-12-03 14:47:36] 0x10244084):0x10000000
[2025-12-03 14:47:36] INFO: [ATF](1)K:[2277.200505][DRAMC-ATF] DRAMC_NAO_CHB + 0x88(0x10244088):0x4900000
[2025-12-03 14:47:36] INFO: }%5)}}}}}}}5)kedump: crc = 0x5d04143f
[2025-12-03 14:47:41] mrdump_get_reserved_info:230: mrdump show :mblock-R[15].start: 0xbfd70000, size: 0x80000 name:atf_ramdump
[2025-12-03 14:47:41] ERROR: [ATF](0)[2292.463796]mediatek_plat_sip_handler_bootloader: unknown 32b LK SMC(0x82000114)
[2025-12-03 14:47:41] ATF: ram dump address hi:0x0, address lo:0xbfd70000, size hi:0, size lo:524288
[2025-12-03 14:47:41] INFO: [ATF](0)[2292.479303]Get ATF log buffer info. for AEE dump in LK.
[2025-12-03 14:47:41] INFO: [ATF](0)[2292.485851]Buf addr:0x9dc14000, buf size:131072, flag addr:0x9dc0002c, flag value:0x41544641
[2025-12-03 14:47:41] ATF: log_buf_addr = 0x9dc14000, size = 0x20000, crash_flag_addr = 0x9dc0002c
[2025-12-03 14:47:41] ATF: footprint hi_addr = 0x0, low_addr = 0x9dc13800, buf_size = 0x800
[2025-12-03 14:47:41] ATF: LAST BUFF
[2025-12-03 14:47:41] kedump: last is not full pmic reset!
[2025-12-03 14:47:41] kedump: lk dump flow
[2025-12-03 14:47:41] aee_init:66: Trigger exception flow
[2025-12-03 14:47:41] aee_init:70: boot_reason(4) boot_mode(0)
[2025-12-03 14:47:41] aee_init:72: ddr_reserve_ready(1) ddr_reserve_success(1)
[2025-12-03 14:47:41] aee_check_enable:290: lk aee dcfg = full (lv.2)
[2025-12-03 14:47:41] rst from: kernel
[2025-12-03 14:47:41] kedump mini start
[2025-12-03 14:47:41] kedump: current time: [2010/1/1 0:38:11]
[2025-12-03 14:47:41] kedump: ddr reserve mode enabled
[2025-12-03 14:47:41] kedump: boot_reason(4)
[2025-12-03 14:47:41] vmalloc_start:0xffffffc008000000, vmalloc_end:0xfffffffdf0000000,master_page_table:0x80ddf000, high_memory:0xffffff8080000000
[2025-12-03 14:47:41] kedump dram range 0x80000000 - 0x100000000
[2025-12-03 14:47:41] kedump: block size:0x200
[2025-12-03 14:47:41] kedump: data:0x11d000, size:0x800, offset:0x1200, va:0x4111d000
[2025-12-03 14:47:41] kedump: crc = 0x29e01cdc
[2025-12-03 14:47:41] kedump add: SYS_RAMCONSOLE_RAW[0] 800/800@1200
[2025-12-03 14:47:41] kedump: data:0x9c100000, size:0xe0000, offset:0x1a00, va:0x41100000
[2025-12-03 14:47:41] kedump: crc = 0xf8c1906a
[2025-12-03 14:47:41] kedump add: SYS_PSTORE_RAW[1] e0000/e0000@1a00
[2025-12-03 14:47:41] kedump: data:0x9c6760a8, size:0x8, offset:0xe1a00, va:0x416760a8
[2025-12-03 14:47:41] kedump add: KEDUMP_CRC[2] 8/8@e1a00
[2025-12-03 14:47:41] kedump: KEHeader 0x40042000
[2025-12-03 14:47:41] kedump: read header 0x0x40042000[0x7f454c46]
[2025-12-03 14:47:41] kedump: mach[0xb7], phnum[0x3c], phoff[0x40]
[2025-12-03 14:47:41] kedump: 0-PT[4] 1aa0@0 -> 3000(d60)
[2025-12-03 14:47:41] kedump: 1-PT[4] 500@0 -> 3000(2800)
[2025-12-03 14:47:41] kedump: 2-PT[1] 2000@11e000 -> 3000(0)
[2025-12-03 14:47:41] kedump: invalid convert address:0x11f000
[2025-12-03 14:47:41] kedump: convert failed expected pa:0x11f000 (va:0xffffffc009dab000)
[2025-12-03 14:47:41] kedump: data:0x11e000, size:0x2000, offset:0xe5200, va:0x4111e000
[2025-12-03 14:47:41] kedump: 3-PT[1] 11000@0 -> 5000(0)
[2025-12-03 14:47:41] kedump: data:0x810a5000, size:0x11000, offset:0xe7200, va:0x410a5000
[2025-12-03 14:47:41] kedump: 4-PT[1] 8000@ff8b0000 -> 16000(0)
[2025-12-03 14:47:41] kedump: data:0xff8b0000, size:0x8000, offset:0xf8200, va:0x418b0000
[2025-12-03 14:47:41] kedump: 5-PT[1] 8000@ff8c2000 -> 1e000(0)
[2025-12-03 14:47:41] kedump: data:0xff8c2000, size:0x8000, offset:0x100200, va:0x418c2000
[2025-12-03 14:47:41] kedump: 6-PT[1] 8000@ff8d4000 -> 26000(0)
[2025-12-03 14:47:41] kedump: data:0xff8d4000, size:0x8000, offset:0x108200, va:0x418d4000
[2025-12-03 14:47:41] kedump: 7-PT[1] 8000@ff8e6000 -> 2e000(0)
[2025-12-03 14:47:41] kedump: data:0xff8e6000, size:0x8000, offset:0x110200, va:0x418e6000
[2025-12-03 14:47:41] kedump: 8-PT[1] 9000@0 -> 36000(0)
[2025-12-03 14:47:41] kedump: data:0x814d7000, size:0x9000, offset:0x118200, va:0x414d7000
[2025-12-03 14:47:41] kedump: 9-PT[1] 4000@0 -> 3f000(0)
[2025-12-03 14:47:41] kedump: data:0x81827000, size:0x4000, offset:0x121200, va:0x41827000
[2025-12-03 14:47:41] kedump: 10-PT[1] 9000@0 -> 43000(0)
[2025-12-03 14:47:41] kedump: data:0x81218000, size:0x9000, offset:0x125200, va:0x41218000
[2025-12-03 14:47:41] kedump: 11-PT[1] 9000@0 -> 4c000(0)
[2025-12-03 14:47:41] kedump: data:0x80cdf000, size:0x9000, offset:0x12e200, va:0x41cdf000
[2025-12-03 14:47:41] kedump: 12-PT[1] 9000@0 -> 55000(0)
[2025-12-03 14:47:41] kedump: data:0x818cc000, size:0x9000, offset:0x137200, va:0x418cc000
[2025-12-03 14:47:41] kedump: 13-PT[1] 9000@0 -> 5e000(0)
[2025-12-03 14:47:41] kedump: data:0x805b4000, size:0x9000, offset:0x140200, va:0x415b4000
[2025-12-03 14:47:41] kedump add: SYS_MINI_RDUMP[3] 67000/67000@e2200
[2025-12-03 14:47:41] kedump: data:0x9c1e0000, size:0x2d00, offset:0xe2200, va:0x411e0000
[2025-12-03 14:47:41] kedump: mini_rdump 0x66d00/0x67000 @0xe2200
[2025-12-03 14:47:41] kedump: misc[0x40042078] 500@2800
[2025-12-03 14:47:41] kedump: miscs[0x40044800], size 40
[2025-12-03 14:47:41] kedump: data:0x9c1e3000, size:0xe00, offset:0x149200, va:0x411e3000
[2025-12-03 14:47:41] kedump add: PROC_CUR_TSK[4] e00/e00@149200
[2025-12-03 14:47:41] kedump: data:0x813d0db8, size:0x80000, offset:0x14a000, va:0x413d0db8
[2025-12-03 14:47:41] kedump add: SYS_KERNEL_LOG_RAW_0[5] 80000/80000@14a000
[2025-12-03 14:47:41] kedump: data:0x81840000, size:0x20000, offset:0x1ca000, va:0x41840000
[2025-12-03 14:47:41] kedump add: SYS_LAST_KMSG[6] 20000/20000@1ca000
[2025-12-03 14:47:41] kedump: data:0x81838000, size:0x4cc0, offset:0x1ea000, va:0x41838000
[2025-12-03 14:47:41] kedump add: SYS_RR_DESC_RAW[7] 4cc0/4cc0@1ea000
[2025-12-03 14:47:41] kedump: data:0x8eb40000, size:0x4b00, offset:0x1eecc0, va:0x41b40000
[2025-12-03 14:47:41] kedump add: SYS_MODULES_INFO_RAW[8] 4b00/4b00@1eecc0
[2025-12-03 14:47:41] kedump: data:0x9a000800, size:0x6000, offset:0x1f37c0, va:0x41000800
[2025-12-03 14:47:41] kedump add: SYS_EXTRA_MDSS_RAW[9] 6000/6000@1f37c0
[2025-12-03 14:47:41] kedump: data:0x9def0020, size:0x9aa5, offset:0x1f97c0, va:0x41ef0020
[2025-12-03 14:47:41] kedump add: SYS_CUR_PLLK[10] 9aa5/9aa5@1f97c0
[2025-12-03 14:47:41] kedump: data:0x9dc14000, size:0x20000, offset:0x203265, va:0x41c14000
[2025-12-03 14:47:41] kedump add: SYS_ATF_LOG[11] 20000/20000@203265
[2025-12-03 14:47:41] kedump: data:0x9c6a106c, size:0x800, offset:0x223265, va:0x416a106c
[2025-12-03 14:47:41] ATF: dev_write:1, atf fp addr pa:0x9dc13800 va:0x0x40072000 size:0x800
[2025-12-03 14:47:41] kedump add: SYS_ATF_FOOTPRINT[12] 800/800@223265
[2025-12-03 14:47:41] kedump: data:0xbfd70000, size:0x80000, offset:0x223a65, va:0x41d70000
[2025-12-03 14:47:41] ATF: dev_write:1, atf ramdump addr pa:0xbfd70000 va:0x0x40073000, size:0x80000
[2025-12-03 14:47:41] kedump add: SYS_ATF_RDUMP[13] 80000/80000@223a65
[2025-12-03 14:47:41] get_suffix:229: [LK] boot_ctrl magic number is match, compare priority 15, 14
[2025-12-03 14:47:41] load_mkimg_part_info:71: magic number : 0x58881688
[2025-12-03 14:47:41] load_mkimg_part_info:72: name : dpmpm
[2025-12-03 14:47:41] load_mkimg_part_info:73: size : 31668
[2025-12-03 14:47:41] load_mkimg_part_info:71: magic number : 0x58881688
[2025-12-03 14:47:41] load_mkimg_part_info:72: name : cert1
[2025-12-03 14:47:41] load_mkimg_part_info:73: size : 1733
[2025-12-03 14:47:41] load_mkimg_part_info:71: magic number : 0x58881688
[2025-12-03 14:47:41] load_mkimg_part_info:72: name : cert2
[2025-12-03 14:47:41] load_mkimg_part_info:73: size : 981
[2025-12-03 14:47:41] load_mkimg_part_info:71: magic number : 0x58881688
[2025-12-03 14:47:41] load_mkimg_part_info:72: name : dpmdm
[2025-12-03 14:47:42] load_mkimg_part_info:73: size : 928
[2025-12-03 14:47:42] load_mkimg_part_info:71: magic number : 0x58881688
[2025-12-03 14:47:42] load_mkimg_part_info:72: name : cert1
[2025-12-03 14:47:42] load_mkimg_part_info:73: size : 1733
[2025-12-03 14:47:42] load_mkimg_part_info:71: magic number : 0x58881688
[2025-12-03 14:47:42] load_mkimg_part_info:72: name : cert2
[2025-12-03 14:47:42] load_mkimg_part_info:73: size : 981
[2025-12-03 14:47:42] load_mkimg_part_info:71: magic number : 0x58881688
[2025-12-03 14:47:42] load_mkimg_part_info:72: name : dpmpt
[2025-12-03 14:47:42] load_mkimg_part_info:73: size : 287327
[2025-12-03 14:47:42] load_partition:152: mkimg hdr detected (287327)
[2025-12-03 14:47:42] [SEC_POLICY] sboot_state = 0x1
[2025-12-03 14:47:42] [SEC_POLICY] lock_state = 0x1
[2025-12-03 14:47:42] load_partition:167: img_auth_required = 1
[2025-12-03 14:47:42] [SEC] SBC_EN = 0, SEC_LEVEL: 0
[2025-12-03 14:47:42] [SEC] SW RoT Verify [PASS]
[2025-12-03 14:47:42] [SEC] dpmpt cert chain vfy pass
[2025-12-03 14:47:42] [SEC] ver:(group,verk,verc,otp,max)=(1, 0, 0, 0, 64) ok
[2025-12-03 14:47:42] [SEC] image dpmpt header auth pass
[2025-12-03 14:47:42] [SEC] image dpmpt auth pass
[2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x200, offset:0x2a3a65, va:0x416a10b4
[2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x4fe00, offset:0x2a3c65, va:0x416a18bc
[2025-12-03 14:47:42] kedump add: SYS_DPM_XFILE[14] 50000/50000@2a3a65
[2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x24, offset:0x2f3a65, va:0x416a10b4
[2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x8000, offset:0x2f3a89, va:0x416a18bc
[2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x5c, offset:0x2fba89, va:0x416a10b4
[2025-12-03 14:47:42] kedump: data:0x9c69be2c, size:0x14, offset:0x2fbae5, va:0x4169be2c
[2025-12-03 14:47:42] kedump: data:0x9c69be0c, size:0x8, offset:0x2fbaf9, va:0x4169be0c
[2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x84, offset:0x2fbb01, va:0x416a10b4
[2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x8000, offset:0x2fbb85, va:0x416a18bc
[2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x5c, offset:0x303b85, va:0x416a10b4
[2025-12-03 14:47:42] kedump: data:0x9c69be2c, size:0x14, offset:0x303be1, va:0x4169be2c
[2025-12-03 14:47:42] kedump: data:0x9c69be0c, size:0x8, offset:0x303bf5, va:0x4169be0c
[2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x84, offset:0x303bfd, va:0x416a10b4
[2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x20, offset:0x303c81, va:0x416a10b4
[2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x20, offset:0x303ca1, va:0x416a10b4
[2025-12-03 14:47:42] END DPM DUMP.
[2025-12-03 14:47:42] kedump add: SYS_DPM_DATA[15] 1025c/1025c@2f3a65
[2025-12-03 14:47:42] kedump: data:0x11d800, size:0x200, offset:0x303cc1, va:0x4111d800
[2025-12-03 14:47:42] kedump add: SYS_LAST_DRAMC[16] 200/200@303cc1
[2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x2fc, offset:0x303ec1, va:0x416a18bc
[2025-12-03 14:47:42] kedump add: SYS_LASTEMI_RAW[17] 2fc/2fc@303ec1
[2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x34000, offset:0x3041bd, va:0x416a18bc
[2025-12-03 14:47:42] kedump add: SYS_MCUPM_COREDUMP[18] 34000/34000@3041bd
[2025-12-03 14:47:42] dfd_internal_dump_check_triggered_or_not: dfd_status = 0x3
[2025-12-03 14:47:42] dfd_internal_dump_check_triggered_or_not: dfd_internal_dump_triggered = 0x1
[2025-12-03 14:47:42] dfd_mcu_get: paddr = (0xffc00000)
[2025-12-03 14:47:42] dfd_mcu_get, no plat_dfd_decode function
[2025-12-03 14:47:42] save_dfd_mcu_data: In dfd_mcu dump
[2025-12-03 14:47:42] kedump: data:0xffc00000, size:0x280000, offset:0x3381bd, va:0x41c00000
[2025-12-03 14:47:42] save_dfd_mcu_data: dfd_mcu done (len = 0x280000)
[2025-12-03 14:47:42] kedump add: DFD.dfd[19] 280000/280000@3381bd
[2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x246, offset:0x5b81bd, va:0x416a18bc
[2025-12-03 14:47:42] lastpc done
[2025-12-03 14:47:42] plat_dfd_mcu done
[2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x5a5, offset:0x5b8403, va:0x416a18bc
[2025-12-03 14:47:42] return_stack done
[2025-12-03 14:47:42] tracker done
[2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x4c6, offset:0x5b89a8, va:0x416a18bc
[2025-12-03 14:47:42] lastbus done
[2025-12-03 14:47:42] etb done
[2025-12-03 14:47:42] kedump add: SYS_LAST_CPU_BUS[20] cb1/cb1@5b81bd
[2025-12-03 14:47:42] mblock_alloc_range_no_lock:504: start: 0xeeff0000, sz: 0x10000 lower_bound: 0x0, limit: 0xef000000,map:0 name:SPM-reserved
[2025-12-03 14:47:42] get_suffix:229: [LK] boot_ctrl magic number is match, compare priority 15, 14
[2025-12-03 14:47:42] load_mkimg_part_info:71: magic number : 0x58881688
[2025-12-03 14:47:42] load_mkimg_part_info:72: name : spmfw
[2025-12-03 14:47:42] load_mkimg_part_info:73: size : 13699
[2025-12-03 14:47:42] load_partition:152: mkimg hdr detected (13699)
[2025-12-03 14:47:42] [SEC_POLICY] sboot_state = 0x1
[2025-12-03 14:47:42] [SEC_POLICY] lock_state = 0x1
[2025-12-03 14:47:42] load_partition:167: img_auth_required = 1
[2025-12-03 14:47:42] [SEC] SBC_EN = 0, SEC_LEVEL: 0
[2025-12-03 14:47:42] [SEC] SW RoT Verify [PASS]
[2025-12-03 14:47:42] [SEC] spmfw cert chain vfy pass
[2025-12-03 14:47:42] [SEC] ver:(group,verk,verc,otp,max)=(1, 0, 0, 0, 64) ok
[2025-12-03 14:47:42] [SEC] image spmfw header auth pass
[2025-12-03 14:47:42] [SEC] image spmfw auth pass
[2025-12-03 14:47:42] spmfw version: pcm_suspend_20240105
[2025-12-03 14:47:42] mblock_free_with_size:947: start 0xeeff0000 size: 0x10000, name: SPM-reserved
[2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x544, offset:0x5b8e6e, va:0x416a18bc
[2025-12-03 14:47:42] kedump add: SYS_LAST_SPM_DATA[21] 544/544@5b8e6e
[2025-12-03 14:47:42] kedump: data:0x12002000, size:0x4000, offset:0x5b93b2, va:0x41002000
[2025-12-03 14:47:42] kedump add: SYS_LAST_SPM_SRAM_DATA[22] 4000/4000@5b93b2
[2025-12-03 14:47:42] kedump: data:0xbffc8080, size:0x3fc, offset:0x5bd3b2, va:0x41fc8080
[2025-12-03 14:47:42] kedump add: SYS_SSPM_LAST_LOG[23] 3fc/3fc@5bd3b2
[2025-12-03 14:47:42] kedump: data:0xbfeff634, size:0x5cfec, offset:0x5bd7ae, va:0x41eff634
[2025-12-03 14:47:42] kedump add: SYS_SSPM_XFILE[24] 5cfec/5cfec@5bd7ae
[2025-12-03 14:47:43] kedump: data:0x9c6a132c, size:0x274, offset:0x61a79a, va:0x416a132c
[2025-12-03 14:47:43] kedump add: SYS_SSPM_DATA[25] 274/274@61a79a
[2025-12-03 14:47:43] kedump: data:0xbffb0000, size:0x18000, offset:0x61aa0e, va:0x41fb0000
[2025-12-03 14:47:43] kedump: data:0xbffc8000, size:0x80, offset:0x632a0e, va:0x41fc8000
[2025-12-03 14:47:43] kedump add: SYS_SSPM_COREDUMP[26] 18080/18080@61aa0e
[2025-12-03 14:47:43] kedump: data:0x9c6a18bc, size:0x965, offset:0x632a8e, va:0x416a18bc
[2025-12-03 14:47:43] kedump add: SYS_LAST_DVFSRC_DATA[27] 965/965@632a8e
[2025-12-03 14:47:43] kedump: data:0x11bc00, size:0x1400, offset:0x6333f3, va:0x4111bc00
[2025-12-03 14:47:43] kedump add: SYS_CPUHVFS_RAW[28] 1400/1400@6333f3
[2025-12-03 14:47:43] kedump: data:0x11b000, size:0x800, offset:0x6347f3, va:0x4111b000
[2025-12-03 14:47:43] kedump add: SYS_MCDI_DATA[29] 800/800@6347f3
[2025-12-03 14:47:43] kedump: data:0x9c68542c, size:0x5000, offset:0x634ff3, va:0x4168542c
[2025-12-03 14:47:43] kedump add: ZAEE_LOG[30] 5000/5000@634ff3
[2025-12-03 14:47:43] kedump mini done
[2025-12-03 14:47:43] aee_check_enable:290: lk aee dcfg = full (lv.2)
[2025-12-03 14:47:43] mrdump_get_env:93: mrdump_output: none
[2025-12-03 14:47:43] [MRDUMP10] D:Boot record found at 0x4011e000[5852]
[2025-12-03 14:47:43] mrdump_detection:285: sram record with mode 4
[2025-12-03 14:47:43] mrdump_get_env:93: mrdump_mem_size:
[2025-12-03 14:47:43] [MRDUMP10] I:Kdump triggerd by 'HWT' (address:80000000, size:2048M)
[2025-12-03 14:47:43] gen_cmm:mrdump_cblock=0x4011e000, crach_record=0x4011e0f8
[2025-12-03 14:47:43] crash_recode msg: HWT