account arrowhead-down arrowhead-up mobile-menu search sm-bold-x x-skinny-rounded x-skinny arrowhead-right social-facebook social-googleplus social-instagram social-linkedin social-pinterest social-qzone social-renren social-tencent social-twitter social-vkontakt social-weibo social-youku social-youtube

Please help us improve our website

Take our customer survey to evaluate your visit.

It should only take a few minutes to answer five quick questions. Just click the Launch survey button at the end of your visit to begin.

cancel
Showing results for 
Search instead for 
Did you mean: 
Tips & Tricks

Want to know more about Xperia 5? To read more about it go here.
If you can't find the answer to your question there please post it here and let the community help you.

Reboot after network change with sd card inserted on Xperia XZ Premium

SOLVED
Sony Xperia Developer
Message 11 of 15
437 Views
Message 11 of 15

Re: Reboot after network change with sd card inserted on Xperia XZ Premium

There are plenty of strange things, but I think you're doing progress in a systematic investigation! I agree that the permissions looks good so that wasn't it. Then the file manager can access external card, that's a bit unexpected. New apps working, but those you already had installed doesn't?

 

relates to "this phone", "the new card name", "the backup content" separately

 

Thanks for breaking it down for me. You concluded that "backup" seems to be irrelevant. For "new card name" I thought that there might be references to the old name in the backup, but that is then also irrelevant. With "this phone" I didn't specifically mean HW problems, but something stored in the phone, settings or so. Something that was not there from the beginning. If you were able to try the card in another phone it could bring evidence to "the phone" theory. Seeing that the other theories are probably irrelevant, this is still the best current idea. Trying the card again after a factory reset is the next best thing after trying another phone. :-)

 

The mount list shows that there is something that is belived to be encrypted. It could be something Spotify does to protect their cache (being precious music data I guess) and possibly nothing wrong in itself. It didn't happen when I tried Spotify briefly, but may be I didn't do exactly like you.

 

Let us know if you get more insight.

Adept
Message 12 of 15
426 Views
Message 12 of 15

Re: Reboot after network change with sd card inserted on Xperia XZ Premium

Ok, now I understand what you meant by "the phone". And after this weekend, I have proof that you were right with the "the phone" theory. But let's look at it step by step:

  • X-plore filemanager was installed the whole time and I allready granted the app permissions to access the SD card. So the prompt to allow access was a surprise as well as the fact that I could write to the SD card :-)
  • For the "backup" scenario: By restoring the backup of the SD, I only meant that I formatted the SD card on the phone and restored the contents of the SD card from a tar-backup on my computer. I did a system backup via "Backup&Restore" app of the phone as well, but did not restore it.
  • I don't think that the mount point with encryption could be created by an app - AFAIK, ecryptfs is system level encryption and apps should not have access to create such mount points. My theory is, that it is a left-over from my initial encryption attempts of the SD card. But why this mount point carries over to the new SD card is something I don't understand.

Well theories aside, I took a look at dmesg output yesterday. Here are some entries I found strange:

 

Spoiler
...
[ 6.741424] fec: <563> warning: __ecc_read: RS block 30003200: corrected 256 errors
[ 6.772915] fec: <564> warning: __ecc_read: RS block 30003200: corrected 256 errors
[ 6.773983] fs_mgr: Enabling dm-verity for system (mode 2)
[ 6.774002] fs_mgr: loading verity table: '1 /dev/block/bootdevice/by-name/system /dev/block/bootdevice/by-name/system 4096 4096 1852247 1852247 sha256 f4cc1e9889478acede3
a5d54e1d04141ec165d770dfe4402074a2dec087ffbdd aee087a5be3b982978c923f566a94613496b417f2af592639bc80d141e34dfe7 10 restart_on_corruption use_fec_from_device /dev/block/bootdev
ice/by-name/system fec_start 1866841 fec_blocks 1866841 fec_roots 2 ignore_zero_blocks'
[ 6.780234] EXT4-fs (dm-0): mounting with "discard" option, but the device does not support discard
[ 6.780243] EXT4-fs (dm-0): mounted filesystem with ordered data mode. Opts: barrier=1,discard
[ 6.780304] fs_mgr: __mount(source=/dev/block/dm-0,target=/system,type=ext4)=0
[ 6.780773] EXT4-fs (sda15): VFS: Can't find ext4 filesystem
[ 6.780810] fs_mgr: check_fs(): mount(/dev/block/bootdevice/by-name/userdata,/data,ext4)=-1: Invalid argument
[ 6.784827] fs_mgr: Running /system/bin/e2fsck on /dev/block/bootdevice/by-name/userdata
[ 6.784835] fs_mgr: fsck log is stored in /dev/fscklogs/userdata
[ 6.833421] e2fsck: e2fsck 1.42.9 (28-Dec-2013)
[ 6.833421]
[ 6.833440] e2fsck: ext2fs_open2: Bad magic number in super-block
[ 6.833440]
[ 6.833445] e2fsck: /system/bin/e2fsck: Superblock invalid, trying backup blocks...
[ 6.833445]
[ 6.833450] e2fsck: /system/bin/e2fsck: Bad magic number in super-block while trying to open /dev/block/bootdevice/by-name/userdata
[ 6.833450]
[ 6.833455] e2fsck:
[ 6.833455]
[ 6.833459] e2fsck:
[ 6.833459]
[ 6.833464] e2fsck: The superblock could not be read or does not describe a correct ext2
[ 6.833464]
[ 6.833469] e2fsck: filesystem. If the device is valid and it really contains an ext2
[ 6.833469]
[ 6.833473] e2fsck: filesystem (and not swap or ufs or something else), then the superblock
[ 6.833473]
[ 6.833478] e2fsck: is corrupt, and you might try running e2fsck with an alternate superblock:
[ 6.833478]
[ 6.833482] e2fsck: e2fsck -b 8193 <device>
[ 6.833482]
[ 6.833486] e2fsck:
[ 6.833486]
[ 6.833493] e2fsck: e2fsck terminated by exit(8)
[ 6.833493]
[ 6.833832] EXT4-fs (sda15): VFS: Can't find ext4 filesystem
[ 6.833862] fs_mgr: __mount(source=/dev/block/bootdevice/by-name/userdata,target=/data,type=ext4)=-1
[ 6.834200] fs_mgr: fs_mgr_mount_all(): possibly an encryptable blkdev /dev/block/bootdevice/by-name/userdata for mount /data type ext4 )
[ 6.836209] EXT4-fs (sda14): mounted filesystem with ordered data mode. Opts: barrier=1
[ 6.836252] fs_mgr: __mount(source=/dev/block/bootdevice/by-name/oem,target=/oem,type=ext4)=0
[ 6.836330] RIC: cache mount denied, mnt_flags:0x40a
[ 6.836339] fs_mgr: check_fs(): mount(/dev/block/bootdevice/by-name/cache,/cache,ext4)=-1: Operation not permitted
[ 6.836358] fs_mgr: Running /system/bin/e2fsck on /dev/block/bootdevice/by-name/cache
[ 6.836365] fs_mgr: fsck log is stored in /dev/fscklogs/cache
[ 6.851765] e2fsck: e2fsck 1.42.9 (28-Dec-2013)
...
[ 6.851804] e2fsck: cache: 20/24336 files (0.0% non-contiguous), 3110/97280 blocks
...
[ 6.866732] e2fsck: /dev/block/bootdevice/by-name/appslog: ***** FILE SYSTEM WAS MODIFIED *****
[ 6.866732]
[ 6.866737] e2fsck: /dev/block/bootdevice/by-name/appslog: 324/1024 files (0.3% non-contiguous), 1761/4096 blocks
...
[    6.881166] e2fsck: /dev/block/bootdevice/by-name/diag: 179/2048 files (1.1% non-contiguous), 1949/8192 blocks
...
[    6.895791] e2fsck: /dev/block/bootdevice/by-name/Qnovo: 15/1536 files (6.7% non-contiguous), 1140/6144 blocks
...
[   49.425322] e2fsck: /dev/block/dm-1: 84501/3334144 files (3.6% non-contiguous), 3849856/13327082 blocks
...

Hmm, invalid supeblock and some filesystem inconsistencies - not what I wanted to see...

 

Spoiler
[ 78.458400] sdcardfs version 2.0
[ 78.458406] sdcardfs: dev_name -> /mnt/media_rw/3262-3632
[ 78.458408] sdcardfs: options -> fsuid=1023,fsgid=1023,mask=6,userid=0,gid=1015
[ 78.458442] sdcardfs: mounted on top of /mnt/media_rw/3262-3632 type ecryptfs
[ 78.458560] sdcardfs version 2.0
[ 78.458562] sdcardfs: dev_name -> /mnt/media_rw/3262-3632
[ 78.458564] sdcardfs: options -> fsuid=1023,fsgid=1023,mask=18,userid=0,gid=9997
[ 78.458572] sdcardfs: mounted on top of /mnt/media_rw/3262-3632 type ecryptfs
[ 78.458634] sdcardfs version 2.0
[ 78.458636] sdcardfs: dev_name -> /mnt/media_rw/3262-3632
[ 78.458637] sdcardfs: options -> fsuid=1023,fsgid=1023,mask=18,userid=0,gid=9997
[ 78.458645] sdcardfs: mounted on top of /mnt/media_rw/3262-3632 type ecryptfs

Don't know what to think about the ecrytfs entries. SD card should not be encrypted!

 

 

 

And here some more "avc: denied" messages and ecryptfs messages:

 

Spoiler
[ 94.601126] ecryptfs_dir_open: Error attempting to initialize the lower file for the dentry with name [data]; rc = [-13]
[ 94.601170] ecryptfs_dir_open: Error attempting to initialize the lower file for the dentry with name [data]; rc = [-13]
[ 94.601846] type=1400 audit(1497628328.572:21): avc: denied { read open } for pid=5270 comm="Binder:3231_15" path="/mnt/media_rw/3262-3632.exfat/Android/data" dev="mmcblk0p1" ino=173015
04 scontext=u:r:system_server:s0 tcontext=u:object_r:vfat:s0 tclass=dir permissive=0 ppid=2768 pcomm="main" pgid=3231 pgcomm="system_server"
[ 94.617237] type=1400 audit(1497628328.572:22): avc: denied { read open } for pid=5270 comm="Binder:3231_15" path="/mnt/media_rw/3262-3632.exfat/Android/data" dev="mmcblk0p1" ino=173015
04 scontext=u:r:system_server:s0 tcontext=u:object_r:vfat:s0 tclass=dir permissive=0 ppid=2768 pcomm="main" pgid=3231 pgcomm="system_server"
[ 94.635552] type=1400 audit(1497628328.612:23): avc: denied { write } for pid=6599 comm="m.spotify.music" name="com.spotify.music" dev="ecryptfs" ino=17433984 scontext=u:r:untrusted_app
:s0:c512,c768 tcontext=u:object_r:ecryptfs:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.636313] ecryptfs_dir_open: Error attempting to initialize the lower file for the dentry with name [com.spotify.music]; rc = [-13]
[ 94.645045] type=1400 audit(1497628328.612:24): avc: denied { write } for pid=6599 comm="m.spotify.music" name="com.spotify.music" dev="ecryptfs" ino=17433984 scontext=u:r:untrusted_app
:s0:c512,c768 tcontext=u:object_r:ecryptfs:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.645255] type=1400 audit(1497628328.612:25): avc: denied { read open } for pid=4230 comm="Binder:3231_7" path="/mnt/media_rw/3262-3632.exfat/Android/data/com.spotify.music" dev="mmcb
lk0p1" ino=17433984 scontext=u:r:system_server:s0 tcontext=u:object_r:vfat:s0 tclass=dir permissive=0 ppid=2768 pcomm="main" pgid=3231 pgcomm="system_server"
[ 94.688434] type=1400 audit(1497628328.662:26): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.688657] type=1400 audit(1497628328.662:27): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.688743] type=1400 audit(1497628328.662:28): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.688817] type=1400 audit(1497628328.662:29): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.688911] type=1400 audit(1497628328.662:30): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689003] type=1400 audit(1497628328.662:31): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689082] type=1400 audit(1497628328.662:32): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689173] type=1400 audit(1497628328.662:33): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689244] type=1400 audit(1497628328.662:34): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689323] type=1400 audit(1497628328.662:35): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689402] type=1400 audit(1497628328.662:36): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689490] type=1400 audit(1497628328.662:37): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689593] type=1400 audit(1497628328.662:38): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.690657] audit: audit_lost=1 audit_rate_limit=20 audit_backlog_limit=64
[ 94.690665] audit: rate limit exceeded
[ 94.699872] type=1400 audit(1497628328.662:39): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.704243] type=1400 audit(1497628328.662:40): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.704422] type=1400 audit(1497628328.662:41): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.704499] type=1400 audit(1497628328.662:42): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.706579] type=1400 audit(1497628328.662:43): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.706698] type=1400 audit(1497628328.662:44): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.706791] type=1400 audit(1497628328.662:45): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 95.014867] Valid eCryptfs headers not found in file header region or xattr region, inode 33432143360
[ 95.014888] pfk_ecryptfs [pfk_ecryptfs_open_cb]: could not parse key size from ecryptfs
...

 

 

Adept
Message 13 of 15
1,795 Views
Message 13 of 15

Re: Reboot after network change with sd card inserted on Xperia XZ Premium

With the logs from my last entry, my current theory is the following: My initial attempt to encrypt the card was around the reboot issues I had (the beginning of this thread). As a result, the information on the internal storage got corrupted somehow and the system still thinks, that parts of the SD card are encrypted and parts of the SD card file access permissions got corrupted as well.

 

So I did a software repair with the Xperia Companion to get a complete new install (and not just a factory reset). I did this with the SD card in place (and intentionally not reformatting it). Before I made a backup of the system (everything available) with the "Backup & Restore" app of the phone (target: SD card). After the software repair I let Google Play reinstall all my apps and restored everything available with "Backup & Restore".

 

Now everything is back to normal again and I can access the SD card from all apps (Spotify, MAPS.ME, etc.) without problems.

 

I will follow up on this topic when I find the time to look at the logs - please give me some days :-)

Just for reference and maybe it will help someone in a similar situation.

Adept
Message 14 of 15
414 Views
Message 14 of 15

Re: Reboot after network change with sd card inserted on Xperia XZ Premium

Addendum part I:

 

  • The superblock error is still there as well as filesystem errors on reboot - seems the system doesn't unmount the partitions when rebooting?

 

[    6.872765] e2fsck: /system/bin/e2fsck: Bad magic number in super-block while trying to open /dev/block/bootdevice
/by-name/userdata
[    6.905012] e2fsck: /dev/block/bootdevice/by-name/appslog: 40/1024 files (5.0% non-contiguous), 1159/4096 blocks
[    6.918033] e2fsck: /dev/block/bootdevice/by-name/diag: 51/2048 files (2.0% non-contiguous), 1270/8192 blocks
  • The current mount points (nowhere an encrypted SD card filesystem to be seen):

 

Spoiler
rootfs on / type rootfs (ro,seclabel,size=1802908k,nr_inodes=450727)
tmpfs on /dev type tmpfs (rw,seclabel,nosuid,relatime,size=1893892k,nr_inodes=473473,mode=755)
devpts on /dev/pts type devpts (rw,seclabel,relatime,mode=600)
proc on /proc type proc (rw,relatime,gid=3009,hidepid=2)
sysfs on /sys type sysfs (rw,seclabel,relatime)
selinuxfs on /sys/fs/selinux type selinuxfs (rw,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,seclabel,relatime)
none on /acct type cgroup (rw,relatime,cpuacct)
none on /dev/stune type cgroup (rw,relatime,schedtune)
tmpfs on /mnt type tmpfs (rw,seclabel,relatime,size=1893892k,nr_inodes=473473,mode=755,gid=1000)
none on /config type configfs (rw,relatime)
none on /dev/memcg type cgroup (rw,relatime,memory)
none on /dev/cpuctl type cgroup (rw,relatime,cpu)
none on /dev/cpuset type cgroup (rw,relatime,cpuset,noprefix,release_agent=/sbin/cpuset_release_agent)
pstore on /sys/fs/pstore type pstore (rw,seclabel,relatime)
none on /sys/fs/cgroup type tmpfs (rw,seclabel,relatime,size=1893892k,nr_inodes=473473,mode=750,gid=1000)
none on /sys/fs/cgroup/memory type cgroup (rw,relatime,memory)
tmpfs on /tmp type tmpfs (rw,seclabel,nosuid,relatime,size=1893892k,nr_inodes=473473,mode=755)
/dev/block/dm-0 on /system type ext4 (ro,seclabel,relatime,discard,data=ordered)
/dev/block/bootdevice/by-name/oem on /oem type ext4 (ro,seclabel,relatime,data=ordered)
/dev/block/bootdevice/by-name/cache on /cache type ext4 (rw,seclabel,nosuid,nodev,noatime,discard,data=ordered)
/dev/block/bootdevice/by-name/appslog on /rca type ext4 (rw,seclabel,nosuid,nodev,noexec,noatime,discard,data=ordered)
/dev/block/bootdevice/by-name/diag on /idd type ext4 (rw,seclabel,nosuid,nodev,noexec,noatime,discard,data=ordered)
/dev/block/bootdevice/by-name/Qnovo on /qns type ext4 (rw,seclabel,nosuid,nodev,noexec,noatime,discard,data=ordered)
/dev/block/bootdevice/by-name/persist on /persist type ext4 (rw,seclabel,nosuid,nodev,relatime,data=ordered)
/dev/block/bootdevice/by-name/dsp on /dsp type ext4 (ro,seclabel,nosuid,nodev,relatime,data=ordered)
/dev/block/bootdevice/by-name/modem on /firmware type vfat (ro,context=u:object_r:firmware_file:s0,relatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
/dev/block/bootdevice/by-name/bluetooth on /bt_firmware type vfat (ro,context=u:object_r:bt_firmware_file:s0,relatime,uid=1002,gid=3002,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
/dev/block/bootdevice/by-name/LTALabel on /lta-label type ext4 (ro,context=u:object_r:lta_label:s0,nosuid,nodev,noexec,noatime,data=ordered)
tmpfs on /storage type tmpfs (rw,seclabel,relatime,size=1893892k,nr_inodes=473473,mode=755,gid=1000)
tracefs on /sys/kernel/debug/tracing type tracefs (rw,seclabel,relatime)
adb on /dev/usb-ffs/adb type functionfs (rw,relatime)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
/dev/block/dm-1 on /data type ext4 (rw,seclabel,nosuid,nodev,noatime,discard,noauto_da_alloc,data=ordered)
/data/media on /mnt/runtime/default/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,multiuser,allow_utime_grp)
/data/media on /storage/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,multiuser,allow_utime_grp)
/data/media on /mnt/runtime/read/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,multiuser,allow_utime_grp)
/data/media on /mnt/runtime/write/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,multiuser,allow_utime_grp)
/dev/block/vold/public:179,1 on /mnt/media_rw/3262-3632 type texfat (rw,dirsync,nosuid,nodev,noexec,relatime,uid=1023,gid=1023,umask=0007,allow_utime=0020,utf8,min_prealloc_size=64k,max_prealloc_size=121910k,writeback_boundary=4M,readahead=4M,fail_safe,discard,hidden=show,errors=continue)
/dev/block/vold/public:179,1 on /mnt/secure/asec type texfat (rw,dirsync,nosuid,nodev,noexec,relatime,uid=1023,gid=1023,umask=0007,allow_utime=0020,utf8,min_prealloc_size=64k,max_prealloc_size=121910k,writeback_boundary=4M,readahead=4M,fail_safe,discard,hidden=show,errors=continue)
/mnt/media_rw/3262-3632 on /mnt/runtime/default/3262-3632 type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,allow_utime_grp)
/mnt/media_rw/3262-3632 on /storage/3262-3632 type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,allow_utime_grp)
/mnt/media_rw/3262-3632 on /mnt/runtime/read/3262-3632 type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,allow_utime_grp)
/mnt/media_rw/3262-3632 on /mnt/runtime/write/3262-3632 type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,allow_utime_grp)
  • I checked the file rights of the Spotify folder on the SD card: Same as before, no change.

 

 

Adept
Message 15 of 15
392 Views
Message 15 of 15

Re: Reboot after network change with sd card inserted on Xperia XZ Premium

Final post in this thread - maybe ;-)

 

I want to thank the Sony support team and especially JensG for the great support during this error tracking session. Without the help of Jens, I wouldn't have gotten this far and I learned a lot while debugging this issue. Thank you very much!

 

-- Kareema