Hello, Since I'm not good at english, so I can make some mistakes. This is HAN who studies Android Lollipop developing. When my custom Lollipop image is downloaded and boot firstly, I got an issue at libselinux.so and libpcre.so.
I've got segmentation fault as below. I guess this segfault came from when SELinux was labelling some packages. I've done debug as below backtrace. It says the segfault was started from pcre_exec.c(line 6844). #Debug Info 0000000000012ae0 : android/external/pcre/dist/pcre_exec.c:6844 Link -> http://androidxref.com/5.1.0_r1/xref/external/pcre/dist/pcre_exec.c#6844 000000000000ba20 : android/external/libselinux/src/label_file.c:636 Link -> http://androidxref.com/5.1.0_r1/xref/external/libselinux/src/label_file.c#636 000000000000ae48 : android/external/libselinux/src/label.c:102 Link -> http://androidxref.com/5.1.0_r1/xref/external/libselinux/src/label.c#102 000000000000e440 : android/external/libselinux/src/android.c:1134 Link -> http://androidxref.com/5.1.0_r1/xref/external/libselinux/src/android.c#1134 000000000000ebcc : android/external/libselinux/src/android.c:1213 Link -> http://androidxref.com/5.1.0_r1/xref/external/libselinux/src/android.c#1213 This issue appeared only one time and I wanted to add some debug logs. so I've tried to reproduce over 20 times,it doesn't appear though. Is there any idea which part should I look at? Thank you in advance. ----------------------------------------------------------------------------------------------------- pid: 1197, tid: 3307, name: pool-6-thread-2 >>> system_server <<< signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x61767265736576 x0 0000007f8f76dc75 x1 0000000000000014 x2 0000000000000000 x3 0000000000000000 x4 0000000000000000 x5 0000000000000000 x6 0000007f8ffbbd44 x7 0000000000000000 x8 0000007f8f76dc74 x9 0000007f8ffbbd18 x10 7461767265736572 x11 0000000000000000 x12 0000000000000000 x13 0000000000000000 x14 0000000000000000 x15 0000000000000014 x16 0000000000000001 x17 0000000000000000 x18 0000000000000014 x19 0000007f8f76dc96 x20 0000000000000000 x21 0000000000000000 x22 0000007f8f76dc75 x23 0000007fa54693c0 x24 0000000000000000 x25 0000000000000021 x26 0000007f8f76dc75 x27 0000000000000000 x28 0000007fa5469430 x29 0000007f8ffbbbf0 x30 0000000055555556 sp 0000007f8ffbbbf0 pc 0000007fae022ae0 pstate 0000000080000000 v0 2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f v1 00000000000000000000000014ba5000 v2 474c2f64616f6c6572702f617461642f v3 80200802802008028020080200000002 v4 00000000000000000000000000000000 v5 00000000000000000000000000000000 v6 00000400000000000000040000000001 v7 80200802802008028020080280200802 v8 00000000000000000000007f8f76dc96 v9 00000000000000000000000000000000 v10 00000000000000000000007f8ffbbd44 v11 00000000000000007461767265736572 v12 00000000000000000000000000000000 v13 00000000000000000000000000000000 v14 00000000000000000000007f8f76dc74 v15 00000000000000000000000000000000 v16 40100401401004014010040140100401 v17 000400000004000104000401aaaaaa02 v18 00000400000000000000040000000001 v19 000000000000000000000000ebad6083 v20 000000000000000000000000ebad6084 v21 000000000000000000000000ebad6085 v22 000000000000000000000000ebad6086 v23 000000000000000000000000ebad6087 v24 00000000000000000000000000000280 v25 00000000000000000000000000000000 v26 0000000000000000ffffffffffffffff v27 000000000000000000000000ebad608b v28 000000000000000000000000ebad608c v29 000000000000000000000000ebad608d v30 000000000000000000000000ebad608e v31 000000000000000000000000ebad608f fpsr 00000010 fpcr 00000000 backtrace: #00 pc 0000000000012ae0 /system/lib64/libpcre.so (pcre_exec+1460) #01 pc 000000000000ba20 /system/lib64/libselinux.so #02 pc 000000000000ae48 /system/lib64/libselinux.so (selabel_lookup+28) #03 pc 000000000000e440 /system/lib64/libselinux.so #04 pc 000000000000ebcc /system/lib64/libselinux.so #05 pc 00000000000d3794 /system/lib64/libandroid_runtime.so #06 pc 00000000000bba68 /data/dalvik-cache/arm64/system@[email protected] oat stack: #06 pc = 0x744d3a68 JNI Stub method CODE OFFSET = 0292a9bc, CODE SIZE = 292, FRAME SIZE = 128, METHOD_START = 0x744d39bc, c=1, add_stack=0 #07 pc = 0x7559b008 boolean android.os.SELinux.restorecon(java.io.File) CODE OFFSET = 039f1fac, CODE SIZE = 440, FRAME SIZE = 112, METHOD_START = 0x7559afac, c=1, add_stack=0 #08 pc = 0x75c7d2e4 void com.android.internal.content.NativeLibraryHelper.createNativeLibrarySubdir(java.io.File) CODE OFFSET = 040d3fac, CODE SIZE = 1280, FRAME SIZE = 96, METHOD_START = 0x75c7cfac, c=1, add_stack=0 #09 pc = 0x75c7c698 int com.android.internal.content.NativeLibraryHelper.copyNativeBinariesForSupportedAbi(com.android.internal.content.NativeLibraryHelper$Handle, java.io.File, java.lang.String[], boolean) CODE OFFSET = 040d364c, CODE SIZE = 496, FRAME SIZE = 144, METHOD_START = 0x75c7c64c, c=1, add_stack=0 #10 pc = 0x7f93de1d4c android.content.pm.PackageParser$Package com.android.server.pm.PackageManagerService.scanPackageDirtyLI(android.content.pm.PackageParser$Package, int, int, long, android.os.UserHandle) CODE OFFSET = 00e3ebdc, CODE SIZE = 41632, FRAME SIZE = 512, METHOD_START = 0x7f93ddabdc, c=0, add_stack=0 #11 pc = 0x7f93de4f20 android.content.pm.PackageParser$Package com.android.server.pm.PackageManagerService.scanPackageLI(android.content.pm.PackageParser$Package, int, int, long, android.os.UserHandle) CODE OFFSET = 00e48e9c, CODE SIZE = 336, FRAME SIZE = 144, METHOD_START = 0x7f93de4e9c, c=0, add_stack=0 #12 pc = 0x7f93de6004 android.content.pm.PackageParser$Package com.android.server.pm.PackageManagerService.scanPackageLI(java.io.File, int, int, long, android.os.UserHandle) CODE OFFSET = 00e4900c, CODE SIZE = 9368, FRAME SIZE = 256, METHOD_START = 0x7f93de500c, c=0, add_stack=0 #13 pc = 0x7f93db7284 android.content.pm.PackageParser$Package com.android.server.pm.PackageManagerService.access$2300(com.android.server.pm.PackageManagerService, java.io.File, int, int, long, android.os.UserHandle) CODE OFFSET = 00e1b20c, CODE SIZE = 176, FRAME SIZE = 128, METHOD_START = 0x7f93db720c, c=0, add_stack=0 #14 pc = 0x7f93d99a7c void com.android.server.pm.PackageManagerService$4.run() CODE OFFSET = 00dfd9fc, CODE SIZE = 976, FRAME SIZE = 144, METHOD_START = 0x7f93d999fc, c=0, add_stack=0 #15 pc = 0x74e47ce8 void java.util.concurrent.ThreadPoolExecutor.runWorker(java.util.concurrent.ThreadPoolExecutor$Worker) CODE OFFSET = 0329eb7c, CODE SIZE = 928, FRAME SIZE = 144, METHOD_START = 0x74e47b7c, c=1, add_stack=0 #16 pc = 0x74e50968 void java.util.concurrent.ThreadPoolExecutor$Worker.run() CODE OFFSET = 032a792c, CODE SIZE = 112, FRAME SIZE = 64, METHOD_START = 0x74e5092c, c=1, add_stack=0 ----------------------------------------------------------------------------------------------
_______________________________________________ Seandroid-list mailing list [email protected] To unsubscribe, send email to [email protected]. To get help, send an email containing "help" to [email protected].
