New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 756574 link

Starred by 1 user

Issue metadata

Status: Duplicate
Owner:
Last visit > 30 days ago
Closed: Sep 2017
EstimatedDays: ----
NextAction: ----
OS: Android
Pri: 3
Type: ----



Sign in to add a comment

breakpad syscalls segfaults on x86 clang builds

Project Member Reported by sandv@google.com, Aug 17 2017

Issue description

Device name: Nexus Player & Emulator
Operating system: Android 7.1.1

This can be reproduced running breakpad_unittests on an x86 device or emulator
This does not happen on arm devices/emulators or an older x86 build using gcc
Line that is responsible: 
https://chromium.googlesource.com/breakpad/breakpad/src/+/master/client/linux/handler/exception_handler.cc#680

it seems other LSS syscalls segfault as well, not only sys_prctl



This is what is the crash seen on the logcat:

08-01 17:13:45.715  3211  3211 W crash_dump32: type=1400 audit(0.0:131): avc: denied { getattr } for path="/data/local/tmp" dev="mmcblk0p11" ino=65154 scontext=u:r:crash_dump:s0 tcontext=u:object_r:shell_data_file:s0 tclass=dir permissive=0
08-01 17:13:45.727  3212  3212 W crash_dump32: type=1400 audit(0.0:132): avc: denied { search } for name="tmp" dev="mmcblk0p11" ino=65154 scontext=u:r:crash_dump:s0 tcontext=u:object_r:shell_data_file:s0 tclass=dir permissive=0
08-01 17:13:45.735  3212  3212 I crash_dump32: obtaining output fd from tombstoned, type: kDebuggerdTombstone
08-01 17:13:45.736   270   270 I /system/bin/tombstoned: received crash request for pid 3209
08-01 17:13:45.737  3212  3212 I crash_dump32: performing dump of process 3209 (target tid = 3209)
08-01 17:13:45.738  3212  3212 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
08-01 17:13:45.738  3212  3212 F DEBUG   : Build fingerprint: 'google/fugu/fugu:8.0.1/MASTER/sandv06131426:userdebug/dev-keys'
08-01 17:13:45.738  3212  3212 F DEBUG   : Revision: '0'
08-01 17:13:45.739  3212  3212 F DEBUG   : ABI: 'x86'
08-01 17:13:45.739  3212  3212 F DEBUG   : pid: 3209, tid: 3209, name: breakpad_unitte  >>> /data/local/tmp/breakpad_unittests__dist/breakpad_unittests <<<
08-01 17:13:45.740  3212  3212 F DEBUG   : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0
08-01 17:13:45.740  3212  3212 F DEBUG   : Cause: null pointer dereference
08-01 17:13:45.741  3212  3212 F DEBUG   :     eax 00000000  ebx f55bfbb0  ecx 00000001  edx 00000001
08-01 17:13:45.741  3212  3212 F DEBUG   :     esi ff9c4008  edi f52f7d5c
08-01 17:13:45.741  3212  3212 F DEBUG   :     xcs 00000023  xds 0000002b  xes 0000002b  xfs 00000003  xss 0000002b
08-01 17:13:45.741  3212  3212 F DEBUG   :     eip f52f7d4a  ebp ff9c4098  esp ff9c3fa0  flags 00000202
08-01 17:13:45.739  3212  3212 W crash_dump32: type=1400 audit(0.0:134): avc: denied { search } for name="tmp" dev="mmcblk0p11" ino=65154 scontext=u:r:crash_dump:s0 tcontext=u:object_r:shell_data_file:s0 tclass=dir permissive=0
08-01 17:13:45.746  3212  3212 F DEBUG   : 
08-01 17:13:45.746  3212  3212 F DEBUG   : backtrace:
08-01 17:13:45.747  3212  3212 F DEBUG   :     #00 pc 00016d4a  /data/local/tmp/breakpad_unittests__dist/breakpad_unittests
08-01 17:13:45.747  3212  3212 F DEBUG   :     #01 pc 00017404  /data/local/tmp/breakpad_unittests__dist/breakpad_unittests
08-01 17:13:45.747  3212  3212 F DEBUG   :     #02 pc 001847ae  /data/local/tmp/breakpad_unittests__dist/breakpad_unittests
08-01 17:13:45.747  3212  3212 F DEBUG   :     #03 pc 00184725  /data/local/tmp/breakpad_unittests__dist/breakpad_unittests
08-01 17:13:45.747  3212  3212 F DEBUG   :     #04 pc 00184e7b  /data/local/tmp/breakpad_unittests__dist/breakpad_unittests
08-01 17:13:45.747  3212  3212 F DEBUG   :     #05 pc 001853ed  /data/local/tmp/breakpad_unittests__dist/breakpad_unittests
08-01 17:13:45.747  3212  3212 F DEBUG   :     #06 pc 00189c19  /data/local/tmp/breakpad_unittests__dist/breakpad_unittests
08-01 17:13:45.747  3212  3212 F DEBUG   :     #07 pc 00189a12  /data/local/tmp/breakpad_unittests__dist/breakpad_unittests
08-01 17:13:45.747  3212  3212 F DEBUG   :     #08 pc 0018995a  /data/local/tmp/breakpad_unittests__dist/breakpad_unittests
08-01 17:13:45.747  3212  3212 F DEBUG   :     #09 pc 0018f475  /data/local/tmp/breakpad_unittests__dist/breakpad_unittests
08-01 17:13:45.747  3212  3212 F DEBUG   :     #10 pc 0018f44b  /data/local/tmp/breakpad_unittests__dist/breakpad_unittests
08-01 17:13:45.747  3212  3212 F DEBUG   :     #11 pc 00015f26  /system/lib/libc.so (__libc_init+102)
08-01 17:13:45.747  3212  3212 F DEBUG   :     #12 pc 001b7b98  /data/local/tmp/breakpad_unittests__dist/breakpad_unittests
08-01 17:13:45.747  3212  3212 F DEBUG   :     #13 pc 00000001  <unknown>
08-01 17:13:45.769   323   466 W NativeCrashListener: Couldn't find ProcessRecord for pid 3209


 
Labels: Stability-Sheriff-Android
Labels: -Stability-Sheriff-Android
Owner: thakis@chromium.org
Status: Assigned (was: Unconfirmed)
Owner: sandv@chromium.org
Isn't that just a dupe? Is this still happening at trunk? What if you revert https://chromium-review.googlesource.com/633865

Comment 5 by sandv@chromium.org, Sep 6 2017

Mergedinto: 751188
Status: Duplicate (was: Assigned)

Sign in to add a comment