Unhandled exception when starting any FEX* command After error during `FEXRootFSFetcher`'s "unpacking fs image" phase ``` Do you wish to extract the erofs file or use it as-is? Options: 0: Cancel 1: Extract 2: As-Is Response {1-2} or 0 to cancel 1 Extracting Erofs. This might take a few minutes. erofs: I/O error occurred when verifying data chunk @ nid 31192463 Do you wish to set this RootFS as default? Response {y,yes,1} or {n,no,0} y Ubuntu_23_04.ero set as default RootFS ``` any Fex* command return this error: ``` > FEXRootFSFetcher terminate called after throwing an instance of 'std::out_of_range' what(): vector::_M_range_check: __n (which is 0) >= this->size() (which is 0) fish: Job 1, 'FEXRootFSFetcher' terminated by signal SIGABRT (Abort) ``` FEXConfig spawns window, but then fail with same error ``` > FEXConfig terminate called after throwing an instance of 'std::out_of_range' what(): vector::_M_range_check: __n (which is 0) >= this->size() (which is 0) fish: Job 1, 'FEXConfig' terminated by signal SIGABRT (Abort) ``` ### Steps to reproduce #### Build ```sh mkdir build cd build env CC=clang CXX=clang++ cmake .. -G Ninja -D ENABLE_LTO=False -D BUILD_TESTS=False -D CMAKE_BUILD_TYPE=Release -D INTERPROCEDURAL_OPTIMIZATION=False sudo ninja install ``` #### Run FEXRootFSFetcher Select Ubuntu 23 erofs image ### Addition info os-release ``` NAME="Manjaro ARM" ID="manjaro-arm" ``` lscpu ``` Architecture: aarch64 CPU op-mode(s): 32-bit, 64-bit Byte Order: Little Endian CPU(s): 6 On-line CPU(s) list: 0-5 Vendor ID: ARM Model name: Cortex-A53 Model: 4 Thread(s) per core: 1 Core(s) per socket: 4 Socket(s): 1 Stepping: r0p4 CPU(s) scaling MHz: 58% CPU max MHz: 1416.0000 CPU min MHz: 408.0000 BogoMIPS: 48.00 Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 cpuid Model name: Cortex-A72 Model: 2 Thread(s) per core: 1 Core(s) per socket: 2 Socket(s): 1 Stepping: r0p2 CPU(s) scaling MHz: 100% CPU max MHz: 1800.0000 CPU min MHz: 408.0000 BogoMIPS: 48.00 Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 cpuid Vulnerabilities: Gather data sampling: Not affected Itlb multihit: Not affected L1tf: Not affected Mds: Not affected Meltdown: Not affected Mmio stale data: Not affected Retbleed: Not affected Spec rstack overflow: Not affected Spec store bypass: Vulnerable Spectre v1: Mitigation; __user pointer sanitization Spectre v2: Vulnerable Srbds: Not affected Tsx async abort: Not affected ```