sdcardfs

sdcardfs

sdcardfs_read() call flow

复制代码
[   70.421020] CPU: 0 PID: 4007 Comm: Binder:2841_2 Tainted: P           O      4.19.116+ #21
[   70.429301] Hardware name: xxx (DT)
[   70.432968] Call trace:
[   70.435427]  dump_backtrace+0x0/0x4
[   70.438923]  dump_stack+0xf4/0x134
[   70.442331]  sdcardfs_read+0x30/0x78
[   70.445912]  __vfs_read+0x6c/0x1e0
[   70.449316]  vfs_read+0xbc/0x154
[   70.452546]  ksys_read+0xc8/0x150
[   70.455863]  __arm64_sys_read+0x20/0x2c
[   70.459704]  el0_svc_common+0xb8/0x1b8
[   70.463457]  el0_svc_compat_handler+0x28/0x34
[   70.467819]  el0_svc_compat+0x8/0x34
复制代码

 

 

复制代码
[   70.353640] CPU: 2 PID: 4844 Comm: IntentService[M Tainted: P           O      4.19.116+ #21
[   70.362095] Hardware name: xxx (DT)
[   70.365761] Call trace:
[   70.368220]  dump_backtrace+0x0/0x4
[   70.371716]  dump_stack+0xf4/0x134
[   70.375121]  sdcardfs_iget+0x124/0x2dc
[   70.378873]  sdcardfs_lookup+0x498/0x910
[   70.382800]  __lookup_slow+0x144/0x254
[   70.386553]  walk_component+0x224/0xb58
[   70.390392]  path_lookupat+0xb4/0x22c
[   70.394056]  filename_lookup+0x98/0x1c8
[   70.397898]  vfs_statx+0xa4/0x1e0
[   70.401216]  __arm64_sys_newfstatat+0x40/0x7c
[   70.405578]  el0_svc_common+0xb8/0x1b8
[   70.409330]  el0_svc_handler+0x74/0x90
[   70.413082]  el0_svc+0x8/0x340
复制代码

 

将sdcardfs开启:

sm set-sdcardfs on

查看sdcardfs是否开启:

console:/ # getprop persist.sys.sdcardfs
force_on

 

sdcardfs kernel config

CONFIG_SDCARD_FS

 

posted @   aspirs  阅读(200)  评论(0编辑  收藏  举报
编辑推荐:
· 浏览器原生「磁吸」效果!Anchor Positioning 锚点定位神器解析
· 没有源码,如何修改代码逻辑?
· 一个奇形怪状的面试题:Bean中的CHM要不要加volatile?
· [.NET]调用本地 Deepseek 模型
· 一个费力不讨好的项目,让我损失了近一半的绩效!
阅读排行:
· 在鹅厂做java开发是什么体验
· 百万级群聊的设计实践
· WPF到Web的无缝过渡:英雄联盟客户端的OpenSilver迁移实战
· 永远不要相信用户的输入:从 SQL 注入攻防看输入验证的重要性
· 浏览器原生「磁吸」效果!Anchor Positioning 锚点定位神器解析
点击右上角即可分享
微信分享提示