高通平台死机分析

高通平台死机分析
  1. 抓取死机dump

    • 连接USB,设备管理器有端口900E
    • 打开QPST configuration,自动保存dump,路径:C:\ProgramData\Qualcomm\QPST\Sahara\Port_COM145
    • dump抓取完成后,手机会自动重启
  2. 找到对应的符号表vmlinux
    如何判断vmlinux是否与死机版本对应?

    • 用UE打开vmlinux,查找关键字"SMP PREEMPT",会输出如下内容,确定编译时间

      Linux version 4.14.83+ (cibuild@cibuild) (clang version 6.0.9 for Android NDK) #1 SMP PREEMPT Wed Jun 12 23:38:51 CST 2019

    • 通过dmesg抓取开机log或者通过命令 "cat /proc/version", 确定机器所运行软件编译时间

      K81928AA1:/ # cat /proc/version
      Linux version 4.14.83+ (cibuild@cibuild) (clang version 6.0.9 for Android NDK) #1 SMP PREEMPT Wed Jun 12 23:38:51 CST 2019

      dmesg:

      [0.000000] [<0>][0, swapper]Linux version 4.14.83+ (cibuild@cibuild) (clang version 6.0.9 for Android NDK) #1 SMP PREEMPT Wed Jun 12 23:38:51 CST 2019

  1. 登录高通carsh分析网站,Qualcommon Carsh Analsys Protal

     选择Chipset, Software Product, dump log路径, 符号表路径
    
     Chipset:SM8150
     Software Product:SM8150.LA.2.0
     Log Location:C:\ProgramData\Qualcomm\QPST\Sahara\Port_COM145 (dump文件目录)
     Build Location:E:\img\1928\2019-06-12-22-48-21\SW_xxxxxx_symbol\symbols  (此目录下包含了vmlinx符号文件)
    
  2. 如果符号表匹配正确,稍等几分钟,网站会输出报告QCAPReport.html,通过该报告可查看死机原因

     244.889835:   <6> Internal error: Accessing user space memory outside uaccess.h routines: 9600004f [#1] PREEMPT SMP
     244.901438:   <6> Modules linked in: wlan(O) machine_dlkm(O) wsa881x_dlkm(O) wcd9360_dlkm(O) wcd934x_dlkm(O) mbhc_dlkm(O) swr_ctrl_dlkm(O) wcd9xxx_dlkm(O) fs16xx_dlkm(O) wcd_core_dlkm(O) stub_dlkm(O) wcd_spi_dlkm(O) hdmi_dlkm(O) swr_dlkm(O) pinctrl_wcd_dlkm(O) usf_dlkm(O) native_dlkm(O) platform_dlkm(O) q6_dlkm(O) adsp_loader_dlkm(O) apr_dlkm(O) q6_notifier_dlkm(O) q6_pdr_dlkm(O) wglink_dlkm(O) msm_11ad_proxy
     244.939517:   <6> CPU: 5 PID: 4008 Comm: cat Tainted: G S      W  O    4.14.83+ #1
     244.948176:   <6> Hardware name: Qualcomm Technologies, Inc. SM8150 V2 PM8150 MTP (DT)
     244.957198:   <6> task: ffffffc42507d800 task.stack: ffffff8044fc8000
     244.964717:   <2> pc : __memcpy+0x30/0x180
     244.969828:   <2> lr : vsnprintf+0x114/0x4d8
     244.975101:   <2> sp : ffffff8044fcba60 pstate : 00400145
     244.981532:   <2> x29: ffffff8044fcbad0 x28: 0000000000000020 
     244.988407:   <2> x27: 000000000000002f x26: 00000000ffffffff 
     244.995286:   <2> x25: ffffff8044fcbbb0 x24: ffffff9a98ea9942 
     245.002169:   <2> x23: 000000621a4dc8b0 x22: ffffff9a98ea9971 
     245.009045:   <2> x21: 000000629a4dc8af x20: ffffff8044fcbb98 
     245.016009:   <2> x19: ffffff9a98a93778 x18: 0000000000000001 
     245.023120:   <2> x17: 000000773a09a78c x16: ffffff9a97a5c4a4 
     245.030006:   <2> x15: aaaaaaaaaaaaaaab x14: 0000000000000050 
     245.036892:   <2> x13: 0000000000000000 x12: ffffff80ffffffd0 
     245.043775:   <2> x11: 0000000000000000 x10: ffffff9a98a93930 
     245.050660:   <2> x9 : ffffff9a988dfac0 x8 : 000000000000002f 
     245.057539:   <2> x7 : 0000001dc76a24c1 x6 : 000000621a4dc8b0 
     245.064418:   <2> x5 : 0000000000000000 x4 : 000000000000000e 
     245.071301:   <2> x3 : 0000000000003d3d x2 : 0000000000000021 
     245.078182:   <2> x1 : ffffff9a98ea9944 x0 : 000000621a4dc8b0 
     245.085064:   <2> 
     PC: 0xffffff9a988d0270:
     245.093008:   <2> 0270  d65f03c0 00000000 00000000 00000000 aa0003e6 f100405f 540003c3 cb0103e4
     245.102829:   <2> 0290  f2400c84 540001c0 cb040042 36000064 38401423 380014c3 36080064 78402423
     245.112647:   <2> 02b0  780024c3 36100064 b8404423 b80044c3 36180064 f8408423 f80084c3 f101005f
     245.122474:   <2> 02d0  5400032a f27c0443 54000140 7100807f 54000080 540000ab a8c12027 a88120c7
     245.132299:   <2> 
     LR: 0xffffff9a988dfaa4:
     245.140243:   <2> faa4  f9400122 aa1703e0 aa1503e1 aa0803e3 9400037f aa0003f7 17ffffe0 eb1502ff
     245.150061:   <2> fac4  54000102 cb1702a8 eb1b011f aa1703e0 1a9bb108 aa1803e1 93407d02 97ffc1e8
     245.159878:   <2> fae4  8b1b02f7 17ffffd5 b9800328 36f800a8 11002109 7100013f b9000329 5400160d
     245.169706:   <2> fb04  f9400288 91002109 f9000289 b9400101 910043e0 940001f6 17ffffc8 b9800328
     245.179529:   <2> 
     SP: 0xffffff8044fcba20:
     245.187482:   <2> ba20  988d02b0 ffffff9a 00400145 00000000 98ea9971 ffffff9a 17b8f400 5549d54f
     245.197302:   <2> ba40  ffffffff 0000007f 98a93778 ffffff9a 44fcbad0 ffffff80 988d02b0 ffffff9a
     245.207126:   <2> ba60  7fffffff 00000000 1a4dc8b0 00000062 00000000 00000000 17b8f400 5549d54f
     245.216950:   <2> ba80  2507d800 ffffffc4 98901000 ffffff9a 998d3000 ffffff9a 00000124 00000000
     245.226782:   <2> 
     245.229750:   <6> Process cat (pid: 4008, stack limit = 0xffffff8044fc8000)
     245.237794:   <2> Call trace:
     245.241741:   <2>  __memcpy+0x30/0x180
     245.246596:   <2>  sprintf+0x7c/0xa4
     245.251165:   <2>  gt1x_debug_read_proc+0x74/0x368
     245.256977:   <2>  proc_reg_read+0x90/0xc4
     245.262084:   <2>  __vfs_read+0x54/0x144
     245.267020:   <2>  vfs_read+0xa4/0x13c
     245.271764:   <2>  SyS_read+0x60/0xc0
     245.276420:   <2>  el0_svc_naked+0x34/0x38
     245.281521:   <6> Code: 38401423 380014c3 36080064 78402423 (780024c3) 
     245.289205:   <6> ---[ end trace 8a0a0b8d7a66762a ]---
     245.295386:   <6> Kernel panic - not syncing: Fatal exception
    
  3. 根据上述log以及Call trace,可以确定执行到__memcpy函数偏移0x30的地方carsh,把vmlinux符号文件拷贝到Android源码路径:android/prebuilts/gcc/linux-x86/aarch64/aarch64-linux-android-4.9/bin/ 目录下,使用如下命令反编译符号文件aarch64-linux-androidkernel-objdump -D -t ./vmlinux > vmlinux_objdump.txt,使用UE工具,打开vmlinux_objdump.txt, __memcpy函数入口地址为ffffff80090d0280,则__memcpy+0x30地址为ffffff80090d02b0, 摘取vmlinux_objdump.txt反编译文件函数__memcpy部分代码如下,可以看到死机时正在执行的指令为strh w3, [x6],#2(Store halfword from w3 to x6, then x6 = x6 + 2);

     ffffff80090d0280 <__memcpy>:
     ffffff80090d0280:   aa0003e6    mov x6, x0
     ffffff80090d0284:   f100405f    cmp x2, #0x10
     ffffff80090d0288:   540003c3    b.cc    ffffff80090d0300 <__memcpy+0x80>
     ffffff80090d028c:   cb0103e4    neg x4, x1
     ffffff80090d0290:   f2400c84    ands    x4, x4, #0xf
     ffffff80090d0294:   540001c0    b.eq    ffffff80090d02cc <__memcpy+0x4c>
     ffffff80090d0298:   cb040042    sub x2, x2, x4
     ffffff80090d029c:   36000064    tbz w4, #0, ffffff80090d02a8 <__memcpy+0x28>
     ffffff80090d02a0:   38401423    ldrb    w3, [x1],#1
     ffffff80090d02a4:   380014c3    strb    w3, [x6],#1
     ffffff80090d02a8:   36080064    tbz w4, #1, ffffff80090d02b4 <__memcpy+0x34>
     ffffff80090d02ac:   78402423    ldrh    w3, [x1],#2
     ffffff80090d02b0:   780024c3    strh    w3, [x6],#2
     ffffff80090d02b4:   36100064    tbz w4, #2, ffffff80090d02c0 <__memcpy+0x40>
     ffffff80090d02b8:   b8404423    ldr w3, [x1],#4
     ffffff80090d02bc:   b80044c3    str w3, [x6],#4
     ffffff80090d02c0:   36180064    tbz w4, #3, ffffff80090d02cc <__memcpy+0x4c>
     ffffff80090d02c4:   f8408423    ldr x3, [x1],#8
     ffffff80090d02c8:   f80084c3    str x3, [x6],#8
     ffffff80090d02cc:   f101005f    cmp x2, #0x40
     ffffff80090d02d0:   5400032a    b.ge    ffffff80090d0334 <__memcpy+0xb4>
     ffffff80090d02d4:   f27c0443    ands    x3, x2, #0x30
     ffffff80090d02d8:   54000140    b.eq    ffffff80090d0300 <__memcpy+0x80>
     ffffff80090d02dc:   7100807f    cmp w3, #0x20
     ffffff80090d02e0:   54000080    b.eq    ffffff80090d02f0 <__memcpy+0x70>
     ffffff80090d02e4:   540000ab    b.lt    ffffff80090d02f8 <__memcpy+0x78>
     ffffff80090d02e8:   a8c12027    ldp x7, x8, [x1],#16
     ffffff80090d02ec:   a88120c7    stp x7, x8, [x6],#16
     ffffff80090d02f0:   a8c12027    ldp x7, x8, [x1],#16
    
  4. strh w3, [x6],#2往X6寄存器保存的地址写值,通过第4步解析的log,X6寄存器保存的值为 000000621a4dc8b0(此为用户空间的地址),是一个非法地址,__memcpy的入口地址指令,可以看到X6 是从寄存器 X0拷贝而来,也即是传递给__memcpy的第一个参数是一个用户空间地址。

    • 64位系统虚拟地址映射:用户地址的位 63:39 设为 0。内核地址的相同位设为 1
      • 0x0000_0000_0000_0000 – 0x0000_007F_FFFF_FFFF:用户空间
      • 0xFFFF_FF80_0000_0000 – 0xFFFF_FFFF_FFFF_FFFF:内核
    • ARM汇编中,R0~R3用来传递第一至第四个参数,超出的参数通过堆栈来传递。R0寄存器同时用来存放函数的返回值。被调用的函数在返回前无须恢复这些寄存器的值。(R0 对等 X0)
  5. 根据Call trace我们很容易追踪到非法地址的引入源头gt1x_debug_read_proc+0x74,注意偏移0x74地址为ffffff80089b4560,但需要减4个字节ffffff80089b455c(根据调用流程推导,具体原因不明),使用命令aarch64-linux-android-addr2line -e vmlinux -Cf ffffff80089b455c可以转换具体的代码行,如下可以直接查到104行代码ptr += sprintf(ptr, "==== GT1X default config setting in driver====\n")

    xxxxx@*****:~/workspace/project/xxxxxx/android/prebuilts/gcc/linux-x86/aarch64/aarch64-linux-android-4.9/bin$ ./aarch64-linux-android-addr2line -e vmlinux -Cf ffffff80089b455c
    gt1x_debug_read_proc
    /devdata/jenkins/dailybuild/xxxxxx/android/kernel/msm-4.14/drivers/input/touchscreen/gt1x_v1.6_generic/gt1x_generic.c:104

     ffffff80089b44ec <gt1x_debug_read_proc>:
     ffffff80089b44ec:   a9ba6ffc    stp x28, x27, [sp,#-96]!
     ffffff80089b44f0:   a90167fa    stp x26, x25, [sp,#16]
     ffffff80089b44f4:   a9025ff8    stp x24, x23, [sp,#32]
     ffffff80089b44f8:   a90357f6    stp x22, x21, [sp,#48]
     ffffff80089b44fc:   a9044ff4    stp x20, x19, [sp,#64]
     ffffff80089b4500:   a9057bfd    stp x29, x30, [sp,#80]
     ffffff80089b4504:   910143fd    add x29, sp, #0x50
     ffffff80089b4508:   d10043ff    sub sp, sp, #0x10
     ffffff80089b450c:   d000afe8    adrp    x8, ffffff8009fb2000 <xt_connlimit_locks+0x1480>
     ffffff80089b4510:   aa0303f3    mov x19, x3
     ffffff80089b4514:   aa0103f6    mov x22, x1
     ffffff80089b4518:   f941c508    ldr x8, [x8,#904]
     ffffff80089b451c:   f81a83a8    stur    x8, [x29,#-88]
     ffffff80089b4520:   97db8345    bl  ffffff8008095234 <_mcount>
     ffffff80089b4524:   f000b8fa    adrp    x26, ffffff800a0d3000 <dev_attr_keys+0x18>
     ffffff80089b4528:   910003e9    mov x9, sp
     ffffff80089b452c:   b941f748    ldr w8, [x26,#500]
     ffffff80089b4530:   91003d08    add x8, x8, #0xf
     ffffff80089b4534:   927c7108    and x8, x8, #0x1fffffff0
     ffffff80089b4538:   cb080135    sub x21, x9, x8
     ffffff80089b453c:   910002bf    mov sp, x21
     ffffff80089b4540:   f9400268    ldr x8, [x19]
     ffffff80089b4544:   b4000068    cbz x8, ffffff80089b4550 <gt1x_debug_read_proc+0x64>
     ffffff80089b4548:   aa1f03e0    mov x0, xzr
     ffffff80089b454c:   140000b4    b   ffffff80089b481c <gt1x_debug_read_proc+0x330>
     ffffff80089b4550:   b00067a1    adrp    x1, ffffff80096a9000 <f_midi_cin_length+0x977d>
     ffffff80089b4554:   91250821    add x1, x1, #0x942
     ffffff80089b4558:   aa1603e0    mov x0, x22
     ffffff80089b455c:   941cb212    bl  ffffff80090e0da4 <sprintf>
     ffffff80089b4560:   d0010ed4    adrp    x20, ffffff800ab8e000 <debug_buffer+0x9df>
    
  6. 这个死机问题,其实比较简单,不需要前2步分析,也能判断大概死机原因。根据这个logInternal error: Accessing user space memory outside uaccess.h routines: 9600004f [#1] PREEMPT SMP,其实就可以大概猜测到传递给__memcpy函数的地址可能是非法的用户空间地址,只需跟踪Call trace,找到非法参数引入的地方。查看 gt1x_debug_read_proc代码,发现ptr += sprintf(ptr, "==== GT1X default config setting in driver====\n") 参数ptr的地址赋值为用户空间地址page,故引起死机。

     static ssize_t gt1x_debug_read_proc(struct file *file, char __user * page,
                                         size_t size, loff_t * ppos)
     {
    
         char *ptr = page;
         char temp_data[gt1x_cfg_length];
         struct irq_desc *irq_desc = NULL;
         int i;
         int ret;
    
         if(*ppos) {
             return 0;
         }
     
         ptr += sprintf(ptr, "==== GT1X default config setting in driver====\n");
     
         for(i = 0; i < gt1x_cfg_length; i++) {
             ptr += sprintf(ptr, "0x%02X,", gt1x_config[i]);
             if(i % 10 == 9 && i != GTP_CONFIG_ORG_LENGTH)
                 ptr += sprintf(ptr, "\n");
     
             if(i == GTP_CONFIG_ORG_LENGTH - 1)
                 ptr += sprintf(ptr, "\n-------------\n");
         }
     
         ptr += sprintf(ptr, "\n");
     
         ptr += sprintf(ptr, "==== GT1X config read from chip====\n");
         ret = gt1x_i2c_read(GTP_REG_CONFIG_DATA, temp_data,
                             GTP_CONFIG_ORG_LENGTH);
         if(ret)
             GTP_ERROR("gt1x_i2c_read GTP_REG_CONFIG_DATA fail!");
     
         if(ret == 0 && gt1x_cfg_length == GTP_CONFIG_ORG_LENGTH +
                 GTP_CONFIG_EXT_LENGTH) {
             ret = gt1x_i2c_read(GTP_REG_EXT_CONFIG,
                                 &temp_data[GTP_CONFIG_ORG_LENGTH],
                                 GTP_CONFIG_EXT_LENGTH);
             if(ret)
                 GTP_ERROR("gt1x_i2c_read GTP_REG_EXT_CONFIG fail!");
         }
     
         for(i = 0; i < gt1x_cfg_length; i++) {
             ptr += sprintf(ptr, "0x%02X,", temp_data[i]);
             if(i % 10 == 9 && i !=  GTP_CONFIG_ORG_LENGTH)
                 ptr += sprintf(ptr, "\n");
     
             if(i == GTP_CONFIG_ORG_LENGTH - 1)
                 ptr += sprintf(ptr, "\n-------------\n");
         }
     
         ptr += sprintf(ptr, "\n");
         /* Touch PID & VID */
         ptr += sprintf(ptr, "==== GT1X Version Info ====\n");
     
         ret = gt1x_i2c_read(GTP_REG_VERSION, temp_data, 12);
         if(ret)
             GTP_ERROR("gt1x_i2c_read GTP_REG_VERSION fail!");
         ptr += sprintf(ptr, "ProductID: GT%c%c%c%c\n", temp_data[0],
                        temp_data[1], temp_data[2], temp_data[3]);
         ptr += sprintf(ptr, "PatchID: %02X%02X\n", temp_data[4], temp_data[5]);
         ptr += sprintf(ptr, "MaskID: %02X%02X\n", temp_data[7], temp_data[8]);
         ptr += sprintf(ptr, "SensorID: %02X\n", temp_data[10] & 0x0F);
     
         irq_desc = irq_to_desc(gt1x_i2c_client->irq);
         if(irq_desc) {
             ptr += sprintf(ptr, "IRQ: %d, irq_desc->disable-depth:%d\n",
                            gt1x_i2c_client->irq, irq_desc->depth);
         }
         *ppos += ptr - page;
         size = ptr - page;
         return size;
     }
    
  7. 更改代码,修复死机bug

     diff --git a/drivers/input/touchscreen/gt1x_v1.6_generic/gt1x_generic.c b/drivers/input/touchscreen/gt1x_v1.6_generic/gt1x_generic.c
     index bd8bdae..669f287 100644
     --- a/drivers/input/touchscreen/gt1x_v1.6_generic/gt1x_generic.c
     +++ b/drivers/input/touchscreen/gt1x_v1.6_generic/gt1x_generic.c
     @@ -91,7 +91,8 @@ static void gt1x_deinit_debug_node(void)
      static ssize_t gt1x_debug_read_proc(struct file *file, char __user * page,
                                          size_t size, loff_t * ppos)
      {
     -    char *ptr = page;
     +    char *ptr;
     +    char *ptr_start;
          char temp_data[gt1x_cfg_length];
          struct irq_desc *irq_desc = NULL;
          int i;
     @@ -101,6 +102,15 @@ static ssize_t gt1x_debug_read_proc(struct file *file, char __user * page,
              return 0;
          }
      
     +    GTP_INFO("%s size=%d\n", __func__, size);
     +    ptr = kmalloc(size, GFP_KERNEL);
     +    if (!ptr) {
     +        GTP_ERROR("Fail to alloc memory");
     +        return -EFAULT;
     +    }
     +
     +    ptr_start = ptr;
     +
          ptr += sprintf(ptr, "==== GT1X default config setting in driver====\n");
      
          for(i = 0; i < gt1x_cfg_length; i++) {
     @@ -156,8 +166,16 @@ static ssize_t gt1x_debug_read_proc(struct file *file, char __user * page,
              ptr += sprintf(ptr, "IRQ: %d, irq_desc->disable-depth:%d\n",
                             gt1x_i2c_client->irq, irq_desc->depth);
          }
     -    *ppos += ptr - page;
     -    size = ptr - page;
     +
     +    size = ptr - ptr_start;
     +    if (copy_to_user(page, ptr_start, size)) {
     +        GTP_ERROR("copy_to_user failed");
     +        kfree(ptr_start);
     +        return -EFAULT;
     +    }
     +
     +    kfree(ptr_start);
     +    *ppos += size;
          return size;
      }
    
  8. 执行命令,可以cat出TP参数

    xxxxxx:/ # cat /proc/gt1x_debug
    ==== GT1X default config setting in driver====
    0x0C,0x38,0x04,0xB8,0x08,0x0A,0x3D,0x0C,0xA8,0xE1,
    0x0E,0x6C,0x50,0x3C,0x5A,0x01,0x11,0x14,0x01,0x02,
    0x46,0x85,0x85,0xC6,0x48,0x04,0x00,0x00,0x1E,0x3C,
    0x00,0x33,0x00,0x51,0x14,0x00,0x12,0x14,0x00,0x40,
    0x00,0x00,0x00,0x00,0x08,0x00,0x88,0x28,0x21,0x56,
    0x58,0xEB,0x06,0x38,0x7E,0x18,0x0D,0x43,0x24,0x33,
    0x54,0x32,0xAF,0x80,0x54,0xF2,0x19,0x0B,0x04,0xDC,
    0x46,0xAA,0x5B,0xAA,0x70,0x7F,0x85,0x77,0x9A,0x74,
    0x42,0x4B,0x40,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
    0x00,0x00,0x00,0x0F,0x1E,0x00,0x81,0x24,0xE3,0x3C,
    0x38,0x40,0x08,0x2C,0x50,0x00,0x00,0x00,0x01,0x73,
    0x0A,0x32,0xE1,0x84,0x84,0x00,0x00,0x00,0x00,0x00,
    0x00,0x00,0x00,0x20,0x00,0x00,0x00,0x00,0x00,0x00,
    0x00,0x00,0x00,0x00,0x2E,0x56,0xDF,0x07,0x41,0x1E,
    0x04,0x03,0x02,0x05,0x07,0x06,0x08,0x09,0x01,0x00,
    0x0A,0x0D,0x0F,0x10,0x11,0x13,0x0B,0x0C,0x1B,0x19,
    0x18,0x14,0x15,0x12,0x16,0x17,0x1A,0x1D,0x1C,0x1E,
    0x1F,0x0E,0x1C,0x05,0x04,0x06,0x07,0x09,0x08,0x0B,
    0x0F,0x0C,0x0D,0x0E,0x0A,0x19,0x1B,0x1A,0x01,0xFF,
    0xFF,0xFF,0xFF,0xFF,0x00,0x30,0x11,0x13,0x00,0x0F,
    0x00,0x00,0x00,0x80,0x00,0x00,0x00,0x00,0x00,0x00,
    0x00,0x00,0x32,0x1E,0x00,0x00,0xA8,0xE4,0x95,0x5A,
    0x78,0x03,0x14,0x50,0x6E,0x01,0x0F,0x50,0x02,0x44,
    0x00,0x30,0x23,0x9D,0x09,0x26,0xF2,0x31,0x01,
    -------------
    
    ==== GT1X config read from chip====
    0x0C,0x38,0x04,0xB8,0x08,0x0A,0x3D,0x0C,0xA8,0xE1,
    0x0E,0x6C,0x50,0x3C,0x5A,0x01,0x11,0x14,0x01,0x02,
    0x46,0x85,0x85,0xC6,0x48,0x04,0x00,0x00,0x1E,0x3C,
    0x00,0x33,0x00,0x51,0x14,0x00,0x12,0x14,0x00,0x40,
    0x00,0x00,0x00,0x00,0x08,0x00,0x88,0x28,0x21,0x56,
    0x58,0xEB,0x06,0x38,0x7E,0x18,0x0D,0x43,0x24,0x33,
    0x54,0x32,0xAF,0x80,0x54,0xF2,0x19,0x0B,0x04,0xDC,
    0x46,0xAA,0x5B,0xAA,0x70,0x7F,0x85,0x77,0x9A,0x74,
    0x42,0x4B,0x40,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
    0x00,0x00,0x00,0x0F,0x1E,0x00,0x81,0x24,0xE3,0x3C,
    0x38,0x40,0x08,0x2C,0x50,0x00,0x00,0x00,0x01,0x73,
    0x0A,0x32,0xE1,0x84,0x84,0x00,0x00,0x00,0x00,0x00,
    0x00,0x00,0x00,0x20,0x00,0x00,0x00,0x00,0x00,0x00,
    0x00,0x00,0x00,0x00,0x2E,0x56,0xDF,0x07,0x41,0x1E,
    0x04,0x03,0x02,0x05,0x07,0x06,0x08,0x09,0x01,0x00,
    0x0A,0x0D,0x0F,0x10,0x11,0x13,0x0B,0x0C,0x1B,0x19,
    0x18,0x14,0x15,0x12,0x16,0x17,0x1A,0x1D,0x1C,0x1E,
    0x1F,0x0E,0x1C,0x05,0x04,0x06,0x07,0x09,0x08,0x0B,
    0x0F,0x0C,0x0D,0x0E,0x0A,0x19,0x1B,0x1A,0x01,0xFF,
    0xFF,0xFF,0xFF,0xFF,0x00,0x30,0x11,0x13,0x00,0x0F,
    0x00,0x00,0x00,0x80,0x00,0x00,0x00,0x00,0x00,0x00,
    0x00,0x00,0x32,0x1E,0x00,0x00,0xA8,0xE4,0x95,0x5A,
    0x78,0x03,0x14,0x50,0x6E,0x01,0x0F,0x50,0x02,0x44,
    0x00,0x30,0x23,0x9D,0x09,0x26,0xF2,0x31,0x00,
    -------------
    
    ==== GT1X Version Info ====
    ProductID: GT9286
    PatchID: 0601
    MaskID: 0101
    SensorID: 00
    IRQ: 239, irq_desc->disable-depth:0
最后编辑于
©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 205,033评论 6 478
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 87,725评论 2 381
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 151,473评论 0 338
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 54,846评论 1 277
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 63,848评论 5 368
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 48,691评论 1 282
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 38,053评论 3 399
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 36,700评论 0 258
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 42,856评论 1 300
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 35,676评论 2 323
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 37,787评论 1 333
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 33,430评论 4 321
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 39,034评论 3 307
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 29,990评论 0 19
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 31,218评论 1 260
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 45,174评论 2 352
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 42,526评论 2 343