Je suis sous Android 6 (AOKP), TWRP installé, et Xposed/Xprivacy. Je voulais crypter l'appareil à partir de la boîte de dialogue des paramètres, mais apparemment cela a échoué - il reste là avec l'animation de démarrage ne faisant rien.
Je peux l'utiliser avec adb shell, logcat dit :
06-03 03:58:47.076 E/BootAnimation(22199): couldn't find audio_conf.txt
06-03 03:58:51.208 W/vold ( 260): type=1400 audit(0.0:9568213): avc: denied { read } for name="fd" dev="proc" ino=3926686 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=dir permissive=0
06-03 03:58:51.208 W/vold ( 260): type=1400 audit(0.0:9568214): avc: denied { getattr } for path="/proc/248/cwd" dev="proc" ino=3926688 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
06-03 03:58:51.208 W/vold ( 260): type=1400 audit(0.0:9568215): avc: denied { getattr } for path="/proc/248/root" dev="proc" ino=3926689 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
06-03 03:58:51.208 W/vold ( 260): type=1400 audit(0.0:9568216): avc: denied { getattr } for path="/proc/248/exe" dev="proc" ino=3926690 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
06-03 03:59:11.618 W/vold ( 260): type=1400 audit(0.0:9568217): avc: denied { read } for name="fd" dev="proc" ino=3926686 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=dir permissive=0
06-03 03:59:11.622 W/vold ( 260): type=1400 audit(0.0:9568218): avc: denied { getattr } for path="/proc/248/cwd" dev="proc" ino=3926688 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
06-03 03:59:11.622 W/vold ( 260): type=1400 audit(0.0:9568219): avc: denied { getattr } for path="/proc/248/root" dev="proc" ino=3926689 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
06-03 03:59:11.622 W/vold ( 260): type=1400 audit(0.0:9568220): avc: denied { getattr } for path="/proc/248/exe" dev="proc" ino=3926690 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
06-03 03:59:11.679 E/Cryptfs ( 249): unmounting /data failed: Device or resource busy
06-03 03:59:11.698 W/vold ( 260): type=1400 audit(0.0:9568221): avc: denied { read } for name="fd" dev="proc" ino=3926686 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=dir permissive=0
06-03 03:59:11.698 W/vold ( 260): type=1400 audit(0.0:9568222): avc: denied { getattr } for path="/proc/248/cwd" dev="proc" ino=3926688 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
06-03 03:59:11.698 W/vold ( 260): type=1400 audit(0.0:9568223): avc: denied { getattr } for path="/proc/248/root" dev="proc" ino=3926689 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
06-03 03:59:11.698 W/vold ( 260): type=1400 audit(0.0:9568224): avc: denied { getattr } for path="/proc/248/exe" dev="proc" ino=3926690 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
06-03 03:59:11.752 W/vold ( 260): type=1400 audit(0.0:9568225): avc: granted { read write } for name="mmcblk0p32" dev="tmpfs" ino=9999 scontext=u:r:vold:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file
06-03 03:59:11.752 W/vold ( 260): type=1400 audit(0.0:9568226): avc: granted { read write open } for name="mmcblk0p32" dev="tmpfs" ino=9999 scontext=u:r:vold:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file
06-03 03:59:11.752 W/vold ( 260): type=1400 audit(0.0:9568227): avc: granted { getattr } for path="/dev/block/mmcblk0p32" dev="tmpfs" ino=9999 scontext=u:r:vold:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file
06-03 03:59:11.832 W/vold ( 260): type=1400 audit(0.0:9568228): avc: granted { read } for name="mmcblk0p47" dev="tmpfs" ino=10059 scontext=u:r:vold:s0 tcontext=u:object_r:userdata_block_device:s0 tclass=blk_file
06-03 03:59:11.832 W/vold ( 260): type=1400 audit(0.0:9568229): avc: granted { read open } for name="mmcblk0p47" dev="tmpfs" ino=10059 scontext=u:r:vold:s0 tcontext=u:object_r:userdata_block_device:s0 tclass=blk_file
06-03 03:59:11.832 W/vold ( 260): type=1400 audit(0.0:9568230): avc: granted { ioctl } for path="/dev/block/mmcblk0p47" dev="tmpfs" ino=10059 ioctlcmd=1260 scontext=u:r:vold:s0 tcontext=u:object_r:userdata_block_device:s0 tclass=blk_file
06-03 03:59:11.835 E/Cryptfs ( 249): Bad magic for real block device /dev/block/platform/msm_sdcc.1/by-name/extra
06-03 03:59:11.841 D/Cryptfs ( 249): Just asked init to shut down class main
06-03 03:59:11.841 W/vold ( 249): emulated unmount requires state mounted
06-03 03:59:11.841 W/vold ( 249): public:179_129 unmount requires state mounted
06-03 03:59:31.935 W/vold ( 260): type=1400 audit(0.0:9568231): avc: denied { read } for name="fd" dev="proc" ino=3926686 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=dir permissive=0
06-03 03:59:31.935 W/vold ( 260): type=1400 audit(0.0:9568232): avc: denied { getattr } for path="/proc/248/cwd" dev="proc" ino=3926688 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
06-03 03:59:31.935 W/vold ( 260): type=1400 audit(0.0:9568233): avc: denied { getattr } for path="/proc/248/root" dev="proc" ino=3926689 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
06-03 03:59:31.935 W/vold ( 260): type=1400 audit(0.0:9568234): avc: denied { getattr } for path="/proc/248/exe" dev="proc" ino=3926690 scontext=u:r:vold:s0 tcontext=u:r:logd:s0 tclass=lnk_file permissive=0
06-03 03:59:32.007 E/Cryptfs ( 249): unmounting /data failed: Device or resource busy
06-03 03:59:32.007 W/SocketClient( 249): write error (Broken pipe)
06-03 03:59:32.007 W/SocketClient( 249): Unable to send msg '200 8 -1'
Maintenant, est-il possible d'annuler le début du cryptage, puisqu'apparemment aucun secteur n'a encore été crypté ? Peut-être que je pourrais d'une manière ou d'une autre écraser l'en-tête luks, restaurer l'original, ou peut-être que la clé (s'il y en a une) est toujours en mémoire ? J'ai une sauvegarde TWRP d'il y a peut-être 2 mois.
Je ne peux pas su
plus, donc ça peut être un problème.... il se bloque tout simplement. Mais j'ai peur que si je redémarre, toutes les dernières chances de récupération soient perdues.
Le mont dit :
rootfs on / type rootfs (ro,seclabel,relatime)
tmpfs on /dev type tmpfs (rw,seclabel,nosuid,relatime,mode=755)
devpts on /dev/pts type devpts (rw,seclabel,relatime,mode=600)
proc on /proc type proc (rw,relatime)
sysfs on /sys type sysfs (rw,seclabel,relatime)
selinuxfs on /sys/fs/selinux type selinuxfs (rw,relatime)
/sys/kernel/debug on /sys/kernel/debug type debugfs (rw,seclabel,relatime)
none on /acct type cgroup (rw,relatime,cpuacct)
none on /sys/fs/cgroup type tmpfs (rw,seclabel,relatime,mode=750,gid=1000)
tmpfs on /mnt type tmpfs (rw,seclabel,relatime,mode=755,gid=1000)
none on /dev/cpuctl type cgroup (rw,relatime,cpu)
none on /sys/fs/cgroup/bfqio type cgroup (rw,relatime,bfqio)
/dev/block/platform/msm_sdcc.1/by-name/system on /system type ext4 (ro,seclabel,noatime,data=ordered)
/dev/block/platform/msm_sdcc.1/by-name/userdata on /data type ext4 (rw,seclabel,nosuid,nodev,noatime,journal_checksum,journal_async_commit,noauto_da_alloc,errors=panic,data=ordered)
/dev/block/platform/msm_sdcc.1/by-name/cache on /cache type ext4 (rw,seclabel,nosuid,nodev,noatime,journal_checksum,journal_async_commit,noauto_da_alloc,errors=panic,data=ordered)
/dev/block/platform/msm_sdcc.1/by-name/radio on /firmware/radio type vfat (ro,context=u:object_r:firmware_file:s0,noatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=cp437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
/dev/block/platform/msm_sdcc.1/by-name/adsp on /firmware/adsp type vfat (ro,context=u:object_r:firmware_file:s0,noatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=cp437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
tmpfs on /storage type tmpfs (rw,seclabel,relatime,mode=755,gid=1000)
/dev/block/loop0 on /su type ext4 (rw,seclabel,noatime,data=ordered)