866] get_sign_info: (VBMETA)
3768[0: 3.876] GetSignerVer : None
3769[0: 3.882] read 'svb_orange.jpg'(72593) completed.
3770[0: 3.928] LoadJPEG took 45 msec
3771[0: 3.980] LoadJPEG took 45 msec
3772[0: 3.989] read 'booting_warning.jpg'(49516) completed.
3773[0: 3.999] LoadJPEG took 10 msec
3774avb_cmdline : root=PARTUUID=52444E41-494F-2044-7379-7374656D0000 androidboot.verifiedbootstate=orange
3775[0: 4.413] [TIMA trusted boot]: SEAndroid MAGIC failure (recovery.img)
3776[0: 4.413] [CM] erase public_key: start
3777[0: 4.413] [CM] erase public_key: success
3778[0: 4.471] [UFDT] FINDING DTB ENTRY
3779[0: 4.477] [UFDT] Find DT Entry[0]: Rev:(S:0, E:255, D:3)
3780[0: 4.478] [UFDT] FINDING DTBO ENTRY
3781[0: 4.478] [DTH] dt table header check Fail: <unknown error>
3782[0: 4.478]
3783[0: 4.478] Samsung S-Boot 4.0 for SM-A202F (Sep 25 2020 - 18:56:57 34672703)
3784[0: 4.478] EXYNOS7885 EVT 0.2 (Base on ARM CortexA50)
3785[0: 4.478] 3072MB / Rev 3 / A202FXXU3BTI7 / (PKG_ID 0xe7885000) / LOT_ID N0000 / SHIP /SW_RST (0x20000000)
3786[0: 4.478] Re init board for bootloader exceptionException: do_handler_sync: DABT_EL1(esr: 0x96000010)
3787[0: 4.978] PSTATE : [<600002c5>] ESR : [<96000010>]
3788[0: 4.978] PC : [<8f037b18>] LR : [<8f037c54>]
3789SP : [<8f16f940>]
3790[0: 4.978] r0: 8f348918 r1 : 8f16f480 r2 : 91a2e0c3
3791[0: 4.978] r3: 43 r4 : a r5 : bc600100
3792[0: 4.978] r6: 8f16f940 r7 : 8f16f940 r8 : cccccccccccccccd
3793[0: 4.978] r9: 8f16f2a0 r10 : 32 r11 : 0
3794[0: 4.978] r12: 5f643367006c616d r13 : 6700307472656c61 r14 : 7472656c615f6433
3795[0: 4.978] r15: 6c615f6433670031 r16 : 0 r17 : 0
3796[0: 4.978] r18: 8f35b1b0 r19 : 8f348918 r20 : 0
3797[0: 4.978] r21: 8f16fa08 r22 : b0000000 r23 : 8f171c80
3798[0: 4.978] r24: 8f0ec000 r25 : 49800 r26 : 8f170158
3799[0: 4.978] r27: 82368810 r28 : 8f171460 r29 : 8f16f940
3800[0: 4.978] ===========================================
3801[0: 4.978] call_do_upload: go to upload mode
3802[0: 4.978] ===========================================
3803[0: 4.978] get_force_upload_mode: param value: 0x0
3804[0: 4.978] call_do_upload: just reboot for user
3805[0: 4.978] s5p_restart_handler ('N':bl_exception)
3806
3807[0: 4.978] s5p_restart_handler bl_exception 5
3808[0: 4.978] blk_close: MMC mode
3809[0: 5.379] Disable dumpGPR - 0x0
3810[0: 5.379] reset_prepare_board: disable asserting rstdisable L1/L2 cache
3811[0: 5.379] Disable dumpGPR - 0x0
3812[0: 0.687]
3813[0: 0.689] Samsung S-Boot 4.0 for SM-A202F (Sep 25 2020 - 18:56:57 34672703)
3814[0: 0.696] EXYNOS7885 EVT 0.2 (Base on ARM CortexA50)
3815[0: 0.701] 3072MB / Rev 3 / A202FXXU3BTI7 / (PKG_ID 0xe7885000) / LOT_ID NN75S / SHIP /SW_RST (0x20000000)
3816[0: 0.711] __if_pmic_rev_init - MUIC API is not ready!
3817[0: 0.718] PMUDBG_CENTRAL_SEQ_*: apsoc 0x0 mif 0x0 apm 0x0
3818[0: 0.723] PMUDBG_CL0_*: cpu0 0x104c0000 cpu1 0x104c0000 l2 0x10050000 noncpu 0x140000
3819[0: 0.732] PMUDBG_CL2_*: cpu0 0x104c0000 cpu1 0x104c0000
3820[0: 0.737] PMUDBG_CL1_*: cpu0 0x70000 cpu1 0x104c0000 cpu2 0x104c0000 cpu3 0x104c0000 l2 0x0 noncpu 0xc0000
3821[0: 0.747] RST_STAT: 0x20000000
3822[0: 0.751] s5p_check_dump_gpr: set sp loading flag
3823[0: 0.756] MMU: enable start
3824[0: 0.759] MMU: enable done
3825[0: 0.762] [MUIC] muic_register_s2mu106_apis
3826[0: 0.768] Try 0 : [MUIC] muic_test1:0x001.
3827[0: 0.772] -> matched(s2mu106).
3828[0: 0.776] init_multi_microusb_ic Active MUIC 0x01
3829[0: 0.782] s2mu106_muic_get_adc_value: ADC:0x1f
3830[0: 0.788] s2mu106_init_microusb_ic: MUIC: Enable BC1.2
3831[0: 0.794] s2mu106_init_microusb_ic: MUIC: CONTROL writing success.
3832[0: 0.803] s2mu106_init_microusb_ic: MUIC: CONTROL:0x17
3833[0: 0.811] s2mu106_init_microusb_ic: MUIC: TIMING3: 0x8d
3834[0: 0.823] s2mu106_muic_get_attached_device: INT[1:0x00, 2:0x00]
3835[0: 0.829] s2mu106_muic_get_attached_device: DEV[1:0x00, 2:0x00, 3:0x00]
3836[0: 0.839] get_vbvolt: apple: 0x00, dev3: 0x00
3837[0: 0.843] get_vbvolt: vbvolt: 0x00
3838[0: 0.847] ccic_register_s2mu106:
3839[0: 0.851] ccic_is_s2mu106:
3840[0: 0.855] ccic_is_s2mu106: reg:b2 - val:00 ret:00
3841[0: 0.861] ccic_register_s2mu106: 0x1 = 0x2
3842[0: 0.867] ccic_register_s2mu106: 0x2 = 0x9b
3843[0: 0.873] ccic_register_s2mu106: 0x3 = 0x98
3844[0: 0.878] ccic_register_s2mu106: 0x4 = 0x90
3845[0: 0.884] ccic_register_s2mu106: 0x5 = 0x99
3846[0: 0.890] ccic_register_s2mu106: 0x6 = 0x88
3847[0: 0.895] ccic_register_s2mu106: 0x7 = 0x47
3848[0: 0.901] ccic_register_s2mu106: 0x8 = 0xa
3849[0: 0.907] ccic_register_s2mu106: 0x9 = 0x0
3850[0: 0.912] ccic_register_s2mu106: 0xa = 0xe
3851[0: 0.918] ccic_register_s2mu106: 0xb = 0xd
3852[0: 0.924] ccic_register_s2mu106: 0xc = 0x90
3853[0: 0.929] ccic_register_s2mu106: 0x18 = 0xe2
3854[0: 0.935] ccic_register_s2mu106: 0xb2 = 0x0
3855[0: 0.949] get_vbvolt: apple: 0x00, dev3: 0x00
3856[0: 0.953] get_vbvolt: vbvolt: 0x00
3857[0: 0.960] ccic_register_s2mu106: BEFORE VBUS(0)
3858[0: 0.967] s2mu106 found.
3859[0: 0.969] mach_board_initialize: Active ccic device.
3860[0: 0.975] ifconn_init: CCIC Mode
3861[0: 0.978] ifconn_get_jig_status: CCIC Mode
3862[0: 0.983] ccic_read_adc:
3863[0: 0.986] s2mu106_read_adc:
3864[0: 0.990] s2mu106_read_adc: RID = 00(RID_0)
3865[0: 0.994] ifconn_is_ccic_jig_device: rid=00
3866[0: 0.999] ccic_wait_auth:
3867[0: 1. 0] s2mu106_muic_get_adc_value: ADC:0x1f
3868[0: 1. 0] ccic_read_adc:
3869[0: 1. 0] s2mu106_read_adc:
3870[0: 1. 2] s2mu106_read_adc: RID = 00(RID_0)
3871[0: 1. 2] board_ccic_check_uart: jig_adc=1f, cc_adc=00
3872[0: 1. 2] ccic_read_adc:
3873[0: 1. 2] s2mu106_read_adc:
3874[0: 1. 3] s2mu106_read_adc: RID = 00(RID_0)
3875[0: 1. 3] ifconn_com_to_open:
3876[0: 1. 6] s2mu106_set_muic_uart_early: MUIC: MAN_SW1[0x00]
3877[0: 1.143] load Secure Payload done.
3878[0: 1.153]
3879Chip ID : 670d6c4d1082
3880[0: 1.153] EL3 Monitor information:
3881[0: 1.153] No tag info No git info ilkyungkim
3882
3883[0: 1.153] DREX_CALIBRATION3: 0xb001717
3884[0: 1.153] MMC Init
3885[0: 1.153] MMC0 400Khz 1 bit mode
3886[0: 1.279] EXT_CSD structure version 8
3887[0: 1.279] cardtype: 0x00000007
3888[0: 1.279] MMC RST_n_FUNCTION was already enabled
3889[0: 1.280] mmc->card_caps: 0x00000f11
3890[0: 1.280] mmc->host_caps: 0x00000f11
3891[0: 1.280] !!!Enter 8 Bit DDR mode.!!!
3892[0: 1.281] MMC0 52Mhz 8bit DDR mode
3893[0: 1.281] MMC0 capacity = 61071360
3894[0: 1.281] MMC0 vendor: 0x15
3895[0: 1.281] MMC0 PNM: 0x424a54443452
3896[0: 1.281] MMC0 MD: 2020 5
3897[0: 1.281] MMC0 FW: 0x03
3898[0: 1.285] MMC0(0x15) LVD reset count : 0
3899[0: 1.285]
3900
3901