Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unable to access the root folder #174

Open
Cremonesi opened this issue Feb 13, 2023 · 21 comments
Open

Unable to access the root folder #174

Cremonesi opened this issue Feb 13, 2023 · 21 comments
Assignees

Comments

@Cremonesi
Copy link

Hi sgan81,
I can mount the password-protected APFS partition without any problems. When I access the mount folder, I can see the "private-dir" and "root" folders but I can't access them and get the error "bash: cd: root: Input/output error".

When I try to unmount, I get always "fusermount: failed to unmount /mnt/apfs: Device or resource busy"

Thank you so much for the help!

@sgan81
Copy link
Owner

sgan81 commented Mar 11, 2023

Hmmm ... can you run the command with the -d flag and see if you notice something useful?

@sgan81 sgan81 self-assigned this Mar 11, 2023
@Cremonesi
Copy link
Author

Hi @sgan81,
thank you for your answer. Unfortunately if I run the command with the d flag (apfs-fuse -d 1 /dev/sdb2 /mnt/apfs) nothing happens. I'm shown the hint and asked to enter the password, but once I enter it, the terminal shows nothing and I have to hit ctrl-c to get back to the shell prompt

@sgan81
Copy link
Owner

sgan81 commented Mar 12, 2023

Well, it doesn't exactly work that way ...

First of all, -d 1 will not give you too much information. Try using -d 255. You will then get the debug output in the terminal where you started it. Use another terminal to access the files while apfs-fuse is running. When you unmount in the second terminal, apfs-fuse will terminate itself. The reason is that normally apfs-fuse starts and runs in the background, but when you use -d something, it will run in the foreground and output messages in the terminal were it was started.

@Cremonesi
Copy link
Author

Cremonesi commented Mar 12, 2023

Thank you @sgan81, here is the debug output:
root@AndrumNAS:/home/andrea# apfs-fuse -d 255 /dev/sdb2 /mnt/apfs
Device /dev/sdb2 opened. Size is 2000189177856
Mounting xid different from NXSB at 0 (xid = 15833). xid = 15833
Mounting xid 15833
omap: oid=38721 xid=15833 flags=0 size=4096 paddr=217531
omap: oid=38717 xid=15833 flags=0 size=4096 paddr=217530
starting LoadKeybag @ 46800a
all blocks verified
Volume Archivio is encrypted.
starting LoadKeybag @ 468003
all blocks verified
Hint: Gloria
Enter Password:
Dumping Keybag (keys)

Version : 0002
Keys : 0002
Bytes : 000000E0

Key 0:
UUID : 6B00CFB9-F437-4F76-9AE8-40D960F822D2
Type : 0003 [Keybag Ref]
Length : 0010
Block : 0000000000468003
Count : 0000000000000001

Key 1:
UUID : 6B00CFB9-F437-4F76-9AE8-40D960F822D2
Type : 0002 [VEK]
Length : 007C
[Blob Header]
Unk 80 : 0
HMAC : 2FC8787A454B13B65FC0ADD3570855FCF9CBEF180F0AE7418AA79D3B0E6B0B29
Salt : E18999266317F74B

[VEK]
Unk 80 : 0
UUID : 6B00CFB9-F437-4F76-9AE8-40D960F822D2
Unk 82 : 00000000 0001 18 BA
VEK Wrpd: 4AD24B8F92F3776B349ABEF5DD90AA93C5F4F8A7475AC34F02B1F866C1CE3207C58B1D042169E1AE

starting LoadKeybag @ 468003
all blocks verified
Dumping Keybag (recs)

Version : 0002
Keys : 0002
Bytes : 000000E0

Key 0:
UUID : 6B00CFB9-F437-4F76-9AE8-40D960F822D2
Type : 0003 [KEK]
Length : 0094
[Blob Header]
Unk 80 : 0
HMAC : 761642422C03DFC60FC03EAFE74BBC61FB5B4DEF35553E80357FC4C48E47D131
Salt : 83A4212C9AFA929B

[KEK]
Unk 80 : 0
UUID : 6B00CFB9-F437-4F76-9AE8-40D960F822D2
Unk 82 : 00000000 0002 18 BA
KEK Wrpd: C24B727E0F69C9210A0286F85A782333EAE20D72C7D828660496456CCF344D45F1A62E0F08FE0F51
Iterat's: 100000
Salt : 60ADA35EDD202B89244318BE2714ACF1

Key 1:
UUID : 6B00CFB9-F437-4F76-9AE8-40D960F822D2
Type : 0004 [Password Hint]
Length : 0006
Hint : Gloria

PW Key :
KEK Wrpd: C24B727E0F69C9210A0286F85A782333EAE20D72C7D828660496456CCF344D45F1A62E0F08FE0F51
KEK :
KEK IV : A6A6A6A6A6A6A6A6

VEK Wrpd: 4AD24B8F92F3776B349ABEF5DD90AA93C5F4F8A7475AC34F02B1F866C1CE3207C58B1D042169E1AE
VEK :
VEK IV : A6A6A6A6A6A6A6A6
omap: oid=405 xid=3DD7 flags=4 size=1000 paddr=BE
apfs_getattr: ino=1 => OK
apfs_opendir: 1
apfs_readdir: 1
omap: oid=2EA0 xid=2257 flags=4 size=1000 paddr=1FA
omap: oid=947 xid=3DC1 flags=4 size=1000 paddr=2AE
omap: oid=407 xid=3DD3 flags=4 size=1000 paddr=809
dumping entry key
0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 - ............priv
0010: 61 74 65 2D 64 69 72 00 - ate-dir.
dumping entry val
0000: 03 00 00 00 00 00 00 00 84 56 E4 15 50 83 F0 16 - .........V..P...
0010: 04 00 - ..
dumping entry key
0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 - ..........q.root
0010: 00 - .
dumping entry val
0000: 02 00 00 00 00 00 00 00 F7 2E E4 15 50 83 F0 16 - ............P...
0010: 04 00 - ..
dumping entry key
0000: 02 00 00 00 00 00 00 30 - .......0
dumping entry val
0000: 01 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 - ................
0010: F7 2E E4 15 50 83 F0 16 7E 9A 6D 34 2E 89 45 17 - ....P...~.m4..E.
0020: 7E 9A 6D 34 2E 89 45 17 35 30 7E 4D 2E 89 45 17 - .m4..E.50M..E.
0030: 00 80 00 00 00 00 00 00 0C 00 00 00 00 00 00 00 - ................
0040: 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 - 1...............
0050: FD 41 00 00 00 00 00 00 00 00 00 00 01 00 08 00 - .A..............
0060: 04 02 05 00 72 6F 6F 74 00 00 00 00 - ....root....
apfs_readdir: 1
apfs_releasedir 1
apfs_lookup: ino=1 name=root => Lookup hashed key: key=9000000000000001 hash=B671E405 name='root'
72 6F 6F 74 root
Lookup: id = 2
OK
apfs_stat_internal => FAIL
apfs_lookup: ino=1 name=root => Lookup hashed key: key=9000000000000001 hash=B671E405 name='root'
72 6F 6F 74 root
Lookup: id = 2
OK
apfs_stat_internal => FAIL
apfs_lookup: ino=1 name=root => Lookup hashed key: key=9000000000000001 hash=B671E405 name='root'
72 6F 6F 74 root
Lookup: id = 2
OK
apfs_stat_internal => FAIL

@sgan81
Copy link
Owner

sgan81 commented Mar 12, 2023

Better delete the lines "PW Key", "KEK" and "VEK" in your post, as these contain your encryption keys ...

@Cremonesi
Copy link
Author

Ok, I just deleted them

@sgan81
Copy link
Owner

sgan81 commented Mar 12, 2023

Sorry about that. And I'll look into your other issues ...

@Cremonesi
Copy link
Author

Thank you very much Simon!

@sgan81
Copy link
Owner

sgan81 commented Mar 12, 2023

Can you try again with the newest version? Use -d 15 this time ...

Somehow it can't read the root inodes, but I can't see why ... the crypto obviously works.

@Cremonesi
Copy link
Author

Cremonesi commented Mar 12, 2023

Sorry for the newbie question... do I have to repeat these steps to upgrade to the new version?

git clone https://github.com/sgan81/apfs-fuse.git
cd apfs-fuse
git submodule init
git submodule update
mkdir build
cd build
cmake ..
make

...or is there a better way?

@sgan81
Copy link
Owner

sgan81 commented Mar 12, 2023

cd apfs-fuse
git pull
cd build
make

cd is for changing the current directory. cd .. changes to the parent directory.

@Cremonesi
Copy link
Author

Here is the new debug output:
root@AndrumNAS:/home/andrea# apfs-fuse -d 15 /dev/sdb2 /mnt/apfs
Device /dev/sdb2 opened. Size is 2000189177856
Mounting xid different from NXSB at 0 (xid = 15833). xid = 15833
Mounting xid 15833
omap: oid=38721 xid=15833 flags=0 size=4096 paddr=217531
omap: oid=38717 xid=15833 flags=0 size=4096 paddr=217530
Volume Archivio is encrypted.
Hint: Gloria
Enter Password:
omap: oid=1029 xid=15831 flags=4 size=4096 paddr=190
apfs_getattr: ino=1 => OK
apfs_opendir: 1
apfs_readdir: 1
omap: oid=2ea0 xid=2257 flags=4 size=1000 paddr=1fa
omap: oid=947 xid=3dc1 flags=4 size=1000 paddr=2ae
omap: oid=407 xid=3dd3 flags=4 size=1000 paddr=809
dumping entry key
0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 - ............priv
0010: 61 74 65 2D 64 69 72 00 - ate-dir.
dumping entry val
0000: 03 00 00 00 00 00 00 00 84 56 E4 15 50 83 F0 16 - .........V..P...
0010: 04 00 - ..
dumping entry key
0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 - ..........q.root
0010: 00 - .
dumping entry val
0000: 02 00 00 00 00 00 00 00 F7 2E E4 15 50 83 F0 16 - ............P...
0010: 04 00 - ..
dumping entry key
0000: 02 00 00 00 00 00 00 30 - .......0
dumping entry val
0000: 01 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 - ................
0010: F7 2E E4 15 50 83 F0 16 7E 9A 6D 34 2E 89 45 17 - ....P...~.m4..E.
0020: 7E 9A 6D 34 2E 89 45 17 35 30 7E 4D 2E 89 45 17 - .m4..E.50M..E.
0030: 00 80 00 00 00 00 00 00 0C 00 00 00 00 00 00 00 - ................
0040: 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 - 1...............
0050: FD 41 00 00 00 00 00 00 00 00 00 00 01 00 08 00 - .A..............
0060: 04 02 05 00 72 6F 6F 74 00 00 00 00 - ....root....
apfs_readdir: 1
apfs_releasedir 1
apfs_lookup: ino=1 name=root => Lookup hashed key: key=9000000000000001 hash=B671E405 name='root'
72 6F 6F 74 root
Lookup: id = 2
OK
Unable to read inode 2
apfs_stat_internal 2 => FAIL
apfs_lookup: ino=1 name=root => Lookup hashed key: key=9000000000000001 hash=B671E405 name='root'
72 6F 6F 74 root
Lookup: id = 2
OK
Unable to read inode 2
apfs_stat_internal 2 => FAIL
apfs_lookup: ino=1 name=root => Lookup hashed key: key=9000000000000001 hash=B671E405 name='root'
72 6F 6F 74 root
Lookup: id = 2
OK
Unable to read inode 2
apfs_stat_internal 2 => FAIL

@sgan81
Copy link
Owner

sgan81 commented Mar 12, 2023

I see. I don't know why it fails, the output looks like it shouldn't. I'll need to investigate.

@Cremonesi
Copy link
Author

Sure, thank you for your help Simon!

@sgan81
Copy link
Owner

sgan81 commented Mar 13, 2023

Ok, since you have been very helpful so far, i have a little challenge for you ...

  • Open the file BTree.cpp
  • Go to line 175, where it says "m_debug = false;"
  • Change that line to "m_debug = true;"
  • cd into the build directory and run "make"
  • Create another log for me - I mean, run apfs-fuse using -d 15 and try to navigate to root. ;)

Thanks :)

@Cremonesi
Copy link
Author

Hi Simon, I've done my homework ;-)
Here is the debug output:

root@AndrumNAS:~# apfs-fuse -d 15 /dev/sdb2 /mnt/apfs
Device /dev/sdb2 opened. Size is 2000189177856
Mounting xid different from NXSB at 0 (xid = 15852). xid = 15852
Mounting xid 15852
omap: oid=38721 xid=15852 flags=0 size=4096 paddr=217716
omap: oid=38717 xid=15852 flags=0 size=4096 paddr=217715
BTree::Lookup: 0000: 02 04 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=......
FindBin : 0000: 02 04 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=......
0 [ 0] 0 : = : 0000: 02 04 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=......
=> =, 0 => 0
Result = 2301266:0
Volume Archivio is encrypted.
Hint: Gloria
Enter Password:
BTree::Lookup: 0000: 05 04 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=......
FindBin : 0000: 05 04 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=......
0 [ 1] 2 : > : 0000: 5D 83 00 00 00 00 00 00 3D 20 00 00 00 00 00 00 - ].......= ......
0 [ 0] 0 : < : 0000: 05 04 00 00 00 00 00 00 EA 3D 00 00 00 00 00 00 - .........=......
=> <, 0 => 0
FindBin : 0000: 05 04 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=......
0 [69] 138 : > : 0000: 8B 6B 00 00 00 00 00 00 FE 1F 00 00 00 00 00 00 - .k..............
0 [34] 68 : > : 0000: 88 5E 00 00 00 00 00 00 DB 1F 00 00 00 00 00 00 - .^..............
0 [16] 33 : > : 0000: 73 58 00 00 00 00 00 00 CE 1F 00 00 00 00 00 00 - sX..............
0 [ 7] 15 : > : 0000: AD 4D 00 00 00 00 00 00 53 22 00 00 00 00 00 00 - .M......S"......
0 [ 3] 6 : > : 0000: 99 42 00 00 00 00 00 00 33 06 00 00 00 00 00 00 - .B......3.......
0 [ 1] 2 : > : 0000: 8D 2E 00 00 00 00 00 00 1C 05 00 00 00 00 00 00 - ................
0 [ 0] 0 : < : 0000: 05 04 00 00 00 00 00 00 EA 3D 00 00 00 00 00 00 - .........=......
=> <, 0 => 0
FindBin : 0000: 05 04 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=......
0 [32] 65 : > : 0000: 56 29 00 00 00 00 00 00 DE 01 00 00 00 00 00 00 - V)..............
0 [15] 31 : > : 0000: 03 29 00 00 00 00 00 00 DA 21 00 00 00 00 00 00 - .).......!......
0 [ 7] 14 : > : 0000: 7A 1D 00 00 00 00 00 00 86 21 00 00 00 00 00 00 - z........!......
0 [ 3] 6 : > : 0000: 0B 04 00 00 00 00 00 00 E8 3D 00 00 00 00 00 00 - .........=......
0 [ 1] 2 : > : 0000: 07 04 00 00 00 00 00 00 E7 3D 00 00 00 00 00 00 - .........=......
0 [ 0] 0 : < : 0000: 05 04 00 00 00 00 00 00 EA 3D 00 00 00 00 00 00 - .........=......
=> <, 0 => 0
Result = 2301862:0
omap: oid=1029 xid=15850 flags=4 size=4096 paddr=1076
apfs_getattr: ino=1 => OK
apfs_lookup: ino=1 name=root => Lookup hashed key: key=10376293541461622785 hash=3060917253 name='root'
72 6F 6F 74 root
BTree::Lookup: 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root.
FindBin : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root.
0 [ 1] 2 : > : 0000: 70 56 04 00 00 00 00 30 - pV.....0
0 [ 0] 0 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir.
=> <, 0 => 0
BTree::Lookup: 0000: A0 2E 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=......
FindBin : 0000: A0 2E 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=......
0 [ 1] 2 : > : 0000: 5D 83 00 00 00 00 00 00 3D 20 00 00 00 00 00 00 - ].......= ......
0 [ 0] 0 : < : 0000: 05 04 00 00 00 00 00 00 EA 3D 00 00 00 00 00 00 - .........=......
=> <, 0 => 0
FindBin : 0000: A0 2E 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=......
0 [69] 138 : > : 0000: 8B 6B 00 00 00 00 00 00 FE 1F 00 00 00 00 00 00 - .k..............
0 [34] 68 : > : 0000: 88 5E 00 00 00 00 00 00 DB 1F 00 00 00 00 00 00 - .^..............
0 [16] 33 : > : 0000: 73 58 00 00 00 00 00 00 CE 1F 00 00 00 00 00 00 - sX..............
0 [ 7] 15 : > : 0000: AD 4D 00 00 00 00 00 00 53 22 00 00 00 00 00 00 - .M......S"......
0 [ 3] 6 : > : 0000: 99 42 00 00 00 00 00 00 33 06 00 00 00 00 00 00 - .B......3.......
0 [ 1] 2 : < : 0000: 8D 2E 00 00 00 00 00 00 1C 05 00 00 00 00 00 00 - ................
2 [ 2] 2 : > : 0000: BD 3C 00 00 00 00 00 00 DB 21 00 00 00 00 00 00 - .<.......!......
=> >, 2 => 1
FindBin : 0000: A0 2E 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=......
0 [34] 68 : > : 0000: 21 33 00 00 00 00 00 00 5B 05 00 00 00 00 00 00 - !3......[.......
0 [16] 33 : < : 0000: 9E 2E 00 00 00 00 00 00 DA 21 00 00 00 00 00 00 - .........!......
17 [25] 33 : > : 0000: 18 33 00 00 00 00 00 00 5B 05 00 00 00 00 00 00 - .3......[.......
17 [20] 24 : > : 0000: 13 33 00 00 00 00 00 00 93 05 00 00 00 00 00 00 - .3..............
17 [18] 19 : > : 0000: A1 2E 00 00 00 00 00 00 DB 21 00 00 00 00 00 00 - .........!......
17 [17] 17 : < : 0000: A0 2E 00 00 00 00 00 00 57 22 00 00 00 00 00 00 - ........W"......
=> <, 17 => 17
Result = 2301204:17
omap: oid=11936 xid=8791 flags=4 size=4096 paddr=506
FindBin : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root.
0 [34] 68 : > : 0000: 49 94 03 00 00 00 00 80 00 00 00 00 00 00 00 00 - I...............
0 [16] 33 : > : 0000: AE 2F 03 00 00 00 00 90 0D C8 CA C7 53 4F 4C 4F 2D 47 38 41 2E 57 41 56 00 - ./..........SOLO-G8A.WAV.
0 [ 7] 15 : > : 0000: 92 BC 02 00 00 00 00 40 17 00 63 6F 6D 2E 61 70 70 6C 65 2E 52 65 73 6F 75 72 63 65 46 6F 72 6B 00 - [email protected].
0 [ 3] 6 : > : 0000: D5 1E 02 00 00 00 00 40 12 00 63 6F 6D 2E 61 70 70 6C 65 2E 64 65 63 6D 70 66 73 00 - [email protected].
0 [ 1] 2 : > : 0000: BB 05 01 00 00 00 00 80 00 00 00 00 00 00 00 00 - ................
0 [ 0] 0 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir.
=> <, 0 => 0
BTree::Lookup: 0000: 47 09 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - G........=......
FindBin : 0000: 47 09 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - G........=......
0 [ 1] 2 : > : 0000: 5D 83 00 00 00 00 00 00 3D 20 00 00 00 00 00 00 - ].......= ......
0 [ 0] 0 : < : 0000: 05 04 00 00 00 00 00 00 EA 3D 00 00 00 00 00 00 - .........=......
=> <, 0 => 0
FindBin : 0000: 47 09 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - G........=......
0 [69] 138 : > : 0000: 8B 6B 00 00 00 00 00 00 FE 1F 00 00 00 00 00 00 - .k..............
0 [34] 68 : > : 0000: 88 5E 00 00 00 00 00 00 DB 1F 00 00 00 00 00 00 - .^..............
0 [16] 33 : > : 0000: 73 58 00 00 00 00 00 00 CE 1F 00 00 00 00 00 00 - sX..............
0 [ 7] 15 : > : 0000: AD 4D 00 00 00 00 00 00 53 22 00 00 00 00 00 00 - .M......S"......
0 [ 3] 6 : > : 0000: 99 42 00 00 00 00 00 00 33 06 00 00 00 00 00 00 - .B......3.......
0 [ 1] 2 : > : 0000: 8D 2E 00 00 00 00 00 00 1C 05 00 00 00 00 00 00 - ................
0 [ 0] 0 : < : 0000: 05 04 00 00 00 00 00 00 EA 3D 00 00 00 00 00 00 - .........=......
=> <, 0 => 0
FindBin : 0000: 47 09 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - G........=......
0 [32] 65 : > : 0000: 56 29 00 00 00 00 00 00 DE 01 00 00 00 00 00 00 - V)..............
0 [15] 31 : > : 0000: 03 29 00 00 00 00 00 00 DA 21 00 00 00 00 00 00 - .).......!......
0 [ 7] 14 : > : 0000: 7A 1D 00 00 00 00 00 00 86 21 00 00 00 00 00 00 - z........!......
0 [ 3] 6 : < : 0000: 0B 04 00 00 00 00 00 00 E8 3D 00 00 00 00 00 00 - .........=......
4 [ 5] 6 : < : 0000: 47 09 00 00 00 00 00 00 EA 3D 00 00 00 00 00 00 - G........=......
6 [ 6] 6 : > : 0000: 50 1D 00 00 00 00 00 00 D8 21 00 00 00 00 00 00 - P........!......
=> >, 6 => 5
Result = 2301862:5
omap: oid=2375 xid=15850 flags=4 size=4096 paddr=832
FindBin : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root.
0 [30] 60 : > : 0000: C9 FF 00 00 00 00 00 60 - ....... 0 [14] 29 : > : 0000: 8F 01 00 00 00 00 00 90 0A 74 AF 41 36 32 33 37 31 2E 74 78 74 00 - .........t.A62371.txt. 0 [ 6] 13 : > : 0000: 15 00 00 00 00 00 00 90 11 B0 E6 7A 36 33 36 35 37 33 61 62 30 32 36 31 62 39 62 35 00 - ...........z636573ab0261b9b5. 0 [ 2] 5 : > : 0000: 13 00 00 00 00 00 00 90 08 D8 10 B8 74 6D 70 2E 43 61 62 00 - ............tmp.Cab. 0 [ 0] 1 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir. 1 [ 1] 1 : > : 0000: 13 00 00 00 00 00 00 90 12 70 6A 09 30 2E 73 68 61 64 6F 77 49 6E 64 65 78 48 65 61 64 00 - .........pj.0.shadowIndexHead. => >, 1 => 0 BTree::Lookup: 0000: 07 04 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=...... FindBin : 0000: 07 04 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=...... 0 [ 1] 2 : > : 0000: 5D 83 00 00 00 00 00 00 3D 20 00 00 00 00 00 00 - ].......= ...... 0 [ 0] 0 : < : 0000: 05 04 00 00 00 00 00 00 EA 3D 00 00 00 00 00 00 - .........=...... => <, 0 => 0 FindBin : 0000: 07 04 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=...... 0 [69] 138 : > : 0000: 8B 6B 00 00 00 00 00 00 FE 1F 00 00 00 00 00 00 - .k.............. 0 [34] 68 : > : 0000: 88 5E 00 00 00 00 00 00 DB 1F 00 00 00 00 00 00 - .^.............. 0 [16] 33 : > : 0000: 73 58 00 00 00 00 00 00 CE 1F 00 00 00 00 00 00 - sX.............. 0 [ 7] 15 : > : 0000: AD 4D 00 00 00 00 00 00 53 22 00 00 00 00 00 00 - .M......S"...... 0 [ 3] 6 : > : 0000: 99 42 00 00 00 00 00 00 33 06 00 00 00 00 00 00 - .B......3....... 0 [ 1] 2 : > : 0000: 8D 2E 00 00 00 00 00 00 1C 05 00 00 00 00 00 00 - ................ 0 [ 0] 0 : < : 0000: 05 04 00 00 00 00 00 00 EA 3D 00 00 00 00 00 00 - .........=...... => <, 0 => 0 FindBin : 0000: 07 04 00 00 00 00 00 00 EC 3D 00 00 00 00 00 00 - .........=...... 0 [32] 65 : > : 0000: 56 29 00 00 00 00 00 00 DE 01 00 00 00 00 00 00 - V).............. 0 [15] 31 : > : 0000: 03 29 00 00 00 00 00 00 DA 21 00 00 00 00 00 00 - .).......!...... 0 [ 7] 14 : > : 0000: 7A 1D 00 00 00 00 00 00 86 21 00 00 00 00 00 00 - z........!...... 0 [ 3] 6 : > : 0000: 0B 04 00 00 00 00 00 00 E8 3D 00 00 00 00 00 00 - .........=...... 0 [ 1] 2 : < : 0000: 07 04 00 00 00 00 00 00 E7 3D 00 00 00 00 00 00 - .........=...... 2 [ 2] 2 : > : 0000: 0A 04 00 00 00 00 00 00 E6 3D 00 00 00 00 00 00 - .........=...... => >, 2 => 1 Result = 2301862:1 omap: oid=1031 xid=15847 flags=4 size=4096 paddr=609 FindBin : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root. 0 [15] 30 : > : 0000: 02 00 00 00 00 00 00 90 10 14 D8 D5 2E 54 65 6D 70 6F 72 61 72 79 49 74 65 6D 73 00 - .............TemporaryItems. 0 [ 7] 14 : > : 0000: 02 00 00 00 00 00 00 90 0A C0 2E 26 2E 44 53 5F 53 74 6F 72 65 00 - ...........&.DS_Store. 0 [ 3] 6 : > : 0000: 02 00 00 00 00 00 00 40 16 00 70 75 72 67 65 61 62 6C 65 2D 64 72 65 63 73 2D 66 69 78 65 64 00 - [email protected]. 0 [ 1] 2 : = : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root. => =, 1 => 1 Result = 1031:1 Lookup: id = 2 OK BTree::Lookup: 0000: 02 00 00 00 00 00 00 30 - .......0 FindBin : 0000: 02 00 00 00 00 00 00 30 - .......0 0 [ 1] 2 : > : 0000: 70 56 04 00 00 00 00 30 - pV.....0 0 [ 0] 0 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir. => <, 0 => 0 FindBin : 0000: 02 00 00 00 00 00 00 30 - .......0 0 [34] 68 : > : 0000: 49 94 03 00 00 00 00 80 00 00 00 00 00 00 00 00 - I............... 0 [16] 33 : > : 0000: AE 2F 03 00 00 00 00 90 0D C8 CA C7 53 4F 4C 4F 2D 47 38 41 2E 57 41 56 00 - ./..........SOLO-G8A.WAV. 0 [ 7] 15 : > : 0000: 92 BC 02 00 00 00 00 40 17 00 63 6F 6D 2E 61 70 70 6C 65 2E 52 65 73 6F 75 72 63 65 46 6F 72 6B 00 - [email protected]. 0 [ 3] 6 : > : 0000: D5 1E 02 00 00 00 00 40 12 00 63 6F 6D 2E 61 70 70 6C 65 2E 64 65 63 6D 70 66 73 00 - [email protected]. 0 [ 1] 2 : > : 0000: BB 05 01 00 00 00 00 80 00 00 00 00 00 00 00 00 - ................ 0 [ 0] 0 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir. => <, 0 => 0 FindBin : 0000: 02 00 00 00 00 00 00 30 - .......0 0 [30] 60 : > : 0000: C9 FF 00 00 00 00 00 60 - .......
0 [14] 29 : > : 0000: 8F 01 00 00 00 00 00 90 0A 74 AF 41 36 32 33 37 31 2E 74 78 74 00 - .........t.A62371.txt.
0 [ 6] 13 : > : 0000: 15 00 00 00 00 00 00 90 11 B0 E6 7A 36 33 36 35 37 33 61 62 30 32 36 31 62 39 62 35 00 - ...........z636573ab0261b9b5.
0 [ 2] 5 : > : 0000: 13 00 00 00 00 00 00 90 08 D8 10 B8 74 6D 70 2E 43 61 62 00 - ............tmp.Cab.
0 [ 0] 1 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir.
1 [ 1] 1 : > : 0000: 13 00 00 00 00 00 00 90 12 70 6A 09 30 2E 73 68 61 64 6F 77 49 6E 64 65 78 48 65 61 64 00 - .........pj.0.shadowIndexHead.
=> >, 1 => 0
FindBin : 0000: 02 00 00 00 00 00 00 30 - .......0
0 [15] 30 : > : 0000: 02 00 00 00 00 00 00 90 10 14 D8 D5 2E 54 65 6D 70 6F 72 61 72 79 49 74 65 6D 73 00 - .............TemporaryItems.
0 [ 7] 14 : < : 0000: 02 00 00 00 00 00 00 90 0A C0 2E 26 2E 44 53 5F 53 74 6F 72 65 00 - ...........&.DS_Store.
8 [11] 14 : > : 0000: 02 00 00 00 00 00 00 90 08 B8 D0 89 53 61 6D 70 6C 65 73 00 - ............Samples.
8 [ 9] 10 : < : 0000: 02 00 00 00 00 00 00 90 16 CC 2E 77 43 68 65 20 73 69 61 20 62 65 6E 65 64 65 74 74 61 2E 6D 70 34 00 - ...........wChe sia benedetta.mp4.
10 [10] 10 : > : 0000: 02 00 00 00 00 00 00 90 09 40 D0 87 2E 54 72 61 73 68 65 73 00 - [email protected].
=> >, 10 => -1
Result = 1031:-1
Unable to read inode 2
apfs_stat_internal 2 => FAIL
apfs_lookup: ino=1 name=root => Lookup hashed key: key=10376293541461622785 hash=3060917253 name='root'
72 6F 6F 74 root
BTree::Lookup: 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root.
FindBin : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root.
0 [ 1] 2 : > : 0000: 70 56 04 00 00 00 00 30 - pV.....0
0 [ 0] 0 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir.
=> <, 0 => 0
FindBin : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root.
0 [34] 68 : > : 0000: 49 94 03 00 00 00 00 80 00 00 00 00 00 00 00 00 - I...............
0 [16] 33 : > : 0000: AE 2F 03 00 00 00 00 90 0D C8 CA C7 53 4F 4C 4F 2D 47 38 41 2E 57 41 56 00 - ./..........SOLO-G8A.WAV.
0 [ 7] 15 : > : 0000: 92 BC 02 00 00 00 00 40 17 00 63 6F 6D 2E 61 70 70 6C 65 2E 52 65 73 6F 75 72 63 65 46 6F 72 6B 00 - [email protected].
0 [ 3] 6 : > : 0000: D5 1E 02 00 00 00 00 40 12 00 63 6F 6D 2E 61 70 70 6C 65 2E 64 65 63 6D 70 66 73 00 - [email protected].
0 [ 1] 2 : > : 0000: BB 05 01 00 00 00 00 80 00 00 00 00 00 00 00 00 - ................
0 [ 0] 0 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir.
=> <, 0 => 0
FindBin : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root.
0 [30] 60 : > : 0000: C9 FF 00 00 00 00 00 60 - ....... 0 [14] 29 : > : 0000: 8F 01 00 00 00 00 00 90 0A 74 AF 41 36 32 33 37 31 2E 74 78 74 00 - .........t.A62371.txt. 0 [ 6] 13 : > : 0000: 15 00 00 00 00 00 00 90 11 B0 E6 7A 36 33 36 35 37 33 61 62 30 32 36 31 62 39 62 35 00 - ...........z636573ab0261b9b5. 0 [ 2] 5 : > : 0000: 13 00 00 00 00 00 00 90 08 D8 10 B8 74 6D 70 2E 43 61 62 00 - ............tmp.Cab. 0 [ 0] 1 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir. 1 [ 1] 1 : > : 0000: 13 00 00 00 00 00 00 90 12 70 6A 09 30 2E 73 68 61 64 6F 77 49 6E 64 65 78 48 65 61 64 00 - .........pj.0.shadowIndexHead. => >, 1 => 0 FindBin : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root. 0 [15] 30 : > : 0000: 02 00 00 00 00 00 00 90 10 14 D8 D5 2E 54 65 6D 70 6F 72 61 72 79 49 74 65 6D 73 00 - .............TemporaryItems. 0 [ 7] 14 : > : 0000: 02 00 00 00 00 00 00 90 0A C0 2E 26 2E 44 53 5F 53 74 6F 72 65 00 - ...........&.DS_Store. 0 [ 3] 6 : > : 0000: 02 00 00 00 00 00 00 40 16 00 70 75 72 67 65 61 62 6C 65 2D 64 72 65 63 73 2D 66 69 78 65 64 00 - [email protected]. 0 [ 1] 2 : = : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root. => =, 1 => 1 Result = 1031:1 Lookup: id = 2 OK BTree::Lookup: 0000: 02 00 00 00 00 00 00 30 - .......0 FindBin : 0000: 02 00 00 00 00 00 00 30 - .......0 0 [ 1] 2 : > : 0000: 70 56 04 00 00 00 00 30 - pV.....0 0 [ 0] 0 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir. => <, 0 => 0 FindBin : 0000: 02 00 00 00 00 00 00 30 - .......0 0 [34] 68 : > : 0000: 49 94 03 00 00 00 00 80 00 00 00 00 00 00 00 00 - I............... 0 [16] 33 : > : 0000: AE 2F 03 00 00 00 00 90 0D C8 CA C7 53 4F 4C 4F 2D 47 38 41 2E 57 41 56 00 - ./..........SOLO-G8A.WAV. 0 [ 7] 15 : > : 0000: 92 BC 02 00 00 00 00 40 17 00 63 6F 6D 2E 61 70 70 6C 65 2E 52 65 73 6F 75 72 63 65 46 6F 72 6B 00 - [email protected]. 0 [ 3] 6 : > : 0000: D5 1E 02 00 00 00 00 40 12 00 63 6F 6D 2E 61 70 70 6C 65 2E 64 65 63 6D 70 66 73 00 - [email protected]. 0 [ 1] 2 : > : 0000: BB 05 01 00 00 00 00 80 00 00 00 00 00 00 00 00 - ................ 0 [ 0] 0 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir. => <, 0 => 0 FindBin : 0000: 02 00 00 00 00 00 00 30 - .......0 0 [30] 60 : > : 0000: C9 FF 00 00 00 00 00 60 - .......
0 [14] 29 : > : 0000: 8F 01 00 00 00 00 00 90 0A 74 AF 41 36 32 33 37 31 2E 74 78 74 00 - .........t.A62371.txt.
0 [ 6] 13 : > : 0000: 15 00 00 00 00 00 00 90 11 B0 E6 7A 36 33 36 35 37 33 61 62 30 32 36 31 62 39 62 35 00 - ...........z636573ab0261b9b5.
0 [ 2] 5 : > : 0000: 13 00 00 00 00 00 00 90 08 D8 10 B8 74 6D 70 2E 43 61 62 00 - ............tmp.Cab.
0 [ 0] 1 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir.
1 [ 1] 1 : > : 0000: 13 00 00 00 00 00 00 90 12 70 6A 09 30 2E 73 68 61 64 6F 77 49 6E 64 65 78 48 65 61 64 00 - .........pj.0.shadowIndexHead.
=> >, 1 => 0
FindBin : 0000: 02 00 00 00 00 00 00 30 - .......0
0 [15] 30 : > : 0000: 02 00 00 00 00 00 00 90 10 14 D8 D5 2E 54 65 6D 70 6F 72 61 72 79 49 74 65 6D 73 00 - .............TemporaryItems.
0 [ 7] 14 : < : 0000: 02 00 00 00 00 00 00 90 0A C0 2E 26 2E 44 53 5F 53 74 6F 72 65 00 - ...........&.DS_Store.
8 [11] 14 : > : 0000: 02 00 00 00 00 00 00 90 08 B8 D0 89 53 61 6D 70 6C 65 73 00 - ............Samples.
8 [ 9] 10 : < : 0000: 02 00 00 00 00 00 00 90 16 CC 2E 77 43 68 65 20 73 69 61 20 62 65 6E 65 64 65 74 74 61 2E 6D 70 34 00 - ...........wChe sia benedetta.mp4.
10 [10] 10 : > : 0000: 02 00 00 00 00 00 00 90 09 40 D0 87 2E 54 72 61 73 68 65 73 00 - [email protected].
=> >, 10 => -1
Result = 1031:-1
Unable to read inode 2
apfs_stat_internal 2 => FAIL
apfs_lookup: ino=1 name=root => Lookup hashed key: key=10376293541461622785 hash=3060917253 name='root'
72 6F 6F 74 root
BTree::Lookup: 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root.
FindBin : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root.
0 [ 1] 2 : > : 0000: 70 56 04 00 00 00 00 30 - pV.....0
0 [ 0] 0 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir.
=> <, 0 => 0
FindBin : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root.
0 [34] 68 : > : 0000: 49 94 03 00 00 00 00 80 00 00 00 00 00 00 00 00 - I...............
0 [16] 33 : > : 0000: AE 2F 03 00 00 00 00 90 0D C8 CA C7 53 4F 4C 4F 2D 47 38 41 2E 57 41 56 00 - ./..........SOLO-G8A.WAV.
0 [ 7] 15 : > : 0000: 92 BC 02 00 00 00 00 40 17 00 63 6F 6D 2E 61 70 70 6C 65 2E 52 65 73 6F 75 72 63 65 46 6F 72 6B 00 - [email protected].
0 [ 3] 6 : > : 0000: D5 1E 02 00 00 00 00 40 12 00 63 6F 6D 2E 61 70 70 6C 65 2E 64 65 63 6D 70 66 73 00 - [email protected].
0 [ 1] 2 : > : 0000: BB 05 01 00 00 00 00 80 00 00 00 00 00 00 00 00 - ................
0 [ 0] 0 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir.
=> <, 0 => 0
FindBin : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root.
0 [30] 60 : > : 0000: C9 FF 00 00 00 00 00 60 - ....... 0 [14] 29 : > : 0000: 8F 01 00 00 00 00 00 90 0A 74 AF 41 36 32 33 37 31 2E 74 78 74 00 - .........t.A62371.txt. 0 [ 6] 13 : > : 0000: 15 00 00 00 00 00 00 90 11 B0 E6 7A 36 33 36 35 37 33 61 62 30 32 36 31 62 39 62 35 00 - ...........z636573ab0261b9b5. 0 [ 2] 5 : > : 0000: 13 00 00 00 00 00 00 90 08 D8 10 B8 74 6D 70 2E 43 61 62 00 - ............tmp.Cab. 0 [ 0] 1 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir. 1 [ 1] 1 : > : 0000: 13 00 00 00 00 00 00 90 12 70 6A 09 30 2E 73 68 61 64 6F 77 49 6E 64 65 78 48 65 61 64 00 - .........pj.0.shadowIndexHead. => >, 1 => 0 FindBin : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root. 0 [15] 30 : > : 0000: 02 00 00 00 00 00 00 90 10 14 D8 D5 2E 54 65 6D 70 6F 72 61 72 79 49 74 65 6D 73 00 - .............TemporaryItems. 0 [ 7] 14 : > : 0000: 02 00 00 00 00 00 00 90 0A C0 2E 26 2E 44 53 5F 53 74 6F 72 65 00 - ...........&.DS_Store. 0 [ 3] 6 : > : 0000: 02 00 00 00 00 00 00 40 16 00 70 75 72 67 65 61 62 6C 65 2D 64 72 65 63 73 2D 66 69 78 65 64 00 - [email protected]. 0 [ 1] 2 : = : 0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 00 - ..........q.root. => =, 1 => 1 Result = 1031:1 Lookup: id = 2 OK BTree::Lookup: 0000: 02 00 00 00 00 00 00 30 - .......0 FindBin : 0000: 02 00 00 00 00 00 00 30 - .......0 0 [ 1] 2 : > : 0000: 70 56 04 00 00 00 00 30 - pV.....0 0 [ 0] 0 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir. => <, 0 => 0 FindBin : 0000: 02 00 00 00 00 00 00 30 - .......0 0 [34] 68 : > : 0000: 49 94 03 00 00 00 00 80 00 00 00 00 00 00 00 00 - I............... 0 [16] 33 : > : 0000: AE 2F 03 00 00 00 00 90 0D C8 CA C7 53 4F 4C 4F 2D 47 38 41 2E 57 41 56 00 - ./..........SOLO-G8A.WAV. 0 [ 7] 15 : > : 0000: 92 BC 02 00 00 00 00 40 17 00 63 6F 6D 2E 61 70 70 6C 65 2E 52 65 73 6F 75 72 63 65 46 6F 72 6B 00 - [email protected]. 0 [ 3] 6 : > : 0000: D5 1E 02 00 00 00 00 40 12 00 63 6F 6D 2E 61 70 70 6C 65 2E 64 65 63 6D 70 66 73 00 - [email protected]. 0 [ 1] 2 : > : 0000: BB 05 01 00 00 00 00 80 00 00 00 00 00 00 00 00 - ................ 0 [ 0] 0 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir. => <, 0 => 0 FindBin : 0000: 02 00 00 00 00 00 00 30 - .......0 0 [30] 60 : > : 0000: C9 FF 00 00 00 00 00 60 - .......
0 [14] 29 : > : 0000: 8F 01 00 00 00 00 00 90 0A 74 AF 41 36 32 33 37 31 2E 74 78 74 00 - .........t.A62371.txt.
0 [ 6] 13 : > : 0000: 15 00 00 00 00 00 00 90 11 B0 E6 7A 36 33 36 35 37 33 61 62 30 32 36 31 62 39 62 35 00 - ...........z636573ab0261b9b5.
0 [ 2] 5 : > : 0000: 13 00 00 00 00 00 00 90 08 D8 10 B8 74 6D 70 2E 43 61 62 00 - ............tmp.Cab.
0 [ 0] 1 : < : 0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 61 74 65 2D 64 69 72 00 - ............private-dir.
1 [ 1] 1 : > : 0000: 13 00 00 00 00 00 00 90 12 70 6A 09 30 2E 73 68 61 64 6F 77 49 6E 64 65 78 48 65 61 64 00 - .........pj.0.shadowIndexHead.
=> >, 1 => 0
FindBin : 0000: 02 00 00 00 00 00 00 30 - .......0
0 [15] 30 : > : 0000: 02 00 00 00 00 00 00 90 10 14 D8 D5 2E 54 65 6D 70 6F 72 61 72 79 49 74 65 6D 73 00 - .............TemporaryItems.
0 [ 7] 14 : < : 0000: 02 00 00 00 00 00 00 90 0A C0 2E 26 2E 44 53 5F 53 74 6F 72 65 00 - ...........&.DS_Store.
8 [11] 14 : > : 0000: 02 00 00 00 00 00 00 90 08 B8 D0 89 53 61 6D 70 6C 65 73 00 - ............Samples.
8 [ 9] 10 : < : 0000: 02 00 00 00 00 00 00 90 16 CC 2E 77 43 68 65 20 73 69 61 20 62 65 6E 65 64 65 74 74 61 2E 6D 70 34 00 - ...........wChe sia benedetta.mp4.
10 [10] 10 : > : 0000: 02 00 00 00 00 00 00 90 09 40 D0 87 2E 54 72 61 73 68 65 73 00 - [email protected].
=> >, 10 => -1
Result = 1031:-1
Unable to read inode 2
apfs_stat_internal 2 => FAIL

@sgan81
Copy link
Owner

sgan81 commented Mar 13, 2023

On what kind of CPU are you trying to run this?

@Cremonesi
Copy link
Author

Hold on tight!... :-)

Architecture: armv5tel
Byte Order: Little Endian
CPU(s): 1
On-line CPU(s) list: 0
Thread(s) per core: 1
Core(s) per socket: 1
Socket(s): 1
Vendor ID: ARM
Model: 0
Model name: ARM926
Stepping: r0p0
BogoMIPS: 333.33
Flags: swp half thumb fastmult edsp

@sgan81
Copy link
Owner

sgan81 commented Mar 13, 2023

That's exactly what I suspected ... an old ARM that does not support unaligned access. I can fix this, but it will take some time. I'll get back to you when stuff is ready for testing ;)

@Cremonesi
Copy link
Author

Oh I see!... I'm glad you figure out what the problem is.
Thank you so much for your work Simon! ;)

@hobs0n
Copy link

hobs0n commented Nov 22, 2023

I found this wonderful thread when I tried to get the APFS partition mounted on my Manjaro XFCE installation. I have already posted in this thread on the Manjaro forums but this thread seems better since the actual developer of apfs-fuse, sgan81, seems to be here :)

I´m pretty sure the APFS partition is encrypted since I have to write the password two times when the computer does a cold startup so I add the password on the apfs-fuse terminal command:
: sudo apfs-fuse -o pass=<mypassword> -o uid=1000,gid=1000,allow_other -d 15 /dev/sda2 /home/hobs0n/apple and I got several pages of info. I´m just posted the first half-page here, let me know if you want more.

Device /dev/sda2 opened. Size is 151976800256
Mounting xid different from NXSB at 0 (xid = 15888091). xid = 15888091
Mounting xid 15888091
omap: oid=2637555 xid=15888091 flags=0 size=4096 paddr=151456
omap: oid=1029 xid=15888091 flags=0 size=4096 paddr=151457
omap: oid=2574525 xid=15888077 flags=0 size=4096 paddr=544223
apfs_opendir: 1
apfs_lookup: ino=1 name=BDMV => Lookup hashed key: key=9000000000000001 hash=9318a005 name='BDMV'
42 44 4D 56 BDMV
Lookup failed!
FAIL
apfs_getattr: ino=1 => OK
apfs_lookup: ino=1 name=autorun.inf => Lookup hashed key: key=9000000000000001 hash=38C9640C name='autorun.inf'
61 75 74 6F 72 75 6E 2E 69 6E 66 autorun.inf
Lookup failed!
FAIL
apfs_lookup: ino=1 name=.xdg-volume-info => Lookup hashed key: key=9000000000000001 hash=74129411 name='.xdg-volume-info'
2E 78 64 67 2D 76 6F 6C 75 6D 65 2D 69 6E 66 6F .xdg-volume-info
Lookup failed!
FAIL
apfs_readdir: 1
omap: oid=2748BF xid=F26ED6 flags=0 size=1000 paddr=836E1
dumping entry key
0000: 01 00 00 00 00 00 00 90 0C 8C A6 AC 70 72 69 76 - ............priv
0010: 61 74 65 2D 64 69 72 00 - ate-dir.
dumping entry val
0000: 03 00 00 00 00 00 00 00 B7 95 57 81 27 19 21 16 - ..........W.'.!.
0010: 04 00 - ..
dumping entry key
0000: 01 00 00 00 00 00 00 90 05 E4 71 B6 72 6F 6F 74 - ..........q.root
0010: 00 - .
dumping entry val
0000: 02 00 00 00 00 00 00 00 F3 67 57 81 27 19 21 16 - .........gW.'.!.
0010: 04 00 - ..
dumping entry key
0000: 02 00 00 00 00 00 00 30 - .......0
dumping entry val
0000: 01 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 - ................
0010: F3 67 57 81 27 19 21 16 34 39 D8 DF D4 1E 74 16 - .gW.'.!.49....t.
0020: 34 39 D8 DF D4 1E 74 16 41 3A D8 DF D4 1E 74 16 - 49....t.A:....t.
0030: 00 80 00 00 00 00 00 00 04 00 00 00 00 00 00 00 - ................
0040: 05 00 00 00 00 00 00 00 00 00 00 00 50 00 00 00 - ............P...
0050: FD 41 00 00 00 00 00 00 00 00 00 00 01 00 08 00 - .A..............
0060: 04 02 05 00 72 6F 6F 74 00 00 00 00 - ....root....
apfs_readdir: 1
apfs_readdir: 1
apfs_releasedir 1
apfs_opendir: 1
apfs_readdir: 1

If I run without allow_other
sudo apfs-fuse -o pass=<mypwd> -o uid=1000,gid=1000 -d 15 /dev/sda2 /home/hobs0n/apple

I get much shorter info:

Device /dev/sda2 opened. Size is 151976800256
Mounting xid different from NXSB at 0 (xid = 15888091). xid = 15888091
Mounting xid 15888091
omap: oid=2637555 xid=15888091 flags=0 size=4096 paddr=151456
omap: oid=1029 xid=15888091 flags=0 size=4096 paddr=151457
omap: oid=2574525 xid=15888077 flags=0 size=4096 paddr=544223

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants