POCO F3 14.0.7.0 upgrade boot loop


Slavius

Members
Jul 11, 2023
2
3
I performed upgrade from 13 to 14.0.7.0 and I'm facing a boot loop. I tried TWRP and also fastboot methods with the same result.
After the all successful upgrade the phone reboots showing MIUI logo and then reboots. After several such reboots it end in FASTBOOT mode without possibility to do anything else.
Using logcat I can see the following:
Code:
- waiting for device -
--------- beginning of crash
02-28 17:01:46.089   662   662 F libc    : Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 662 (init), pid 662 (init)
02-28 17:01:46.095   662   662 F libc    : crash_dump helper failed to exec, or was killed
--------- beginning of system
02-28 17:01:46.132   669   669 I vold    : Vold 3.0 (the awakening) firing up
02-28 17:01:46.132   669   669 D vold    : Detected support for: ext4 f2fs ntfs vfat
02-28 17:01:46.135   669   669 I vold    : [libfs_mgr]dt_fstab: Skip disabled entry for partition vendor
02-28 17:01:46.137   669   669 D vold    : VoldNativeService::start() completed OK
02-28 17:01:46.146   667   688 I QISL    : QSEE Interrupt Service Listener Thread is started
02-28 17:01:46.146   667   688 I QISL    : QSEE Interrupt Service Listener was activated successfully
02-28 17:01:46.147   667   667 D SPL     : Call QSEECom_register_listener()
02-28 17:01:46.147   667   667 D SPL     : Registered listener sucessfully!
02-28 17:01:46.147   667   667 D SPL     : pipe read-fd [32] write-fd [33]
02-28 17:01:46.147   667   667 D SPL     : Create thread
02-28 17:01:46.147   667   667 D SPL     : Thread created sucessfully.
02-28 17:01:46.148   667   689 D SPL     : spl_dispatch() started
02-28 17:01:46.148   667   689 D SPL     : ==== Wait For Request ======
02-28 17:01:46.242   669   669 D vold    : fscrypt_mount_metadata_encrypted: /data encrypt: 0 format: 0 with null
02-28 17:01:46.242   669   669 D vold    : metadata_key_dir/key: /metadata/vold/metadata_encryption/key
02-28 17:01:46.243   669   669 D vold    : Key exists, using: /metadata/vold/metadata_encryption/key
02-28 17:01:46.251   705   705 I keystore2: keystore2_main: Keystore2 is starting.
02-28 17:01:46.251   705   705 I keystore2: keystore2_main: Setting up sqlite logging for keystore2
02-28 17:01:46.251   705   705 W keystore2: keystore2::metrics_store: In update_keystore_crash_sysprop: Failed to read the existing system property due to: In read_keystore_crash_count: Property not set..Therefore, keystore crashes will not be logged.
02-28 17:01:46.252   705   705 I keystore2: keystore2_main: Starting thread pool now.
02-28 17:01:46.257   705   705 I keystore2: keystore2::globals: Add emulation wrapper around Keymaster device for security level: SecurityLevel(1)
02-28 17:01:46.258   669   669 D vold    : Deleting leftover upgraded key /metadata/vold/metadata_encryption/key/keymaster_key_blob_upgraded
02-28 17:01:46.258   705   705 I keystore2: keystore2_main: Not publishing IRemotelyProvisionedKeyPool service: In new_native_binder: Failed to get TEE Remote Provisioner instance.
02-28 17:01:46.258   705   705 I keystore2:
02-28 17:01:46.258   705   705 I keystore2: Caused by:
02-28 17:01:46.258   705   705 I keystore2:     0: In get_remotely_provisioned_component.
02-28 17:01:46.258   705   705 I keystore2:     1: In connect_remotely_provisioned_component.
02-28 17:01:46.258   705   705 I keystore2:     2: Error::Km(ErrorCode(-68))
02-28 17:01:46.258   705   705 I keystore2: keystore2_main: Successfully registered Keystore 2.0 service.
02-28 17:01:46.258   705   705 I keystore2: keystore2_main: Joining thread pool now.
02-28 17:01:46.263   705   720 I keystore2: keystore2::shared_secret_negotiation: Shared secret negotiation concluded successfully.
02-28 17:01:46.263   705   720 I keystore2: keystore2::shared_secret_negotiation: No StrongBox Keymint available, so no RoT transfer
02-28 17:01:46.281   669   669 I vold    : Upgrading key: /metadata/vold/metadata_encryption/key/keymaster_key_blob
02-28 17:01:46.284   669   669 I vold    : Wrote upgraded key to /metadata/vold/metadata_encryption/key/keymaster_key_blob_upgraded; delaying commit due to checkpoint
02-28 17:01:46.289   669   669 D vold    : Mounting metadata-encrypted filesystem:/data
02-28 17:01:46.293   669   669 I vold    : [libfs_mgr]Setting resize overprovision ratio to 1.4 for /dev/block/dm-33(256G)
02-28 17:01:46.293   669   669 I vold    : [libfs_mgr]Running /system/bin/fsck.f2fs -a -c 10000 --debug-cache /dev/block/dm-33
02-28 17:01:46.546   669   669 I vold    : [libfs_mgr]Running /system/bin/resize.f2fs/dev/block/dm-33
02-28 17:01:51.853   669   669 I vold    : [libfs_mgr]__mount(source=/dev/block/dm-33,target=/data,type=f2fs)=0: Success
02-28 17:01:51.854   669   669 D vold    : Mounted /data
02-28 17:01:51.865   669   669 I Checkpoint: cp_prepareCheckpoint called
02-28 17:01:51.871   669   669 I vold    : fscrypt_initialize_systemwide_keys
02-28 17:01:51.871   669   669 D vold    : Key exists, using: /data/unencrypted/key
02-28 17:01:51.882   669   669 I vold    : Upgrading key: /data/unencrypted/key/keymaster_key_blob
02-28 17:01:51.883   669   669 I vold    : Wrote upgraded key to /data/unencrypted/key/keymaster_key_blob_upgraded; delaying commit due to checkpoint
02-28 17:01:51.888   669   669 D vold    : Installed fscrypt key with ref dd9f173bed862f4f3a5939401044ebbb to /data
02-28 17:01:51.888   669   669 D vold    : Added fscrypt-provisioning key for dd9f173bed862f4f3a5939401044ebbb to session keyring
02-28 17:01:51.889   669   669 I vold    : Wrote system DE key reference to:/data/unencrypted/ref
02-28 17:01:51.889   669   669 D vold    : Generating wrapped storage key
02-28 17:01:51.889   759   762 D spcomlib: [spcom_register_service] spcom_register_service() name [sp_keymaster_ssr] pid [516182490288]
02-28 17:01:51.889   759   762 D spcomlib: [spcom_open] ch [sp_keymaster_ssr] doesn't exist, create it.
02-28 17:01:51.889   759   762 D spcomlib: [spcom_create_channel] Create Channel [sp_keymaster_ssr].
02-28 17:01:51.899   669   669 D vold    : Installed fscrypt key with ref c18e85ea678d684b9a43fe38c7088eb5 to /data
02-28 17:01:51.899   669   669 D vold    : Added fscrypt-provisioning key for c18e85ea678d684b9a43fe38c7088eb5 to session keyring
02-28 17:01:51.899   669   669 I vold    : Wrote per boot key reference to:/data/unencrypted/per_boot_ref
02-28 17:01:51.900   759   762 D spcomlib: [add_ssr_cb] ssr cb added!
02-28 17:01:51.900   759   762 D spcomlib: [start_ssr_thread] ch [spcom] ready!
02-28 17:01:51.900   759   762 D spcomlib: [start_ssr_thread] main pthread self_id [0x2edfbcb0].
02-28 17:01:51.900   759   762 D spcomlib: [start_ssr_thread] pthread_create() ret [0] thread-id [0x2dcfdcb0].
02-28 17:01:51.900   759   762 D spcomlib: [start_ssr_thread] Wait for SSR thread to run.
02-28 17:01:51.900   759   770 D spcomlib: [notify_ssr_thread] SSR pthread self_id [0x2dcfdcb0].
02-28 17:01:51.900   759   762 D spcomlib: [start_ssr_thread] pthread_cond_wait() ret [0].
02-28 17:01:51.900   759   762 D spcomlib: [start_ssr_thread] done.
02-28 17:01:51.900   759   762 D spcomlib: [add_ch] add ch [sp_keymaster_ssr].
02-28 17:01:51.900   759   762 D spcomlib: [spcom_register_service] spcom_register_service() name [sp_keymaster_ssr] pid [516182490288] done
02-28 17:01:51.914   669   669 I incfs   : Initial API level of the device: 30
02-28 17:01:51.914   669   669 I incfs   : ro.incremental.enable: 1
02-28 17:01:51.914   669   669 I incfs   : isFsAvailable: true
02-28 17:01:51.914   669   669 I incfs   : isFsAvailable: true
02-28 17:01:51.915   669   669 I incfs   : IncFs_Features: v1
02-28 17:01:51.915   705   705 I keystore2: keystore2::maintenance: In early_boot_ended.
02-28 17:01:51.917   705   705 I keystore2: keystore2::globals: Touching Keystore 2.0 database for this first time since boot.
02-28 17:01:51.917   705   705 I keystore2: keystore2::globals: Calling cleanup leftovers.
02-28 17:01:51.939   705   705 I keystore2: keystore2::super_key: Starting boot level watcher.
02-28 17:01:51.939   705   705 I keystore2: keystore2::maintenance: Call to earlyBootEnded succeeded for security level TRUSTED_ENVIRONMENT.
02-28 17:01:51.939   705   774 I keystore2: keystore2::super_key: Read keystore.boot_level value 30
02-28 17:01:51.939   705   774 I keystore2: keystore2::super_key: Read keystore.boot_level value 30
02-28 17:01:51.940   705   705 E keystore2: keystore2::maintenance: Call to earlyBootEnded failed for security level STRONGBOX: In call_with_watchdog: getting keymint device.
02-28 17:01:51.940   705   705 E keystore2: keystore2::error: In call_with_watchdog: getting keymint device
02-28 17:01:51.940   705   705 E keystore2:
02-28 17:01:51.940   705   705 E keystore2: Caused by:
02-28 17:01:51.940   705   705 E keystore2:     0: In get_keymint_device.
02-28 17:01:51.940   705   705 E keystore2:     1: In connect_keymint: Trying to get Legacy wrapper.
02-28 17:01:51.940   705   705 E keystore2:     2: Error::Km(ErrorCode(-68))
02-28 17:01:51.940   669   669 E vold    : keystore2 Keystore earlyBootEnded returned service specific error: -68
--------- beginning of main
07-11 09:17:37.714  3003  3023 D MDnsDS  : MDnsSdListener starting to monitor
07-11 09:17:37.714  3003  3023 D MDnsDS  : Going to poll with pollCount 1
07-11 09:17:37.746  3000  3000 I FastMixerState: sMaxFastTracks = 8
07-11 09:17:44.589  3425  3425 I FastMixerState: sMaxFastTracks = 8
07-11 09:17:44.648  3428  3459 D MDnsDS  : MDnsSdListener starting to monitor
07-11 09:17:44.648  3428  3459 D MDnsDS  : Going to poll with pollCount 1
07-11 09:17:50.874  3849  3849 I FastMixerState: sMaxFastTracks = 8
07-11 09:17:50.940  3852  3881 D MDnsDS  : MDnsSdListener starting to monitor
07-11 09:17:50.940  3852  3881 D MDnsDS  : Going to poll with pollCount 1
07-11 09:17:57.450  4265  4265 I FastMixerState: sMaxFastTracks = 8
07-11 09:17:57.506  4268  4298 D MDnsDS  : MDnsSdListener starting to monitor
07-11 09:17:57.506  4268  4298 D MDnsDS  : Going to poll with pollCount 1
 
Last edited by a moderator: