Advertisement
Captain_Throwback

strace A9 TWRP vold decrypt

Dec 19th, 2016
113
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.65 KB | None | 0 0
  1. 505 root 13072 S /system/bin/vold --blkid_context=u:r:blkid:s0 --blki
  2. 511 root 6296 R ps
  3. ~ # strace -f -s 1000 -p 505
  4. strace: Process 505 attached with 4 threads
  5. [pid 508] pselect6(12, [10 11], NULL, NULL, NULL, NULL <unfinished ...>
  6. [pid 507] pselect6(13, [7 12], NULL, NULL, NULL, NULL <unfinished ...>
  7. [pid 506] pselect6(6, [4 5], NULL, NULL, NULL, NULL <unfinished ...>
  8. [pid 505] restart_syscall(<... resuming interrupted nanosleep ...> <unfinished ...>
  9. [pid 508] <... pselect6 resumed> ) = 1 (in [11])
  10. [pid 508] accept4(11, {sa_family=AF_LOCAL, NULL}, [2], 0) = 14
  11. [pid 508] fcntl(14, F_SETFD, FD_CLOEXEC) = 0
  12. [pid 508] getsockopt(14, SOL_SOCKET, SO_PEERCRED, {pid=515, uid=0, gid=0}, [12]) = 0
  13. [pid 508] pselect6(15, [10 11 14], NULL, NULL, NULL, NULL) = 1 (in [14])
  14. [pid 508] read(14, "0 cryptfs checkpw default_password\0", 1024) = 35
  15. [pid 508] getuid() = 0
  16. [pid 508] writev(3, [{"\3\374\1\367\355WX\201\365\3228", 11}, {"\3", 1}, {"FrameworkListener\0", 18}, {"dispatchCommand data = (cryptfs)\0", 33}], 4) = 63
  17. [pid 508] getuid() = 0
  18. [pid 508] writev(3, [{"\3\374\1\367\355WX\232\226\3278", 11}, {"\4", 1}, {"Cryptfs\0", 8}, {"cryptfs_check_passwd\0", 21}], 4) = 41
  19. [pid 508] getuid() = 0
  20. [pid 508] writev(3, [{"\3\374\1\367\355WXZ\250\3358", 11}, {"\4", 1}, {"Ext4Crypt\0", 10}, {"ext4 crypto complete called on /data\0", 37}], 4) = 59
  21. [pid 508] openat(AT_FDCWD, "/data/unencrypted", O_RDONLY|O_DIRECTORY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
  22. [pid 508] openat(AT_FDCWD, "/data/tmp_mnt/unencrypted", O_RDONLY|O_DIRECTORY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
  23. [pid 508] getuid() = 0
  24. [pid 508] writev(3, [{"\3\374\1\367\355WX5\326\3468", 11}, {"\4", 1}, {"Ext4Crypt\0", 10}, {"No master key, so not ext4enc\0", 30}], 4) = 52
  25. [pid 508] openat(AT_FDCWD, "/dev/block/bootdevice/by-name/extra", O_RDWR|O_CLOEXEC) = 15
  26. [pid 508] fstat(15, {st_mode=S_IFBLK|0600, st_rdev=makedev(259, 21), ...}) = 0
  27. [pid 508] lseek(15, 0, SEEK_SET) = 0
  28. [pid 508] read(15, "\304\261\265\320\1\0\3\0\20\t\0\0\0\0\0\0\20\0\0\0\1\0\0\0\0\200\20\3\0\0\0\0\0\0\0\0aes-xts\0essiv:sha256\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0a\2246B=\274\264?.\341?\263\0054-\325\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\304\205C\317\317\323\337\233\247\336Y\325\220\3544\6\0\20\0\0\0\0\0\0\0 \0\0\0\0\0\0\0\20\0\0\5\f\3\1\0\200\20\3\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\37l\2041j#OJ\5)u`~\253\212\333z\375\313l\177\353\277\204Y\300Xs\364\243\0278 \0\0\0\0\0\0\0\2\0\0\0@\0\0\0\0\0\0\0\20\0\0\0\0\0\0\0\0\0\0\0\20\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\253\275\204\363Vx\353Y\242\225\234\311\31R\276\322\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\206\225\1@3\26\32F\34\204\10\251FZ8]\214\366i_Z\327a\341p\27\313\30\211\202\373*\234\16Z\222\23A\376ZL\351z\361sh8\230\310\203\3008\217l\313\346}lA\r<\317A<\236\325k\214\255]l\252\336M\214\346\210B\273x\310\206L\27\243\217V\257u\225\311\255@\360Vuq\34Y8\30\237\"\322\324\"`\331\231%(U\224\327\0016`!\316\0\211\254\361\224C\237M\250{\324\1\232\343\2255D\226\1_\272x\261S\347\35\371Z\302\253\320\307\r\266ny%\203\202^5S\240N\312\202\331\366o4\261\222)\240W\326j@\334\376\20\372\313J'\327\1z\335\2640\301\336\225\231H\334S}t6d\223D\205\326\217\2376T\217!\333\221\202\344\22iN\214.\333\366\357\267\341\225\336\341v\204\376\275\322\212l7\241\350\304\377\377c\210\222\246'\31\v\2v\316\245\352\251\0332\32\366\275\21g\347&\10\327\330\220UFZ(\t\373r\n\247\264\265b\16\360\200]@\360\32\24\303\304\255\323\271\6KB3\216\347\206\10\304\375\207WJ3\20-\317j)\330\31\r`\303\253\27\246RG\347yCL~\257g\267|\361\200\ty\344U\223`V\213\211\204A\257\271xh\250u\255&\265\216\357\342\226!\322&u\261JS[\277\214\fr\264\2\301\366~=\352`\330\322\n2::\177\212\"O\276\352hL\255\236C}\216\356\231\343\325;\253K8%\35A\253\217ew\250\306C\351U\314\352\32\317u\303b\350\177\225\223j\35\205\301\220\1#\227%\242\254\31\362e\374[\23\356%\313\260\231m\377^\370\223\252\221\210!q\26P\22_]+\354\272*\234GaJb\362\355|\216&\375\347L"..., 2320) = 2320
  29. [pid 508] close(15) = 0
  30. [pid 508] getuid() = 0
  31. [pid 508] writev(3, [{"\3\374\1\367\355WXP\17\0079", 11}, {"\3", 1}, {"Cryptfs\0", 8}, {"crypt_ftr->fs_size = 51412992\n\0", 31}], 4) = 51
  32. [pid 508] getuid() = 0
  33. [pid 508] writev(3, [{"\3\374\1\367\355WXB=\v9", 11}, {"\4", 1}, {"Cryptfs\0", 8}, {"Using scrypt with keymaster for cryptfs KDF\0", 44}], 4) = 64
  34. [pid 508] mmap(NULL, 4198400, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f799f4000
  35. [pid 508] prctl(0x53564d41 /* PR_??? */, 0, 0x7f799f4000, 0x401000, 0x7f7a47a780) = 0
  36. [pid 508] munmap(0x7f799f4000, 4198400) = 0
  37. [pid 508] faccessat(AT_FDCWD, "/vendor/lib64/hw/keystore.htc_hiae.so", R_OK) = -1 ENOENT (No such file or directory)
  38. [pid 508] faccessat(AT_FDCWD, "/system/lib64/hw/keystore.htc_hiae.so", R_OK) = -1 ENOENT (No such file or directory)
  39. [pid 508] faccessat(AT_FDCWD, "/vendor/lib64/hw/keystore.MSM8952.so", R_OK) = -1 ENOENT (No such file or directory)
  40. [pid 508] faccessat(AT_FDCWD, "/system/lib64/hw/keystore.MSM8952.so", R_OK) = -1 ENOENT (No such file or directory)
  41. [pid 508] faccessat(AT_FDCWD, "/vendor/lib64/hw/keystore.msm8952.so", R_OK) = 0
  42. [pid 508] mprotect(0x7f7a986000, 4096, PROT_READ|PROT_WRITE) = 0
  43. [pid 508] mprotect(0x7f7a984000, 4096, PROT_READ|PROT_WRITE) = 0
  44. [pid 508] mprotect(0x7f7a985000, 4096, PROT_READ|PROT_WRITE) = 0
  45. [pid 508] mprotect(0x7f7a9d8000, 4096, PROT_READ|PROT_WRITE) = 0
  46. [pid 508] mprotect(0x7f7a9df000, 4096, PROT_READ|PROT_WRITE) = 0
  47. [pid 508] mprotect(0x7f7a9d9000, 4096, PROT_READ|PROT_WRITE) = 0
  48. [pid 508] mprotect(0x7f7a9da000, 4096, PROT_READ|PROT_WRITE) = 0
  49. [pid 508] openat(AT_FDCWD, "/vendor/lib64/hw/keystore.msm8952.so", O_RDONLY|O_CLOEXEC) = 15
  50. [pid 508] fstat(15, {st_mode=S_IFREG|0644, st_size=34880, ...}) = 0
  51. [pid 508] mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, 0, 0) = 0x7f7a25d000
  52. [pid 508] prctl(0x53564d41 /* PR_??? */, 0, 0x7f7a25d000, 0x2000, 0x7f7a9ce230) = 0
  53. [pid 508] mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, 0, 0) = 0x7f79df3000
  54. [pid 508] prctl(0x53564d41 /* PR_??? */, 0, 0x7f79df3000, 0x2000, 0x7f7a9ce230) = 0
  55. [pid 508] prctl(PR_GET_DUMPABLE) = 1
  56. [pid 508] prctl(PR_SET_DUMPABLE, 1) = 0
  57. [pid 508] readlinkat(AT_FDCWD, "/proc/self/fd/15", "/system/vendor/lib64/hw/keystore.msm8952.so", 4096) = 43
  58. [pid 508] prctl(PR_SET_DUMPABLE, 1) = 0
  59. [pid 508] munmap(0x7f79df3000, 8192) = 0
  60. [pid 508] munmap(0x7f7a25d000, 8192) = 0
  61. [pid 508] pread64(15, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\200\24\0\0\0\0\0\0@\0\0\0\0\0\0\0@\202\0\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\30\0\27\0", 64, 0) = 64
  62. [pid 508] mmap(NULL, 4096, PROT_READ, MAP_PRIVATE, 15, 0) = 0x7f7a25e000
  63. [pid 508] mmap(NULL, 102400, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f79ddc000
  64. [pid 508] mmap(0x7f79ddc000, 29384, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED, 15, 0) = 0x7f79ddc000
  65. [pid 508] mmap(0x7f79df3000, 4360, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 15, 0x7000) = 0x7f79df3000
  66. [pid 508] munmap(0x7f7a25e000, 4096) = 0
  67. [pid 508] close(15) = 0
  68. [pid 508] mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, 0, 0) = 0x7f7a25e000
  69. [pid 508] prctl(0x53564d41 /* PR_??? */, 0, 0x7f7a25e000, 0x1000, 0x7f7a9ce1c0) = 0
  70. [pid 508] mprotect(0x7f79df3000, 4096, PROT_READ) = 0
  71. [pid 508] munmap(0x7f7a25e000, 4096) = 0
  72. [pid 508] mprotect(0x7f7a260000, 4096, PROT_READ|PROT_WRITE) = 0
  73. [pid 508] mprotect(0x7f7a260000, 4096, PROT_READ) = 0
  74. [pid 508] mprotect(0x7f7a986000, 4096, PROT_READ) = 0
  75. [pid 508] mprotect(0x7f7a984000, 4096, PROT_READ) = 0
  76. [pid 508] mprotect(0x7f7a985000, 4096, PROT_READ) = 0
  77. [pid 508] mprotect(0x7f7a9d8000, 4096, PROT_READ) = 0
  78. [pid 508] mprotect(0x7f7a9df000, 4096, PROT_READ) = 0
  79. [pid 508] mprotect(0x7f7a9d9000, 4096, PROT_READ) = 0
  80. [pid 508] mprotect(0x7f7a9da000, 4096, PROT_READ) = 0
  81. [pid 508] getuid() = 0
  82. [pid 508] writev(3, [{"\3\374\1\370\355WX73\267\n", 11}, {"\4", 1}, {"Cryptfs\0", 8}, {"keymaster module name is Keymaster QTI HAL\0", 43}], 4) = 63
  83. [pid 508] getuid() = 0
  84. [pid 508] writev(3, [{"\3\374\1\370\355WX\320\221\326\n", 11}, {"\4", 1}, {"Cryptfs\0", 8}, {"keymaster version is 256\0", 25}], 4) = 45
  85. [pid 508] getuid() = 0
  86. [pid 508] writev(3, [{"\3\374\1\370\355WX\367\246\365\n", 11}, {"\4", 1}, {"Cryptfs\0", 8}, {"Found keymaster1 module, using keymaster1 API.\0", 47}], 4) = 67
  87. [pid 508] mprotect(0x7f7a986000, 4096, PROT_READ|PROT_WRITE) = 0
  88. [pid 508] mprotect(0x7f7a984000, 4096, PROT_READ|PROT_WRITE) = 0
  89. [pid 508] mprotect(0x7f7a985000, 4096, PROT_READ|PROT_WRITE) = 0
  90. [pid 508] mprotect(0x7f7a9d8000, 4096, PROT_READ|PROT_WRITE) = 0
  91. [pid 508] mprotect(0x7f7a9df000, 4096, PROT_READ|PROT_WRITE) = 0
  92. [pid 508] mprotect(0x7f7a9d9000, 4096, PROT_READ|PROT_WRITE) = 0
  93. [pid 508] mprotect(0x7f7a9da000, 4096, PROT_READ|PROT_WRITE) = 0
  94. [pid 508] openat(AT_FDCWD, "/system/lib64/libQSEEComAPI.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
  95. [pid 508] openat(AT_FDCWD, "/system/lib/libQSEEComAPI.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
  96. [pid 508] openat(AT_FDCWD, "/vendor/lib64/libQSEEComAPI.so", O_RDONLY|O_CLOEXEC) = 15
  97. [pid 508] fstat(15, {st_mode=S_IFREG|0644, st_size=26352, ...}) = 0
  98. [pid 508] mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, 0, 0) = 0x7f7a25d000
  99. [pid 508] prctl(0x53564d41 /* PR_??? */, 0, 0x7f7a25d000, 0x2000, 0x7f7a9ce230) = 0
  100. [pid 508] mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, 0, 0) = 0x7f79dda000
  101. [pid 508] prctl(0x53564d41 /* PR_??? */, 0, 0x7f79dda000, 0x2000, 0x7f7a9ce230) = 0
  102. [pid 508] prctl(PR_GET_DUMPABLE) = 1
  103. [pid 508] prctl(PR_SET_DUMPABLE, 1) = 0
  104. [pid 508] readlinkat(AT_FDCWD, "/proc/self/fd/15", "/system/vendor/lib64/libQSEEComAPI.so", 4096) = 37
  105. [pid 508] prctl(PR_SET_DUMPABLE, 1) = 0
  106. [pid 508] munmap(0x7f79dda000, 8192) = 0
  107. [pid 508] munmap(0x7f7a25d000, 8192) = 0
  108. [pid 508] pread64(15, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\260\22\0\0\0\0\0\0@\0\0\0\0\0\0\0000a\0\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\27\0\26\0", 64, 0) = 64
  109. [pid 508] mmap(NULL, 4096, PROT_READ, MAP_PRIVATE, 15, 0) = 0x7f7a25e000
  110. [pid 508] mmap(NULL, 94208, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f79dc5000
  111. [pid 508] mmap(0x7f79dc5000, 23392, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED, 15, 0) = 0x7f79dc5000
  112. [pid 508] mmap(0x7f79dda000, 4104, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 15, 0x5000) = 0x7f79dda000
  113. [pid 508] mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, 0, 0) = 0x7f7a25d000
  114. [pid 508] prctl(0x53564d41 /* PR_??? */, 0, 0x7f7a25d000, 0x1000, 0x7f7a9ce2e8) = 0
  115. [pid 508] munmap(0x7f7a25e000, 4096) = 0
  116. [pid 508] close(15) = 0
  117. [pid 508] mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, 0, 0) = 0x7f7a25e000
  118. [pid 508] prctl(0x53564d41 /* PR_??? */, 0, 0x7f7a25e000, 0x1000, 0x7f7a9ce1c0) = 0
  119. [pid 508] mprotect(0x7f79dda000, 4096, PROT_READ) = 0
  120. [pid 508] munmap(0x7f7a25e000, 4096) = 0
  121. [pid 508] mprotect(0x7f7a25d000, 4096, PROT_READ) = 0
  122. [pid 508] mprotect(0x7f7a986000, 4096, PROT_READ) = 0
  123. [pid 508] mprotect(0x7f7a984000, 4096, PROT_READ) = 0
  124. [pid 508] mprotect(0x7f7a985000, 4096, PROT_READ) = 0
  125. [pid 508] mprotect(0x7f7a9d8000, 4096, PROT_READ) = 0
  126. [pid 508] mprotect(0x7f7a9df000, 4096, PROT_READ) = 0
  127. [pid 508] mprotect(0x7f7a9d9000, 4096, PROT_READ) = 0
  128. [pid 508] mprotect(0x7f7a9da000, 4096, PROT_READ) = 0
  129. [pid 508] getuid() = 0
  130. [pid 508] writev(3, [{"\0\374\1\370\355WXk\370\330\f", 11}, {"\3", 1}, {"QSEECOMAPI: \0", 13}, {"QSEECom_get_handle sb_length = 0xa000\n\0", 39}], 4) = 64
  131. [pid 508] openat(AT_FDCWD, "/dev/qseecom", O_RDWR) = 15
  132. [pid 508] ioctl(15, _IOC(_IOC_READ|_IOC_WRITE, 0x97, 0x0a, 0x04), 0x7f79ef9708) = 0
  133. [pid 508] ioctl(15, _IOC(_IOC_READ|_IOC_WRITE, 0x97, 0x0f, 0x48), 0x7f79ef9630) = -1 EINVAL (Invalid argument)
  134. [pid 508] getuid() = 0
  135. [pid 508] writev(3, [{"\0\374\1\370\355WX\221V\3\r", 11}, {"\6", 1}, {"QSEECOMAPI: \0", 13}, {"Error::ioctl call query if app is loaded failed with ret = -1, errno = 22\n\0", 75}], 4) = 100
  136. [pid 508] close(15) = 0
  137. [pid 508] getuid() = 0
  138. [pid 508] writev(3, [{"\0\374\1\370\355WX\344\32\v\r", 11}, {"\6", 1}, {"keymaster1_device\0", 18}, {"Loading keymaster app failed\0", 29}], 4) = 59
  139. [pid 508] openat(AT_FDCWD, "/proc/driver/hdf", O_RDONLY) = 15
  140. [pid 508] read(15, "0XFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF\n", 72) = 67
  141. [pid 508] close(15) = 0
  142. [pid 508] openat(AT_FDCWD, "/system/etc/hldm.bin", O_RDONLY) = 15
  143. [pid 508] read(15, "1818181818181818181818181818181818181818181818181818181818181818\n", 72) = 65
  144. [pid 508] close(15) = 0
  145. [pid 508] openat(AT_FDCWD, "/system/etc/hltof.bin", O_RDONLY) = 15
  146. [pid 508] read(15, "TOF/", 4) = 4
  147. [pid 508] openat(AT_FDCWD, "/system/etc/hltrd.bin", O_RDONLY) = 16
  148. [pid 508] read(16, "TRD/", 4) = 4
  149. [pid 508] lseek(15, 0, SEEK_END) = 6172
  150. [pid 508] lseek(15, 3076, SEEK_SET) = 3076
  151. [pid 508] read(15, "\330gk8s\26\0\0\1\0\0\0", 12) = 12
  152. [pid 508] lseek(15, 1528, SEEK_SET) = 1528
  153. [pid 508] read(15, "C\264\331\32\262\n\0\0\1\0\0\0", 12) = 12
  154. [pid 508] lseek(15, 2296, SEEK_SET) = 2296
  155. [pid 508] read(15, "\235\v\332-{\20\0\0\1\0\0\0", 12) = 12
  156. [pid 508] lseek(15, 1912, SEEK_SET) = 1912
  157. [pid 508] read(15, "\10\256\262$\207\r\0\0\1\0\0\0", 12) = 12
  158. [pid 508] lseek(15, 2104, SEEK_SET) = 2104
  159. [pid 508] read(15, "\317c8)\5\17\0\0\1\0\0\0", 12) = 12
  160. [pid 508] lseek(15, 2008, SEEK_SET) = 2008
  161. [pid 508] read(15, "r'/'B\16\0\0\1\0\0\0", 12) = 12
  162. [pid 508] lseek(15, 1960, SEEK_SET) = 1960
  163. [pid 508] read(15, "(\273q&\347\r\0\0\1\0\0\0", 12) = 12
  164. [pid 508] lseek(15, 1984, SEEK_SET) = 1984
  165. [pid 508] read(15, "\226I\7'\16\16\0\0\1\0\0\0", 12) = 12
  166. [pid 508] lseek(15, 1972, SEEK_SET) = 1972
  167. [pid 508] read(15, "\323\27\304&\376\r\0\0\1\0\0\0", 12) = 12
  168. [pid 508] lseek(16, 3582, SEEK_SET) = 3582
  169. [pid 508] read(16, "\t\0\0\0\10\0\0\0", 8) = 8
  170. [pid 508] read(16, "Cryptfs\0", 8) = 8
  171. [pid 508] close(15) = 0
  172. [pid 508] close(16) = 0
  173. [pid 508] getuid() = 0
  174. [pid 508] writev(3, [{"\0\374\1\370\355WX\0\263J\r", 11}, {"\6", 1}, {"Cryptfs\0", 8}, {"could not open keymaster device in keystore (Operation not permitted)\0", 70}], 4) = 90
  175. [pid 508] getuid() = 0
  176. [pid 508] writev(3, [{"\3\374\1\370\355WX\317\230P\r", 11}, {"\6", 1}, {"Cryptfs\0", 8}, {"Failed to init keymaster\0", 25}], 4) = 45
  177. [pid 508] getuid() = 0
  178. [pid 508] writev(3, [{"\3\374\1\370\355WXQ\320T\r", 11}, {"\6", 1}, {"Cryptfs\0", 8}, {"Signing failed\0", 15}], 4) = 35
  179. [pid 508] getuid() = 0
  180. [pid 508] writev(3, [{"\3\374\1\370\355WX\16|X\r", 11}, {"\6", 1}, {"Cryptfs\0", 8}, {"kdf failed\0", 11}], 4) = 31
  181. [pid 508] getuid() = 0
  182. [pid 508] writev(3, [{"\3\374\1\370\355WX\362\232\\\r", 11}, {"\5", 1}, {"Cryptfs\0", 8}, {"failure decrypting master key\0", 30}], 4) = 50
  183. [pid 508] getuid() = 0
  184. [pid 508] writev(3, [{"\3\374\1\370\355WX\367\330`\r", 11}, {"\6", 1}, {"Cryptfs\0", 8}, {"Failed to decrypt master key\n\0", 30}], 4) = 50
  185. [pid 508] rt_sigaction(SIGPIPE, {SIG_IGN, [], 0}, {0x7f7a9a99f0, [], SA_STACK|SA_RESTART|SA_SIGINFO}, 8) = 0
  186. [pid 508] writev(14, [{"200 0 -1\0", 9}], 1) = 9
  187. [pid 508] rt_sigaction(SIGPIPE, {0x7f7a9a99f0, [], SA_STACK|SA_RESTART|SA_SIGINFO}, {SIG_IGN, [], 0}, 8) = 0
  188. [pid 508] pselect6(15, [10 11 14], NULL, NULL, NULL, NULL) = 1 (in [14])
  189. [pid 508] read(14, "", 1024) = 0
  190. [pid 508] close(14) = 0
  191. [pid 508] pselect6(12, [10 11], NULL, NULL, NULL, NULL <unfinished ...>
  192. [pid 506] <... pselect6 resumed> ) = 1 (in [4])
  193. [pid 506] recvmsg(4, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000001}, msg_iov(1)=[{"change@/devices/platform/htc_battery/power_supply/battery\0ACTION=change\0DEVPATH=/devices/platform/htc_battery/power_supply/battery\0SUBSYSTEM=power_supply\0POWER_SUPPLY_NAME=battery\0POWER_SUPPLY_STATUS=Full\0POWER_SUPPLY_CHARGE_TYPE=N/A\0POWER_SUPPLY_HEALTH=Good\0POWER_SUPPLY_PRESENT=1\0POWER_SUPPLY_TECHNOLOGY=Li-poly\0POWER_SUPPLY_CAPACITY=100\0POWER_SUPPLY_OVERLOAD=1\0POWER_SUPPLY_FLASH_ACTIVE=0\0SEQNUM=3338\0", 65536}], msg_controllen=32, [{cmsg_len=28, cmsg_level=SOL_SOCKET, cmsg_type=SCM_CREDENTIALS, {pid=0, uid=0, gid=0}}], msg_flags=0}, 0) = 404
  194. [pid 506] pselect6(6, [4 5], NULL, NULL, NULL, NULL) = 1 (in [4])
  195. [pid 506] recvmsg(4, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000001}, msg_iov(1)=[{"change@/devices/platform/htc_battery/power_supply/battery\0ACTION=change\0DEVPATH=/devices/platform/htc_battery/power_supply/battery\0SUBSYSTEM=power_supply\0POWER_SUPPLY_NAME=battery\0POWER_SUPPLY_STATUS=Full\0POWER_SUPPLY_CHARGE_TYPE=N/A\0POWER_SUPPLY_HEALTH=Good\0POWER_SUPPLY_PRESENT=1\0POWER_SUPPLY_TECHNOLOGY=Li-poly\0POWER_SUPPLY_CAPACITY=100\0POWER_SUPPLY_OVERLOAD=1\0POWER_SUPPLY_FLASH_ACTIVE=0\0SEQNUM=3339\0", 65536}], msg_controllen=32, [{cmsg_len=28, cmsg_level=SOL_SOCKET, cmsg_type=SCM_CREDENTIALS, {pid=0, uid=0, gid=0}}], msg_flags=0}, 0) = 404
  196. [pid 506] pselect6(6, [4 5], NULL, NULL, NULL, NULL) = 1 (in [4])
  197. [pid 506] recvmsg(4, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000001}, msg_iov(1)=[{"change@/devices/platform/htc_battery/power_supply/battery\0ACTION=change\0DEVPATH=/devices/platform/htc_battery/power_supply/battery\0SUBSYSTEM=power_supply\0POWER_SUPPLY_NAME=battery\0POWER_SUPPLY_STATUS=Full\0POWER_SUPPLY_CHARGE_TYPE=N/A\0POWER_SUPPLY_HEALTH=Good\0POWER_SUPPLY_PRESENT=1\0POWER_SUPPLY_TECHNOLOGY=Li-poly\0POWER_SUPPLY_CAPACITY=100\0POWER_SUPPLY_OVERLOAD=1\0POWER_SUPPLY_FLASH_ACTIVE=0\0SEQNUM=3340\0", 65536}], msg_controllen=32, [{cmsg_len=28, cmsg_level=SOL_SOCKET, cmsg_type=SCM_CREDENTIALS, {pid=0, uid=0, gid=0}}], msg_flags=0}, 0) = 404
  198. [pid 506] pselect6(6, [4 5], NULL, NULL, NULL, NULL
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement