I'm seeing this native crash with the following stack trace.
I have checked other questions similar to this but doesn't found anything similar solution as I have not used TextureView or CardView and I am also sure that it is not due to any library dependencies.
Can anyone have clue, Please?
#00 pc 000000000004ae30 /system/lib/libc.so (tgkill+12)
#01 pc 00000000000485c3 /system/lib/libc.so (pthread_kill+34)
#02 pc 000000000001de5d /system/lib/libc.so (raise+10)
#03 pc 0000000000019561 /system/lib/libc.so (__libc_android_abort+34)
#04 pc 00000000000171a0 /system/lib/libc.so (abort+4)
#05 pc 000000000031e8fd /system/lib/libart.so (_ZN3art7Runtime5AbortEPKc+328)
#06 pc 00000000000b56d7 /system/lib/libart.so (_ZN3art10LogMessageD2Ev+1134)
#07 pc 00000000001be831 /system/lib/libart.so (_ZN3art22IndirectReferenceTable3AddEjPNS_6mirror6ObjectE+308)
#08 pc 000000000023c917 /system/lib/libart.so (_ZN3art9JavaVMExt16AddWeakGlobalRefEPNS_6ThreadEPNS_6mirror6ObjectE+46)
#09 pc 00000000002822ef /system/lib/libart.so (_ZN3art3JNI16NewWeakGlobalRefEP7_JNIEnvP8_jobject+418)
#10 pc 0000000000090abb /system/lib/libandroid_runtime.so
#11 pc 00000000029950cd /system/framework/arm/boot-framework.oat (android.view.RenderNode.nCreate+96)
#12 pc 0000000002994e23 /system/framework/arm/boot-framework.oat (android.view.RenderNode.<init>+70)
#13 pc 0000000002994f91 /system/framework/arm/boot-framework.oat (android.view.RenderNode.create+68)
#14 pc 00000000027526e3 /system/framework/arm/boot-framework.oat (android.view.View.<init>+750)
#15 pc 0000000002752a57 /system/framework/arm/boot-framework.oat (android.view.View.<init>+66)
#16 pc 0000000002a6d831 /system/framework/arm/boot-framework.oat (android.widget.TextView.<init>+148)
#17 pc 0000000002a6d765 /system/framework/arm/boot-framework.oat (android.widget.TextView.<init>+64)
#18 pc 0000000002a6d6f1 /system/framework/arm/boot-framework.oat (android.widget.TextView.<init>+60)
#19 pc 0000000002a6d683 /system/framework/arm/boot-framework.oat (android.widget.TextView.<init>+46)
#20 pc 000000000003bd5b /dev/ashmem/dalvik-jit-code-cache_17678_17678 (deleted)
Related
I have been seeing several such crashes only on Android 8 with no sensible stack trace.
How to identify the root cause? There seems to be no way to identify the library causing this failure.
backtrace:
#00 pc 0000000000263fec /system/lib64/libart.so (_ZN3art6mirror5Class24ResolvedMethodAccessTestILb1ELb1ELNS_10InvokeTypeE0EEEbNS_6ObjPtrIS1_EEPNS_9ArtMethodEjNS4_INS0_8DexCacheEEE+352)
#01 pc 00000000002975fc /system/lib64/libart.so (_ZN3art11interpreterL8DoInvokeILNS_10InvokeTypeE0ELb0ELb1EEEbPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+508)
#02 pc 000000000028c578 /system/lib64/libart.so (_ZN3art11interpreter17ExecuteSwitchImplILb1ELb0EEENS_6JValueEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameES2_b+36540)
#03 pc 000000000025d450 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+664)
#04 pc 0000000000263a74 /system/lib64/libart.so (_ZN3art11interpreter33ArtInterpreterToInterpreterBridgeEPNS_6ThreadEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+212)
#05 pc 000000000027cd68 /system/lib64/libart.so (_ZN3art11interpreter6DoCallILb0ELb1EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+1520)
#06 pc 0000000000295ca4 /system/lib64/libart.so (_ZN3art11interpreterL8DoInvokeILNS_10InvokeTypeE1ELb0ELb1EEEbPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+676)
#07 pc 000000000028c988 /system/lib64/libart.so (_ZN3art11interpreter17ExecuteSwitchImplILb1ELb0EEENS_6JValueEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameES2_b+37580)
#08 pc 000000000025d450 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+664)
#09 pc 0000000000263a74 /system/lib64/libart.so (_ZN3art11interpreter33ArtInterpreterToInterpreterBridgeEPNS_6ThreadEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+212)
#10 pc 000000000027c5d8 /system/lib64/libart.so (_ZN3art11interpreter6DoCallILb0ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+640)
#11 pc 00000000004f0bb8 /system/lib64/libart.so (MterpInvokeStatic+468)
#12 pc 00000000004f9914 /system/lib64/libart.so (ExecuteMterpImpl+14612)
#13 pc 000000000025d374 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+444)
#14 pc 0000000000263a74 /system/lib64/libart.so (_ZN3art11interpreter33ArtInterpreterToInterpreterBridgeEPNS_6ThreadEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+212)
#15 pc 000000000027c5d8 /system/lib64/libart.so (_ZN3art11interpreter6DoCallILb0ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+640)
#16 pc 00000000004f27b8 /system/lib64/libart.so (MterpInvokeVirtualQuick+680)
#17 pc 00000000004fd514 /system/lib64/libart.so (ExecuteMterpImpl+29972)
#18 pc 000000000025d374 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+444)
#19 pc 00000000004e3514 /system/lib64/libart.so (artQuickToInterpreterBridge+1468)
#20 pc 000000000051121c /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
#21 pc 000000000083cf74 /data/app/com.example.test-J16cmsw6mZ2mJRQy0VeYlQ==/oat/arm64/base.odex
We are observing a native crash on Samsung devices with Android 8.0 in Play Console for our app.
We have never been able to reproduce this crash ourselves.
The crash is occurring in the following devices
Galaxy S7(herolte) Galaxy S8(dreamlte) Galaxy A5(2017) Galaxy
A7(2018) Galaxy S9+ (star2LTE) Galaxy A7(2017) Galaxy S7 edge
(hero2lte)
The backtrace is
#00 pc 000000000006b488 /system/lib64/libc.so (tgkill+8)
#01 pc 000000000001dbd0 /system/lib64/libc.so (abort+88)
#02 pc 00000000004380f8 /system/lib64/libart.so (_ZN3art7Runtime5AbortEPKc+528)
#03 pc 0000000000438808 /system/lib64/libart.so (_ZN3art7Runtime7AborterEPKc+24)
#04 pc 000000000052383c /system/lib64/libart.so (_ZN7android4base10LogMessageD1Ev+900)
#05 pc 00000000004628fc /system/lib64/libart.so (_ZNK3art6Thread24AssertNoPendingExceptionEv+1144)
#06 pc 0000000000128120 /system/lib64/libart.so (_ZN3art11ClassLinker9FindClassEPNS_6ThreadEPKcNS_6HandleINS_6mirror11ClassLoaderEEE+64)
#07 pc 0000000000311364 /system/lib64/libart.so (_ZN3art3JNI9FindClassEP7_JNIEnvPKc+1432)
#08 pc 000000000002bed8 /system/lib64/libjavacrypto.so (_ZN9conscrypt6Errors24jniThrowRuntimeExceptionEP7_JNIEnvPKc+40)
#09 pc 000000000002c7a0 /system/lib64/libjavacrypto.so (_ZN9conscrypt6Errors25throwExceptionIfNecessaryEP7_JNIEnvPKcPFiS2_S4_E+732)
#10 pc 000000000001ff8c /system/lib64/libjavacrypto.so (_ZL29NativeCrypto_d2i_X509_CRL_bioP7_JNIEnvP7_jclassl+56)
#11 pc 000000000002de78 /system/framework/arm64/boot-conscrypt.oat (com.android.org.conscrypt.NativeCrypto.PEM_read_bio_PUBKEY [DEDUPED]+152)
#12 pc 0000000000509038 /system/lib64/libart.so (art_quick_invoke_static_stub+600)
#13 pc 00000000000d7fd8 /system/lib64/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+260)
#14 pc 00000000002826b0 /system/lib64/libart.so (_ZN3art11interpreter34ArtInterpreterToCompiledCodeBridgeEPNS_6ThreadEPNS_9ArtMethodEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+352)
#15 pc 000000000027cd78 /system/lib64/libart.so (_ZN3art11interpreter6DoCallILb0ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+672)
#16 pc 00000000004f1c04 /system/lib64/libart.so (MterpInvokeStatic+468)
#17 pc 00000000004fa994 /system/lib64/libart.so (ExecuteMterpImpl+14612)
#18 pc 000000000025daf4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+444)
#19 pc 00000000004e4560 /system/lib64/libart.so (artQuickToInterpreterBridge+1468)
#20 pc 000000000051221c /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
#21 pc 0000000000057814 /system/framework/arm64/boot-conscrypt.oat (com.android.org.conscrypt.OpenSSLX509CertificateFactory$2.fromX509DerInputStream+52)
#22 pc 00000000000575e0 /system/framework/arm64/boot-conscrypt.oat (com.android.org.conscrypt.OpenSSLX509CertificateFactory$1.fromX509DerInputStream [DEDUPED]+48)
#23 pc 0000000000056ef0 /system/framework/arm64/boot-conscrypt.oat (com.android.org.conscrypt.OpenSSLX509CertificateFactory$Parser.generateItem+944)
#24 pc 0000000000057b9c /system/framework/arm64/boot-conscrypt.oat (com.android.org.conscrypt.OpenSSLX509CertificateFactory.engineGenerateCRL+76)
#25 pc 00000000003c0e34 /system/framework/arm64/boot.oat (java.security.cert.CertificateFactory.generateCRL+68)
#26 pc 0000000000508d84 /system/lib64/libart.so (art_quick_invoke_stub+580)
#27 pc 00000000000d7f9c /system/lib64/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+200)
#28 pc 00000000002826b0 /system/lib64/libart.so (_ZN3art11interpreter34ArtInterpreterToCompiledCodeBridgeEPNS_6ThreadEPNS_9ArtMethodEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+352)
#29 pc 000000000027cd78 /system/lib64/libart.so (_ZN3art11interpreter6DoCallILb0ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+672)
#30 pc 00000000004f3804 /system/lib64/libart.so (MterpInvokeVirtualQuick+680)
#31 pc 00000000004fe594 /system/lib64/libart.so (ExecuteMterpImpl+29972)
#32 pc 000000000025daf4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+444)
#33 pc 00000000004e4560 /system/lib64/libart.so (artQuickToInterpreterBridge+1468)
#34 pc 000000000051221c /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
#35 pc 00000000003bf7c4 /system/framework/arm64/boot.oat (java.security.cert.CertStore.getCRLs+68)
#36 pc 0000000000508d84 /system/lib64/libart.so (art_quick_invoke_stub+580)
#37 pc 00000000000d7f9c /system/lib64/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+200)
#38 pc 00000000002826b0 /system/lib64/libart.so (_ZN3art11interpreter34ArtInterpreterToCompiledCodeBridgeEPNS_6ThreadEPNS_9ArtMethodEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+352)
#39 pc 000000000027cd78 /system/lib64/libart.so (_ZN3art11interpreter6DoCallILb0ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+672)
#40 pc 00000000004f3804 /system/lib64/libart.so (MterpInvokeVirtualQuick+680)
#41 pc 00000000004fe594 /system/lib64/libart.so (ExecuteMterpImpl+29972)
#42 pc 000000000025daf4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+444)
#43 pc 00000000002641f4 /system/lib64/libart.so (_ZN3art11interpreter33ArtInterpreterToInterpreterBridgeEPNS_6ThreadEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+212)
#44 pc 000000000027dbc8 /system/lib64/libart.so (_ZN3art11interpreter6DoCallILb1ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+584)
#45 pc 00000000004f34ac /system/lib64/libart.so (MterpInvokeStaticRange+396)
#46 pc 00000000004fac94 /system/lib64/libart.so (ExecuteMterpImpl+15380)
#47 pc 000000000025daf4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+444)
#48 pc 00000000002641f4 /system/lib64/libart.so (_ZN3art11interpreter33ArtInterpreterToInterpreterBridgeEPNS_6ThreadEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+212)
#49 pc 000000000027dbc8 /system/lib64/libart.so (_ZN3art11interpreter6DoCallILb1ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+584)
#50 pc 00000000004f34ac /system/lib64/libart.so (MterpInvokeStaticRange+396)
#51 pc 00000000004fac94 /system/lib64/libart.so (ExecuteMterpImpl+15380)
#52 pc 000000000025daf4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+444)
#53 pc 00000000004e4560 /system/lib64/libart.so (artQuickToInterpreterBridge+1468)
#54 pc 000000000051221c /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
#55 pc 00000000007aaccc /system/framework/arm64/boot.oat (sun.security.provider.certpath.RevocationChecker.checkCRLs+2684)
#56 pc 00000000007a95f4 /system/framework/arm64/boot.oat (sun.security.provider.certpath.RevocationChecker.check+1892)
#57 pc 00000000007adf40 /system/framework/arm64/boot.oat (sun.security.provider.certpath.RevocationChecker.check+112)
#58 pc 000000000079c998 /system/framework/arm64/boot.oat (sun.security.provider.certpath.PKIXMasterCertPathValidator.validate+2152)
#59 pc 000000000079b050 /system/framework/arm64/boot.oat (sun.security.provider.certpath.PKIXCertPathValidator.validate+3376)
#60 pc 000000000079bc34 /system/framework/arm64/boot.oat (sun.security.provider.certpath.PKIXCertPathValidator.validate+1556)
#61 pc 000000000079c0ec /system/framework/arm64/boot.oat (sun.security.provider.certpath.PKIXCertPathValidator.engineValidate+380)
#62 pc 0000000000508d84 /system/lib64/libart.so (art_quick_invoke_stub+580)
#63 pc 00000000000d7f9c /system/lib64/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+200)
The issue seems to be some where in the certificate validation and the classes related to Conscrypt are also visible which is the Java Security Provider. Has Any body faced this issue before and can help in understanding this backtrace.
Native crash at getResources().getStringArray on some devices such as Samsung On7 Pro and Samsung Galaxy J8. On other devices same code is working fine. I am not able to figure out what is wrong. Below is the stack trace of crash.
backtrace:
#00 pc 000000000004b95c /system/lib/libc.so (tgkill+12)
#01 pc 000000000001a733 /system/lib/libc.so (abort+54)
#02 pc 0000000000337da3 /system/lib/libart.so (_ZN3art7Runtime5AbortEPKc+230)
#03 pc 0000000000338433 /system/lib/libart.so (_ZN3art7Runtime7AborterEPKc+10)
#04 pc 00000000003efaad /system/lib/libart.so (_ZN7android4base10LogMessageD1Ev+456)
#05 pc 00000000002300df /system/lib/libart.so (_ZN3art9JavaVMExt8JniAbortEPKcS2_+1262)
#06 pc 000000000023033b /system/lib/libart.so (_ZN3art9JavaVMExt9JniAbortFEPKcS2_z+66)
#07 pc 000000000028b3f7 /system/lib/libart.so (_ZN3art3JNI9NewStringEP7_JNIEnvPKti+590)
#08 pc 00000000000ea39d /system/lib/libandroid_runtime.so (_ZN7androidL51android_content_AssetManager_getArrayStringResourceEP7_JNIEnvP8_jobjecti+244)
#09 pc 0000000000a51567 /system/framework/arm/boot-framework.oat (android.content.res.AssetManager.getArrayStringInfo [DEDUPED]+78)
#10 pc 0000000000a596ff /system/framework/arm/boot-framework.oat (android.content.res.Resources.getStringArray+86)
#11 pc 00000000003dd1e1 /system/lib/libart.so (art_quick_invoke_stub_internal+64)
#12 pc 00000000003e1755 /system/lib/libart.so (art_quick_invoke_stub+228)
#13 pc 00000000000ac0e1 /system/lib/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+140)
#14 pc 00000000001f1cf3 /system/lib/libart.so (_ZN3art11interpreter34ArtInterpreterToCompiledCodeBridgeEPNS_6ThreadEPNS_9ArtMethodEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+238)
#15 pc 00000000001ed2a3 /system/lib/libart.so (_ZN3art11interpreter6DoCallILb0ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+574)
#16 pc 00000000003c9691 /system/lib/libart.so (MterpInvokeVirtualQuick+504)
#17 pc 00000000003d3214 /system/lib/libart.so (ExecuteMterpImpl+29972)
#18 pc 00000000001d4825 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+340)
#19 pc 00000000001d9ba7 /system/lib/libart.so (_ZN3art11interpreter33ArtInterpreterToInterpreterBridgeEPNS_6ThreadEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+142)
#20 pc 00000000001ed28d /system/lib/libart.so (_ZN3art11interpreter6DoCallILb0ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+552)
#21 pc 00000000003c7f71 /system/lib/libart.so (MterpInvokeDirect+360)
#22 pc 00000000003cf594 /system/lib/libart.so (ExecuteMterpImpl+14484)
#23 pc 00000000001d4825 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+340)
#24 pc 00000000001d9af5 /system/lib/libart.so (_ZN3art11interpreter30EnterInterpreterFromEntryPointEPNS_6ThreadEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameE+92)
#25 pc 00000000003bd7f5 /system/lib/libart.so (artQuickToInterpreterBridge+960)
#26 pc 00000000003e0fa1 /system/lib/libart.so (art_quick_to_interpreter_bridge+32)
#27 pc 00000000007eebc5 /system/framework/arm/boot-framework.oat (android.app.Instrumentation.callActivityOnCreate+108)
#28 pc 0000000000712309 /system/framework/arm/boot-framework.oat (android.app.ActivityThread.performLaunchActivity+1936)
#29 pc 000000000070a21b /system/framework/arm/boot-framework.oat (android.app.ActivityThread.handleLaunchActivity+298)
#30 pc 00000000006fe84f /system/framework/arm/boot-framework.oat (android.app.ActivityThread.-wrap11+62)
#31 pc 00000000006fb5c5 /system/framework/arm/boot-framework.oat (android.app.ActivityThread$H.handleMessage+8676)
#32 pc 0000000000e94cfb /system/framework/arm/boot-framework.oat (android.os.Handler.dispatchMessage+138)
#33 pc 0000000000ee3243 /system/framework/arm/boot-framework.oat (android.os.Looper.loop+1066)
#34 pc 000000000071036d /system/framework/arm/boot-framework.oat (android.app.ActivityThread.main+932)
#35 pc 00000000003dd1e1 /system/lib/libart.so (art_quick_invoke_stub_internal+64)
#36 pc 00000000003e185b /system/lib/libart.so (art_quick_invoke_static_stub+226)
#37 pc 00000000000ac10b /system/lib/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+182)
#38 pc 000000000033215d /system/lib/libart.so (_ZN3artL18InvokeWithArgArrayERKNS_33ScopedObjectAccessAlreadyRunnableEPNS_9ArtMethodEPNS_8ArgArrayEPNS_6JValueEPKc+52)
#39 pc 00000000003336a3 /system/lib/libart.so (_ZN3art12InvokeMethodERKNS_33ScopedObjectAccessAlreadyRunnableEP8_jobjectS4_S4_j+946)
#40 pc 00000000002e1475 /system/lib/libart.so (_ZN3artL13Method_invokeEP7_JNIEnvP8_jobjectS3_S3_+40)
#41 pc 0000000000250bdf /system/framework/arm/boot-core-oj.oat (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+110)
#42 pc 000000000162b055 /system/framework/arm/boot-framework.oat (com.android.internal.os.Zygote$MethodAndArgsCaller.run+124)
#43 pc 000000000162f245 /system/framework/arm/boot-framework.oat (com.android.internal.os.ZygoteInit.main+3076)
#44 pc 00000000003dd1e1 /system/lib/libart.so (art_quick_invoke_stub_internal+64)
#45 pc 00000000003e185b /system/lib/libart.so (art_quick_invoke_static_stub+226)
#46 pc 00000000000ac10b /system/lib/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+182)
#47 pc 000000000033215d /system/lib/libart.so (_ZN3artL18InvokeWithArgArrayERKNS_33ScopedObjectAccessAlreadyRunnableEPNS_9ArtMethodEPNS_8ArgArrayEPNS_6JValueEPKc+52)
#48 pc 0000000000331f69 /system/lib/libart.so (_ZN3art17InvokeWithVarArgsERKNS_33ScopedObjectAccessAlreadyRunnableEP8_jobjectP10_jmethodIDSt9__va_list+296)
#49 pc 0000000000285c83 /system/lib/libart.so (_ZN3art3JNI21CallStaticVoidMethodVEP7_JNIEnvP7_jclassP10_jmethodIDSt9__va_list+430)
#50 pc 00000000000a0f41 /system/lib/libandroid_runtime.so (_ZN7_JNIEnv20CallStaticVoidMethodEP7_jclassP10_jmethodIDz+36)
#51 pc 00000000000a284b /system/lib/libandroid_runtime.so (_ZN7android14AndroidRuntime5startEPKcRKNS_6VectorINS_7String8EEEb+466)
#52 pc 0000000000003215 /system/bin/app_process32 (main+1180)
#53 pc 0000000000017e89 /system/lib/libc.so (__libc_init+48)
#54 pc 0000000000002ca0 /system/bin/app_process32 (_start+96)
I've searched on Google many times but did not find a way to locate the error code.
I'm seeing this native crash with the following stack trace.
Android 8.0
pid: 0, tid: 0 >>> package name <<<
Case 1
backtrace:
#00 pc 000000000004b10c /system/lib/libc.so (tgkill+12)
#01 pc 000000000001a9a3 /system/lib/libc.so (abort+54)
#02 pc 0000000000006849 /system/lib/liblog.so (__android_log_assert+152)
#03 pc 00000000000c72b7 /system/lib/libandroid_runtime.so (_ZN7android6bitmap8toBitmapEP7_JNIEnvP8_jobject+34)
#04 pc 00000000000d8003 /system/lib/libandroid_runtime.so (_ZL24BitmapShader_constructorP7_JNIEnvP8_jobjectxS2_ii+38)
#05 pc 0000000000a43c1b /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.nativeCreate [DEDUPED]+146)
#06 pc 0000000000a43d5d /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.createNativeInstance+68)
#07 pc 0000000000a436d5 /system/framework/arm/boot-framework.oat (android.graphics.Shader.getNativeInstance+100)
#08 pc 0000000000a5fcb5 /system/framework/arm/boot-framework.oat (android.graphics.Paint.getNativeInstance+68)
#09 pc 000000000110ed69 /system/framework/arm/boot-framework.oat (android.view.RecordingCanvas.drawCircle+64)
#10 pc 000000000001abf1 /dev/ashmem/dalvik-jit-code-cache (deleted)
Case 2
backtrace:
#00 pc 000000000004add4 /system/lib/libc.so (tgkill+12)
#01 pc 000000000001a6c3 /system/lib/libc.so (abort+54)
#02 pc 00000000000065f9 /system/lib/liblog.so (__android_log_assert+152)
#03 pc 00000000000c711f /system/lib/libandroid_runtime.so (_ZN7android6bitmap8toBitmapEP7_JNIEnvP8_jobject+34)
#04 pc 00000000000d7ec3 /system/lib/libandroid_runtime.so (_ZL24BitmapShader_constructorP7_JNIEnvP8_jobjectxS2_ii+38)
#05 pc 0000000000a15103 /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.nativeCreate [DEDUPED]+146)
#06 pc 0000000000a15245 /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.createNativeInstance+68)
#07 pc 0000000000a14bbd /system/framework/arm/boot-framework.oat (android.graphics.Shader.getNativeInstance+100)
#08 pc 0000000000a3115d /system/framework/arm/boot-framework.oat (android.graphics.Paint.getNativeInstance+68)
#09 pc 0000000000a173e7 /system/framework/arm/boot-framework.oat (android.graphics.Canvas.drawCircle+126)
#10 pc 0000000000023d49 /dev/ashmem/dalvik-jit-code-cache (deleted)
Case 3
backtrace:
#00 pc 000000000001a39a /system/lib/libc.so (abort+63)
#01 pc 000000000000655d /system/lib/liblog.so (__android_log_assert+156)
#02 pc 00000000000c125b /system/lib/libandroid_runtime.so (android::bitmap::toBitmap(_JNIEnv*, _jobject*)+34)
#03 pc 00000000000d19b5 /system/lib/libandroid_runtime.so (BitmapShader_constructor(_JNIEnv*, _jobject*, long long, _jobject*, int, int)+32)
#04 pc 00000000009da043 /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.nativeCreate [DEDUPED]+146)
#05 pc 00000000009da173 /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.createNativeInstance+66)
#06 pc 00000000009d9bb3 /system/framework/arm/boot-framework.oat (android.graphics.Shader.getNativeInstance+98)
#07 pc 00000000009f497f /system/framework/arm/boot-framework.oat (android.graphics.Paint.getNativeInstance+70)
#08 pc 0000000000ff3d51 /system/framework/arm/boot-framework.oat (android.view.RecordingCanvas.drawCircle+64)
#09 pc 0000000000001e4d /dev/ashmem/dalvik-jit-code-cache (deleted)
Android7.0/7.1
Case 1
backtrace:
#00 pc 000000000004a230 /system/lib/libc.so (tgkill+12)
#01 pc 00000000000479c3 /system/lib/libc.so (pthread_kill+34)
#02 pc 000000000001d9c5 /system/lib/libc.so (raise+10)
#03 pc 0000000000019511 /system/lib/libc.so (__libc_android_abort+34)
#04 pc 0000000000017150 /system/lib/libc.so (abort+4)
#05 pc 000000000000c687 /system/lib/libcutils.so (__android_log_assert+114)
#06 pc 00000000000a424b /system/lib/libandroid_runtime.so (_ZN7android6Bitmap15pinPixelsLockedEv+54)
#07 pc 00000000000a4283 /system/lib/libandroid_runtime.so (_ZN7android6Bitmap17refPixelRefLockedEv+34)
#08 pc 00000000000a43b9 /system/lib/libandroid_runtime.so (_ZN7android6Bitmap11getSkBitmapEP8SkBitmap+32)
#09 pc 00000000000ad57b /system/lib/libandroid_runtime.so
#10 pc 00000000021f0407 /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.nativeCreate+114)
#11 pc 00000000021f0349 /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.<init>+124)
#12 pc 00000000000002a1 /dev/ashmem/dalvik-jit-code-cache_8544_8544 (deleted)
Case 2
backtrace:
#00 pc 000000000004a720 /system/lib/libc.so (tgkill+12)
#01 pc 0000000000047eb3 /system/lib/libc.so (pthread_kill+34)
#02 pc 000000000001d955 /system/lib/libc.so (raise+10)
#03 pc 00000000000194a1 /system/lib/libc.so (__libc_android_abort+34)
#04 pc 00000000000170e4 /system/lib/libc.so (abort+4)
#05 pc 000000000000d6af /vendor/lib/libcutils.so (__android_log_assert+114)
#06 pc 00000000000a603f /system/lib/libandroid_runtime.so (_ZN7android6Bitmap15pinPixelsLockedEv+54)
#07 pc 00000000000a6077 /system/lib/libandroid_runtime.so (_ZN7android6Bitmap17refPixelRefLockedEv+34)
#08 pc 00000000000a61a5 /system/lib/libandroid_runtime.so (_ZN7android6Bitmap11getSkBitmapEP8SkBitmap+48)
#09 pc 00000000000b1237 /system/lib/libandroid_runtime.so
#10 pc 0000000074d013d7 /data/dalvik-cache/arm/system#framework#boot-framework.oat
Android 6.0
backtrace:
#00 pc 000000000004323c /system/lib/libc.so (tgkill+12)
#01 pc 0000000000041e45 /system/lib/libc.so (pthread_kill+32)
#02 pc 000000000001bb53 /system/lib/libc.so (raise+10)
#03 pc 0000000000018db1 /system/lib/libc.so (__libc_android_abort+34)
#04 pc 000000000001696c /system/lib/libc.so (abort+4)
#05 pc 00000000000091cb /system/lib/libcutils.so (__android_log_assert+86)
#06 pc 0000000000090fdf /system/lib/libandroid_runtime.so (_ZNK7android6Bitmap11assertValidEv+18)
#07 pc 000000000009105b /system/lib/libandroid_runtime.so (_ZN7android6Bitmap11getSkBitmapEP8SkBitmap+6)
#08 pc 000000000009a17b /system/lib/libandroid_runtime.so
#09 pc 000000007269b57f /data/dalvik-cache/arm/system#framework#boot.oat
Here's a list of devices that are effected:
1.According to Android Vitals statistics, This mainly happens in Android 8.0.A few parts occur on Android 7 & 7.1.
SIGSEGV: SIGSEGV
#00 pc 4009a4c0 /system/bin/linker
#01 pc 4009b004 /system/bin/linker
#02 pc 4009b416 /system/bin/linker
#03 pc 4009b9ca /system/bin/linker
#04 pc 40099f42 /system/bin/linker
#05 pc 00051074 /system/lib/libdvm.so (_Z17dvmLoadNativeCodePKcP6ObjectPPc)
#06 pc 00068a18 /system/lib/libdvm.so
#07 pc 00027fa0 /system/lib/libdvm.so
#08 pc 0002f110 /system/lib/libdvm.so (_Z11dvmMterpStdP6Thread)
#09 pc 0002c774 /system/lib/libdvm.so (_Z12dvmInterpretP6ThreadPK6MethodP6JValue)
#10 pc 000619ea /system/lib/libdvm.so (_Z15dvmInvokeMethodP6ObjectPK6MethodP11ArrayObjectS5_P11ClassObjectb)
#11 pc 00069af6 /system/lib/libdvm.so
#12 pc 00027fa0 /system/lib/libdvm.so
#13 pc 0002f110 /system/lib/libdvm.so (_Z11dvmMterpStdP6Thread)
#14 pc 0002c774 /system/lib/libdvm.so (_Z12dvmInterpretP6ThreadPK6MethodP6JValue)
#15 pc 000619ea /system/lib/libdvm.so (_Z15dvmInvokeMethodP6ObjectPK6MethodP11ArrayObjectS5_P11ClassObjectb)
#16 pc 00069af6 /system/lib/libdvm.so
#17 pc 00027fa0 /system/lib/libdvm.so
#18 pc 0002f110 /system/lib/libdvm.so (_Z11dvmMterpStdP6Thread)
#19 pc 0002c774 /system/lib/libdvm.so (_Z12dvmInterpretP6ThreadPK6MethodP6JValue)
#20 pc 000619ea /system/lib/libdvm.so (_Z15dvmInvokeMethodP6ObjectPK6MethodP11ArrayObjectS5_P11ClassObjectb)
#21 pc 00069af6 /system/lib/libdvm.so
#22 pc 00027fa0 /system/lib/libdvm.so
#23 pc 0002f110 /system/lib/libdvm.so (_Z11dvmMterpStdP6Thread)
#24 pc 0002c774 /system/lib/libdvm.so (_Z12dvmInterpretP6ThreadPK6MethodP6JValue)
#25 pc 00061706 /system/lib/libdvm.so (_Z14dvmCallMethodVP6ThreadPK6MethodP6ObjectbP6JValueSt9__va_list)
#26 pc 0004ae1a /system/lib/libdvm.so
#27 pc 00050546 /system/lib/libandroid_runtime.so
#28 pc 000512d2 /system/lib/libandroid_runtime.so (_ZN7android14AndroidRuntime5startEPKcS2_)
#29 pc 4009605c /system/bin/app_process
#30 pc 0000e5e6 /system/lib/libc.so (__libc_init)
java:
java.lang.Runtime.nativeLoad(Native Method)
java.lang.Runtime.doLoad(Runtime.java:421)
java.lang.Runtime.load(Runtime.java:331)
java.lang.System.load(System.java:541)
....
It crashes at this line when trying to load a private library(.so):
System.load(so_path);
In addition, this code is invoked from a customized DexClassLoader, which loads a lot of private classes in associated with the native code in ".so".
However on most devices it is loaded regularly. And this issue is mostly found on devices with android api level 17, 16, 19.
Does any one have any experience or any idea about this issue? Thank you very much!