All of lore.kernel.org
 help / color / mirror / Atom feed
* [Bug 205197] New: kernel BUG at fs/ext4/extents_status.c:884
@ 2019-10-15 12:38 bugzilla-daemon
  2019-10-15 13:53 ` [Bug 205197] " bugzilla-daemon
                   ` (7 more replies)
  0 siblings, 8 replies; 9+ messages in thread
From: bugzilla-daemon @ 2019-10-15 12:38 UTC (permalink / raw)
  To: linux-ext4

https://bugzilla.kernel.org/show_bug.cgi?id=205197

            Bug ID: 205197
           Summary: kernel BUG at fs/ext4/extents_status.c:884
           Product: File System
           Version: 2.5
    Kernel Version: 5.3.5
          Hardware: x86-64
                OS: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: ext4
          Assignee: fs_ext4@kernel-bugs.osdl.org
          Reporter: arnaud@btmx.fr
        Regression: No

I get this in dmesg when trying to mount an encrypted volume that is on an SD
card.

[ 196.382120] kernel BUG at fs/ext4/extents_status.c:884!
[ 196.382126] invalid opcode: 0000 [#1] PREEMPT SMP PTI
[ 196.382131] CPU: 1 PID: 3053 Comm: mount Tainted: G OE 5.3.5-arch1-1-ARCH #1
[ 196.382133] Hardware name: LENOVO 20BUS0991P/20BUS0991P, BIOS JBET54WW (1.19
) 11/06/2015
[ 196.382152] RIP: 0010:ext4_es_cache_extent+0x130/0x140 [ext4]
[ 196.382155] Code: 48 89 e2 4c 89 e6 e8 3f 13 24 c6 48 8b 03 48 85 c0 75 e5 65
ff 0d 68 72 a5 3f 0f 85 43 ff ff ff e8 15 3f 64 c5 e9 39 ff ff ff <0f> 0b e8 49
da 6c c5 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 41
[ 196.382157] RSP: 0018:ffffb357c2087a08 EFLAGS: 00010a13
[ 196.382159] RAX: 07ffffffffffffff RBX: ffff89fa3622c468 RCX: 07ffffffffffffff
[ 196.382161] RDX: 00000000d7fee2a7 RSI: 000000008597e24b RDI: ffff89fa3622c468
[ 196.382163] RBP: 000000005d96c4f1 R08: 47ffffffffffffff R09: 0000000000000008
[ 196.382165] R10: ffffd3ac501f1000 R11: 0000000000000c84 R12: ffff89fa3622c468
[ 196.382166] R13: 000000008597e24b R14: ffff89fa5b642de8 R15: 000000005d96c4f2
[ 196.382169] FS: 00007fa998e67500(0000) GS:ffff89fa6de40000(0000)
knlGS:0000000000000000
[ 196.382171] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 196.382173] CR2: 00007f4d6727a100 CR3: 00000004256f0003 CR4: 00000000003606e0
[ 196.382175] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 196.382176] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 196.382178] Call Trace:
[ 196.382194] __read_extent_tree_block+0x19d/0x240 [ext4]
[ 196.382207] ext4_find_extent+0x140/0x310 [ext4]
[ 196.382220] ext4_ext_map_blocks+0x96/0x1260 [ext4]
[ 196.382237] ext4_map_blocks+0x361/0x610 [ext4]
[ 196.382252] _ext4_get_block+0xaa/0x120 [ext4]
[ 196.382257] generic_block_bmap+0x4b/0x70
[ 196.382266] jbd2_journal_init_inode+0x13/0xb0 [jbd2]
[ 196.382283] ext4_fill_super+0x261e/0x36f0 [ext4]
[ 196.382289] ? snprintf+0x51/0x70
[ 196.382293] ? mount_bdev+0x176/0x1a0
[ 196.382308] ? ext4_calculate_overhead+0x480/0x480 [ext4]
[ 196.382310] mount_bdev+0x176/0x1a0
[ 196.382325] ? ext4_calculate_overhead+0x480/0x480 [ext4]
[ 196.382330] legacy_get_tree+0x27/0x40
[ 196.382334] vfs_get_tree+0x25/0xd0
[ 196.382337] do_mount+0x78c/0x9f0
[ 196.382341] ? memdup_user+0x45/0x80
[ 196.382343] ksys_mount+0x7e/0xc0
[ 196.382346] __x64_sys_mount+0x21/0x30
[ 196.382350] do_syscall_64+0x5f/0x1c0
[ 196.382355] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 196.382358] RIP: 0033:0x7fa998feae4e
[ 196.382361] Code: 48 8b 0d 35 00 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f
1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0
ff ff 73 01 c3 48 8b 0d 02 00 0c 00 f7 d8 64 89 01 48
[ 196.382363] RSP: 002b:00007fff1c861838 EFLAGS: 00000246 ORIG_RAX:
00000000000000a5
[ 196.382366] RAX: ffffffffffffffda RBX: 00007fa999111204 RCX: 00007fa998feae4e
[ 196.382367] RDX: 00005623e65ba650 RSI: 00005623e65ba6d0 RDI: 00005623e65ba6b0
[ 196.382369] RBP: 00005623e65ba440 R08: 0000000000000000 R09: 00005623e65bb750
[ 196.382370] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000000
[ 196.382372] R13: 00005623e65ba6b0 R14: 00005623e65ba650 R15: 00005623e65ba440
[ 196.382375] Modules linked in: bnep fuse dm_crypt snd_hda_codec_hdmi uvcvideo
videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_common videodev mc
joydev mousedev btusb intel_rapl_msr intel_rapl_common btrtl btbcm btintel
bluetooth x86_pkg_temp_thermal intel_powerclamp kvm_intel kvm ecdh_generic ecc
irqbypass i915 iwlmvm crct10dif_pclmul mac80211 crc32_pclmul ofpart
ghash_clmulni_intel cmdlinepart libarc4 intel_spi_platform intel_spi
snd_hda_codec_realtek i2c_algo_bit iTCO_wdt spi_nor iTCO_vendor_support
snd_hda_codec_generic iwlwifi aesni_intel mei_wdt mtd mei_hdcp wmi_bmof
snd_hda_intel aes_x86_64 drm_kms_helper crypto_simd snd_hda_codec cryptd drm
glue_helper intel_cstate intel_uncore cfg80211 psmouse snd_hda_core
intel_rapl_perf input_leds thinkpad_acpi i2c_i801 intel_pch_thermal intel_gtt
tpm_tis snd_hwdep mei_me tpm_tis_core snd_pcm rtsx_pci_ms agpgart nvram
ledtrig_audio lpc_ich memstick mei snd_timer syscopyarea rfkill e1000e tpm
sysfillrect evdev snd sysimgblt mac_hid
[ 196.382407] rng_core fb_sys_fops battery ac wmi soundcore mmc_block
vboxnetflt(OE) vboxnetadp(OE) vboxpci(OE) vboxdrv(OE) coretemp msr loop sg
crypto_user ip_tables x_tables ext4 crc32c_generic crc16 mbcache jbd2 dm_mod
sd_mod rtsx_pci_sdmmc serio_raw mmc_core atkbd libps2 ahci libahci libata
crc32c_intel ehci_pci xhci_pci scsi_mod ehci_hcd xhci_hcd rtsx_pci i8042 serio
[ 196.382428] ---[ end trace 175bffb9fd52421d ]---
[ 196.382447] RIP: 0010:ext4_es_cache_extent+0x130/0x140 [ext4]
[ 196.382471] Code: 48 89 e2 4c 89 e6 e8 3f 13 24 c6 48 8b 03 48 85 c0 75 e5 65
ff 0d 68 72 a5 3f 0f 85 43 ff ff ff e8 15 3f 64 c5 e9 39 ff ff ff <0f> 0b e8 49
da 6c c5 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 41
[ 196.382473] RSP: 0018:ffffb357c2087a08 EFLAGS: 00010a13
[ 196.382476] RAX: 07ffffffffffffff RBX: ffff89fa3622c468 RCX: 07ffffffffffffff
[ 196.382477] RDX: 00000000d7fee2a7 RSI: 000000008597e24b RDI: ffff89fa3622c468
[ 196.382479] RBP: 000000005d96c4f1 R08: 47ffffffffffffff R09: 0000000000000008
[ 196.382481] R10: ffffd3ac501f1000 R11: 0000000000000c84 R12: ffff89fa3622c468
[ 196.382483] R13: 000000008597e24b R14: ffff89fa5b642de8 R15: 000000005d96c4f2
[ 196.382485] FS: 00007fa998e67500(0000) GS:ffff89fa6de40000(0000)
knlGS:0000000000000000
[ 196.382487] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 196.382488] CR2: 00007f4d6727a100 CR3: 00000004256f0003 CR4: 00000000003606e0
[ 196.382494] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 196.382495] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400

--------------------------------------------------------------------------------------------------

LUKS header information
Version: 2
Epoch: 3
Metadata area: 16384 [bytes]
Keyslots area: 16744448 [bytes]
UUID: 02d64dc9-075e-462f-bfb3-d68e86ec55cc
Label: (no label)
Subsystem: (no subsystem)
Flags: (no flags)

Data segments:
0: crypt
offset: 16777216 [bytes]
length: (whole device)
cipher: aes-xts-plain64
sector: 512 [bytes]

Keyslots:
0: luks2
Key: 512 bits
Priority: normal
Cipher: aes-xts-plain64
Cipher key: 512 bits
PBKDF: argon2i
Time cost: 4
Memory: 894034
Threads: 4
Salt: ca dc d6 fd d0 a5 48 b0 2e 0b f4 bd 0b cc ae 31
c9 96 9d a6 b2 cb e3 24 b5 be 76 55 89 e5 1d dc
AF stripes: 4000
AF hash: sha256
Area offset:32768 [bytes]
Area length:258048 [bytes]
Digest ID: 0
Tokens:
Digests:
0: pbkdf2
Hash: sha256
Iterations: 110516
Salt: 21 53 93 92 14 12 d9 1b 33 d5 8c 03 e0 8b 89 b4
b7 00 9d 4b 3b be 68 ab d3 f5 b7 42 d9 31 f5 61
Digest: 66 28 58 07 3f 71 99 5c 63 99 49 b6 53 a9 d7 9d
38 aa 84 9e 7e 8c 42 62 99 d8 8b 35 7d 12 99 3c

----------------------------------------------------------------------------------------------------------------

★ sudo fdisk -l /dev/mmcblk0
Disk /dev/mmcblk0: 976.58 GiB, 1048577048576 bytes, 2048002048 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: dos
Disk identifier: 0x00000000

Device Boot Start End Sectors Size Id Type
/dev/mmcblk0p1 32 2048001823 2048001792 976.6G b W95 FAT32

------------------------------------------------------------------------------------------------------------------

★ sudo fdisk -l /dev/mapper/sd
Disk /dev/mapper/sd: 976.56 GiB, 1048560140288 bytes, 2047969024 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes

------------------------------------------------------------------------------------------------------------------

★ sudo cat /etc/crypttab
sd /dev/mmcblk0p1 /home/arno/.sd.keyfile luks,nofail

-- 
You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug 205197] kernel BUG at fs/ext4/extents_status.c:884
  2019-10-15 12:38 [Bug 205197] New: kernel BUG at fs/ext4/extents_status.c:884 bugzilla-daemon
@ 2019-10-15 13:53 ` bugzilla-daemon
  2019-10-17  6:50 ` bugzilla-daemon
                   ` (6 subsequent siblings)
  7 siblings, 0 replies; 9+ messages in thread
From: bugzilla-daemon @ 2019-10-15 13:53 UTC (permalink / raw)
  To: linux-ext4

https://bugzilla.kernel.org/show_bug.cgi?id=205197

Theodore Tso (tytso@mit.edu) changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |tytso@mit.edu

--- Comment #1 from Theodore Tso (tytso@mit.edu) ---
It looks like the journal inode is corrupted but it shouldn't have BUG'ed on
you.

Can you reproduce this crash?  If so, does this fairly simple patch cause it
not to BUG?  (It will still fail to mount, but it shouldn't crash.)

diff --git a/fs/ext4/extents.c b/fs/ext4/extents.c
index f203bf989a4c..d83b325fb54b 100644
--- a/fs/ext4/extents.c
+++ b/fs/ext4/extents.c
@@ -375,7 +375,7 @@ static int ext4_valid_extent(struct inode *inode, struct
ext4_extent *ext)
         *  - zero length
         *  - overflow/wrap-around
         */
-       if (lblock + len <= lblock)
+       if (lblock + (ext4_lblk_t) len <= lblock)
                return 0;
        return ext4_data_block_valid(EXT4_SB(inode->i_sb), block, len);
 }

Apologies if this is whitespace damaged, but t's a fairly simple edit to apply,
and I'm currently on a chromebook so I can't easily get a patch uploaded into
bugzilla.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply related	[flat|nested] 9+ messages in thread

* [Bug 205197] kernel BUG at fs/ext4/extents_status.c:884
  2019-10-15 12:38 [Bug 205197] New: kernel BUG at fs/ext4/extents_status.c:884 bugzilla-daemon
  2019-10-15 13:53 ` [Bug 205197] " bugzilla-daemon
@ 2019-10-17  6:50 ` bugzilla-daemon
  2019-10-23 13:13 ` bugzilla-daemon
                   ` (5 subsequent siblings)
  7 siblings, 0 replies; 9+ messages in thread
From: bugzilla-daemon @ 2019-10-17  6:50 UTC (permalink / raw)
  To: linux-ext4

https://bugzilla.kernel.org/show_bug.cgi?id=205197

--- Comment #2 from Arnaud Bétrémieux (arnaud@btmx.fr) ---
Sorry for the delay. I can confirm that although the partition still does not
mount, there is indeed no "BUG" with this patch applied.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug 205197] kernel BUG at fs/ext4/extents_status.c:884
  2019-10-15 12:38 [Bug 205197] New: kernel BUG at fs/ext4/extents_status.c:884 bugzilla-daemon
  2019-10-15 13:53 ` [Bug 205197] " bugzilla-daemon
  2019-10-17  6:50 ` bugzilla-daemon
@ 2019-10-23 13:13 ` bugzilla-daemon
  2019-10-24  6:58 ` bugzilla-daemon
                   ` (4 subsequent siblings)
  7 siblings, 0 replies; 9+ messages in thread
From: bugzilla-daemon @ 2019-10-23 13:13 UTC (permalink / raw)
  To: linux-ext4

https://bugzilla.kernel.org/show_bug.cgi?id=205197

--- Comment #3 from Theodore Tso (tytso@mit.edu) ---
It's been pointed out to me that the patch in #1 should have been a no-op,
since a signed integer gets converted to be unsigned before it is added to an
unsigned int.   

Can you confirm that without the patch, you can still reliably reproduce the
failure?

-- 
You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug 205197] kernel BUG at fs/ext4/extents_status.c:884
  2019-10-15 12:38 [Bug 205197] New: kernel BUG at fs/ext4/extents_status.c:884 bugzilla-daemon
                   ` (2 preceding siblings ...)
  2019-10-23 13:13 ` bugzilla-daemon
@ 2019-10-24  6:58 ` bugzilla-daemon
  2024-03-04  4:17 ` bugzilla-daemon
                   ` (3 subsequent siblings)
  7 siblings, 0 replies; 9+ messages in thread
From: bugzilla-daemon @ 2019-10-24  6:58 UTC (permalink / raw)
  To: linux-ext4

https://bugzilla.kernel.org/show_bug.cgi?id=205197

--- Comment #4 from Arnaud Bétrémieux (arnaud@btmx.fr) ---
I just tried it with the same kernel I used at the time of the bug report, and
no, I can't reproduce the failure anymore. I'm not sure what changed… sorry !

Strangely, I'm pretty sure I did test with and without the patch and it all
seemed to work at the time (BUG with no patch, no BUG with patch).

The partition is automounted, so maybe there was an auto-fsck at some point. I
should have thought of removing the automount to keep things testable.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug 205197] kernel BUG at fs/ext4/extents_status.c:884
  2019-10-15 12:38 [Bug 205197] New: kernel BUG at fs/ext4/extents_status.c:884 bugzilla-daemon
                   ` (3 preceding siblings ...)
  2019-10-24  6:58 ` bugzilla-daemon
@ 2024-03-04  4:17 ` bugzilla-daemon
  2024-03-14 21:31 ` bugzilla-daemon
                   ` (2 subsequent siblings)
  7 siblings, 0 replies; 9+ messages in thread
From: bugzilla-daemon @ 2024-03-04  4:17 UTC (permalink / raw)
  To: linux-ext4

https://bugzilla.kernel.org/show_bug.cgi?id=205197

Antony Amburose (antony.ambrose@in.bosch.com) changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |antony.ambrose@in.bosch.com

--- Comment #5 from Antony Amburose (antony.ambrose@in.bosch.com) ---
Working with a 5.4.233 on aarch64 (Qualcomm/Android) platform we get the same
error. I am able to reliably reproduce this problem even after applying the
patch #1.Could you please let me know what additional information required ?
As the partition is FBE encrypted , I am not able to look at the hex dump to
check the nature corruption.

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug 205197] kernel BUG at fs/ext4/extents_status.c:884
  2019-10-15 12:38 [Bug 205197] New: kernel BUG at fs/ext4/extents_status.c:884 bugzilla-daemon
                   ` (4 preceding siblings ...)
  2024-03-04  4:17 ` bugzilla-daemon
@ 2024-03-14 21:31 ` bugzilla-daemon
  2024-03-15 12:14 ` bugzilla-daemon
  2024-03-15 17:03 ` bugzilla-daemon
  7 siblings, 0 replies; 9+ messages in thread
From: bugzilla-daemon @ 2024-03-14 21:31 UTC (permalink / raw)
  To: linux-ext4

https://bugzilla.kernel.org/show_bug.cgi?id=205197

--- Comment #6 from Theodore Tso (tytso@mit.edu) ---
The reason why no one has paid much attention to it is because the bug is
reported against a very old kernel, and upstream developers generally only
worry about the upstream kernel.  Companies which insist on using old stable
kernels need to either engage paid support (e.g., contacting Red Hat if you are
using RHEL, etc.) or have their own kernel developers on staff to debug the
problem.  Upstream developers are volunteers don't have the time to provide
free support to companies that are using old kernels.  In general, at the
minimum we ask kernel engineers working on these kernels to try to reproduce
the problem on the latest upstream kernel, and if they can't.... maybe they
should work on using a newer upstream kernel, or they should figure out how to
backport fixes to old LTS kernels.

Also, it seems... weird.... that you can't look at the hex dump.  The kernel is
able to mount the kernel, so you have access to the encryption key, or at
least, to a block device which has the encryption key set up by your user
space.   So you should be able to run e2fsck -fn /dev/hdXX.  This would help
provide a hint to the nature of the corruption, so that we could try to
reproduce the problem on an upstream kernel.   But what we really don't have
time to do is to hand-hold users who don't know how to run fsck or apply kernel
patches, and trying to run test kernels.

If you can let us know what you actually can do, perhaps we might bend the
rules and try to give you some debugging help.  But it will only be on a best
efforts basis, and when we have time, since after all, we're volunteers....

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug 205197] kernel BUG at fs/ext4/extents_status.c:884
  2019-10-15 12:38 [Bug 205197] New: kernel BUG at fs/ext4/extents_status.c:884 bugzilla-daemon
                   ` (5 preceding siblings ...)
  2024-03-14 21:31 ` bugzilla-daemon
@ 2024-03-15 12:14 ` bugzilla-daemon
  2024-03-15 17:03 ` bugzilla-daemon
  7 siblings, 0 replies; 9+ messages in thread
From: bugzilla-daemon @ 2024-03-15 12:14 UTC (permalink / raw)
  To: linux-ext4

https://bugzilla.kernel.org/show_bug.cgi?id=205197

--- Comment #7 from Antony Amburose (antony.ambrose@in.bosch.com) ---
Thank you for the response. I understand now , why there was not much attention
to this issue. Sorry for providing a minimal information in the first
communication...
 We have back-ported the interesting changes from upstream (~70 of them) and 
could still see the problem. I have reported the issue based on old kernel to
have the continuity. The old  issue reported as well seen while mounting an
encrypted sd card and we have also seen this on an encrypted volume, but its
onboard storage. I thought it is logical to continue the discussion here as you
had given some debugging hints and issue did not progress as the old reporter
could not reproduce the problem but we could even after backporting the change.
I will create the bug based on the latest kernel in future. Thanks for the
hint. 

The issue could be reproduced in a sequence where we interrupt the power. From
our decade long experience working with ext4, we have never seen an issue where
we could corrupt the ext4 volume in a way that it is not mountable  by
executing a power loss sequence. That was main reason to report the issue to
the community experts. Ofcourse we have some paid support and also inhouse
kernel engineers, and I thought it is also better to report to the community
experts as the old bug is still open and we have a reliable reproduction .My
current assumption is either that we have a problem with our sequence or
problem with handling encrypted ext4 partition.

Regarding our knowhow and usage of tooling , we can work with the hex dump and
understand the ext4 disk layout and also work with the e2fsprogs to debug the
problem. Hence, we expect only some debugging hints and direction and hopefully
we try to solve the issues together.

As the device resets cyclically , we could not hook into the device and get the
/dev/sdXX . The existing tooling only get the encrypted data .We will try to
resolve this situation and somehow get the hex dump and provide more details on
the nature of corruption and will also provide the fsck output.

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug 205197] kernel BUG at fs/ext4/extents_status.c:884
  2019-10-15 12:38 [Bug 205197] New: kernel BUG at fs/ext4/extents_status.c:884 bugzilla-daemon
                   ` (6 preceding siblings ...)
  2024-03-15 12:14 ` bugzilla-daemon
@ 2024-03-15 17:03 ` bugzilla-daemon
  7 siblings, 0 replies; 9+ messages in thread
From: bugzilla-daemon @ 2024-03-15 17:03 UTC (permalink / raw)
  To: linux-ext4

https://bugzilla.kernel.org/show_bug.cgi?id=205197

--- Comment #8 from Theodore Tso (tytso@mit.edu) ---
One of the things I'd recommend doing is to grabbing a compressed raw e2image
dump.   See the e2image man page for the the -r or the -Q option.   It's not
hard to build e2image for Android.  At one point I had added support for
building e2image in the AOSP build files (although this might be before the
AOSP build system has gotten updated, so it might require making some minor
work on your side; still, it's really not hard to build an AOSP image with
e2image and debugfs enabled, and if you're trying to do file system debugging
on Android, this is a Really Good idea.)

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2024-03-15 17:03 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-10-15 12:38 [Bug 205197] New: kernel BUG at fs/ext4/extents_status.c:884 bugzilla-daemon
2019-10-15 13:53 ` [Bug 205197] " bugzilla-daemon
2019-10-17  6:50 ` bugzilla-daemon
2019-10-23 13:13 ` bugzilla-daemon
2019-10-24  6:58 ` bugzilla-daemon
2024-03-04  4:17 ` bugzilla-daemon
2024-03-14 21:31 ` bugzilla-daemon
2024-03-15 12:14 ` bugzilla-daemon
2024-03-15 17:03 ` bugzilla-daemon

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.