Open
Description
After using KernelPatch 0.11.0-dev to patch the boot.img in the Android 15 Beta AP41.240823.009 build on the Pixel 7 Pro, a boot loop occurred .
Here is my Patch log :
[+] kernel image_size: 0x0315aa00
[+] kernel uefi header: true
[+] kernel load_offset: 0x00000000
[+] kernel kernel_size: 0x03200000
[+] kernel page_shift: 12
[+] new kernel image ...
[+] linux_banner 1: Linux version 5.10.214-android13-4-00002-g4c868a6e89f5-ab12097184 (build-user@build-host) (Android (8508608, based on r450784e) clang version 14.0.7 (https://android.googlesource.com/toolchain/llvm-project 4c603efb0cca074e9238af8b4106c30add4418f6), LLD 14.0.7) #1 SMP PREEMPT Tue Jul 16 15:34:35 UTC 2024
[+] linux_banner offset: 0x24dcaa8
[+] kernel version major: 5, minor: 10, patch: 214
[+] kallsyms_token_table offset: 0x02251460
[+] endian: little
[+] kallsyms_token_index offset: 0x02251800
[+] arm64 relocation kernel_va: 0xffffffffffffffff
[?] can't find arm64 relocation table
[+] kallsyms_markers range: [0x02250b78, 0x0225145c), count: 0x00000239
[+] approximate kallsyms_offsets range: [0x01fbf228, 0x0204d504) count: 0x000238b7
[+] kallsyms_names offset: 0x0204d510
[?] can't find kallsyms_num_syms, try: 0x000238ad
[+] names table linux_banner index: 0x00017ab4
[+] linux_banner index: 0
[+] kallsyms_offsets offset: 0x01fbf228
[+] pid_vnr: type: T, offset: 0x00174ab4
[+] pid_vnr verfied sp_el0, insn: 0xd5384108
[+] layout kimg: 0x0,0x315aa00, kpimg: 0x315b000,0x27f80, extra: 0x3182f80,0x80, end: 0x3183000, start: 0x3200000
[+] kpimg version: a07
[+] kpimg compile time: 12:16:35 May 1 2024
[+] kpimg config: android, release
[+] tcp_init_sock: type: T, offset: 0x0140df60
[+] map_start: 0x140df60, max_size: 0x800
[+] kallsyms_lookup_name: type: T, offset: 0x00293930
[+] printk: type: T, offset: 0x001ea15c
[+] memblock_reserve: type: T, offset: 0x004ae3cc
[+] memblock_free: type: T, offset: 0x004acb0c
[+] memblock_mark_nomap: type: T, offset: 0x004ae6e0
[+] memblock_phys_alloc_try_nid: type: T, offset: 0x02cd60b4
[?] no symbol: memblock_virt_alloc_try_nid
[+] memblock_alloc_try_nid: type: T, offset: 0x02cd6388
[+] panic: type: T, offset: 0x0012aeec
[+] rest_init: type: T, offset: 0x01837194
[+] kernel_init: type: t, offset: 0x01837274
[?] no symbol: report_cfi_failure
[?] no symbol: __cfi_slowpath_diag
[+] __cfi_slowpath: type: T, offset: 0x003bc9b8
[+] copy_process: type: t, offset: 0x00123cb4
[+] avc_denied: type: t, offset: 0x0089a118
[+] slow_avc_audit: type: T, offset: 0x008989b8
[+] input_handle_event: type: t, offset: 0x00f282a8
[+] superkey: 881633an
[+] paging_init: type: T, offset: 0x02cc19fc
[+] patch done: kernel
It doesn't seem to have any issues.
Another piece of information is that when using apatch with kernelpatch 0.11.0-pre, it reports the error:
patch kernel error: 139
I'm not sure if this is an error code from apatch or kernelpatch, so I'm posting it here.
Thank you all for your contributions to the open-source community .
Can anyone else help?
Metadata
Assignees
Labels
No labels