PCSX-Rearmed Crash when loading PBP (Android)

Hi All, I seem to be running into an issue that I can’t seem that anyone else has commented on as of yet. When I attempt to load a .PBP file against the latest PCSX-Rearmed core for Android, RetroArch crashes. I’ve tried two of my .pbp files with no luck. I can get it to load ZIP archives of my BIN/CUE files fine. Of course, with my Windows version of RetroArch, the Mednafen core doesn’t load ZIP archives of BIN/CUE files, but does load PBP files fine. I’m trying to use one format for both, and getting the pbp file to run on Android would be ideal.

I’ve done some debugging logging and though I won’t post the whole shebang here, here’s a few lines of where it crashes. Thanks for any input!

[ 03-19 10:43:21.819 16973:16995 I/PCSX ] plugin: plugins/builtin_pad

[ 03-19 10:43:21.819 16973:16995 I/PCSX ] Plugins loaded.

[ 03-19 10:43:21.819 16973:16995 I/PCSX ] Loaded CD Image: /storage/0000-0000/Roms/PlayStation/Persona 2 - Eternal Punishment.pbp

[ 03-19 10:43:21.819 16973:16995 F/libc ] Fatal signal 11 (SIGSEGV), code 1, fault addr 0x20 in tid 16995 (Thread-5)

[ 03-19 10:43:21.820 606: 606 W/ ] debuggerd: handling request: pid=16973 uid=10202 gid=10202 tid=16995

[ 03-19 10:43:21.827 864: 864 E/audit ] type=1400 audit(1489934601.816:14315): avc: denied { search } for pid=17013 comm=“debuggerd” name=“com.retroarch” dev=“dm-1” ino=458264 scontext=u:r:debuggerd:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SECMOBILE_7.0_0002

[ 03-19 10:43:21.827 864: 864 E/audit ] type=1300 audit(1489934601.816:14315): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f1517700 a2=20000 a3=0 items=0 ppid=606 pid=17013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=“debuggerd” exe="/system/bin/debuggerd" subj=u:r:debuggerd:s0 key=(null)

[ 03-19 10:43:21.827 864: 864 E/audit ] type=1327 audit(1489934601.816:14315): proctitle="/system/bin/debuggerd"

This is the only vaild data, it just means invalid ram access, this could be anything.

We need a stack trace, it has user readable names followed by hex numbers. Here is an example.(from a mac retroarch crash)

Thread 0 Crashed:: Dispatch queue: com.apple.main-thread 0 libsystem_c.dylib 0x00007fffb4722b52 strlen + 18 1 x64_libretro.dylib 0x0000000114424ccf util_concat + 271 2 x64_libretro.dylib 0x000000011460cfff archdep_default_sysfile_pathlist + 319 3 x64_libretro.dylib 0x000000011440fa69 sysfile_init + 9 4 x64_libretro.dylib 0x0000000114402ad9 main_program + 425 5 x64_libretro.dylib 0x000000011460cca9 skel_main + 9 6 x64_libretro.dylib 0x00000001145c647f pre_main + 799 7 x64_libretro.dylib 0x00000001145c719f retro_run + 95 8 libretro.RetroArch 0x000000010004b6f5 core_run + 75 9 libretro.RetroArch 0x000000010004eed8 runloop_iterate + 3221 10 libretro.RetroArch 0x000000010000400e -[RetroArch_OSX rarch_main] + 61 11 com.apple.Foundation 0x00007fffa0bf888a __NSThreadPerformPerform + 326 12 com.apple.CoreFoundation 0x00007fff9f1b4981 CFRUNLOOP_IS_CALLING_OUT_TO_A_SOURCE0_PERFORM_FUNCTION + 17 13 com.apple.CoreFoundation 0x00007fff9f1959f7 __CFRunLoopDoSources0 + 423 14 com.apple.CoreFoundation 0x00007fff9f194f76 __CFRunLoopRun + 934 15 com.apple.CoreFoundation 0x00007fff9f194974 CFRunLoopRunSpecific + 420 16 com.apple.HIToolbox 0x00007fff9e720a5c RunCurrentEventLoopInMode + 240 17 com.apple.HIToolbox 0x00007fff9e720799 ReceiveNextEventCommon + 184 18 com.apple.HIToolbox 0x00007fff9e7206c6 _BlockUntilNextEventMatchingListInModeWithFilter + 71 19 com.apple.AppKit 0x00007fff9ccc65b4 _DPSNextEvent + 1120 20 com.apple.AppKit 0x00007fff9d440d6b -[NSApplication(NSEvent) _nextEventMatchingEventMask:untilDate:inMode:dequeue:] + 2789 21 com.apple.AppKit 0x00007fff9ccbaf35 -[NSApplication run] + 926 22 com.apple.AppKit 0x00007fff9cc85850 NSApplicationMain + 1237 23 libretro.RetroArch 0x00000001000019e4 start + 52

Thank you for the reply! Apologies on not getting back earlier, it’s been a heck of a month. Is this more what you are looking for? If not, just let me know, if possible, how to set up debugging properly, and I can run an additional trace.

04-19 12:11:32.376 11095 11119 I PCSX : Loaded CD Image: /storage/0000-0000/ROMS/PlayStation/eboot.pbp 04-19 12:11:32.377 11095 11119 F libc : Fatal signal 11 (SIGSEGV), code 1, fault addr 0x20 in tid 11119 (Thread-5) 04-19 12:11:32.377 605 605 W : debuggerd: handling request: pid=11095 uid=10202 gid=10202 tid=11119 04-19 12:11:32.387 862 862 E audit : type=1400 audit(1492618292.372:712): avc: denied { search } for pid=11153 comm=“debuggerd” name=“com.retroarch” dev=“dm-1” ino=458264 scontext=u:r:debuggerd:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SECMOBILE_7.0_0002 04-19 12:11:32.387 862 862 E audit : type=1300 audit(1492618292.372:712): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f3817700 a2=20000 a3=0 items=0 ppid=605 pid=11153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=“debuggerd” exe="/system/bin/debuggerd" subj=u:r:debuggerd:s0 key=(null) 04-19 12:11:32.387 862 862 E audit : type=1327 audit(1492618292.372:712): proctitle="/system/bin/debuggerd" 04-19 12:11:32.387 862 862 E audit : type=1320 audit(1492618292.372:712): 04-19 12:11:32.423 1606 2426 D InputReader: Input event(9): value=0 when=782101153000 04-19 12:11:32.427 1606 2425 I InputDispatcher: Delivering key to (11095): action: 0x1 (0) 04-19 12:11:32.459 11153 11153 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 04-19 12:11:32.460 11153 11153 F DEBUG : Build fingerprint: ‘samsung/hero2qlteuc/hero2qlteatt:7.0/NRD90M/G935AUCS4BQC2:user/release-keys’ 04-19 12:11:32.460 11153 11153 F DEBUG : Revision: ‘15’ 04-19 12:11:32.460 11153 11153 F DEBUG : ABI: ‘arm’ 04-19 12:11:32.460 11153 11153 F DEBUG : pid: 11095, tid: 11119, name: Thread-5 >>> com.retroarch <<< 04-19 12:11:32.460 11153 11153 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x20 04-19 12:11:32.460 11153 11153 F DEBUG : r0 00000000 r1 00000001 r2 0000000a r3 e9052451 04-19 12:11:32.461 11153 11153 F DEBUG : r4 e9052451 r5 c314e97c r6 df420094 r7 c314d800 04-19 12:11:32.461 11153 11153 F DEBUG : r8 00000001 r9 0000000a sl 00000065 fp 0000000a 04-19 12:11:32.461 11153 11153 F DEBUG : ip c2a04ed0 sp df420020 lr c296d7e4 pc eb041892 cpsr 200b0030 04-19 12:11:32.463 862 862 E audit : type=1400 audit(1492618292.452:713): avc: denied { search } for pid=11153 comm=“debuggerd” name=“com.retroarch” dev=“dm-1” ino=458264 scontext=u:r:debuggerd:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SECMOBILE_7.0_0002 04-19 12:11:32.463 862 862 E audit : type=1300 audit(1492618292.452:713): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f3817700 a2=20000 a3=0 items=0 ppid=605 pid=11153 auid=4294967295 uid=1045 gid=1045 euid=1045 suid=1045 fsuid=1045 egid=1045 sgid=1045 fsgid=1045 tty=(none) ses=4294967295 comm=“debuggerd” exe="/system/bin/debuggerd" subj=u:r:debuggerd:s0 key=(null) 04-19 12:11:32.463 862 862 E audit : type=1327 audit(1492618292.452:713): proctitle="/system/bin/debuggerd" 04-19 12:11:32.463 862 862 E audit : type=1320 audit(1492618292.452:713): 04-19 12:11:32.470 11153 11153 F DEBUG : 04-19 12:11:32.470 11153 11153 F DEBUG : backtrace: 04-19 12:11:32.471 11153 11153 F DEBUG : #00 pc 00051892 /system/lib/libc.so (fread+69) 04-19 12:11:32.471 11153 11153 F DEBUG : #01 pc 000c67e0 /data/data/com.retroarch/cores/pcsx_rearmed_libretro_android.so 04-19 12:11:32.471 11153 11153 F DEBUG : #02 pc 00115eec /data/data/com.retroarch/cores/pcsx_rearmed_libretro_android.so 04-19 12:11:32.471 11153 11153 F DEBUG : #03 pc 00116940 /data/data/com.retroarch/cores/pcsx_rearmed_libretro_android.so 04-19 12:11:32.471 11153 11153 F DEBUG : #04 pc 0011a824 /data/data/com.retroarch/cores/pcsx_rearmed_libretro_android.so 04-19 12:11:32.471 11153 11153 F DEBUG : #05 pc 00233140 /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so 04-19 12:11:32.471 11153 11153 F DEBUG : #06 pc 00198c44 /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so (content_init+1612) 04-19 12:11:32.471 11153 11153 F DEBUG : #07 pc 0025731c /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so 04-19 12:11:32.471 11153 11153 F DEBUG : #08 pc 000dff90 /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so (command_event+4676) 04-19 12:11:32.471 11153 11153 F DEBUG : #09 pc 0014f450 /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so (retroarch_main_init+6420) 04-19 12:11:32.471 11153 11153 F DEBUG : #10 pc 00197144 /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so 04-19 12:11:32.471 11153 11153 F DEBUG : #11 pc 00197f44 /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so (task_push_load_content_with_new_core_from_menu+420) 04-19 12:11:32.471 11153 11153 F DEBUG : #12 pc 00247754 /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so 04-19 12:11:32.471 11153 11153 F DEBUG : #13 pc 00246f54 /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so 04-19 12:11:32.471 11153 11153 F DEBUG : #14 pc 001c7aa0 /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so (menu_entry_action+300) 04-19 12:11:32.471 11153 11153 F DEBUG : #15 pc 001e27bc /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so (generic_menu_iterate+1176) 04-19 12:11:32.471 11153 11153 F DEBUG : #16 pc 001266c0 /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so (menu_driver_ctl+4804) 04-19 12:11:32.471 11153 11153 F DEBUG : #17 pc 0014b974 /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so (runloop_iterate+1104) 04-19 12:11:32.471 11153 11153 F DEBUG : #18 pc 0014b3ac /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so (rarch_main+500) 04-19 12:11:32.471 11153 11153 F DEBUG : #19 pc 0022cd90 /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so 04-19 12:11:32.471 11153 11153 F DEBUG : #20 pc 00184e78 /data/app/com.retroarch-2/lib/arm/libretroarch-activity.so 04-19 12:11:32.472 11153 11153 F DEBUG : #21 pc 000471c3 /system/lib/libc.so (_ZL15__pthread_startPv+22) 04-19 12:11:32.472 11153 11153 F DEBUG : #22 pc 00019d99 /system/lib/libc.so (__start_thread+6) 04-19 12:11:33.356 11153 11153 E : ro.debug_level = 0x4f4c 04-19 12:11:33.356 11153 11153 E : sys.mobilecare.preload = false 04-19 12:11:33.361 862 862 E audit : type=1701 audit(1492618293.342:714): auid=4294967295 uid=10202 gid=10202 ses=4294967295 subj=u:r:untrusted_app:s0:c512,c768 pid=11119 comm=“Thread-5” exe="/system/bin/app_process32" sig=11 04-19 12:11:33.363 1606 11154 W ActivityManager: Force finishing activity com.retroarch/.browser.retroactivity.RetroActivityFuture 04-19 12:11:33.363 1606 11154 W MultiScreenManagerService: moveTaskBackToDisplayIfNeeded(): root is not base activity 04-19 12:11:33.366 605 605 W : debuggerd: resuming target 11095

PS, with additional troubleshooting regarding ZIPs and Windows RetroArch, it appears that the reason it doesn’t load ZIP files successfully is that is only unzips the .cue file into the temp directory, not the .bin as well. Then, it tries to load the .bin but can’t find it, so it fails.

1 Like

Just following up if my additional info was helpful at all, or if there’s more I can contribute to help troubleshoot / identify the issue. Thanks!

Hi there, just another bump. If my info isn’t useful or no one is interested in this (or if it’s been addressed) let me know. Thanks.

do not zip cd-images

Hi Wertz,

Perhaps you can answer part #2 of my question? I’m trying to use one file format for both Windows and Android. Windows has an issue with ZIPs, which I’m assuming from your response will not get fixed, and the other is that Android appears to have an issue with .pbp files. I’d like to use one format between the two.