Advertisement
Captain_Throwback

A9 decrypt fail recovery log

Dec 19th, 2016
189
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.05 KB | None | 0 0
  1. Failed to decrypt master key
  2. I:TW_CRYPTO_USE_SYSTEM_VOLD := true
  3. I:Attempting to use system's vold for decryption...
  4. Setting up folders and permissions...
  5. mv: can't rename 'firmware': No such file or directory
  6. mv: can't rename 'vendor': No such file or directory
  7. mkdir: can't create directory '/dev/qseecom': File exists
  8. mkdir: can't create directory '/dev/ion': File exists
  9. Symlinking vendor folder...
  10. Symlinking firmware files...
  11. ls: cmnlib.b00: No such file or directory
  12. No cmnlib.b00 in /firmware/image
  13. ln -s /system/etc/firmware/cmnlib.b00 /firmware/image/cmnlib.b00
  14. ln -s /system/etc/firmware/cmnlib.b01 /firmware/image/cmnlib.b01
  15. ln -s /system/etc/firmware/cmnlib.b02 /firmware/image/cmnlib.b02
  16. ln -s /system/etc/firmware/cmnlib.b03 /firmware/image/cmnlib.b03
  17. ln -s /system/etc/firmware/cmnlib.mdt /firmware/image/cmnlib.mdt
  18. ln -s /system/etc/firmware/keymaste.b00 /firmware/image/keymaste.b00
  19. ln -s /system/etc/firmware/keymaste.b01 /firmware/image/keymaste.b01
  20. ln -s /system/etc/firmware/keymaste.b02 /firmware/image/keymaste.b02
  21. ln -s /system/etc/firmware/keymaste.b03 /firmware/image/keymaste.b03
  22. ln -s /system/etc/firmware/keymaste.mdt /firmware/image/keymaste.mdt
  23. Starting services...
  24. vdc cryptfs result: 200 0 -1
  25. res=0
  26. mv: can't rename 'firmware-orig': No such file or directory
  27. mv: can't rename 'vendor-orig': No such file or directory
  28. ---- DMESG LOG FOLLOWS ----
  29. <11>[ 2.454405] c0 1 init: init.recovery.vold_decrypt.rc: 28: invalid option 'cgroup'
  30. <11>[ 2.454434] c0 1 init: init.recovery.vold_decrypt.rc: 39: invalid option 'cgroup'
  31. <13>[ 2.454499] c0 1 init: (Parsing init.recovery.vold_decrypt.rc took 0.00s.)
  32. <11>[ 8.789816] c4 1 init: avc: denied { set } for property=crypto.state scontext=u:r:recovery:s0 tcontext=u:object_r:vold_prop:s0 tclass=property_service
  33. <5>[ 10.168064] c5 383 type=1400 audit(1482172297.239:13): avc: denied { getattr } for pid=383 comm="chmod" path="/dev/qseecom" dev="tmpfs" ino=12493 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
  34. <5>[ 10.168115] c5 383 type=1400 audit(1482172297.239:14): avc: denied { setattr } for pid=383 comm="chmod" name="qseecom" dev="tmpfs" ino=12493 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
  35. <14>[ 10.396950] c4 379 [DECRYPT]Starting services...
  36. <13>[ 10.412586] c5 1 init: Starting service 'qseecomd'...
  37. <13>[ 10.467162] c7 1 init: Starting service 'vold'...
  38. <6>[ 10.485496] c5 411 warning: `qseecomd' uses 32-bit capabilities (legacy support in use)
  39. <3>[ 10.493428] c7 428 QSEECOM: __qseecom_set_sb_memory: qseecom_scm_call failed with err: -22
  40. <3>[ 10.493464] c7 428 QSEECOM: qseecom_register_listener: qseecom_set_sb_memoryfailed
  41. <3>[ 10.493548] c7 428 QSEECOM: qseecom_ioctl: failed qseecom_register_listener: -12
  42. <3>[ 10.493861] c7 428 QSEECOM: qseecom_unregister_listener: scm_call() failed with err: -22 (lstnr id=0)
  43. <3>[ 10.495740] c7 428 QSEECOM: __qseecom_set_sb_memory: qseecom_scm_call failed with err: -22
  44. <3>[ 10.495750] c7 428 QSEECOM: qseecom_register_listener: qseecom_set_sb_memoryfailed
  45. <3>[ 10.495761] c7 428 QSEECOM: qseecom_ioctl: failed qseecom_register_listener: -12
  46. <3>[ 10.495992] c7 428 QSEECOM: qseecom_unregister_listener: scm_call() failed with err: -22 (lstnr id=0)
  47. <3>[ 10.498842] c7 428 QSEECOM: __qseecom_set_sb_memory: qseecom_scm_call failed with err: -22
  48. <3>[ 10.498877] c7 428 QSEECOM: qseecom_register_listener: qseecom_set_sb_memoryfailed
  49. <3>[ 10.498889] c7 428 QSEECOM: qseecom_ioctl: failed qseecom_register_listener: -12
  50. <3>[ 10.499166] c7 428 QSEECOM: qseecom_unregister_listener: scm_call() failed with err: -22 (lstnr id=0)
  51. <3>[ 10.500148] c5 428 QSEECOM: __qseecom_check_app_exists: scm_call to check if app is already loaded failed
  52. <3>[ 10.500231] c5 428 QSEECOM: qseecom_query_app_loaded: scm call to check if app is loaded failed
  53. <3>[ 10.500495] c5 428 QSEECOM: __qseecom_check_app_exists: scm_call to check if app is already loaded failed
  54. <38>[ 10.563251] c5 434 type=1400 audit(1482172297.549:25): avc: denied { setgid } for pid=411 comm="qseecomd" capability=6 scontext=u:r:tee:s0 tcontext=u:r:tee:s0 tclass=capability permissive=1
  55. <38>[ 10.563380] c5 434 type=1400 audit(1482172297.549:26): avc: denied { setuid } for pid=411 comm="qseecomd" capability=7 scontext=u:r:tee:s0 tcontext=u:r:tee:s0 tclass=capability permissive=1
  56. <38>[ 10.563493] c5 434 type=1400 audit(1482172297.559:27): avc: denied { read write } for pid=428 comm="qseecomd" name="qseecom" dev="tmpfs" ino=12493 scontext=u:r:tee:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
  57. <38>[ 10.563905] c7 434 type=1400 audit(1482172297.559:28): avc: denied { open } for pid=428 comm="qseecomd" path="/dev/qseecom" dev="tmpfs" ino=12493 scontext=u:r:tee:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
  58. <38>[ 10.564023] c7 434 type=1400 audit(1482172297.559:29): avc: denied { ioctl } for pid=428 comm="qseecomd" path="/dev/qseecom" dev="tmpfs" ino=12493 ioctlcmd=970a scontext=u:r:tee:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
  59. <38>[ 10.564408] c7 434 type=1400 audit(1482172297.569:30): avc: denied { write } for pid=428 comm="qseecomd" name="property_service" dev="tmpfs" ino=10009 scontext=u:r:tee:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=1
  60. <38>[ 10.564520] c7 434 type=1400 audit(1482172297.569:31): avc: denied { connectto } for pid=428 comm="qseecomd" path="/dev/socket/property_service" scontext=u:r:tee:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket permissive=1
  61. <3>[ 10.500577] c5 428 QSEECOM: qseecom_query_app_loaded: scm call to check if app is loaded failed
  62. <6>[ 11.441260] c7 41 [K] 0% 420 vold 22
  63. <14>[ 11.506813] c4 379 [DECRYPT]About to run vdc...
  64. <38>[ 11.509548] c7 434 type=1400 audit(1482172298.579:32): avc: denied { execute } for pid=437 comm="init.vold_decry" name="vdc" dev="mmcblk0p62" ino=702 scontext=u:r:recovery:s0 tcontext=u:object_r:vdc_exec:s0 tclass=file permissive=1
  65. <38>[ 11.512233] c7 434 type=1400 audit(1482172298.579:33): avc: denied { execute_no_trans } for pid=437 comm="init.vold_decry" path="/system/bin/vdc" dev="mmcblk0p62" ino=702 scontext=u:r:recovery:s0 tcontext=u:object_r:vdc_exec:s0 tclass=file permissive=1
  66. <38>[ 11.548520] c7 434 type=1400 audit(1482172298.619:34): avc: denied { write } for pid=437 comm="vdc" name="cryptd" dev="tmpfs" ino=2251 scontext=u:r:recovery:s0 tcontext=u:object_r:vold_socket:s0 tclass=sock_file permissive=1
  67. <38>[ 11.548648] c7 434 type=1400 audit(1482172298.619:35): avc: denied { connectto } for pid=437 comm="vdc" path="/dev/socket/cryptd" scontext=u:r:recovery:s0 tcontext=u:r:vold:s0 tclass=unix_stream_socket permissive=1
  68. <36>[ 11.549176] c7 434 type=1400 audit(1482172298.619:36): avc: granted { read write } for pid=436 comm="vold" name="mmcblk0p37" dev="tmpfs" ino=10197 scontext=u:r:vold:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file
  69. <36>[ 11.549415] c7 434 type=1400 audit(1482172298.619:37): avc: granted { read write open } for pid=436 comm="vold" path="/dev/block/mmcblk0p37" dev="tmpfs" ino=10197 scontext=u:r:vold:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file
  70. <36>[ 11.549508] c7 434 type=1400 audit(1482172298.619:38): avc: granted { getattr } for pid=436 comm="vold" path="/dev/block/mmcblk0p37" dev="tmpfs" ino=10197 scontext=u:r:vold:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file
  71. <3>[ 11.697371] c0 436 QSEECOM: __qseecom_check_app_exists: scm_call to check if app is already loaded failed
  72. <38>[ 11.697887] c5 434 type=1400 audit(1482172298.769:39): avc: denied { read write } for pid=436 comm="vold" name="qseecom" dev="tmpfs" ino=12493 scontext=u:r:vold:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
  73. <38>[ 11.698428] c5 434 type=1400 audit(1482172298.769:40): avc: denied { open } for pid=436 comm="vold" path="/dev/qseecom" dev="tmpfs" ino=12493 scontext=u:r:vold:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
  74. <38>[ 11.698975] c5 434 type=1400 audit(1482172298.769:41): avc: denied { ioctl } for pid=436 comm="vold" path="/dev/qseecom" dev="tmpfs" ino=12493 ioctlcmd=970a scontext=u:r:vold:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
  75. <14>[ 11.700333] c6 379 [DECRYPT]vdc returned an error 0
  76. <14>[ 12.731100] c4 379 [DECRYPT]Stopping services...
  77. <13>[ 12.753239] c5 1 init: Service 'vold' is being killed...
  78. <13>[ 12.757985] c4 1 init: Service 'vold' (pid 420) killed by signal 9
  79. <13>[ 12.789512] c5 1 init: Service 'qseecomd' is being killed...
  80. <13>[ 12.790107] c5 1 init: Service 'qseecomd' (pid 411) killed by signal 9
  81. <3>[ 12.790129] c4 428 QSEECOM: qseecom_unregister_listener: scm_call() failed with err: -22 (lstnr id=8192)
  82. <3>[ 12.790184] c4 428 QSEECOM: qseecom_unregister_listener: scm_call() failed with err: -22 (lstnr id=12288)
  83. <14>[ 12.823119] c5 379 [DECRYPT]Finished.
  84. ---- DMESG LOG ENDS ----
  85. Failed to decrypt data.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement