Join now - be part of our community!

Reboot after network change with sd card inserted on Xperia XZ Premium

SOLVED
Kareema
Visitor

Reboot after network change with sd card inserted on Xperia XZ Premium

Hi,

some days ago I got my new Xperia XZ Professional and I like it a lot ๐Ÿ™‚

Yesterday, I finished the installation of all of my apps and encountered a really strange problem: With only some app data on my SD card, everything was fine. But after finishing my installation, I had reboots, when my network connection changed! This ony happens, when an SD card is inserted and the problem is reproducible. Test setting:

1. Disable Wifi on router or disable Wifi on phone via settings

2. After about ten seconds, the phone reboots

3. Remove SD card

4. Try point 1 again, no problem

5. Reinsert SD card

6. Same problem as before

I'm on Android 7.1.1 build number 45.0.A.1.229 and my sd card is a Lexar Professional 128GB High-Performance Class 10 UHS-I 600x 95MB/s Micro SDXC card. Here's the output of a exfatfsck under linux:

exfatfsck 1.2.5
WARN: volume was not unmounted cleanly.
Checking file system on /dev/sdb1.
File system version 1.0
Sector size 512 bytes
Cluster size 128 KB
Volume size 119 GB
Used space 70 GB
Available space 50 GB
Totally 880 directories and 42723 files.
File system checking finished. No errors found.

And a 'df -h' shows: 

Filesystem      Size  Used Avail Use%

/dev/sdb1       120G   70G   50G  59% 

As you can see, the sd card is heavily used, but this shouldn't be a problem. The warning about the unclean unmount is due to the sudden reboot of the phone, but the filesystem is consistent.

A 'adb logcat' before a reboot did not give me any insghts about the cause of the problem. But I'm not an Android programmer... perhaps I missed the essential messages due to inexperience in Android device debugging.

Any hint how to solve this strage issue would be appreciated!

14 REPLIES 14
JensG
Visitor

There are plenty of strange things, but I think you're doing progress in a systematic investigation! I agree that the permissions looks good so that wasn't it. Then the file manager can access external card, that's a bit unexpected. New apps working, but those you already had installed doesn't?

relates to "this phone", "the new card name", "the backup content" separately

Thanks for breaking it down for me. You concluded that "backup" seems to be irrelevant. For "new card name" I thought that there might be references to the old name in the backup, but that is then also irrelevant. With "this phone" I didn't specifically mean HW problems, but something stored in the phone, settings or so. Something that was not there from the beginning. If you were able to try the card in another phone it could bring evidence to "the phone" theory. Seeing that the other theories are probably irrelevant, this is still the best current idea. Trying the card again after a factory reset is the next best thing after trying another phone. ๐Ÿ™‚

The mount list shows that there is something that is belived to be encrypted. It could be something Spotify does to protect their cache (being precious music data I guess) and possibly nothing wrong in itself. It didn't happen when I tried Spotify briefly, but may be I didn't do exactly like you.

Let us know if you get more insight.

Kareema
Visitor

Ok, now I understand what you meant by "the phone". And after this weekend, I have proof that you were right with the "the phone" theory. But let's look at it step by step:

  • X-plore filemanager was installed the whole time and I allready granted the app permissions to access the SD card. So the prompt to allow access was a surprise as well as the fact that I could write to the SD card ๐Ÿ™‚
  • For the "backup" scenario: By restoring the backup of the SD, I only meant that I formatted the SD card on the phone and restored the contents of the SD card from a tar-backup on my computer. I did a system backup via "Backup&Restore" app of the phone as well, but did not restore it.
  • I don't think that the mount point with encryption could be created by an app - AFAIK, ecryptfs is system level encryption and apps should not have access to create such mount points. My theory is, that it is a left-over from my initial encryption attempts of the SD card. But why this mount point carries over to the new SD card is something I don't understand.

Well theories aside, I took a look at dmesg output yesterday. Here are some entries I found strange:

Spoiler
...
[ 6.741424] fec: <563> warning: __ecc_read: RS block 30003200: corrected 256 errors
[ 6.772915] fec: <564> warning: __ecc_read: RS block 30003200: corrected 256 errors
[ 6.773983] fs_mgr: Enabling dm-verity for system (mode 2)
[ 6.774002] fs_mgr: loading verity table: '1 /dev/block/bootdevice/by-name/system /dev/block/bootdevice/by-name/system 4096 4096 1852247 1852247 sha256 f4cc1e9889478acede3
a5d54e1d04141ec165d770dfe4402074a2dec087ffbdd aee087a5be3b982978c923f566a94613496b417f2af592639bc80d141e34dfe7 10 restart_on_corruption use_fec_from_device /dev/block/bootdev
ice/by-name/system fec_start 1866841 fec_blocks 1866841 fec_roots 2 ignore_zero_blocks'
[ 6.780234] EXT4-fs (dm-0): mounting with "discard" option, but the device does not support discard
[ 6.780243] EXT4-fs (dm-0): mounted filesystem with ordered data mode. Opts: barrier=1,discard
[ 6.780304] fs_mgr: __mount(source=/dev/block/dm-0,target=/system,type=ext4)=0
[ 6.780773] EXT4-fs (sda15): VFS: Can't find ext4 filesystem
[ 6.780810] fs_mgr: check_fs(): mount(/dev/block/bootdevice/by-name/userdata,/data,ext4)=-1: Invalid argument
[ 6.784827] fs_mgr: Running /system/bin/e2fsck on /dev/block/bootdevice/by-name/userdata
[ 6.784835] fs_mgr: fsck log is stored in /dev/fscklogs/userdata
[ 6.833421] e2fsck: e2fsck 1.42.9 (28-Dec-2013)
[ 6.833421]
[ 6.833440] e2fsck: ext2fs_open2: Bad magic number in super-block
[ 6.833440]
[ 6.833445] e2fsck: /system/bin/e2fsck: Superblock invalid, trying backup blocks...
[ 6.833445]
[ 6.833450] e2fsck: /system/bin/e2fsck: Bad magic number in super-block while trying to open /dev/block/bootdevice/by-name/userdata
[ 6.833450]
[ 6.833455] e2fsck:
[ 6.833455]
[ 6.833459] e2fsck:
[ 6.833459]
[ 6.833464] e2fsck: The superblock could not be read or does not describe a correct ext2
[ 6.833464]
[ 6.833469] e2fsck: filesystem. If the device is valid and it really contains an ext2
[ 6.833469]
[ 6.833473] e2fsck: filesystem (and not swap or ufs or something else), then the superblock
[ 6.833473]
[ 6.833478] e2fsck: is corrupt, and you might try running e2fsck with an alternate superblock:
[ 6.833478]
[ 6.833482] e2fsck: e2fsck -b 8193 <device>
[ 6.833482]
[ 6.833486] e2fsck:
[ 6.833486]
[ 6.833493] e2fsck: e2fsck terminated by exit(8)
[ 6.833493]
[ 6.833832] EXT4-fs (sda15): VFS: Can't find ext4 filesystem
[ 6.833862] fs_mgr: __mount(source=/dev/block/bootdevice/by-name/userdata,target=/data,type=ext4)=-1
[ 6.834200] fs_mgr: fs_mgr_mount_all(): possibly an encryptable blkdev /dev/block/bootdevice/by-name/userdata for mount /data type ext4 )
[ 6.836209] EXT4-fs (sda14): mounted filesystem with ordered data mode. Opts: barrier=1
[ 6.836252] fs_mgr: __mount(source=/dev/block/bootdevice/by-name/oem,target=/oem,type=ext4)=0
[ 6.836330] RIC: cache mount denied, mnt_flags:0x40a
[ 6.836339] fs_mgr: check_fs(): mount(/dev/block/bootdevice/by-name/cache,/cache,ext4)=-1: Operation not permitted
[ 6.836358] fs_mgr: Running /system/bin/e2fsck on /dev/block/bootdevice/by-name/cache
[ 6.836365] fs_mgr: fsck log is stored in /dev/fscklogs/cache
[ 6.851765] e2fsck: e2fsck 1.42.9 (28-Dec-2013)
...
[ 6.851804] e2fsck: cache: 20/24336 files (0.0% non-contiguous), 3110/97280 blocks
...
[ 6.866732] e2fsck: /dev/block/bootdevice/by-name/appslog: ***** FILE SYSTEM WAS MODIFIED *****
[ 6.866732]
[ 6.866737] e2fsck: /dev/block/bootdevice/by-name/appslog: 324/1024 files (0.3% non-contiguous), 1761/4096 blocks
...
[    6.881166] e2fsck: /dev/block/bootdevice/by-name/diag: 179/2048 files (1.1% non-contiguous), 1949/8192 blocks
...
[    6.895791] e2fsck: /dev/block/bootdevice/by-name/Qnovo: 15/1536 files (6.7% non-contiguous), 1140/6144 blocks
...
[   49.425322] e2fsck: /dev/block/dm-1: 84501/3334144 files (3.6% non-contiguous), 3849856/13327082 blocks
...

Hmm, invalid supeblock and some filesystem inconsistencies - not what I wanted to see...

Spoiler
[ 78.458400] sdcardfs version 2.0
[ 78.458406] sdcardfs: dev_name -> /mnt/media_rw/3262-3632
[ 78.458408] sdcardfs: options -> fsuid=1023,fsgid=1023,mask=6,userid=0,gid=1015
[ 78.458442] sdcardfs: mounted on top of /mnt/media_rw/3262-3632 type ecryptfs
[ 78.458560] sdcardfs version 2.0
[ 78.458562] sdcardfs: dev_name -> /mnt/media_rw/3262-3632
[ 78.458564] sdcardfs: options -> fsuid=1023,fsgid=1023,mask=18,userid=0,gid=9997
[ 78.458572] sdcardfs: mounted on top of /mnt/media_rw/3262-3632 type ecryptfs
[ 78.458634] sdcardfs version 2.0
[ 78.458636] sdcardfs: dev_name -> /mnt/media_rw/3262-3632
[ 78.458637] sdcardfs: options -> fsuid=1023,fsgid=1023,mask=18,userid=0,gid=9997
[ 78.458645] sdcardfs: mounted on top of /mnt/media_rw/3262-3632 type ecryptfs

Don't know what to think about the ecrytfs entries. SD card should not be encrypted!

And here some more "avc: denied" messages and ecryptfs messages:

Spoiler
[ 94.601126] ecryptfs_dir_open: Error attempting to initialize the lower file for the dentry with name [data]; rc = [-13]
[ 94.601170] ecryptfs_dir_open: Error attempting to initialize the lower file for the dentry with name [data]; rc = [-13]
[ 94.601846] type=1400 audit(1497628328.572:21): avc: denied { read open } for pid=5270 comm="Binder:3231_15" path="/mnt/media_rw/3262-3632.exfat/Android/data" dev="mmcblk0p1" ino=173015
04 scontext=u:r:system_server:s0 tcontext=u:object_r:vfat:s0 tclass=dir permissive=0 ppid=2768 pcomm="main" pgid=3231 pgcomm="system_server"
[ 94.617237] type=1400 audit(1497628328.572:22): avc: denied { read open } for pid=5270 comm="Binder:3231_15" path="/mnt/media_rw/3262-3632.exfat/Android/data" dev="mmcblk0p1" ino=173015
04 scontext=u:r:system_server:s0 tcontext=u:object_r:vfat:s0 tclass=dir permissive=0 ppid=2768 pcomm="main" pgid=3231 pgcomm="system_server"
[ 94.635552] type=1400 audit(1497628328.612:23): avc: denied { write } for pid=6599 comm="m.spotify.music" name="com.spotify.music" dev="ecryptfs" ino=17433984 scontext=u:r:untrusted_app
:s0:c512,c768 tcontext=u:object_r:ecryptfs:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.636313] ecryptfs_dir_open: Error attempting to initialize the lower file for the dentry with name [com.spotify.music]; rc = [-13]
[ 94.645045] type=1400 audit(1497628328.612:24): avc: denied { write } for pid=6599 comm="m.spotify.music" name="com.spotify.music" dev="ecryptfs" ino=17433984 scontext=u:r:untrusted_app
:s0:c512,c768 tcontext=u:object_r:ecryptfs:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.645255] type=1400 audit(1497628328.612:25): avc: denied { read open } for pid=4230 comm="Binder:3231_7" path="/mnt/media_rw/3262-3632.exfat/Android/data/com.spotify.music" dev="mmcb
lk0p1" ino=17433984 scontext=u:r:system_server:s0 tcontext=u:object_r:vfat:s0 tclass=dir permissive=0 ppid=2768 pcomm="main" pgid=3231 pgcomm="system_server"
[ 94.688434] type=1400 audit(1497628328.662:26): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.688657] type=1400 audit(1497628328.662:27): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.688743] type=1400 audit(1497628328.662:28): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.688817] type=1400 audit(1497628328.662:29): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.688911] type=1400 audit(1497628328.662:30): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689003] type=1400 audit(1497628328.662:31): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689082] type=1400 audit(1497628328.662:32): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689173] type=1400 audit(1497628328.662:33): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689244] type=1400 audit(1497628328.662:34): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689323] type=1400 audit(1497628328.662:35): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689402] type=1400 audit(1497628328.662:36): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689490] type=1400 audit(1497628328.662:37): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.689593] type=1400 audit(1497628328.662:38): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.690657] audit: audit_lost=1 audit_rate_limit=20 audit_backlog_limit=64
[ 94.690665] audit: rate limit exceeded
[ 94.699872] type=1400 audit(1497628328.662:39): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.704243] type=1400 audit(1497628328.662:40): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.704422] type=1400 audit(1497628328.662:41): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.704499] type=1400 audit(1497628328.662:42): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.706579] type=1400 audit(1497628328.662:43): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.706698] type=1400 audit(1497628328.662:44): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 94.706791] type=1400 audit(1497628328.662:45): avc: denied { getattr } for pid=6599 comm="m.spotify.music" path="/mnt/media_rw" dev="tmpfs" ino=9569 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_media_rw_file:s0 tclass=dir permissive=0 ppid=2769 pcomm="main" pgid=2769 pgcomm="main"
[ 95.014867] Valid eCryptfs headers not found in file header region or xattr region, inode 33432143360
[ 95.014888] pfk_ecryptfs [pfk_ecryptfs_open_cb]: could not parse key size from ecryptfs
...
Kareema
Visitor

With the logs from my last entry, my current theory is the following: My initial attempt to encrypt the card was around the reboot issues I had (the beginning of this thread). As a result, the information on the internal storage got corrupted somehow and the system still thinks, that parts of the SD card are encrypted and parts of the SD card file access permissions got corrupted as well.

So I did a software repair with the Xperia Companion to get a complete new install (and not just a factory reset). I did this with the SD card in place (and intentionally not reformatting it). Before I made a backup of the system (everything available) with the "Backup & Restore" app of the phone (target: SD card). After the software repair I let Google Play reinstall all my apps and restored everything available with "Backup & Restore".

Now everything is back to normal again and I can access the SD card from all apps (Spotify, MAPS.ME, etc.) without problems.

I will follow up on this topic when I find the time to look at the logs - please give me some days ๐Ÿ™‚

Just for reference and maybe it will help someone in a similar situation.

Kareema
Visitor

Addendum part I:

  • The superblock error is still there as well as filesystem errors on reboot - seems the system doesn't unmount the partitions when rebooting?
[    6.872765] e2fsck: /system/bin/e2fsck: Bad magic number in super-block while trying to open /dev/block/bootdevice
/by-name/userdata
[    6.905012] e2fsck: /dev/block/bootdevice/by-name/appslog: 40/1024 files (5.0% non-contiguous), 1159/4096 blocks
[    6.918033] e2fsck: /dev/block/bootdevice/by-name/diag: 51/2048 files (2.0% non-contiguous), 1270/8192 blocks
  • The current mount points (nowhere an encrypted SD card filesystem to be seen):
Spoiler
rootfs on / type rootfs (ro,seclabel,size=1802908k,nr_inodes=450727)
tmpfs on /dev type tmpfs (rw,seclabel,nosuid,relatime,size=1893892k,nr_inodes=473473,mode=755)
devpts on /dev/pts type devpts (rw,seclabel,relatime,mode=600)
proc on /proc type proc (rw,relatime,gid=3009,hidepid=2)
sysfs on /sys type sysfs (rw,seclabel,relatime)
selinuxfs on /sys/fs/selinux type selinuxfs (rw,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,seclabel,relatime)
none on /acct type cgroup (rw,relatime,cpuacct)
none on /dev/stune type cgroup (rw,relatime,schedtune)
tmpfs on /mnt type tmpfs (rw,seclabel,relatime,size=1893892k,nr_inodes=473473,mode=755,gid=1000)
none on /config type configfs (rw,relatime)
none on /dev/memcg type cgroup (rw,relatime,memory)
none on /dev/cpuctl type cgroup (rw,relatime,cpu)
none on /dev/cpuset type cgroup (rw,relatime,cpuset,noprefix,release_agent=/sbin/cpuset_release_agent)
pstore on /sys/fs/pstore type pstore (rw,seclabel,relatime)
none on /sys/fs/cgroup type tmpfs (rw,seclabel,relatime,size=1893892k,nr_inodes=473473,mode=750,gid=1000)
none on /sys/fs/cgroup/memory type cgroup (rw,relatime,memory)
tmpfs on /tmp type tmpfs (rw,seclabel,nosuid,relatime,size=1893892k,nr_inodes=473473,mode=755)
/dev/block/dm-0 on /system type ext4 (ro,seclabel,relatime,discard,data=ordered)
/dev/block/bootdevice/by-name/oem on /oem type ext4 (ro,seclabel,relatime,data=ordered)
/dev/block/bootdevice/by-name/cache on /cache type ext4 (rw,seclabel,nosuid,nodev,noatime,discard,data=ordered)
/dev/block/bootdevice/by-name/appslog on /rca type ext4 (rw,seclabel,nosuid,nodev,noexec,noatime,discard,data=ordered)
/dev/block/bootdevice/by-name/diag on /idd type ext4 (rw,seclabel,nosuid,nodev,noexec,noatime,discard,data=ordered)
/dev/block/bootdevice/by-name/Qnovo on /qns type ext4 (rw,seclabel,nosuid,nodev,noexec,noatime,discard,data=ordered)
/dev/block/bootdevice/by-name/persist on /persist type ext4 (rw,seclabel,nosuid,nodev,relatime,data=ordered)
/dev/block/bootdevice/by-name/dsp on /dsp type ext4 (ro,seclabel,nosuid,nodev,relatime,data=ordered)
/dev/block/bootdevice/by-name/modem on /firmware type vfat (ro,context=u:object_r:firmware_file:s0,relatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
/dev/block/bootdevice/by-name/bluetooth on /bt_firmware type vfat (ro,context=u:object_r:bt_firmware_file:s0,relatime,uid=1002,gid=3002,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
/dev/block/bootdevice/by-name/LTALabel on /lta-label type ext4 (ro,context=u:object_r:lta_label:s0,nosuid,nodev,noexec,noatime,data=ordered)
tmpfs on /storage type tmpfs (rw,seclabel,relatime,size=1893892k,nr_inodes=473473,mode=755,gid=1000)
tracefs on /sys/kernel/debug/tracing type tracefs (rw,seclabel,relatime)
adb on /dev/usb-ffs/adb type functionfs (rw,relatime)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
/dev/block/dm-1 on /data type ext4 (rw,seclabel,nosuid,nodev,noatime,discard,noauto_da_alloc,data=ordered)
/data/media on /mnt/runtime/default/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,multiuser,allow_utime_grp)
/data/media on /storage/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,multiuser,allow_utime_grp)
/data/media on /mnt/runtime/read/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,multiuser,allow_utime_grp)
/data/media on /mnt/runtime/write/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,multiuser,allow_utime_grp)
/dev/block/vold/public:179,1 on /mnt/media_rw/3262-3632 type texfat (rw,dirsync,nosuid,nodev,noexec,relatime,uid=1023,gid=1023,umask=0007,allow_utime=0020,utf8,min_prealloc_size=64k,max_prealloc_size=121910k,writeback_boundary=4M,readahead=4M,fail_safe,discard,hidden=show,errors=continue)
/dev/block/vold/public:179,1 on /mnt/secure/asec type texfat (rw,dirsync,nosuid,nodev,noexec,relatime,uid=1023,gid=1023,umask=0007,allow_utime=0020,utf8,min_prealloc_size=64k,max_prealloc_size=121910k,writeback_boundary=4M,readahead=4M,fail_safe,discard,hidden=show,errors=continue)
/mnt/media_rw/3262-3632 on /mnt/runtime/default/3262-3632 type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,allow_utime_grp)
/mnt/media_rw/3262-3632 on /storage/3262-3632 type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,allow_utime_grp)
/mnt/media_rw/3262-3632 on /mnt/runtime/read/3262-3632 type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,allow_utime_grp)
/mnt/media_rw/3262-3632 on /mnt/runtime/write/3262-3632 type sdcardfs (rw,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,allow_utime_grp)
  • I checked the file rights of the Spotify folder on the SD card: Same as before, no change.
Kareema
Visitor

Final post in this thread - maybe ๐Ÿ˜‰

I want to thank the Sony support team and especially JensG for the great support during this error tracking session. Without the help of Jens, I wouldn't have gotten this far and I learned a lot while debugging this issue. Thank you very much!

-- Kareema