I performed upgrade from 13 to 14.0.7.0 and I'm facing a boot loop. I tried TWRP and also fastboot methods with the same result.
After the all successful upgrade the phone reboots showing MIUI logo and then reboots. After several such reboots it end in FASTBOOT mode without possibility to do anything else.
Using logcat I can see the following:
After the all successful upgrade the phone reboots showing MIUI logo and then reboots. After several such reboots it end in FASTBOOT mode without possibility to do anything else.
Using logcat I can see the following:
Code:
- waiting for device -
--------- beginning of crash
02-28 17:01:46.089 662 662 F libc : Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 662 (init), pid 662 (init)
02-28 17:01:46.095 662 662 F libc : crash_dump helper failed to exec, or was killed
--------- beginning of system
02-28 17:01:46.132 669 669 I vold : Vold 3.0 (the awakening) firing up
02-28 17:01:46.132 669 669 D vold : Detected support for: ext4 f2fs ntfs vfat
02-28 17:01:46.135 669 669 I vold : [libfs_mgr]dt_fstab: Skip disabled entry for partition vendor
02-28 17:01:46.137 669 669 D vold : VoldNativeService::start() completed OK
02-28 17:01:46.146 667 688 I QISL : QSEE Interrupt Service Listener Thread is started
02-28 17:01:46.146 667 688 I QISL : QSEE Interrupt Service Listener was activated successfully
02-28 17:01:46.147 667 667 D SPL : Call QSEECom_register_listener()
02-28 17:01:46.147 667 667 D SPL : Registered listener sucessfully!
02-28 17:01:46.147 667 667 D SPL : pipe read-fd [32] write-fd [33]
02-28 17:01:46.147 667 667 D SPL : Create thread
02-28 17:01:46.147 667 667 D SPL : Thread created sucessfully.
02-28 17:01:46.148 667 689 D SPL : spl_dispatch() started
02-28 17:01:46.148 667 689 D SPL : ==== Wait For Request ======
02-28 17:01:46.242 669 669 D vold : fscrypt_mount_metadata_encrypted: /data encrypt: 0 format: 0 with null
02-28 17:01:46.242 669 669 D vold : metadata_key_dir/key: /metadata/vold/metadata_encryption/key
02-28 17:01:46.243 669 669 D vold : Key exists, using: /metadata/vold/metadata_encryption/key
02-28 17:01:46.251 705 705 I keystore2: keystore2_main: Keystore2 is starting.
02-28 17:01:46.251 705 705 I keystore2: keystore2_main: Setting up sqlite logging for keystore2
02-28 17:01:46.251 705 705 W keystore2: keystore2::metrics_store: In update_keystore_crash_sysprop: Failed to read the existing system property due to: In read_keystore_crash_count: Property not set..Therefore, keystore crashes will not be logged.
02-28 17:01:46.252 705 705 I keystore2: keystore2_main: Starting thread pool now.
02-28 17:01:46.257 705 705 I keystore2: keystore2::globals: Add emulation wrapper around Keymaster device for security level: SecurityLevel(1)
02-28 17:01:46.258 669 669 D vold : Deleting leftover upgraded key /metadata/vold/metadata_encryption/key/keymaster_key_blob_upgraded
02-28 17:01:46.258 705 705 I keystore2: keystore2_main: Not publishing IRemotelyProvisionedKeyPool service: In new_native_binder: Failed to get TEE Remote Provisioner instance.
02-28 17:01:46.258 705 705 I keystore2:
02-28 17:01:46.258 705 705 I keystore2: Caused by:
02-28 17:01:46.258 705 705 I keystore2: 0: In get_remotely_provisioned_component.
02-28 17:01:46.258 705 705 I keystore2: 1: In connect_remotely_provisioned_component.
02-28 17:01:46.258 705 705 I keystore2: 2: Error::Km(ErrorCode(-68))
02-28 17:01:46.258 705 705 I keystore2: keystore2_main: Successfully registered Keystore 2.0 service.
02-28 17:01:46.258 705 705 I keystore2: keystore2_main: Joining thread pool now.
02-28 17:01:46.263 705 720 I keystore2: keystore2::shared_secret_negotiation: Shared secret negotiation concluded successfully.
02-28 17:01:46.263 705 720 I keystore2: keystore2::shared_secret_negotiation: No StrongBox Keymint available, so no RoT transfer
02-28 17:01:46.281 669 669 I vold : Upgrading key: /metadata/vold/metadata_encryption/key/keymaster_key_blob
02-28 17:01:46.284 669 669 I vold : Wrote upgraded key to /metadata/vold/metadata_encryption/key/keymaster_key_blob_upgraded; delaying commit due to checkpoint
02-28 17:01:46.289 669 669 D vold : Mounting metadata-encrypted filesystem:/data
02-28 17:01:46.293 669 669 I vold : [libfs_mgr]Setting resize overprovision ratio to 1.4 for /dev/block/dm-33(256G)
02-28 17:01:46.293 669 669 I vold : [libfs_mgr]Running /system/bin/fsck.f2fs -a -c 10000 --debug-cache /dev/block/dm-33
02-28 17:01:46.546 669 669 I vold : [libfs_mgr]Running /system/bin/resize.f2fs/dev/block/dm-33
02-28 17:01:51.853 669 669 I vold : [libfs_mgr]__mount(source=/dev/block/dm-33,target=/data,type=f2fs)=0: Success
02-28 17:01:51.854 669 669 D vold : Mounted /data
02-28 17:01:51.865 669 669 I Checkpoint: cp_prepareCheckpoint called
02-28 17:01:51.871 669 669 I vold : fscrypt_initialize_systemwide_keys
02-28 17:01:51.871 669 669 D vold : Key exists, using: /data/unencrypted/key
02-28 17:01:51.882 669 669 I vold : Upgrading key: /data/unencrypted/key/keymaster_key_blob
02-28 17:01:51.883 669 669 I vold : Wrote upgraded key to /data/unencrypted/key/keymaster_key_blob_upgraded; delaying commit due to checkpoint
02-28 17:01:51.888 669 669 D vold : Installed fscrypt key with ref dd9f173bed862f4f3a5939401044ebbb to /data
02-28 17:01:51.888 669 669 D vold : Added fscrypt-provisioning key for dd9f173bed862f4f3a5939401044ebbb to session keyring
02-28 17:01:51.889 669 669 I vold : Wrote system DE key reference to:/data/unencrypted/ref
02-28 17:01:51.889 669 669 D vold : Generating wrapped storage key
02-28 17:01:51.889 759 762 D spcomlib: [spcom_register_service] spcom_register_service() name [sp_keymaster_ssr] pid [516182490288]
02-28 17:01:51.889 759 762 D spcomlib: [spcom_open] ch [sp_keymaster_ssr] doesn't exist, create it.
02-28 17:01:51.889 759 762 D spcomlib: [spcom_create_channel] Create Channel [sp_keymaster_ssr].
02-28 17:01:51.899 669 669 D vold : Installed fscrypt key with ref c18e85ea678d684b9a43fe38c7088eb5 to /data
02-28 17:01:51.899 669 669 D vold : Added fscrypt-provisioning key for c18e85ea678d684b9a43fe38c7088eb5 to session keyring
02-28 17:01:51.899 669 669 I vold : Wrote per boot key reference to:/data/unencrypted/per_boot_ref
02-28 17:01:51.900 759 762 D spcomlib: [add_ssr_cb] ssr cb added!
02-28 17:01:51.900 759 762 D spcomlib: [start_ssr_thread] ch [spcom] ready!
02-28 17:01:51.900 759 762 D spcomlib: [start_ssr_thread] main pthread self_id [0x2edfbcb0].
02-28 17:01:51.900 759 762 D spcomlib: [start_ssr_thread] pthread_create() ret [0] thread-id [0x2dcfdcb0].
02-28 17:01:51.900 759 762 D spcomlib: [start_ssr_thread] Wait for SSR thread to run.
02-28 17:01:51.900 759 770 D spcomlib: [notify_ssr_thread] SSR pthread self_id [0x2dcfdcb0].
02-28 17:01:51.900 759 762 D spcomlib: [start_ssr_thread] pthread_cond_wait() ret [0].
02-28 17:01:51.900 759 762 D spcomlib: [start_ssr_thread] done.
02-28 17:01:51.900 759 762 D spcomlib: [add_ch] add ch [sp_keymaster_ssr].
02-28 17:01:51.900 759 762 D spcomlib: [spcom_register_service] spcom_register_service() name [sp_keymaster_ssr] pid [516182490288] done
02-28 17:01:51.914 669 669 I incfs : Initial API level of the device: 30
02-28 17:01:51.914 669 669 I incfs : ro.incremental.enable: 1
02-28 17:01:51.914 669 669 I incfs : isFsAvailable: true
02-28 17:01:51.914 669 669 I incfs : isFsAvailable: true
02-28 17:01:51.915 669 669 I incfs : IncFs_Features: v1
02-28 17:01:51.915 705 705 I keystore2: keystore2::maintenance: In early_boot_ended.
02-28 17:01:51.917 705 705 I keystore2: keystore2::globals: Touching Keystore 2.0 database for this first time since boot.
02-28 17:01:51.917 705 705 I keystore2: keystore2::globals: Calling cleanup leftovers.
02-28 17:01:51.939 705 705 I keystore2: keystore2::super_key: Starting boot level watcher.
02-28 17:01:51.939 705 705 I keystore2: keystore2::maintenance: Call to earlyBootEnded succeeded for security level TRUSTED_ENVIRONMENT.
02-28 17:01:51.939 705 774 I keystore2: keystore2::super_key: Read keystore.boot_level value 30
02-28 17:01:51.939 705 774 I keystore2: keystore2::super_key: Read keystore.boot_level value 30
02-28 17:01:51.940 705 705 E keystore2: keystore2::maintenance: Call to earlyBootEnded failed for security level STRONGBOX: In call_with_watchdog: getting keymint device.
02-28 17:01:51.940 705 705 E keystore2: keystore2::error: In call_with_watchdog: getting keymint device
02-28 17:01:51.940 705 705 E keystore2:
02-28 17:01:51.940 705 705 E keystore2: Caused by:
02-28 17:01:51.940 705 705 E keystore2: 0: In get_keymint_device.
02-28 17:01:51.940 705 705 E keystore2: 1: In connect_keymint: Trying to get Legacy wrapper.
02-28 17:01:51.940 705 705 E keystore2: 2: Error::Km(ErrorCode(-68))
02-28 17:01:51.940 669 669 E vold : keystore2 Keystore earlyBootEnded returned service specific error: -68
--------- beginning of main
07-11 09:17:37.714 3003 3023 D MDnsDS : MDnsSdListener starting to monitor
07-11 09:17:37.714 3003 3023 D MDnsDS : Going to poll with pollCount 1
07-11 09:17:37.746 3000 3000 I FastMixerState: sMaxFastTracks = 8
07-11 09:17:44.589 3425 3425 I FastMixerState: sMaxFastTracks = 8
07-11 09:17:44.648 3428 3459 D MDnsDS : MDnsSdListener starting to monitor
07-11 09:17:44.648 3428 3459 D MDnsDS : Going to poll with pollCount 1
07-11 09:17:50.874 3849 3849 I FastMixerState: sMaxFastTracks = 8
07-11 09:17:50.940 3852 3881 D MDnsDS : MDnsSdListener starting to monitor
07-11 09:17:50.940 3852 3881 D MDnsDS : Going to poll with pollCount 1
07-11 09:17:57.450 4265 4265 I FastMixerState: sMaxFastTracks = 8
07-11 09:17:57.506 4268 4298 D MDnsDS : MDnsSdListener starting to monitor
07-11 09:17:57.506 4268 4298 D MDnsDS : Going to poll with pollCount 1
Last edited by a moderator: