ELF@@*( $cam_smmu_find_mapping_by_dma_buf6CAM_ERR: %s: %s: %d Error: dma buf map attachment failed 6CAM_ERR: %s: %s: %d Trying to release secheap twice 6CAM_ERR: %s: %s: %d Error: Not detach/attach: %d MAPcam_smmu_alloc_iova6CAM_ERR: %s: %s: %d Error: can't map non-secure mem to secure cb cam_smmu_destroy_handle6CAM_ERR: %s: %s: %d Error: failed to setup cb : %s cam_smmu_map_buffer_and_add_to_listcam_smmu_dump_cb_info6CAM_ERR: %s: %s: %d Error: mapping_info is invalid 6CAM_ERR: %s: %s: %d Error: dma map attachment failed idx=%d, ion_fd=%d, dev=%pK, paddr=%pK, len=%u6CAM_ERR: %s: %s: %d Error: %s get handle fail 6CAM_ERR: %s: %s: %d Incorrect region id present in DT file: %d 6CAM_ERR: %s: %s: %d Invalid Discard region specified in CB, rc=%d 6CAM_INFO: %s: %s: %d [%s] : Discard region specified [0x%x 0x%x] in [0x%x 0x%x] 6CAM_WARN: %s: %s: %d Failed to allocate dma_params cam_smmu_free_iova6CAM_ERR: %s: %s: %d Secondary heap not supported cam_smmu_attach_device6CAM_ERR: %s: %s: %d handle or index invalid. idx = %d hdl = %x 6CAM_ERR: %s: %s: %d Shared mem not supported 6CAM_ERR: %s: %s: %d Error: %s already got handle 0x%x cam_smmu_create_iommu_handlecam_smmu_clean_kernel_buffer_listFree mapping address %pK, i = %d, dma_buf = %pKcam_smmu_free_scratch_buffer_remove_from_list6CAM_ERR: %s: %s: %d Requested scratch buffer length not page aligned mapped virtual address = %lxqcom,msm-cam-smmumap_profile_enablecam_smmu_page_fault_work6CAM_ERR: %s: %s: %d Can not read discard region %d 6CAM_ERR: %s: %s: %d Invalid fd %d iommu_map_sg returned iova=%pK, size=%zu6CAM_ERR: %s: %s: %d Error: dma buf attach failed, idx=%d, ion_fd=%d I/O area for hdl = %x Region:[%pK %zu] Discard:[%pK %zu]cam_smmu_check_handle_unique6CAM_ERR: %s: %s: %d Error: virt_len > phys_len qcom,qsmmu-cam-cb6CAM_ERR: %s: %s: %d iova-mem-map not present 6CAM_ERR: %s: %s: %d Incorrect Discard region specified [0x%x 0x%x] 6CAM_ERR: %s: %s: %d CB has no domain set 6CAM_ERR: %s: %s: %d Error: Wrong region id passed 6CAM_ERR: %s: %s: %d Error: Invalid inputs, paddr_ptr:%pK, len_ptr: %pK 6CAM_ERR: %s: %s: %d Invalid region_info pointer 6CAM_ERR: %s: %s: %d Error: can't get non-secure mem from secure cb cam_smmu_print_kernel_listcam_smmu_dealloc_qdss6CAM_ERR: %s: %s: %d Error: Context bank does not support scratch bufs 6CAM_ERR: %s: %s: %d Failed to read iova-region-start 6CAM_ERR: %s: %s: %d Genpool chunk creation failed No discard region specifiedcam_smmu_unmap_validate_params6CAM_ERR: %s: %s: %d Error: dma get buf failed. rc = %d 6CAM_ERR: %s: %s: %d hdl is not valid, idx=%d, table_hdl = %x, hdl = %x 6CAM_ERR: %s: %s: %d %u. ion_fd=%d start=0x%x end=0x%x len=%u region=%d 6CAM_ERR: %s: %s: %d Input pointers are invalid 6CAM_ERR: %s: %s: %d cb_init_count=%d, cb_num=%d 6CAM_ERR: %s: %s: %d Trying to allocate twice Found virtual address %lx6CAM_ERR: %s: %s: %d Failed to read qdss phy addr 6CAM_INFO: %s: %s: %d PF already handled %d %d %d 6CAM_ERR: %s: %s: %d Error: hdl is not valid, table_hdl = %x, hdl = %x 6CAM_ERR: %s: %s: %d Error: Invalid handle 6CAM_ERR: %s: %s: %d unmap util validation failure SMMU: removing buffer idx = %d6CAM_ERR: %s: %s: %d Error: unmap or remove list fail find ion_fd %d6CAM_ERR: %s: %s: %d Error: can't map non-secure mem to secure cb idx=%d cam_smmu_map_stage2_buffer_and_add_to_list6CAM_ERR: %s: %s: %d mapping or add list fail Free mapping address %pK, i = %d, fd = %d6CAM_ERR: %s: %s: %d QDSS memory not supported for this SMMU handle nents = %lu, idx = %d, virt_len = %zx6CAM_ERR: %s: %s: %d Error: Context bank does not support scratch buffers 6CAM_ERR: %s: %s: %d failed to create map_profile_enable 6CAM_ERR: %s: %s: %d Failed to read iova-region-id 6CAM_ERR: %s: %s: %d Error: Input args are invalid 6CAM_ERR: %s: %s: %d Error: ARM IOMMU attach failed. ret = %d cam_smmu_map_user_iova6CAM_ERR: %s: %s: %d translate direction failed. dir = %d 6CAM_ERR: %s: %s: %d Error: mapping or add list fail, idx=%d, handle=%d, fd=%d, rc=%d 6CAM_ERR: %s: %s: %d Firmware not supported 6CAM_ERR: %s: %s: %d Error: Cannot find fd %d by index %d 6CAM_ERR: %s: %s: %d %s Should not regiester more handlers 6CAM_ERR: %s: %s: %d Error: table sgl is null cam_smmu_map_iova_validate_paramscam_smmu_map_stage2_iova6CAM_ERR: %s: %s: %d I/O memory not supported for this SMMU handle cam_smmu_get_handle%s creates handle 0x%xcam_smmu_clean_user_buffer_list6CAM_ERR: %s: %s: %d Buffer delete failed: idx = %d 6CAM_ERR: %s: %s: %d Error: Invalid page bits in scratch map cam_smmu_alloc_scratch_buffer_add_to_listiova-region-nameX: cb init count :%d6CAM_ERR: %s: %s: %d Error: domain = %pK, device = %pK include/linux/dma-mapping.h6CAM_ERR: %s: %s: %d Error: Invalid params idx = %d, fd = %d region_id=%d, paddr=%pK, len=%d, dma_map_attrs=%dfind dma_buf %pKQDSS area len from DT = %zuvirt_len = %zx, phys_len = %zx6CAM_ERR: %s: %s: %d Error: no context banks present qcom,msm-cam-smmu-fw-dev6CAM_ERR: %s: %s: %d Error: populating devices cb_dump_enableiova-region-lencam_smmu_init_scratch_mapRemoving SHARED buffer paddr = %pK, len = %zu6CAM_ERR: %s: %s: %d Error: dma map attachment failed, size=%zu 6CAM_ERR: %s: %s: %d Error: Cannot find name %s or all handle exist cam_smmu_dealloc_firmwaresmmu handle = %x, idx = %d, dir = %d6CAM_ERR: %s: %s: %d Error: allocating context banks 6CAM_ERR: %s: %s: %d failed to create dump_enable_debug labeliova-region-startregion_start -> %X6CAM_ERR: %s: %s: %d Error: Cannot find entry by index %d cam_smmu_attach6CAM_INFO: %s: %s: %d ========Dumping monitor information for cb %s=========== table sgl: %pK, rc: %d, dma_address: 0x%xcam_smmu_translate_dir6CAM_ERR: %s: %s: %d Error: Input pointer or lengths invalid cam_smmu_find_mapping_by_virt_address&iommu_cb_set.payload_list_lockcam_smmu_find_closest_mappingiova-mem-mapregion_id -> %X6CAM_ERR: %s: %s: %d Error: Space Allocation failed 6CAM_ERR: %s: %s: %d Error: translate direction failed. dir = %d fd:%d already in list idx:%d, handle=%d give same addr back6CAM_ERR: %s: %s: %d SMMU context bank pointer invalid cam_smmu_get_io_region_info6CAM_ERR: %s: %s: %d Error: handle pointer is NULL 6CAM_ERR: %s: %s: %d i=%d, handle=%d, name_addr=%pK 6CAM_ERR: %s: %s: %d iommu_map_sg() failed 6CAM_ERR: %s: %s: %d Error: Invalid device cam_alloc_smmu_context_banksqdss6CAM_ERR: %s: %s: %d No memory regions found, at least one needed cam_smmu_setup_cbUNMAPcam_smmu_map_kernel_iova6CAM_ERR: %s: %s: %d KMD %s buffer list is not clean 6CAM_ERR: %s: %s: %d Failed to map QDSS into IOMMU 6CAM_ERR: %s: %s: %d FW memory alloc failed DMA alloc returned fw = %pK, hdl = %pK6CAM_ERR: %s: %s: %d failed to create dentry cam_populate_smmu_context_banks6CAM_ERR: %s: %s: %d Invalid discard region specified %d Discard region [0x%x 0x%x]6CAM_ERR: %s: %s: %d initial checks failed, unable to proceed 6CAM_ERR: %s: %s: %d buffer validation failure cam_smmu_dump_monitor_array6CAM_ERR: %s: %s: %d Error: Cannot find virtual address %lx by index %d 6CAM_ERR: %s: %s: %d Error: failed to read label from sub device Shared mem start->%lXShared mem len->%zu6CAM_ERR: %s: %s: %d Error: failed to create scratch map 6CAM_ERR: %s: %s: %d iova = %lX, flags = %d 6CAM_ERR: %s: %s: %d IOMMU mapping failed 6CAM_ERR: %s: %s: %d Error: ATTACH fail 6CAM_ERR: %s: %s: %d Error: Input pointers are invalid no of context banks :%dapprox va %lx not in range: %lx-%lx fd = %0xiova-region-discard6CAM_ERR: %s: %s: %d Error: token is NULL or invalid handle cam_smmu_unmap_user_iova6CAM_ERR: %s: %s: %d Error:dma_buf = %pK, attach = %pK cam_smmu_find_mapping_by_ion_index6CAM_ERR: %s: %s: %d Error: can't unmap secure mem from non secure cb 6CAM_ERR: %s: %s: %d Invalid dma_buf iova=%pK, region_id=%d, paddr=%pK, len=%d, dma_map_attrs=%dcam_smmu_probeidx: %d fd = %d ref_count: %d6CAM_ERR: %s: %s: %d Error: Invalid params idx = %d, dma_buf = %pK cam_smmu_ops6CAM_INFO: %s: %s: %d **** %llu:%llu:%llu.%llu : Index[%d] [%s] : ion_fd=%d start=0x%x end=0x%x len=%u region=%d 6CAM_ERR: %s: %s: %d Invalid handle 6CAM_ERR: %s: %s: %d ion_fd:%d not in the mapped list cam_smmu_get_region_info6CAM_ERR: %s: %s: %d name="%s", dev=%pK 6CAM_ERR: %s: %s: %d index = %d phys_len = %zx, iommu_dir = %d, virt_addr = %pKiova-region-idcam_smmu_unmap_stage2_iovacam_smmu_set_client_page_fault_handler6CAM_ERR: %s: %s: %d dma_buf :%pK already in the list 6CAM_ERR: %s: %s: %d Buffer delete failed: addr = %lx, fd = %d 6CAM_ERR: %s: %s: %d Error: Invalid params: dev = %pK, table = %pK cam_smmu_put_scratch_iovaFound label -> %sregion_len -> %X6CAM_ERR: %s: %s: %d Mismatch Discard region specified, [0x%x 0x%x] [0x%x 0x%x] 6CAM_ERR: %s: %s: %d Error: can't unmap non-secure mem from secure cb 6CAM_ERR: %s: %s: %d IOMMU unmap failed cam_smmu_find_mapping_by_sec_buf_idx6CAM_ERR: %s: %s: %d Error: Index invalid. idx = %d hdl = %x Allocating iova size = %zu for smmu hdl=%Xcam_smmu_create_add_handle_in_tableiommu handle is init number. Need to try again6CAM_INFO: %s: %s: %d Closest map fd %d 0x%lx %llu-%llu 0x%lx-0x%lx buf=%pK mem %0x 6CAM_ERR: %s: %s: %d Error: populate more than allocated cb 6CAM_ERR: %s: %s: %d Error: Getting region info 6CAM_ERR: %s: %s: %d Error: create domain Failed 6CAM_ERR: %s: %s: %d Error: idx = %d, ops = %d 6CAM_ERR: %s: %s: %d IOVA alloc failed for shared memory, size=%zu, idx=%d, handle=%d iommu handle %d conflicts6CAM_ERR: %s: %s: %d ion_fd = %d, paddr= 0x%pK, len = %u, region = %d 6CAM_ERR: %s: %s: %d Firmware memory not supported for this SMMU handle 6CAM_ERR: %s: %s: %d Error: mapping or add list fail 6CAM_ERR: %s: %s: %d Error: cannot allocate context banks 6CAM_INFO: %s: %s: %d Found va 0x%lx in:0x%lx-0x%lx, fd %d cb:%s cam_smmu_iommu_fault_handler6CAM_ERR: %s: %s: %d Error: Invalid params! idx = %d, fd = %d cam_smmu_unmap_kernel_iova6CAM_ERR: %s: %s: %d Error: dma buf attach failed 6CAM_ERR: %s: %s: %d Failed: Unmapped = %zu, requested = %zu 6CAM_ERR: %s: %s: %d fd:%d already in list idx:%d, handle=%d, give same addr back 6CAM_ERR: %s: %s: %d Error: Shared memory not supported for hdl = %X 4------------[ cut here ]------------ msm_cam_smmu6CAM_INFO: %s: %s: %d closest buf 0x%x idx %d cam_smmu_put_iova6CAM_ERR: %s: %s: %d Error: iommu hardware name is NULL 6CAM_ERR: %s: %s: %d Requested virt length not aligned with phys length getting Arm SMMU ctx : %s6CAM_ERR: %s: %s: %d Error: token is NULL 6CAM_ERR: %s: %s: %d Error: Invalid iova while freeing scratch buffer 6CAM_ERR: %s: %s: %d Only %zu unmapped out of total %zu &iommu_cb_set.cb_info[i].lock6CAM_ERR: %s: %s: %d Invalid argument(s) 6CAM_ERR: %s: %s: %d Failed to read iova-region-len 6CAM_ERR: %s: %s: %d Invalid Discard region specified in IO region, rc=%d 6CAM_ERR: %s: %s: %d Error: Invalid params dev = %pK, table = %pK 6CAM_ERR: %s: %s: %d ********** Context bank dump for %s ********** cam_smmu_get_stage2_iova6CAM_ERR: %s: %s: %d Scratch memory not supported cam_smmu_get_iova6CAM_ERR: %s: %s: %d Buffer delete failed: addr = %lx, dma_buf = %pK cam_smmu_translate_dir_to_iommu_dir6CAM_ERR: %s: %s: %d Payload list empty 6CAM_ERR: %s: %s: %d Unmapped = %zu, requested = %zu cam_smmu_secure_unmap_buf_and_remove_from_list6CAM_ERR: %s: %s: %d Unmapped only %zx instead of %zx 6CAM_ERR: %s: %s: %d Trying to deallocate firmware that is not allocated 6CAM_ERR: %s: %s: %d Could not find valid iova for scratch buffer 6CAM_ERR: %s: %s: %d IOVA region not found qdss-phy-addrFound region -> %s6CAM_ERR: %s: %s: %d Page count is zero, size passed = %zu include/linux/scatterlist.hcam_smmu_unmap_buf_and_remove_from_listcam_smmu_reserve_sec_heapDMA buf: %pK, device: %pK, attach: %pK, table: %pK6CAM_ERR: %s: %s: %d Error: dma buf get failed, idx=%d, ion_fd=%d 6CAM_ERR: %s: %s: %d Trying to deallocate qdss that is not allocated paddr = %pK, len = %zx, phys_len = %zx6CAM_ERR: %s: %s: %d Error: Invalid params qcom,msm-cam-smmu-cbcam_smmu_create_debug_fs6CAM_INFO: %s: %s: %d Cannot find vaddr:%lx in SMMU %s virt address 6CAM_ERR: %s: %s: %d Error: QSMMU ctx not supported for : %s 6CAM_ERR: %s: %s: %d Error: handle or index invalid. idx = %d hdl = %x cam_smmu_release_sec_heapcam_smmu_map_buffer_validatecam_smmu_map_kernel_buffer_and_add_to_listcam_smmu_print_tableFirmware area len from DT = %zu6CAM_ERR: %s: %s: %d Error: populating context banks 6CAM_ERR: %s: %s: %d [%s] : Incorrect Discard region specified [0x%x 0x%x] in [0x%x 0x%x] cam_smmu_unset_client_page_fault_handler6CAM_ERR: %s: %s: %d Error: hdl %x no matching tokens: %s 6CAM_ERR: %s: %s: %d Trying to allocate secheap twice 6CAM_ERR: %s: %s: %d Err:Dev %s should call SMMU attach before map buffer idx=%d, dma_buf=%pK, dev=%pK, paddr=%pK, len=%u6CAM_ERR: %s: %s: %d Error: hdl is not valid, idx=%d, table_hdl=%x, hdl=%x 6CAM_ERR: %s: %s: %d Error: can't get secure mem from non secure cb 6CAM_ERR: %s: %s: %d IOVA free failed 6CAM_ERR: %s: %s: %d Error: Direction is invalid. dir = %d 6CAM_ERR: %s: %s: %d hdl is not valid, table_hdl = %x, hdl = %x 6CAM_ERR: %s: %s: %d Invalid region id: %d for smmu hdl: %X create handle value = %x6CAM_ERR: %s: %s: %d UMD %s buffer list is not clean 6CAM_ERR: %s: %s: %d Buffer delete in kernel list failed: idx = %d 6CAM_ERR: %s: %s: %d Error: Invalid address cam_smmu_alloc_qdss6CAM_ERR: %s: %s: %d Failed to map FW into IOMMU cam_smmu_get_scratch_iova6CAM_ERR: %s: %s: %d Handle or index invalid. idx = %d hdl = %x cam_smmu_print_user_listcam_smmu_free_scratch_vacam_smmu_alloc_firmwarecamera_smmucam_smmu_get_memory_regions_infoqcom,secure-cb6CAM_ERR: %s: %s: %d Context bank does not have IO region 6CAM_ERR: %s: %s: %d Error: index is not valid, index = %d, token = %s unmap fd: %d, idx : %d6CAM_ERR: %s: %s: %d mapping or add list fail, idx=%d, fd=%d, region=%d, rc=%d 6CAM_ERR: %s: %s: %d Usage: shared_usage=%u io_usage=%u shared_free=%u io_free=%u 6CAM_ERR: %s: %s: %d Error: can't map secure mem to non secure cb, idx=%d 6CAM_ERR: %s: %s: %d IO memory not supported 6CAM_ERR: %s: %s: %d dma_buf = %pK, paddr= 0x%pK, len = %u, region = %d cam_smmu_get_discard_memory_regions 5>g_num_pf_handledqcom,msm-cam-smmuqcom,msm-cam-smmu-cbqcom,msm-cam-smmu-fw-devH HZLT(ȋ(LThlҨoTHȋ(LTH5HaTȜ҈̽Z<T<w(6hmT҈hH, Tw(6hTߙ҈EH%( T("Th=ҨL5^m T=ҨL5^TҨ.h#T葐UaT( ȓ TH ҈hȯm Th ҈hȯ Tiݤ(HA` THH҈H+T( ȓTulҨo` T҈$ȇhV T(hra T]҈hH TNs T[h THHՎҨȔh@T<Ҩ-hehT9h HZ ThȪȆ/T*'$!  ?AT_A_֠@9qCT_@*^{_WO1` T! @|S*k T@R*"@")A?k T R" I@?T R" *@_T R" *@_T R" *@_@T R" @? TAR H ()R(IR(!iR@ R~   @ A)Q @ R" OCWB_A{Ĩ^__RBcMRRBcNR**R@ R~ ABcOR*@R@ R" @BcQR*^{_WO1T@|S*kBT@R**h"@i")@95 R" AkA T** !cRR** 7*@ R" *OCWB_A{Ĩ^__RBR RBÇR**RBRRBRR@ R" ABR* RBR***RB#R^{O*7@ R* )(@)?T @_kT@?aTRBC~R*!cR}R*OA{¨^__RB|R*^{#WO@*@Hh @h@@j R Q") R!  Bj}ʛ RJBI R6! B߂9hB@!&h@cRRh&@h@:h@d@e@f&@@B9h4ch@~@ qTqTd@e&@!cRR@ Ra@b&@" @h&@ T@ R`*@" A 5@ R" @ R" i&@ @I `@b@`@`@@9h4#6i"C( tt* _)@?aT{COFWE#@^__R@ R~)e @iiRRd@CRRRRe&@Rt&@RBR^{ O*_1`T@t~Sk"T@ R")A*?kaT R" 1@**OB @{è^__RBØRRBÙR* R@ R" ABR*^{_WO*1|S` T@k T@ Ri")@9 4* R *@ )A?k T R# @T@?kT@aTRBR**2!cR₀R*bB_QqBkT!cRb`R**^B6"@( @!cRYR**3RBC_R**&RBC\R** RB]RR@ R# AB^R*@ R# *OCWB_A{Ĩ^__^{_WO1 T@|S*k T@R*h"@i")@9 5 R" )A?ka T4 R" (@)A?T]_T@?ATRBCR*Z!cRR5 !cRBR** 7*ORBR RBÇR**RB#R4RB#R$R@ R" AB#R*RBRRBR*@ R" *OCWB_A{Ĩ^__*RBR^{ _WO1@ T @|S*k T@R*"@")A?ka T R# A?q@ Ta) @ R # *ف_q T R # klyi )_ Tv # I@?@T R # *@_T R # *@_T R # *@_ T R# @?A TARO R    @ M)QHB()R?RBcERFRBcFR**:R@ R ABcGR*@&(IRR@ R @BHR@(!iR@ R    @ A)Q @ R# ODWC_B @{Ũ^__R@ R# @BLR*^{og_WO@|Skb T@ R")@9i 4* R @@9( 5 ? TRU@Y!ih@ ?b T*ZR[` ?B T@ R@ @# @@y@dR T@ R  *R 9|@ *b*RBҀR**TRBcӀRIRBCԀR@ R# u9RBcՀR*)RBրRRB׀RRsB#ـR@@a@** @A@ @@ R# *OEWD_CgBoA{ƨ^__^{ WO@|SkBT@ Ri")@9I4* R~ @@9h4R^y@@@ATR~S*R@@9@*OCWB @{Ĩ^__*RB݀R**RBހRRBC߀R@ R" `RB#R^{_WO1T@|S*kBT@R**"@"AkAT***@ R" *OCWB_A{Ĩ^__RBRRB×R**R@ R" ABØR* RB㙁R**^{_WO1T@|S*kBT@R**"@")A?kATq`T 5 R" )A4?qA T R" @ 7@ R*" s R" )A?qT5 R~ @@)R* b3`*^RBCRXRB#R**KR@ R~ AB#R*@6RBCR**R@ R" AB㎀R*RBfR*RBRS@ R" *OCWB_A{Ĩ^__^{og_WOC@******* 5@~SRh"@i")@9)5 Ri" )A?kT Ri" )A5 Ri" (@)?T @_kT@?aT*f***5@ RB@h" @6V@j R Qh" R@!  Bj}ʛ RJBI R7! B5R9B@*&@&@@:@ Rh"  @)@? T{A*OFWE_DgCoB^__*RBiRRBCjR*R@ Rh" ABCkR**R@ Rh" @BClR*RBRv6RBnR***** _R) @BcmR***6^{ObC*1 T*q_@TqT@~SkT*6RBcR+RBdR!RB#]R*RBeR* RBfR**OA{¨^__^{og_ W O @>=?T@9****h4c@ Rii?T_q* T*@?T@ Ri# 5@5@/w% Rh# A1$T!cRbR*@PkB$T@ R # )A?k$T R # )@9I&4 R# 1@&4@ @@dR!cRR*7@@ R@h# _qT7@o*@?T@ R/* @(u@@h#  @!) &@@@cR"R**@9h4@ @ Ri iicRR@cR@bR*@R r R@@`P'@)R@ $h)$ h )@ Rj /@&ij!cRbR*RBR*RBRRBR*RBRRBR*RBCR|RBRrRd@BCR*jR BcR@_qTH@ Ru @A*H@!@@@uFRBÒR*RB#R*R@ R# ABR*RBR*u@R@@/@$@ Rh# ABCR** _)@?aT{F*OKWJ_IgHoG^__^{og_WO @R|@T(@9h5*RV @A3KRV@9h5*RV @A4KRRV@c4RRAA#5R**@9H4@Rb@T3RR[@RF_H@E@I^6R* @sbATRbA?AT{DOIWH_GgFoE^__?lT* i (Q BI}ɛ)Bә R:RRb@B#)R4R;bRSshAji AJjc-}Jͫ*}ۛ Rg+DJEM#Hhk}͛V%H}ۛiCEӋR hU(}țD RRtB hH9jAkA@l:Bq m +RB3+飐RHi=r })eӊ R9q: T^{og_WOCcW*_ qBT*1|S@T@kTH@ Ri")@94* Rv *H@ )A?kT Ri# (@)?T @_k T@?aT*?BTH@ Ri ii_?BTH@IR;K{*H`??"T(@ )@R @ @3I rJ~I   (@R@@(@(RI@@ )@ R t &it!cRMR**H@c@*6# _!  @cR"VR A_***) A**y@** 7H@ Rh# {A*OFWE_DgCoB^__RBPRRB#]R*RBQR*RBSR**RBSR*RH@ Rh# ABTR**RBFR**v6RBCWR****RBHR**|RBIRm^{g_WOC@*****5qTHRKH@3SRh"H@i")@95 Ri" )A?kaT Ri" )A5 Ri" (@)A?T ]_@T@?aT****5@ RBH@h" @A6VH@j R Qh" R@!  Bj}ʛ RJBI R6! B5RՂ9B@*&@&@@:H@ Rh"  @)@?!T{A*OFWE_DgC@^__*RBCqRRB#]R*xRzRBcrRRH@ Rh" ABCsR*RH@ Rh" @BCtR*RBR86RBcvR _R @BcuR8^{ _WO" *1 T_@~Sk T@ R")@9 4* R~ *@ )A?k T R" (@)?T @_kT@?aTRBR*K _* @@ R" *ODWC_B @{Ũ^__RBcRRBRRBR**RBCRR@ R" ABCR*^{ _WOB *1 T@~Sk T@R*"*@" qT *JLii8k ` R" )@94 R" E@A$ R" )@94 R" U@ R" )@94 R" 5@ R" )@94 R" e@A  R" )@94 R" u@i@ Rh@" *ODWC_B @{Ũ^__RBƀR RB#ǀRRBȀR**RBȀR@ R" RBπR**RBɀR$RBˀRRB#̀RRBC̀R RBc΀R@ R" @^{g_WOb # *1 T_@~Sk T@ Ri")@9 5* R: *@ )A?k T R)# (@)?T @_k T@?aTRB}R**K _* @@ R(# *ODWC_BgA{Ũ^__RBCxRRBxRRBczR**RB#{RR@ R(# AB#|R*^{_WOC1TA@|S*kT(@ R #)@94* R8} (@!e@cRĀR(@*i@(@m@(@q@@@@(@*{AOEWD_C@^__RBRRB€R**RB€R^{og_WOC@ !@54v@**RkZC@T Y7 @}@ 5Rh@ )A?1@T R# )@94 R# A) h@ R h@ )@9)4 R# A*RaR!cAR @yRdR**1T @@4*J? kTK!9kA1@TkTRbR!c* R  h@ h@  )@94 R# A) !cRlR*h@ R# *pRBmRR@)BRRBc?R**R@ R" ABc@R*RBCAR*RBCR^{_WOA!uBb@4`A``A4@ 4@@4 RR}  r*@!cRBR`A!@4AR*@6RBCR}`A!4!R*6RBcRi`A!4*} ``A!* 7s{{ )hh"`!Bhh&hBh*h.` c4R@ cb@4RRBRIRB㲁RRB#R RBcRRBcRt*OCWB_A{Ĩ^__RBRRBRRBR`@^{O@ RabAb`A!`4`@OA*{¨^__^{ _WO@(4*R@ k"T@}@ a6)@94b @Ib@94b 3@?3b@9H4b#@#@`B ODWC_B @{Ũ^__^{og_WO@@e@)?kAT@|AR*4k!`A7uATB5B!!R(k 88##/k#@#CR() !+< A +; +:  +9 ! A+8 a       *Z{ !A*RcR*F4s c=@7s#R7#R7#R7^ 5#R!7]q(T kjih8) /@(R(9C^+@(^'@A;@(R(9C^7@(^3@8G@(R(9C^C@(^?@/Y(RK@(9C^X(^w(`4*RʁR**5Z(R(9C^Z(^Y \(R(9C^\(^[(][(]RB́R@c^Rb́RcC^ŔRc^ŔRc]ŔRc*(RH5*RcÁRM*RcāRE*RcŁR=*RƁR5R]́RRBR**CR@(k@9(4R @(k5 R5k @M AT R*k @Jq@? T*H 4/@A'7@94 @*) 8q@ T]!@cR܁RR4kB8 vx*4RR5k&R6kJV@s*cRRZ@cRªR#5R5kB8(4R(k9@iLӉ$45@hLCiR* rR(k! $RirS(k- %QR(k@94R(k?TR(k@R(kAR*(kR(k@9H4R(k@]!@`[ARR r`[!h[Ah  @!$cRBRRB#ׁRWRBׁRA*RBcفRRBþRsRR(k@@@q@BЁRc*RBρR*X R5k L T R7k Mj  "T( TR]@@@@D@(BCԁR*5RBCՁRW,R]@B܁RW(RBïRYR R])k @@@)i@D@(BҁRRBCځR _)@? T{R*OWWV_UgToS^__RB#R#w1RB#R@6#RBoRRB㬁R@94R3k`2@2@94R3k`"@"WR]@B#݁RRBށR[C^{og_WOBTRB-R6 #@(  s `'h@ R^" @`TR9 g@駟I *?qRAR!c@{@"Tx_h@uT?CTR@ Rg@" @B?R_<R(@ R" @BDR*C@:R=3f@@C@'@@ BCRu5(@ R" 6@6`΄Ҁ@hP(@ R}^" _@*?(@ R" 6@6`΄Ҁ@hP(@ R}^" _@*?(@ R" 6@6`΄Ҁ@hP(@ R}^" _@*?(@ R" 7@7`΄Ҁ@hP(@ R}^" _@*?(@ R" @`΄Ҁ@hP(@ R}^" _@*?*{COHWG_FgEoD^_C_RB/R**^{WOC@A?!RqT*qaT!CR7@4@h4 !c@RR@*@h !c@R¹R* @)@?T{A*OCWB^__@R@)B㻁R@RBCR**@RBCRDR^{og_WOC* @|4;@*3R>>f C f _^{!{^__^{{^__description=MSM Camera SMMU driverparmtype=g_num_pf_handled:intlicense=GPL v2softdep=pre: camcc_kona camcc_lito arm_smmuintree=Yname=cam_smmu_apivermagic=4.19.191-gc2161d44afae-ab7624114 SMP preempt mod_unload modversions aarch64depends=cam_debug_utilcam_smmu_alloc_firmwarecam_smmu_alloc_qdsscam_smmu_dealloc_firmwarecam_smmu_dealloc_qdsscam_smmu_destroy_handlecam_smmu_get_handlecam_smmu_get_io_region_infocam_smmu_get_iovacam_smmu_get_region_infocam_smmu_get_stage2_iovacam_smmu_map_kernel_iovacam_smmu_map_stage2_iovacam_smmu_map_user_iovacam_smmu_opscam_smmu_put_iovacam_smmu_release_sec_heapcam_smmu_reserve_sec_heapcam_smmu_set_client_page_fault_handlercam_smmu_unmap_kernel_iovacam_smmu_unmap_stage2_iovacam_smmu_unmap_user_iovacam_smmu_unset_client_page_fault_handlerS0?module_layoutg__stack_chk_guard__stack_chk_fail܃__ll_sc_atomic64_add_returnވmemstart_addrKkmalloc_cachesWdummy_dma_opsparam_ops_intVplatform_driver_unregister;debugfs_remove_recursive "debugfs_create_bool)/debugfs_create_dirdevm_kfree$___ratelimit#gen_pool_add_virt giommu_dma_reserve_iova*iommu_dma_enable_best_fit_algodxiommu_get_domain_for_devL"lgen_pool_destroygen_pool_createsof_property_count_elems_of_sizeM-of_property_read_variable_u32_arraykof_find_propertyx3of_get_child_by_nameUh$iommu_set_fault_handler8of_property_read_stringydevm_kmallocof_get_next_available_childcrof_platform_populateVof_device_is_compatible87__platform_driver_registerFqgen_pool_freegen_pool_allocƞktime_get_real_ts64|EF}dma_buf_getUrS__list_del_entry_validE/__bitmap_clearh__list_add_validYa__bitmap_setg{dbitmap_find_next_zero_area_off-__alloc_pages_nodemask地__kmalloc3qmkmem_cache_alloc_trace zkfreeO[sg_free_tablej__free_pagesysg_next,fVsg_alloc_tableH.iommu_detach_device=W:iommu_attach_deviceyget_random_bytesZ%strcmpdma_release_from_dev_coherent,__cfi_slowpath`-dma_alloc_from_dev_coherentdma_buf_putHEdma_buf_detachdma_buf_unmap_attachmentiommu_map_sgdIdma_buf_map_attachmentpjdma_buf_attachiommu_unmapiiommu_mapccam_debug_logv__mutex_init2: mutex_unlock֮Amutex_lockcam_get_module_name2|printkLinuxcam_smmu_apiGNU9WxHUV[WXY Z\<]8^_0`(aDb,c$de fHg@h4ij<@TXlp$<P`11X01X01 1 1  $01<1@1D1Px|    t ,PX& \ `& d lxX0 X0 S  S  " "      4<@ DH Xlt x |  [[ [   [  , H P  T [X  \ [h  m m   k 3$ Q.( , Q.8 l | 3 Q. ; Q. ;        $ L  T  \  ` d p 3 1 ) m m    Q. * Q. *  ( ", "8 H L Q.T "X Q.\ "h p | }, },   w3 Q. w3 Q.  l    8 5X ` d h l t   X0  X0         $PT5#5## # !8 !8$4 <1X,\6`,d6x)'!'!X0!X0!~!~!  , 8!< @!LTd<DHLP\dh4lp4A' A' t &  &  X0 X0  S $A'(S ,A'4DL"PA'T"XA'`lp| A' A'VA'VA'08 <A'@ DA'L8!8!X08!X08!,8<T X8!\ `8!lpq8!q8!8<H1T8!X1\8!h @` X0y.X0y.y.y.$4<02@y.D02Hy.PTdt| y. y.\'y.\'y.&y.&y.y.y.  0 8 <L   ( ,8DltX0x0|X0000b0b0'0 '$04\`tx& (& ( $X0((,X00(@PT` l(p t((( T#\$& & C#C# ,0H LP T`dp$$ $(,4<Lmm$#X 2x d$  /  k!3@!P!T!m\!m!!6!\!6!\!!! !\! !\!!!"2 "\"2 "\$"4"8"D"h2P"\T"h2X"\`"t"|"v"w"v"w"""6"\"6"\""+""'"\"'#\# #ld#h### ## #### ## ####3##3###$s$ $s$$($0$4$8$<$L$$m$m$$$3$$$ %4%8%p%t%#x%|%#%%%%%%4 & &0&2&0 &24&@&P&&&&&0&&0&' '''3(','8'0@'0D'.H'.d'l'ip'i''S8'S8'*'''0'2'0(2($(,( 0(04( 8(0D(P(X(\(0`(d(0l(|((\'(0(\'(0((((0((0((((0((0()) )0))0)0)8)<)0@)D)0L)X)d)ih)0l)ip)0x)))j)0)j)0)))))) ))*****$*4*<*X0@*D*X0H*\*`*d*p* |** ****#(**#(*****+*%+0+*% +0+$+ 0+ 8+ @+mH+m|+l++ ,,$,C+(,,,C+8,@,P,57T,57h,l,p,x,,| ,,| ,,,,|------D.`.d.l.p.t.x....+>A >+>>+8>H>p>x>9|>+>9>+>>& >+>& >+>>X0>+>X0>+>>>>+>?+???(? 4?+8? pi9iHi6iij!jVjHj6j j0j!4jVHjPj-Xj-`jxj9j;j?j?j?j!k-k-k?,kr80kr8kdykk*k*lpl7"l7"ll-l-lllllI"lI"llZlZlmmP $mP 4m}P}j}} }(}} }(x8OP ~~0(@OX8x}~Android (7284624, based on r416183b) clang version 12.0.5 (https://android.googlesource.com/toolchain/llvm-project c935d99d7cf2016289302412d708641d52d2f7ee)P%*- 0C0@<Pw`p (j j  x8~Dy  U t 8 ],g$$$$ 'H@4q   ,n   Q 1   5. r84<8 ~I ~ ~ ~ q   X  t      T\ p t{ <  d l s $# d$ +O . 3 W 7 9m $= T? AI pE (Ka hM $O Qg Q SC TH W WK |Y `a ` ,c= 0g gB hE t dy| {[  }7 } }< } }? } }v }U } } }1 } }6 } }9 } }p } w  b 5.##| AN%P,U@ jx ,F \ t) Z* 1 >;Pj'.h )   00 @ PO- `p}M  _HS   V (9  x8i hl  u +d} (  (K@# dy  { (;  d$G $#@ tp  ,cD  g 0gx# t T^  G 8      %$R T7 ! DD  W  S   $O Q(: hMY T? 9H p]{li t  Ad  |YD `lW .   l 37  $=0 7(  X8]   <|  pEK ,e $h8J  m _   | (    ,   o =" Y+ *| " , W <yU ?G d9X  Pq C.Xж\X$L]ZI  V~к g{( x Ԑ_;eI M0 ֗ - 9&ct dXmn .note.Linux.rela.exit.text.rela.init.text.comment.altinstr_replacement.init.plt.bss.rela.altinstructions__versions__ksymtab_strings.rela.data.cam_smmu_driver.rela.text.cam_smmu_unset_client_page_fault_handler.rela___kcrctab_gpl+cam_smmu_set_client_page_fault_handler.modinfo.rela___ksymtab_gpl+cam_smmu_get_io_region_info.rela__param__ksymtab_gpl__kcrctab_gpl.note.GNU-stack.llvm_addrsig.rela___ksymtab+cam_smmu_alloc_firmware.rela___kcrctab+cam_smmu_alloc_firmware.text.ftrace_trampoline.rela.gnu.linkonce.this_module.rela__bug_table.note.gnu.build-id.shstrtab.strtab__ksymtab.symtab__kcrctab.rodata.dataof_find_propertygen_pool_destroycam_smmu_reset_iommu_table.__keycam_smmu_probe.__keyof_property_read_variable_u32_arraycam_smmu_find_mapping_by_ion_indexicp_fwiommu_get_domain_for_devsg_nextdma_buf_putcam_smmu_free_scratch_buffer_remove_from_listcam_smmu_unmap_buf_and_remove_from_listgen_pool_add_virtparam_ops_intdma_release_from_dev_coherentdma_alloc_from_dev_coherentdma_buf_unmap_attachmentdma_buf_map_attachment__mutex_init___ratelimit__bitmap_setiommu_cb_setdma_buf_get__crc_cam_smmu_dealloc_qdss__kstrtab_cam_smmu_dealloc_qdss__ksymtab_cam_smmu_dealloc_qdss__crc_cam_smmu_alloc_qdss__kstrtab_cam_smmu_alloc_qdss__ksymtab_cam_smmu_alloc_qdsscam_smmu_iommu_fault_handler._rs__crc_cam_smmu_ops__kstrtab_cam_smmu_ops__ksymtab_cam_smmu_opsdummy_dma_ops____versionscam_smmu_get_discard_memory_regionscam_smmu_map_iova_validate_paramscam_populate_smmu_context_banksget_random_byteskmalloc_caches__free_pages__module_dependsdebugfs_create_dircam_smmu_driverplatform_driver_unregister__platform_driver_registercam_smmu_iommu_fault_handleriommu_set_fault_handler__crc_cam_smmu_unset_client_page_fault_handler__kstrtab_cam_smmu_unset_client_page_fault_handler__ksymtab_cam_smmu_unset_client_page_fault_handler__crc_cam_smmu_set_client_page_fault_handler__kstrtab_cam_smmu_set_client_page_fault_handler__ksymtab_cam_smmu_set_client_page_fault_handlermemstart_addr__bitmap_clearstrcmpiommu_unmapiommu_map__crc_cam_smmu_reserve_sec_heap__kstrtab_cam_smmu_reserve_sec_heap__ksymtab_cam_smmu_reserve_sec_heap__crc_cam_smmu_release_sec_heap__kstrtab_cam_smmu_release_sec_heap__ksymtab_cam_smmu_release_sec_heapiommu_dma_enable_best_fit_algo__crc_cam_smmu_get_region_info__kstrtab_cam_smmu_get_region_info__ksymtab_cam_smmu_get_region_info__crc_cam_smmu_get_io_region_info__kstrtab_cam_smmu_get_io_region_info__ksymtab_cam_smmu_get_io_region_infocam_smmu_dump_cb_info__ll_sc_atomic64_add_returndebugfs_create_bool__stack_chk_fail__cfi_check_failprintk__alloc_pages_nodemaskcam_smmu_page_fault_workmutex_unlockmutex_lock__cfi_check__cfi_slowpathmsm_cam_smmu_dt_matchdma_buf_attachdma_buf_detachiommu_map_sgcam_debug_logof_property_read_stringbitmap_find_next_zero_area_offof_property_count_elems_of_sizecam_smmu_removedebugfs_remove_recursiveof_platform_populategen_pool_createcam_smmu_map_buffer_validate__crc_cam_smmu_dealloc_firmware__kstrtab_cam_smmu_dealloc_firmware__ksymtab_cam_smmu_dealloc_firmware__crc_cam_smmu_alloc_firmware__kstrtab_cam_smmu_alloc_firmware__ksymtab_cam_smmu_alloc_firmwareof_get_child_by_namecam_get_module_nameinit_module__this_modulecleanup_module__crc_cam_smmu_destroy_handle__kstrtab_cam_smmu_destroy_handle__ksymtab_cam_smmu_destroy_handle__crc_cam_smmu_get_handle__kstrtab_cam_smmu_get_handle__ksymtab_cam_smmu_get_handleof_device_is_compatiblecam_smmu_reset_iommu_tablesg_free_tablesg_alloc_tabledevm_kfreegen_pool_freeiommu_attach_deviceiommu_detach_devicekmem_cache_alloc_tracecam_smmu_probe__stack_chk_guardof_get_next_available_child__list_del_entry_valid__list_add_valid__param_str_g_num_pf_handled__param_g_num_pf_handleddevm_kmalloc__kmallocgen_pool_alloccam_smmu_release_cb__crc_cam_smmu_put_iova__kstrtab_cam_smmu_put_iova__ksymtab_cam_smmu_put_iova__crc_cam_smmu_get_iova__kstrtab_cam_smmu_get_iova__ksymtab_cam_smmu_get_iova__crc_cam_smmu_unmap_user_iova__kstrtab_cam_smmu_unmap_user_iova__ksymtab_cam_smmu_unmap_user_iova__crc_cam_smmu_map_user_iova__kstrtab_cam_smmu_map_user_iova__ksymtab_cam_smmu_map_user_iova__crc_cam_smmu_unmap_kernel_iova__kstrtab_cam_smmu_unmap_kernel_iova__ksymtab_cam_smmu_unmap_kernel_iova__crc_cam_smmu_map_kernel_iova__kstrtab_cam_smmu_map_kernel_iova__ksymtab_cam_smmu_map_kernel_iovacam_smmu_put_scratch_iovacam_smmu_get_scratch_iovaiommu_dma_reserve_iovacam_smmu_free_iova__crc_cam_smmu_get_stage2_iova__kstrtab_cam_smmu_get_stage2_iova__ksymtab_cam_smmu_get_stage2_iova__crc_cam_smmu_unmap_stage2_iova__kstrtab_cam_smmu_unmap_stage2_iova__ksymtab_cam_smmu_unmap_stage2_iova__crc_cam_smmu_map_stage2_iova__kstrtab_cam_smmu_map_stage2_iova__ksymtab_cam_smmu_map_stage2_iova$x.99$x.89$x.79$x.69$x.59$d.49$d.139$x.39$d.129$x.29$d.119$d.19__UNIQUE_ID_description109$d.109$d.9$x.98$x.88$x.78$d.68$d.58$x.48$d.138$d.38$d.128$x.28$d.118$d.18$d.108$d.8$x.97$x.87$x.77$x.67$d.57$x.47$d.137$x.37$d.127$d.27.Ltmp17$d.117$d.17$d.107$d.7_note_6$x.96$x.86__UNIQUE_ID_g_num_pf_handledtype76$d.76$x.66__UNIQUE_ID_intree56$x.56$d.146$x.46$d.136$x.36$d.126$x.26$d.116$d.16$d.106$d.6$x.95$x.85$x.75$x.65__UNIQUE_ID_name55$x.55$d.145$d.45$d.135$x.35$d.125$x.25$d.115$d.15$d.105$d.5$x.94$x.84$x.74ktime_get_real_ts64$d.64__UNIQUE_ID_vermagic54$x.54$x.44$d.134$x.34$d.124$x.24.Ltmp14$d.114$d.14$d.104$d.4$x.93$x.83$x.73$x.63$x.53$x.43$d.133$x.33.Ltmp23$d.123$x.23$d.113$d.13$x.103$d.3$x.92$x.82$x.72$d.62$x.52$x.42$d.132$x.32$d.122$x.22$d.112$d.12$x.102$d.2$x.91$x.81$x.71$x.61$x.51$x.41$d.131$x.31$d.121$d.21__UNIQUE_ID_softdep111$d.111$d.11$x.101$d.1$x.90$x.80$x.70$x.60$x.50$x.40$d.130$x.30.Ltmp20$d.120$d.20__UNIQUE_ID_license110$d.110$d.10$x.100$d.0U@0^p0gLl QLVyq2;'@~`$68$P0",$о|ӿ#V(q @`@0@H'@`'@(X' [@' @'@x' @HH'@'!@ 'Q@`'@x' @0'-0LoVz@_@P")CM