does Linux kernel alter unmounted ext4 partitions?

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP












3














When the 4.9 Linux kernel boots and recognizes the presence of and MMC partition, does it alter the partition in any way if the partition is not mounted?



I pre-calculated the sha256 of a "filesystem.img" at build time (ext4.)



I apply my file system to an MMC partition as follows:



dd if=myfilesystem.img of=/dev/mmcblk0p2 bs=4096 count=XYZABC 


I can read the partition back and verify that the flash was correct:



dd if=/dev/mmcblk0p2 bs=496 count=XYZABC | sha256sum


Journaling is disabled. I can manually mount the file system read-only and unmount as much as I want. The sha256 remains the same.



However, if I reboot and run the checksum again, the sha256 on the partition comes out different. The partition I wrote to before rebooting is not mounted. But it is recognized as mmcblk0p2 by the kernel.



Does the kernel alter the data in a partition in any way before it is mounted?










share|improve this question



















  • 1




    when using count=x, you should also use iflag=fullblock. there is also a typo in your command (bs=496 instead of bs=4096)
    – frostschutz
    Dec 26 '18 at 19:20















3














When the 4.9 Linux kernel boots and recognizes the presence of and MMC partition, does it alter the partition in any way if the partition is not mounted?



I pre-calculated the sha256 of a "filesystem.img" at build time (ext4.)



I apply my file system to an MMC partition as follows:



dd if=myfilesystem.img of=/dev/mmcblk0p2 bs=4096 count=XYZABC 


I can read the partition back and verify that the flash was correct:



dd if=/dev/mmcblk0p2 bs=496 count=XYZABC | sha256sum


Journaling is disabled. I can manually mount the file system read-only and unmount as much as I want. The sha256 remains the same.



However, if I reboot and run the checksum again, the sha256 on the partition comes out different. The partition I wrote to before rebooting is not mounted. But it is recognized as mmcblk0p2 by the kernel.



Does the kernel alter the data in a partition in any way before it is mounted?










share|improve this question



















  • 1




    when using count=x, you should also use iflag=fullblock. there is also a typo in your command (bs=496 instead of bs=4096)
    – frostschutz
    Dec 26 '18 at 19:20













3












3








3







When the 4.9 Linux kernel boots and recognizes the presence of and MMC partition, does it alter the partition in any way if the partition is not mounted?



I pre-calculated the sha256 of a "filesystem.img" at build time (ext4.)



I apply my file system to an MMC partition as follows:



dd if=myfilesystem.img of=/dev/mmcblk0p2 bs=4096 count=XYZABC 


I can read the partition back and verify that the flash was correct:



dd if=/dev/mmcblk0p2 bs=496 count=XYZABC | sha256sum


Journaling is disabled. I can manually mount the file system read-only and unmount as much as I want. The sha256 remains the same.



However, if I reboot and run the checksum again, the sha256 on the partition comes out different. The partition I wrote to before rebooting is not mounted. But it is recognized as mmcblk0p2 by the kernel.



Does the kernel alter the data in a partition in any way before it is mounted?










share|improve this question















When the 4.9 Linux kernel boots and recognizes the presence of and MMC partition, does it alter the partition in any way if the partition is not mounted?



I pre-calculated the sha256 of a "filesystem.img" at build time (ext4.)



I apply my file system to an MMC partition as follows:



dd if=myfilesystem.img of=/dev/mmcblk0p2 bs=4096 count=XYZABC 


I can read the partition back and verify that the flash was correct:



dd if=/dev/mmcblk0p2 bs=496 count=XYZABC | sha256sum


Journaling is disabled. I can manually mount the file system read-only and unmount as much as I want. The sha256 remains the same.



However, if I reboot and run the checksum again, the sha256 on the partition comes out different. The partition I wrote to before rebooting is not mounted. But it is recognized as mmcblk0p2 by the kernel.



Does the kernel alter the data in a partition in any way before it is mounted?







linux ext4






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Dec 26 '18 at 16:22









Romeo Ninov

5,27731827




5,27731827










asked Dec 26 '18 at 15:45









Eric TexleyEric Texley

463




463







  • 1




    when using count=x, you should also use iflag=fullblock. there is also a typo in your command (bs=496 instead of bs=4096)
    – frostschutz
    Dec 26 '18 at 19:20












  • 1




    when using count=x, you should also use iflag=fullblock. there is also a typo in your command (bs=496 instead of bs=4096)
    – frostschutz
    Dec 26 '18 at 19:20







1




1




when using count=x, you should also use iflag=fullblock. there is also a typo in your command (bs=496 instead of bs=4096)
– frostschutz
Dec 26 '18 at 19:20




when using count=x, you should also use iflag=fullblock. there is also a typo in your command (bs=496 instead of bs=4096)
– frostschutz
Dec 26 '18 at 19:20










1 Answer
1






active

oldest

votes


















2














Which distro / environment are you booting exactly?



It could be as simple as a filesystem check that just updates the last-checked timestamp. Instead of taking a hash sum, it would be more interesting to make a 1:1 copy and then compare them byte-by-byte (cmp -l) to find out what exactly changed.



Usually, it's not the kernel modifying the filesystems, but whatever userland you are booting into. Most LiveCDs (Live-USB-Sticks), even those made for rescue purposes, modify filesystems by mounting them in search of their own live data. With systemd/udev, there is also a lot of magic happening in the background that you might not be aware of.



If you are able to modify initramfs / early boot, try setting /proc/sys/vm/block_dump before anything else and you might get some surprises regarding what's writing where in dmesg.



Note: this will cause issues if you are already logging kernel messages to disk, as each write would cause another write for the log alone.




I can manually mount the file system read-only and unmount as much as I want.




Even a read-only mount doesn't always guarantee no-change:



# truncate -s 100M foobar.iso
# losetup --find --show foobar.iso
/dev/loop0
# mkfs.ext4 foobar.iso
# md5sum foobar.iso
59dea589bb84855e282d1415b3238230 foobar.iso
# mount -o ro /dev/loop0 loop/
# md5sum /dev/loop0
47c89177d619b55b701a1ddbde352c90 /dev/loop0


What happened here? No idea, really...



--- a.txt 2018-12-26 20:39:13.578096660 +0100
+++ b.txt 2018-12-26 20:39:18.444742584 +0100
@@ -1536,11 +1536,10 @@
*
03000400 c0 3b 39 98 00 00 00 04 00 00 00 00 00 00 04 00 |.;9.............|
03000410 00 00 10 00 00 00 00 01 00 00 00 01 00 00 00 00 |................|
-03000420 00 00 00 00 00 00 00 00 00 00 00 12 00 00 00 00 |................|
+03000420 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
03000430 15 de d5 f7 6f 52 43 9b a9 18 9b 3d 28 65 2d 51 |....oRC....=(e-Q|
03000440 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 |................|
-03000450 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
-03000460 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
+03000450 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
03800400 58 64 00 00 00 90 01 00 00 14 00 00 40 6d 01 00 |Xd..........@m..|
03800410 4d 64 00 00 01 00 00 00 00 00 00 00 00 00 00 00 |Md..............|


If you want to reinforce the read-only idea a little, use mount -o loop,ro, it adds a read-only loop device in between. But even that is no guarantee for anything.






share|improve this answer


















  • 1




    You can use blockdev --setro to have kernel enforce read-only status, even against its own facilities (eg a filesystem).
    – A.B
    Dec 26 '18 at 22:18










  • Fantastic! blockdev --setro appears to have licked the problem. "/dev/mmcblk0pX write protected." on boot. NOW the hash doesn't change. Otherwise, I'll netcat the contents of my partition off the board and perform the byte-for-byte compare you are doing. I'm using Yocto distribution with an IMX6.
    – Eric Texley
    Dec 28 '18 at 4:54











Your Answer








StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "106"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













draft saved

draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f491001%2fdoes-linux-kernel-alter-unmounted-ext4-partitions%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









2














Which distro / environment are you booting exactly?



It could be as simple as a filesystem check that just updates the last-checked timestamp. Instead of taking a hash sum, it would be more interesting to make a 1:1 copy and then compare them byte-by-byte (cmp -l) to find out what exactly changed.



Usually, it's not the kernel modifying the filesystems, but whatever userland you are booting into. Most LiveCDs (Live-USB-Sticks), even those made for rescue purposes, modify filesystems by mounting them in search of their own live data. With systemd/udev, there is also a lot of magic happening in the background that you might not be aware of.



If you are able to modify initramfs / early boot, try setting /proc/sys/vm/block_dump before anything else and you might get some surprises regarding what's writing where in dmesg.



Note: this will cause issues if you are already logging kernel messages to disk, as each write would cause another write for the log alone.




I can manually mount the file system read-only and unmount as much as I want.




Even a read-only mount doesn't always guarantee no-change:



# truncate -s 100M foobar.iso
# losetup --find --show foobar.iso
/dev/loop0
# mkfs.ext4 foobar.iso
# md5sum foobar.iso
59dea589bb84855e282d1415b3238230 foobar.iso
# mount -o ro /dev/loop0 loop/
# md5sum /dev/loop0
47c89177d619b55b701a1ddbde352c90 /dev/loop0


What happened here? No idea, really...



--- a.txt 2018-12-26 20:39:13.578096660 +0100
+++ b.txt 2018-12-26 20:39:18.444742584 +0100
@@ -1536,11 +1536,10 @@
*
03000400 c0 3b 39 98 00 00 00 04 00 00 00 00 00 00 04 00 |.;9.............|
03000410 00 00 10 00 00 00 00 01 00 00 00 01 00 00 00 00 |................|
-03000420 00 00 00 00 00 00 00 00 00 00 00 12 00 00 00 00 |................|
+03000420 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
03000430 15 de d5 f7 6f 52 43 9b a9 18 9b 3d 28 65 2d 51 |....oRC....=(e-Q|
03000440 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 |................|
-03000450 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
-03000460 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
+03000450 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
03800400 58 64 00 00 00 90 01 00 00 14 00 00 40 6d 01 00 |Xd..........@m..|
03800410 4d 64 00 00 01 00 00 00 00 00 00 00 00 00 00 00 |Md..............|


If you want to reinforce the read-only idea a little, use mount -o loop,ro, it adds a read-only loop device in between. But even that is no guarantee for anything.






share|improve this answer


















  • 1




    You can use blockdev --setro to have kernel enforce read-only status, even against its own facilities (eg a filesystem).
    – A.B
    Dec 26 '18 at 22:18










  • Fantastic! blockdev --setro appears to have licked the problem. "/dev/mmcblk0pX write protected." on boot. NOW the hash doesn't change. Otherwise, I'll netcat the contents of my partition off the board and perform the byte-for-byte compare you are doing. I'm using Yocto distribution with an IMX6.
    – Eric Texley
    Dec 28 '18 at 4:54
















2














Which distro / environment are you booting exactly?



It could be as simple as a filesystem check that just updates the last-checked timestamp. Instead of taking a hash sum, it would be more interesting to make a 1:1 copy and then compare them byte-by-byte (cmp -l) to find out what exactly changed.



Usually, it's not the kernel modifying the filesystems, but whatever userland you are booting into. Most LiveCDs (Live-USB-Sticks), even those made for rescue purposes, modify filesystems by mounting them in search of their own live data. With systemd/udev, there is also a lot of magic happening in the background that you might not be aware of.



If you are able to modify initramfs / early boot, try setting /proc/sys/vm/block_dump before anything else and you might get some surprises regarding what's writing where in dmesg.



Note: this will cause issues if you are already logging kernel messages to disk, as each write would cause another write for the log alone.




I can manually mount the file system read-only and unmount as much as I want.




Even a read-only mount doesn't always guarantee no-change:



# truncate -s 100M foobar.iso
# losetup --find --show foobar.iso
/dev/loop0
# mkfs.ext4 foobar.iso
# md5sum foobar.iso
59dea589bb84855e282d1415b3238230 foobar.iso
# mount -o ro /dev/loop0 loop/
# md5sum /dev/loop0
47c89177d619b55b701a1ddbde352c90 /dev/loop0


What happened here? No idea, really...



--- a.txt 2018-12-26 20:39:13.578096660 +0100
+++ b.txt 2018-12-26 20:39:18.444742584 +0100
@@ -1536,11 +1536,10 @@
*
03000400 c0 3b 39 98 00 00 00 04 00 00 00 00 00 00 04 00 |.;9.............|
03000410 00 00 10 00 00 00 00 01 00 00 00 01 00 00 00 00 |................|
-03000420 00 00 00 00 00 00 00 00 00 00 00 12 00 00 00 00 |................|
+03000420 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
03000430 15 de d5 f7 6f 52 43 9b a9 18 9b 3d 28 65 2d 51 |....oRC....=(e-Q|
03000440 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 |................|
-03000450 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
-03000460 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
+03000450 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
03800400 58 64 00 00 00 90 01 00 00 14 00 00 40 6d 01 00 |Xd..........@m..|
03800410 4d 64 00 00 01 00 00 00 00 00 00 00 00 00 00 00 |Md..............|


If you want to reinforce the read-only idea a little, use mount -o loop,ro, it adds a read-only loop device in between. But even that is no guarantee for anything.






share|improve this answer


















  • 1




    You can use blockdev --setro to have kernel enforce read-only status, even against its own facilities (eg a filesystem).
    – A.B
    Dec 26 '18 at 22:18










  • Fantastic! blockdev --setro appears to have licked the problem. "/dev/mmcblk0pX write protected." on boot. NOW the hash doesn't change. Otherwise, I'll netcat the contents of my partition off the board and perform the byte-for-byte compare you are doing. I'm using Yocto distribution with an IMX6.
    – Eric Texley
    Dec 28 '18 at 4:54














2












2








2






Which distro / environment are you booting exactly?



It could be as simple as a filesystem check that just updates the last-checked timestamp. Instead of taking a hash sum, it would be more interesting to make a 1:1 copy and then compare them byte-by-byte (cmp -l) to find out what exactly changed.



Usually, it's not the kernel modifying the filesystems, but whatever userland you are booting into. Most LiveCDs (Live-USB-Sticks), even those made for rescue purposes, modify filesystems by mounting them in search of their own live data. With systemd/udev, there is also a lot of magic happening in the background that you might not be aware of.



If you are able to modify initramfs / early boot, try setting /proc/sys/vm/block_dump before anything else and you might get some surprises regarding what's writing where in dmesg.



Note: this will cause issues if you are already logging kernel messages to disk, as each write would cause another write for the log alone.




I can manually mount the file system read-only and unmount as much as I want.




Even a read-only mount doesn't always guarantee no-change:



# truncate -s 100M foobar.iso
# losetup --find --show foobar.iso
/dev/loop0
# mkfs.ext4 foobar.iso
# md5sum foobar.iso
59dea589bb84855e282d1415b3238230 foobar.iso
# mount -o ro /dev/loop0 loop/
# md5sum /dev/loop0
47c89177d619b55b701a1ddbde352c90 /dev/loop0


What happened here? No idea, really...



--- a.txt 2018-12-26 20:39:13.578096660 +0100
+++ b.txt 2018-12-26 20:39:18.444742584 +0100
@@ -1536,11 +1536,10 @@
*
03000400 c0 3b 39 98 00 00 00 04 00 00 00 00 00 00 04 00 |.;9.............|
03000410 00 00 10 00 00 00 00 01 00 00 00 01 00 00 00 00 |................|
-03000420 00 00 00 00 00 00 00 00 00 00 00 12 00 00 00 00 |................|
+03000420 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
03000430 15 de d5 f7 6f 52 43 9b a9 18 9b 3d 28 65 2d 51 |....oRC....=(e-Q|
03000440 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 |................|
-03000450 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
-03000460 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
+03000450 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
03800400 58 64 00 00 00 90 01 00 00 14 00 00 40 6d 01 00 |Xd..........@m..|
03800410 4d 64 00 00 01 00 00 00 00 00 00 00 00 00 00 00 |Md..............|


If you want to reinforce the read-only idea a little, use mount -o loop,ro, it adds a read-only loop device in between. But even that is no guarantee for anything.






share|improve this answer














Which distro / environment are you booting exactly?



It could be as simple as a filesystem check that just updates the last-checked timestamp. Instead of taking a hash sum, it would be more interesting to make a 1:1 copy and then compare them byte-by-byte (cmp -l) to find out what exactly changed.



Usually, it's not the kernel modifying the filesystems, but whatever userland you are booting into. Most LiveCDs (Live-USB-Sticks), even those made for rescue purposes, modify filesystems by mounting them in search of their own live data. With systemd/udev, there is also a lot of magic happening in the background that you might not be aware of.



If you are able to modify initramfs / early boot, try setting /proc/sys/vm/block_dump before anything else and you might get some surprises regarding what's writing where in dmesg.



Note: this will cause issues if you are already logging kernel messages to disk, as each write would cause another write for the log alone.




I can manually mount the file system read-only and unmount as much as I want.




Even a read-only mount doesn't always guarantee no-change:



# truncate -s 100M foobar.iso
# losetup --find --show foobar.iso
/dev/loop0
# mkfs.ext4 foobar.iso
# md5sum foobar.iso
59dea589bb84855e282d1415b3238230 foobar.iso
# mount -o ro /dev/loop0 loop/
# md5sum /dev/loop0
47c89177d619b55b701a1ddbde352c90 /dev/loop0


What happened here? No idea, really...



--- a.txt 2018-12-26 20:39:13.578096660 +0100
+++ b.txt 2018-12-26 20:39:18.444742584 +0100
@@ -1536,11 +1536,10 @@
*
03000400 c0 3b 39 98 00 00 00 04 00 00 00 00 00 00 04 00 |.;9.............|
03000410 00 00 10 00 00 00 00 01 00 00 00 01 00 00 00 00 |................|
-03000420 00 00 00 00 00 00 00 00 00 00 00 12 00 00 00 00 |................|
+03000420 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
03000430 15 de d5 f7 6f 52 43 9b a9 18 9b 3d 28 65 2d 51 |....oRC....=(e-Q|
03000440 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 |................|
-03000450 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
-03000460 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
+03000450 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
03800400 58 64 00 00 00 90 01 00 00 14 00 00 40 6d 01 00 |Xd..........@m..|
03800410 4d 64 00 00 01 00 00 00 00 00 00 00 00 00 00 00 |Md..............|


If you want to reinforce the read-only idea a little, use mount -o loop,ro, it adds a read-only loop device in between. But even that is no guarantee for anything.







share|improve this answer














share|improve this answer



share|improve this answer








edited Dec 26 '18 at 19:42

























answered Dec 26 '18 at 19:31









frostschutzfrostschutz

26.2k15282




26.2k15282







  • 1




    You can use blockdev --setro to have kernel enforce read-only status, even against its own facilities (eg a filesystem).
    – A.B
    Dec 26 '18 at 22:18










  • Fantastic! blockdev --setro appears to have licked the problem. "/dev/mmcblk0pX write protected." on boot. NOW the hash doesn't change. Otherwise, I'll netcat the contents of my partition off the board and perform the byte-for-byte compare you are doing. I'm using Yocto distribution with an IMX6.
    – Eric Texley
    Dec 28 '18 at 4:54













  • 1




    You can use blockdev --setro to have kernel enforce read-only status, even against its own facilities (eg a filesystem).
    – A.B
    Dec 26 '18 at 22:18










  • Fantastic! blockdev --setro appears to have licked the problem. "/dev/mmcblk0pX write protected." on boot. NOW the hash doesn't change. Otherwise, I'll netcat the contents of my partition off the board and perform the byte-for-byte compare you are doing. I'm using Yocto distribution with an IMX6.
    – Eric Texley
    Dec 28 '18 at 4:54








1




1




You can use blockdev --setro to have kernel enforce read-only status, even against its own facilities (eg a filesystem).
– A.B
Dec 26 '18 at 22:18




You can use blockdev --setro to have kernel enforce read-only status, even against its own facilities (eg a filesystem).
– A.B
Dec 26 '18 at 22:18












Fantastic! blockdev --setro appears to have licked the problem. "/dev/mmcblk0pX write protected." on boot. NOW the hash doesn't change. Otherwise, I'll netcat the contents of my partition off the board and perform the byte-for-byte compare you are doing. I'm using Yocto distribution with an IMX6.
– Eric Texley
Dec 28 '18 at 4:54





Fantastic! blockdev --setro appears to have licked the problem. "/dev/mmcblk0pX write protected." on boot. NOW the hash doesn't change. Otherwise, I'll netcat the contents of my partition off the board and perform the byte-for-byte compare you are doing. I'm using Yocto distribution with an IMX6.
– Eric Texley
Dec 28 '18 at 4:54


















draft saved

draft discarded
















































Thanks for contributing an answer to Unix & Linux Stack Exchange!


  • Please be sure to answer the question. Provide details and share your research!

But avoid


  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.

To learn more, see our tips on writing great answers.





Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


Please pay close attention to the following guidance:


  • Please be sure to answer the question. Provide details and share your research!

But avoid


  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.

To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f491001%2fdoes-linux-kernel-alter-unmounted-ext4-partitions%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown






Popular posts from this blog

How to check contact read email or not when send email to Individual?

Bahrain

Postfix configuration issue with fips on centos 7; mailgun relay