Sie sind auf Seite 1von 39

Samsung Confidential

Exynos Log Tool


Log Tool Introduction

Revision 1.00
June 2018

User Guide

 2018 Samsung Electronics Co., Ltd. All rights reserved.


Samsung Confidential

Important Notice

Samsung Electronics Co. Ltd. (“Samsung”) reserves the any information provided in this publication. Customer shall
right to make changes to the information in this publication indemnify and hold Samsung and its officers, employees,
at any time without prior notice. All information provided is subsidiaries, affiliates, and distributors harmless against all
for reference purpose only. Samsung assumes no claims, costs, damages, expenses, and reasonable attorney
responsibility for possible errors or omissions, or for any fees arising out of, either directly or indirectly, any claim
consequences resulting from the use of the information (including but not limited to personal injury or death) that
contained herein. may be associated with such unintended, unauthorized
and/or illegal use.
This publication on its own does not convey any license,
either express or implied, relating to any Samsung and/or WARNING No part of this publication may be reproduced,
third-party products, under the intellectual property rights of stored in a retrieval system, or transmitted in any form or by
Samsung and/or any third parties. any means, electric or mechanical, by photocopying,
recording, or otherwise, without the prior written consent of
Samsung makes no warranty, representation, or guarantee
Samsung. This publication is intended for use by designated
regarding the suitability of its products for any particular
recipients only. This publication contains confidential
purpose, nor does Samsung assume any liability arising out
information (including trade secrets) of Samsung protected
of the application or use of any product or circuit and
by Competition Law, Trade Secrets Protection Act and other
specifically disclaims any and all liability, including without
related laws, and therefore may not be, in part or in whole,
limitation any consequential or incidental damages.
directly or indirectly publicized, distributed, photocopied or
used (including in a posting on the Internet where
Customers are responsible for their own products and
applications. "Typical" parameters can and do vary in unspecified access is possible) by any unauthorized third

different applications. All operating parameters, including party. Samsung reserves its right to take any and all
measures both in equity and law available to it and claim full
"Typicals" must be validated for each customer application
by the customer's technical experts. damages against any party that misappropriates Samsung’s
trade secrets and/or confidential information.
Samsung products are not designed, intended, or authorized
for use in applications intended to support or sustain life, or 警 告 本文件仅向经韩国三星电子株式会社授权的人员提供,
其内容含有商业秘密保护相关法规规定并受其保护的三星电
for any other application in which the failure of the Samsung
子株式会社商业秘密,任何直接或间接非法向第三人披露、
product could reasonably be expected to create a situation 传播、复制或允许第三人使用该文件全部或部分内容的行为
where personal injury or death may occur. Customers (包括在互联网等公开媒介刊登该商业秘密而可能导致不特
定第三人获取相关信息的行为)皆为法律严格禁止。此等违
acknowledge and agree that they are solely responsible to
法行为一经发现,三星电子株式会社有权根据相关法规对其
meet all other legal and regulatory requirements regarding 采取法律措施,包括但不限于提出损害赔偿请求。
their applications using Samsung products notwithstanding

Copyright  2018 Samsung Electronics Co., Ltd.

Samsung Electronics Co., Ltd.


San #24 Nongseo-Dong, Giheung-Gu
Samsung Confidential

Yongin-City, Gyeonggi-Do, Korea 446-711

Contact Us: mobilesol.cs@samsung.com

Home Page: http://www.samsungsemi.com


Samsung Confidential

Trademarks

All brand names, trademarks and registered trademarks belong to their respective owners.

 Exynos, Product Name, FlexOneNAND, and OneNAND are trademarks of Samsung Electronics.
 ARM, Jazelle, TrustZone, and Thumb are registered trademarks of ARM Limited.
 Cortex, ETM, ETB, Coresight, ISA, and Neon are trademarks of ARM Limited.
 Java is a trademark of Sun Microsystems, Inc.
 SD is a registered trademark of Toshiba Corporation.
 MMC and eMMC are trademarks of MultiMediaCard Association.
 JTAG is a registered trademark of JTAG Technologies, Inc.
 Synopsys is a registered trademark of Synopsys, Inc.
 I2S is a trademark of Phillips Electronics.
 I2C is a trademark of Phillips Semiconductor Corp.
 MIPI and Slimbus are registered trademarks of the Mobile Industry Processor Interface (MIPI) Alliance.

All other trademarks used in this publication are the property of their respective owners.
Samsung Confidential

Revision History

Revision No. Date Description Author(s)


SW Quallity
1.0 Jun. 05, 2018  Initial Version
Engineering Lab
SW Quallity
1.1 Oct. 19, 2018  Change description of silent log
Engineering Lab
Samsung Confidential

Contents

1 SHANNONDM .................................................................................................. 8
1.1 Apply for KEY ...............................................................................................................................................8
1.2 ShannonDM installed ...................................................................................................................................8
1.3 ShannonDM UI introduction .......................................................................................................................10
1.4 ShannonDM and Device connection .........................................................................................................12
1.4.1 USB Mode Switch ...............................................................................................................................12
1.4.2 ShannonDM connection settings ........................................................................................................14
1.5 How to capture ShannonDM LOG .............................................................................................................18

2 HOW TO CAPTURE AP LOG......................................................................... 23


2.1 ADB configuration ......................................................................................................................................23

2.2 How to capture AP LOG ............................................................................................................................23

3 HOW TO CAPTURE DSP LOG .................................................................... 26


4 HOW TO CAPTURE TCP LOG ...................................................................... 28
5 HOW TO CAPTURE CRASH LOG ............................................................... 30
6 SILENT LOGGING ......................................................................................... 33
7 COMMON USSD COMMAND......................................................................... 35
7.1 *#*#4412#*#*..............................................................................................................................................35
7.2 *#*#0808#*#*..............................................................................................................................................37
7.3 *#*#5096#*#*..............................................................................................................................................38

8 COMMON SHORTCUTS ................................................................................ 39


Samsung Confidential

List of Figures

Figure Page
Number Number

Figure 1-1 ..........................................................................................................................................................8


Figure 1-2 ..........................................................................................................................................................9
Figure 1-3 ........................................................................................................................................................10
Figure 1-4 ........................................................................................................................................................11
Figure 1-5 ........................................................................................................................................................11
Figure 1-6 ........................................................................................................................................................12
Figure 1-7 ........................................................................................................................................................13
Figure 1-8 ........................................................................................................................................................14
Figure 1-9 ........................................................................................................................................................14
Figure 1-10 ........................................................................................................................................................15
Figure 1-11 ........................................................................................................................................................16
Figure 1-12 ........................................................................................................................................................18
Figure 1-13 ........................................................................................................................................................19
Figure 1-14 ........................................................................................................................................................20
Figure 1-15 ........................................................................................................................................................21
Figure 1-16 ........................................................................................................................................................22
Figure 2-1 ........................................................................................................................................................24
Figure 2-2 ........................................................................................................................................................25
Figure 3-1 ........................................................................................................................................................26
Figure 3-2 ........................................................................................................................................................27
Figure 4-1 ........................................................................................................................................................28
Figure 4-2 ........................................................................................................................................................29
Figure 5-1 ........................................................................................................................................................30
Figure 5-2 ........................................................................................................................................................31
Figure 5-3 ........................................................................................................................................................32
Figure 6-1 ........................................................................................................................................................33
Figure 6-2 ........................................................................................................................................................34
Figure 7-1 ........................................................................................................................................................35
Figure 7-2 ........................................................................................................................................................36
Figure 7-3 ........................................................................................................................................................37
Figure 7-4 ........................................................................................................................................................38
Samsung Confidential

1 ShannonDM

1.1 Apply for key

ShannonDM requires a KEY file to work properly,first you need to apply for ShannonDM's KEY file, query

the local MAC address, apply for KEY corresponding to MAC address. Figure 1-1:

Figure 1-2

8
Samsung Confidential

1.2 ShannonDM install


Unpack the ShannonDM package and place the requested KEY.bat (the file name must be key.bat) in the
ShannonDM extracted folder (KEY and MAC addresses are corresponding). Example Figure 1-2:

Figure 1-3

9
Samsung Confidential

1.3 ShannonDM UI introduction


On the toolbar, there are six items of File, Run, Metric, Message, Tool, Help, and below the six items are
several common functions, such as start modem, start record, open a log file, save log file as, pause, clear,

refresh, preference, Figure 1-3:

Figure 1-4

In the working panel of ShannonDM, Divided into three parts: signaling, ILM, Trace. Signaling shows the
signaling process between the RRC layer and the NAS layer. ILM is the message between inner layers of the
protocol stack (if UNKNOWN represents which means you should update the DLL library). Trace is a detailed
interpretation of log (need to match the corresponding Bin files and profile file)

10
Samsung Confidential

There are several function buttons on the right side of the work panel as shown in Fig. 2, "Auto Scroll" and"
Filter" are commonly used, "Auto Scroll" can control signaling not to jump automatically and "filter" to filter the
signals to be viewed. In the Trace work panel (Figure 1-4), there are more function buttons like "Find",
"Bookmark", "Keyword" "Filter", "Select item".

Figure 1-5

The MODEM indicator in the lower right corner of the software interface can be used to determine whether
the phone is connected to the software, dark blue-connected, light green-unconnected, as shown in Figure 1-5

Figure 1-6

11
Samsung Confidential

1.4 ShannonDM and Device connections


1.4.1 USB Mode Switch

Installation of Samsung phone driver, download and install “Samsung_USB_Drivers_for_Mobile_Phones”,

then the phone will connect to the computer, and then input *#*#0808#*#* in the dial interface, will enter USB

Mode Switch (Figure 1-6), select rndis,acm,dm,adb or dm,acm,adb. The installation is successful as indicated by

the appearance (Figure 1-7).

Figure 1-7

12
Samsung Confidential

Figure 1-8

13
Samsung Confidential

Open your computer's Device Manager and find the port, Figure 1-8

Figure 1-9

1.4.2 ShannonDM connection settings

Find preference on ShannonDM toolbar (Figure 1-9), click preference to enter the setting interface(Figure 1-9)

Figure 1-10

14
Samsung Confidential

There is a toolbar on the left side of Preference, mainly uses "Logging" and "Message-String-Trace". “Loging"
the main function is to set the port of connection, "Message-String-Trace" mainly for loading binary.

In the Logging interface, the Modem tick needs to be selected as the "Use serial interface", BaudRate select
"460800", and select "Auto connect to modem, when modem is plugged", the next time plugged the phone, will
automatically connect to the modem, "maximum log file size" is set up to your own needs, do not set too large for
each generated log (recommended less than 100m) for post-analysis

Figure 1-11

When setting is complete, click "Auto detect modem interface", to update the port to COM8 (Figure1-11),
same with the port number in Figure 1-8, and "start modem" become dark blue, and the lower-right Modem also
change to dark blue. Click the Apply to save the settings.

15
Samsung Confidential

Figure 1-12

In the "Message-String-Trace" interface, you need load CP binary. If not, Trace will have no signaling display.
Figure 1-12

16
Samsung Confidential

17
Samsung Confidential

Figure 1-13

1.5 How to capture ShannonDM log

Step1:Profile load, profile is defined for filtering trace file, in order to capture defined trace(Catch default

trace log if no profile file loaded). Find “Load Profile” in the File directory, load requested profile. "Profile is

successfully downloaded" in the left down menu of ShannonDM tool indicated that Profile is loaded successfully,
follow as Figure 1-13:

18
Samsung Confidential

Figure 1-14

Step2:Record log, click Start record,would pop-up save log path,select one log path,name it, then click

"Open". Follow as Figure 1-14:

19
Samsung Confidential

Figure 1-15

At this moment, "start record" would show state as "stop record", and background show as dark blue. There are
signaling running in the work platform of Signaling, ILM and Trace. It is needed to reload profile and bin file again
and again if have incomplete signaling in the Trace work platform. Follow as Figure 1-15:

20
Samsung Confidential

Figure 1-16

Step3:After test,click stop record to stop record log. The .sdm files in saved log directory is CP log files, follow

21
Samsung Confidential

as Figure 1-16:

Figure 1-17

22
Samsung Confidential

2 How to capture AP Log

2.1 ADB configuration

For AP LOG,need to configure ADB environment variable. Write local ADB path into computer’s environment
variable Path.

ADB configuration path: Copy local ADB path -> My computer -> press right key -> property -> advance system
settings -> advanced -> environment variable -> Path

2.2 How to capture AP LOG

Step1:Unzip AP LOG tool(Provided by Samsung)

Step2:Click “get_AP_SQE2.bat” to capture AP Log, then would pop-up one command window and creates one
file named “AP_LOG” in the directory. Follow as Figure 2-1:

23
Samsung Confidential

Figure 2-1

Step3:After finished test, press Ctrl + C in the command window, would prompt “would you like to stop the bat
progress<Y/N>?”, then input “N”, and click “Enter” to save AP log.(collect ShannonDM LOG and AP LOG in the
same file directory). Follow as Figure 2-2:

24
Samsung Confidential

Figure 2-2

25
Samsung Confidential

3 How to capture DSP LOG

It is requested to catch DSP log when perform related data service cases, such as TP,MMS, ping test, video call,
video streaming and so on.

Step 1:Active DSP,input *#*#4412#*#* in dial keyboard,then Menu->SIM1->3)Test Equipment setting-

>3)DSP&IQ Log, set “DSP Log OFF” as DSP Log ON. Follow as Figure 3-1

Figure 3-1

Step2:Reboot phone

Step3:Check DSP log in the Trace option of ShannonDM. Follow as Figure 3-2:

26
Samsung Confidential

Figure 3-2

27
Samsung Confidential

4 How to capture TCP LOG

It is needed to capture TCP log when perform TP or other data service test cases. TCP log will captured with
ShannonDM LOG and AP LOG at the same time.

Step1:create one command window in the case directory, input "adb shell tcpdump -i any -vvv -w
/sdcard/rmnet_all.pcap", must check value behind “got” whether is increasing or not, follow as Figure 4-1:

Figure 4-1

Step2:Perform Ctrl+C in command window to end TCP logging when test is finished,then input “adb pull

/sdcard/rmnet_all.pcap” to collect TCP LOG to case file directory. Follow as Figure 4-2:

28
Samsung Confidential

Figure 4-2

29
Samsung Confidential

5 How to capture Crash log

Due to SW is still in development, system is not stable enough, sometime system would crash when perform or
capturing log, so call it as “Modem Crash”.

There are two types of Crash:CP Crash and AP Crash. Must check crash type shown in screen when crash

happened,whether it is CP Crash(Figure 5-1)or AP Crash. (Note:testers cannot distinguish between AP

crash and CP crash)

Figure 5-1

DUT would enter red screen suddenly when crash happened, then enter fastboot mode automatically. Follow as
Figure 5-2:

30
Samsung Confidential

Figure 5-2

Must use special bat tool “qdump tool for maestro7872” to catch crash log,unzip “qdump tool for maestro7872”

tool file, find “qdump_7872_64bit_all.bat” in the file, double click it,crash log would be collected in current

directory when pop-up window was closed automatically. Follow as Figure 5-3:

31
Samsung Confidential

Figure 5-3

32
Samsung Confidential

6 Silent logging

Silent logging is used to capture log by phone.

Input *#*#0328#*#* in dial keyboard to enter Silent logging,select AP and CP(Please select TCP when perform
data service related cases),then click "record" in the right top of menu, start to test when pop-up "OK", follow as
Figure 6-1:

Figure 6-1

Save log after finished test,step1:click SNAPSHOT LOG,step2:Closed "record" option,step3:click COPY

TO STORAGE, select internal storage, Follow as Figure 6-2:

33
Samsung Confidential

Figure 6-2

When finished above steps,connect the phone to PC,phone is set to MTP mode(*#*#0808#*#*),find
DMLog file in the phone directory.(Must rename DMLog before next test case)

34
Samsung Confidential

7 Common USSD command

7.1 *#*#4412#*#*

*#*#4412#*#* is a common command to check network signal value(Figure 7-1),lock band channel(Figure
7-2),active DSP(Figure 3-1), recover network settings(Figure 6-3)and so on.

Check network signal value:

Figure 7-1

35
Samsung Confidential

Lock or change band channel:

Figure 7-2

Recover Network settings, Menu->2)NV Reset->1)CP Registry Reset, click 1)CP Registry Reset, then reboot
phone.

36
Samsung Confidential

Figure 7-3

7.2 *#*#0808#*#*

*#*#0808#*#* is to change phone mode,such as MTP mode,ADB mode,DM mode.

37
Samsung Confidential

7.3 *#*#5096#*#*
Must perform *#*#5096#*#* in dial after crash happened, then press [1]Log DUMP(AP/CP)->[2]Delete Log
Files(/data/exynos/log/dump) one by one, to clear last crash file, Please follow Figure 7-4:

Figure 7-4

38
Samsung Confidential

8 Common shortcuts

1:screenshot: power + volume down key.

2:fastboot mode: long press power + volume down key when keep phone in power off state.

39

Das könnte Ihnen auch gefallen