Hello, 
Since I'm not good at english, so I can make some mistakes.
This is HAN who studies Android Lollipop developing.
When my custom Lollipop image is downloaded and boot firstly, I got an issue at 
libselinux.so and libpcre.so.

I've got segmentation fault as below.
I guess this segfault came from when SELinux was labelling some packages.

I've done debug as below backtrace.
It says the segfault was started from pcre_exec.c(line 6844).

#Debug Info
0000000000012ae0  : android/external/pcre/dist/pcre_exec.c:6844
Link -> 
http://androidxref.com/5.1.0_r1/xref/external/pcre/dist/pcre_exec.c#6844
000000000000ba20  : android/external/libselinux/src/label_file.c:636
Link -> 
http://androidxref.com/5.1.0_r1/xref/external/libselinux/src/label_file.c#636
000000000000ae48  : android/external/libselinux/src/label.c:102
Link -> 
http://androidxref.com/5.1.0_r1/xref/external/libselinux/src/label.c#102
000000000000e440  : android/external/libselinux/src/android.c:1134
Link -> 
http://androidxref.com/5.1.0_r1/xref/external/libselinux/src/android.c#1134
000000000000ebcc  : android/external/libselinux/src/android.c:1213
Link -> 
http://androidxref.com/5.1.0_r1/xref/external/libselinux/src/android.c#1213

This issue appeared only one time and I wanted to add some debug logs.
so I've tried to reproduce over 20 times,it doesn't appear though.

Is there any idea which part should I look at?

Thank you in advance.

-----------------------------------------------------------------------------------------------------
pid: 1197, tid: 3307, name: pool-6-thread-2  >>> system_server 
<<<
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x61767265736576
    x0   0000007f8f76dc75  x1   0000000000000014  x2   0000000000000000  x3   
0000000000000000
    x4   0000000000000000  x5   0000000000000000  x6   0000007f8ffbbd44  x7   
0000000000000000
    x8   0000007f8f76dc74  x9   0000007f8ffbbd18  x10  7461767265736572  x11  
0000000000000000
    x12  0000000000000000  x13  0000000000000000  x14  0000000000000000  x15  
0000000000000014
    x16  0000000000000001  x17  0000000000000000  x18  0000000000000014  x19  
0000007f8f76dc96
    x20  0000000000000000  x21  0000000000000000  x22  0000007f8f76dc75  x23  
0000007fa54693c0
    x24  0000000000000000  x25  0000000000000021  x26  0000007f8f76dc75  x27  
0000000000000000
    x28  0000007fa5469430  x29  0000007f8ffbbbf0  x30  0000000055555556
    sp   0000007f8ffbbbf0  pc   0000007fae022ae0  pstate 0000000080000000
    v0   2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f  v1   00000000000000000000000014ba5000
    v2   474c2f64616f6c6572702f617461642f  v3   80200802802008028020080200000002
    v4   00000000000000000000000000000000  v5   00000000000000000000000000000000
    v6   00000400000000000000040000000001  v7   80200802802008028020080280200802
    v8   00000000000000000000007f8f76dc96  v9   00000000000000000000000000000000
    v10  00000000000000000000007f8ffbbd44  v11  00000000000000007461767265736572
    v12  00000000000000000000000000000000  v13  00000000000000000000000000000000
    v14  00000000000000000000007f8f76dc74  v15  00000000000000000000000000000000
    v16  40100401401004014010040140100401  v17  000400000004000104000401aaaaaa02
    v18  00000400000000000000040000000001  v19  000000000000000000000000ebad6083
    v20  000000000000000000000000ebad6084  v21  000000000000000000000000ebad6085
    v22  000000000000000000000000ebad6086  v23  000000000000000000000000ebad6087
    v24  00000000000000000000000000000280  v25  00000000000000000000000000000000
    v26  0000000000000000ffffffffffffffff  v27  000000000000000000000000ebad608b
    v28  000000000000000000000000ebad608c  v29  000000000000000000000000ebad608d
    v30  000000000000000000000000ebad608e  v31  000000000000000000000000ebad608f
    fpsr 00000010  fpcr 00000000

backtrace:
    #00 pc 0000000000012ae0  /system/lib64/libpcre.so (pcre_exec+1460)
    #01 pc 000000000000ba20  /system/lib64/libselinux.so
    #02 pc 000000000000ae48  /system/lib64/libselinux.so (selabel_lookup+28)
    #03 pc 000000000000e440  /system/lib64/libselinux.so
    #04 pc 000000000000ebcc  /system/lib64/libselinux.so
    #05 pc 00000000000d3794  /system/lib64/libandroid_runtime.so
    #06 pc 00000000000bba68  /data/dalvik-cache/arm64/system@[email protected]
    
oat stack:
    #06  pc = 0x744d3a68  JNI Stub method
               CODE OFFSET = 0292a9bc, CODE SIZE = 292, FRAME SIZE = 128, 
METHOD_START = 0x744d39bc, c=1, add_stack=0
               
    #07  pc = 0x7559b008  boolean android.os.SELinux.restorecon(java.io.File)
               CODE OFFSET = 039f1fac, CODE SIZE = 440, FRAME SIZE = 112, 
METHOD_START = 0x7559afac, c=1, add_stack=0
               
    #08  pc = 0x75c7d2e4  void 
com.android.internal.content.NativeLibraryHelper.createNativeLibrarySubdir(java.io.File)
               CODE OFFSET = 040d3fac, CODE SIZE = 1280, FRAME SIZE = 96, 
METHOD_START = 0x75c7cfac, c=1, add_stack=0
               
   
 #09  pc = 0x75c7c698  int 
com.android.internal.content.NativeLibraryHelper.copyNativeBinariesForSupportedAbi(com.android.internal.content.NativeLibraryHelper$Handle,
 java.io.File, java.lang.String[], boolean)
               CODE OFFSET = 040d364c, CODE SIZE = 496, FRAME SIZE = 144, 
METHOD_START = 0x75c7c64c, c=1, add_stack=0
               
   
 #10  pc = 0x7f93de1d4c  android.content.pm.PackageParser$Package 
com.android.server.pm.PackageManagerService.scanPackageDirtyLI(android.content.pm.PackageParser$Package,
 int, int, long, android.os.UserHandle)
               CODE OFFSET = 00e3ebdc, CODE SIZE = 41632, FRAME SIZE = 512, 
METHOD_START = 0x7f93ddabdc, c=0, add_stack=0
               
   
 #11  pc = 0x7f93de4f20  android.content.pm.PackageParser$Package 
com.android.server.pm.PackageManagerService.scanPackageLI(android.content.pm.PackageParser$Package,
 int, int, long, android.os.UserHandle)
               CODE OFFSET = 00e48e9c, CODE SIZE = 336, FRAME SIZE = 144, 
METHOD_START = 0x7f93de4e9c, c=0, add_stack=0
               
   
 #12  pc = 0x7f93de6004  android.content.pm.PackageParser$Package 
com.android.server.pm.PackageManagerService.scanPackageLI(java.io.File, 
int, int, long, android.os.UserHandle)
               CODE OFFSET = 00e4900c, CODE SIZE = 9368, FRAME SIZE = 256, 
METHOD_START = 0x7f93de500c, c=0, add_stack=0
               
   
 #13  pc = 0x7f93db7284  android.content.pm.PackageParser$Package 
com.android.server.pm.PackageManagerService.access$2300(com.android.server.pm.PackageManagerService,
 java.io.File, int, int, long, android.os.UserHandle)
               CODE OFFSET = 00e1b20c, CODE SIZE = 176, FRAME SIZE = 128, 
METHOD_START = 0x7f93db720c, c=0, add_stack=0
               
    #14  pc = 0x7f93d99a7c  void 
com.android.server.pm.PackageManagerService$4.run()
               CODE OFFSET = 00dfd9fc, CODE SIZE = 976, FRAME SIZE = 144, 
METHOD_START = 0x7f93d999fc, c=0, add_stack=0
               
    #15  pc = 0x74e47ce8  void 
java.util.concurrent.ThreadPoolExecutor.runWorker(java.util.concurrent.ThreadPoolExecutor$Worker)
               CODE OFFSET = 0329eb7c, CODE SIZE = 928, FRAME SIZE = 144, 
METHOD_START = 0x74e47b7c, c=1, add_stack=0
    #16  pc = 0x74e50968  void 
java.util.concurrent.ThreadPoolExecutor$Worker.run()
               CODE OFFSET = 032a792c, CODE SIZE = 112, FRAME SIZE = 64, 
METHOD_START = 0x74e5092c, c=1, add_stack=0
               
               
----------------------------------------------------------------------------------------------
 
_______________________________________________
Seandroid-list mailing list
[email protected]
To unsubscribe, send email to [email protected].
To get help, send an email containing "help" to 
[email protected].

Reply via email to