we have an app in beta testing. On one of the devices we received a crash in Play:
Native crash at /system/lib/libc.so
In the fault message below there are several important things to notice:
The problem component is IntentService (but android not ours, we don't have such class)
signal 6 (SIGABRT)
device is XIAOMI and it is rooted (very possible it is the root of this crash...)
OS version is 4.4
Here is the fault message:
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'Xiaomi/cancro/cancro:4.4.4/KTU84P/4.8.22:user/release-keys'
Revision: '0'
pid: 25073, tid: 25116, name: IntentService[C >>> org.final <<<
signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
r0 00000000 r1 0000621c r2 00000006 r3 00000000
r4 00000006 r5 00000000 r6 0000621c r7 0000010c
r8 77415b10 r9 770ffd2c sl 76e900a8 fp 77415b24
ip 719a3034 sp 77415850 lr 400da169 pc 400e910c cpsr 000f0010
d0 0000000000000000 d1 0000000000000000
d2 0000000000000000 d3 0000000000000000
d4 fe8000003f000001 d5 000122e800000000
d6 0000000000000000 d7 00000000000022ec
d8 0000000000000000 d9 0000000000000000
d10 0000000000000000 d11 0000000000000000
d12 0000000000000000 d13 0000000000000000
d14 0000000000000000 d15 0000000000000000
d16 5472656c646e6148 d17 616a2e6461657268
d18 00310020002c0031 d19 0020002c00300032
d20 0020002c00300031 d21 0020002c00380034
d22 0020002c00310035 d23 0020002c00340035
d24 bf29e90ee4c465e7 d25 3fd0c84cbbcf4669
d26 3fd0c84cbbcf4669 d27 bf56a5b479c28218
d28 3febe5311169afed d29 bfdffffffd0c5e81
d30 3fb19a64f765cb80 d31 3ef99342e0ee5069
scr 60000012
backtrace:
#00 pc 0002210c /system/lib/libc.so (tgkill+12)
#01 pc 00013165 /system/lib/libc.so (pthread_kill+48)
#02 pc 00013379 /system/lib/libc.so (raise+10)
#03 pc 000120a3 /system/lib/libc.so
#04 pc 000219c0 /system/lib/libc.so (abort+4)
#05 pc 00048b1f /system/lib/libdvm.so (dvmAbort+78)
#06 pc 0004d487 /system/lib/libdvm.so (dvmDecodeIndirectRef(Thread*, _jobject*)+146)
#07 pc 0005023f /system/lib/libdvm.so
#08 pc 0006a469 /system/lib/libdvm.so (Java_java_lang_Class_getDex(_JNIEnv*, _jclass*)+144)
#09 pc 0002034c /system/lib/libdvm.so (dvmPlatformInvoke+112)
#10 pc 00050fcf /system/lib/libdvm.so (dvmCallJNIMethod(unsigned int const*, JValue*, Method const*, Thread*)+398)
#11 pc 000297e0 /system/lib/libdvm.so
#12 pc 00030c6c /system/lib/libdvm.so (dvmMterpStd(Thread*)+76)
#13 pc 0002e304 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#14 pc 00063431 /system/lib/libdvm.so (dvmCallMethodV(Thread*, Method const*, Object*, bool, JValue*, std::__va_list)+336)
#15 pc 00063455 /system/lib/libdvm.so (dvmCallMethod(Thread*, Method const*, Object*, JValue*, ...)+20)
#16 pc 00058133 /system/lib/libdvm.so
#17 pc 0000d248 /system/lib/libc.so (__thread_entry+72)
#18 pc 0000d3e0 /system/lib/libc.so (pthread_create+240)
code around pc:
400e90ec e8bd00f0 e3700a01 912fff1e e2600000
400e90fc ea006df3 e92d50f0 e3a07f43 ef000000
400e910c e8bd50f0 e3700a01 912fff1e e2600000
400e911c ea006deb e92d50f0 e3a070ee ef000000
400e912c e8bd50f0 e3700a01 912fff1e e2600000
400e913c ea006de3 f200429a bf0080b9 f040f891
400e914c 4001e92d f2c02a04 2a1080a5 8093f2c0
400e915c f2c02a20 2a408088 ea4fdb7f f1bc1c92
400e916c dd6c0f0a 0600e92d 0f40f1bc f500dd4a
400e917c f5016e80 ebae7920 ea4f0e09 ea4f5e4e
400e918c f50e5e5e ebbc7e20 dd3b1f9e f04fbfc4
400e919c ebd9090a dd35199e 0a0eeb01 0a3ff02a
400e91ac 1c9eebac bfd245e1 0c09ebac f04f46e1
400e91bc f8910c00 f891f240 f921f280 f921028d
400e91cc f8da428d f1b93000 f9000901 f900028d
400e91dc f10a428d d1ee0a40 0f00f1bc f5bcd02b
code around lr:
400da148 447b4b13 42b3e010 6a1ed10e 44784811
400da158 ec7ef7fb ea0af00d 46224631 efccf00e
400da168 d00a3001 e00b2400 2b00681b 480ad1eb
400da178 44782403 ec6cf7fb f001e002 6804fa23
400da188 fa20f001 46206005 bf00bd70 0003b26a
400da198 0003b25e 0003b256 0003b232 bf7ef7ff
400da1a8 4a3e4b3d e92d447b b08b43f0 4606589c
400da1b8 6823460d 930946a1 fa04f001 8000f8d0
400da1c8 d0482d00 f0104628 280ff919 d8444604
400da1d8 ffe4f7ff d1064286 4629200f e8d4f00d
400da1e8 d03c2800 482ee02e f7fb4478 482debb0
400da1f8 e0154478 d11342b0 482b6a06 f7fb4478
400da208 4a2aec28 46332120 a801447a f990f013
400da218 a8012101 fcaef01a 46061c42 e011d104
400da228 28006800 e02cd1e6 46294630 f00d4622
400da238 1c43e910 d11e4607 f9c4f001 29046801
I have searched through lots of posts. This problem appeared only once but it can appear... What is the cause to this? How to prevent it? Thank you for any guidance.
Okey, so the problem is with Apk Protect and not with Retrofit.
Currently, the ApkProtect supports only versions 2.1-4.2.
http://www.apkprotect.com/apkprotectpc.html
Related
We have an Android app that is written mostly in Java but uses small native module based on OpenCV library for image processing.
The module is called by JNI and all of the code in its method is inside a try-catch block that should catch any exception.
Now we rarely (about once per thousand users) get a native crash that is very puzzling for us. We cannot replicate those crashes. It is always on Android 4.4.2 or 4.4.4 but too rarely to reproduce. It doesn't seem to have any relation to our code. There are no .so files in backtrace that would suggest what it could be. We have no clue when the crash happen, users don't post a useful comment on crashes.
How could we even begin to debug something like that? Is it possible to find out what is the cause?
Typical crash report:
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'samsung/s3ve3gxx/s3ve3g:4.4.2/KOT49H/I9301IXXSAPG5:user/release-keys'
Revision: '4'
pid: 11950, tid: 11950
signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
r0 00000000 r1 00002eae r2 00000006 r3 00000000
r4 00000006 r5 00000002 r6 00002eae r7 0000010c
r8 a080001d r9 6d596a34 sl 415ef4d8 fp beca92d4
ip 4163fb21 sp beca8ff8 lr 40064205 pc 40073164 cpsr 000f0010
d0 0000000000000000 d1 0000000000000000
d2 0000000000000000 d3 0000000000000000
d4 4391240843912408 d5 4391240843912408
d6 4391240843912408 d7 4391240843912408
d8 0000000000000000 d9 000005003f000000
d10 3f00000000000038 d11 4044000000000000
d12 4044000000000000 d13 0000000000000029
d14 0000000000000000 d15 0000000000000000
d16 2065766974614e28 d17 0a29646f6874654d
d18 4391240843912408 d19 4391240843912408
d20 4391240843912408 d21 4391240843912408
d22 4391240843912408 d23 4391240843912408
d24 004e004d004c004b d25 0050004f004d004e
d26 0000000000000000 d27 0000000000000000
d28 001e001d001c001b d29 0020001f001d001e
d30 0050005000500050 d31 0000000000000000
scr 88000013
backtrace:
#00 pc 00022164 /system/lib/libc.so (tgkill+12)
#01 pc 00013201 /system/lib/libc.so (pthread_kill+48)
#02 pc 00013415 /system/lib/libc.so (raise+10)
#03 pc 000120e3 /system/lib/libc.so
#04 pc 00021a18 /system/lib/libc.so (abort+4)
#05 pc 000494ff /system/lib/libdvm.so (dvmAbort+78)
#06 pc 0004ccfd /system/lib/libdvm.so
#07 pc 0004eb3b /system/lib/libdvm.so
#08 pc 0006ab23 /system/lib/libandroid_runtime.so
#09 pc 00020d0c /system/lib/libdvm.so (dvmPlatformInvoke+112)
#10 pc 000519af /system/lib/libdvm.so (dvmCallJNIMethod(unsigned int const*, JValue*, Method const*, Thread*)+398)
#11 pc 0002a1a0 /system/lib/libdvm.so
#12 pc 00031650 /system/lib/libdvm.so (dvmMterpStd(Thread*)+76)
#13 pc 0002ece8 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#14 pc 000640f9 /system/lib/libdvm.so (dvmInvokeMethod(Object*, Method const*, ArrayObject*, ArrayObject*, ClassObject*, bool)+392)
#15 pc 0006c05f /system/lib/libdvm.so
#16 pc 0002a1a0 /system/lib/libdvm.so
#17 pc 00031650 /system/lib/libdvm.so (dvmMterpStd(Thread*)+76)
#18 pc 0002ece8 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#19 pc 00063e15 /system/lib/libdvm.so (dvmCallMethodV(Thread*, Method const*, Object*, bool, JValue*, std::__va_list)+336)
#20 pc 0004d597 /system/lib/libdvm.so
#21 pc 000520e7 /system/lib/libandroid_runtime.so
#22 pc 0005367f /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, char const*, bool)+358)
#23 pc 00001063 /system/bin/app_process
#24 pc 0000e503 /system/lib/libc.so (__libc_init+50)
#25 pc 00000d80 /system/bin/app_process
code around pc:
40073144 e8bd00f0 e3700a01 912fff1e e2600000
40073154 ea006e48 e92d50f0 e3a07f43 ef000000
40073164 e8bd50f0 e3700a01 912fff1e e2600000
40073174 ea006e40 e92d50f0 e3a070ee ef000000
40073184 e8bd50f0 e3700a01 912fff1e e2600000
40073194 ea006e38 f200429a bf0080b9 f040f891
400731a4 4001e92d f2c02a04 2a1080a5 8093f2c0
400731b4 f2c02a20 2a408088 ea4fdb7f f1bc1c92
400731c4 dd6c0f0a 0600e92d 0f40f1bc f500dd4a
400731d4 f5016e80 ebae7920 ea4f0e09 ea4f5e4e
400731e4 f50e5e5e ebbc7e20 dd3b1f9e f04fbfc4
400731f4 ebd9090a dd35199e 0a0eeb01 0a3ff02a
40073204 1c9eebac bfd245e1 0c09ebac f04f46e1
40073214 f8910c00 f891f240 f921f280 f921028d
40073224 f8da428d f1b93000 f9000901 f900028d
40073234 f10a428d d1ee0a40 0f00f1bc f5bcd02b
code around lr:
400641e4 447b4b13 42b3e010 6a1ed10e 44784811
400641f4 ec50f7fb e9e8f00d 46224631 efaaf00e
40064204 d00a3001 e00b2400 2b00681b 480ad1eb
40064214 44782403 ec3ef7fb f001e002 6804f9ff
40064224 f9fcf001 46206005 bf00bd70 0003b1d2
40064234 0003b1c6 0003b1be 0003b19a bf7ef7ff
40064244 4a3e4b3d e92d447b b08b43f0 4606589c
40064254 6823460d 930946a1 f9e0f001 8000f8d0
40064264 d0482d00 f0104628 280ff8f7 d8444604
40064274 ffe4f7ff d1064286 4629200f e8b2f00d
40064284 d03c2800 482ee02e f7fb4478 482deb82
40064294 e0154478 d11342b0 482b6a06 f7fb4478
400642a4 4a2aebfa 46332120 a801447a f96ef013
400642b4 a8012101 fc8cf01a 46061c42 e011d104
400642c4 28006800 e02cd1e6 46294630 f00d4622
400642d4 1c43e8ee d11e4607 f9a0f001 29046801
This is likely to be either a bug in the implementation of Android that the user is running, or a bug in the way your code/opencv are using JNI. This will be hard for SO people to debug as we have less information than you, but here are some suggestions for trying to track it down:
Test on the same hardware/OS revision as the users that have the
issue.
Test with many images/data as it could be a format problem or size
issue that triggers the fault.
Test by changing relevant OS settings like ART.
Test by doing things users may do like flipping between landscape and
portrait mode just as the app is processing a large image.
Put some instrumentation around the JNI calls to audit things
like size and format of images. Find a way to get this information, this SO Question gives some suggestions.
Without the information on why/when it crashed, you can't reproduce and without reproducing you can't fix it.
I am getting crash reports from Google Play. And all those error occur only on Android v4.4.2.
I don't known what is causing the crash and how do i fix it.
Hope someone can help me.
Log:
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'samsung/ja3gxx/ja3g:4.4.2/KOT49H/I9500XXUFNI2:user/release-keys'
Revision: '10'
pid: 28579, tid: 28587, name: FinalizerDaemon >>> com.iam.nearer.app <<<
signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
Abort message: 'heap corruption detected by dlfree'
r0 00000000 r1 00006fab r2 00000006 r3 00000000
r4 00000006 r5 00000000 r6 00006fab r7 0000010c
r8 00000000 r9 72822f48 sl 7282c108 fp 72a90b24
ip 00000016 sp 72a909b8 lr 401090e1 pc 401182d0 cpsr 000f0010
d0 65746564206e6f64 d1 207962206465746c
d2 6dba675800000066 d3 0000010000000072
d4 8000000000000000 d5 0000000000000000
d6 4b83075000000000 d7 42c8000000000003
d8 0000000000000000 d9 0000000000000000
d10 0000000000000000 d11 0000000000000000
d12 0000000000000000 d13 0000000000000000
d14 0000000000000000 d15 0000000000000000
d16 0000000000000000 d17 0000000000000000
d18 0000000000000000 d19 8000000000000000
d20 0000000000004000 d21 0000000000000000
d22 0000000000004000 d23 8000000000000000
d24 0000000000000000 d25 4008000000000000
d26 3fc2f112df3e5244 d27 0000000000000001
d28 00000000000000e6 d29 00000000000000e5
d30 0000000000000001 d31 0000000000004000
scr 80000010
backtrace:
#00 pc 000222d0 /system/lib/libc.so (tgkill+12)
#01 pc 000130dd /system/lib/libc.so (pthread_kill+48)
#02 pc 000132f1 /system/lib/libc.so (raise+10)
#03 pc 00012027 /system/lib/libc.so
#04 pc 00021b84 /system/lib/libc.so (abort+4)
#05 pc 00012b0d /system/lib/libc.so
#06 pc 0000f22d /system/lib/libc.so
#07 pc 000117ef /system/lib/libc.so (dlfree+1222)
#08 pc 0000dd1f /system/lib/libc.so (free+10)
#09 pc 000af60b /system/lib/libskia.so (SkMallocPixelRef::~SkMallocPixelRef()+10)
#10 pc 0008e1b1 /system/lib/libskia.so
#11 pc 0008e211 /system/lib/libskia.so (SkPixelRef::globalUnref()+20)
#12 pc 000915cf /system/lib/libskia.so (SkBitmap::freePixels()+36)
#13 pc 000915fb /system/lib/libskia.so (SkBitmap::setPixelRef(SkPixelRef*, unsigned int)+26)
#14 pc 0009168f /system/lib/libskia.so (SkBitmap::setPixels(void*, SkColorTable*)+16)
#15 pc 000bfe93 /system/lib/libskia.so (SkPixelRef::unlockPixels()+32)
#16 pc 000915c9 /system/lib/libskia.so (SkBitmap::freePixels()+30)
#17 pc 000917af /system/lib/libskia.so (SkBitmap::~SkBitmap()+4)
#18 pc 0002a5db /system/lib/libhwui.so (android::uirenderer::ResourceCache::destructorLocked(SkBitmap*)+50)
#19 pc 0002a613 /system/lib/libhwui.so (android::uirenderer::ResourceCache::destructor(SkBitmap*)+20)
#20 pc 0001e84c /system/lib/libdvm.so (dvmPlatformInvoke+112)
#21 pc 0004f28b /system/lib/libdvm.so (dvmCallJNIMethod(unsigned int const*, JValue*, Method const*, Thread*)+398)
#22 pc 00027c60 /system/lib/libdvm.so
#23 pc 0002ec9c /system/lib/libdvm.so (dvmMterpStd(Thread*)+76)
#24 pc 0002c300 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#25 pc 000618f1 /system/lib/libdvm.so (dvmCallMethodV(Thread*, Method const*, Object*, bool, JValue*, std::__va_list)+336)
#26 pc 00061915 /system/lib/libdvm.so (dvmCallMethod(Thread*, Method const*, Object*, JValue*, ...)+20)
#27 pc 00056603 /system/lib/libdvm.so
#28 pc 0000d280 /system/lib/libc.so (__thread_entry+72)
#29 pc 0000d418 /system/lib/libc.so (pthread_create+240)
code around pc:
401182b0 e8bd00f0 e3700a01 912fff1e e2600000
401182c0 ea006fce e92d50f0 e3a07f43 ef000000
401182d0 e8bd50f0 e3700a01 912fff1e e2600000
401182e0 ea006fc6 e92d50f0 e3a070ee ef000000
401182f0 e8bd50f0 e3700a01 912fff1e e2600000
40118300 ea006fbe e1520003 8a000102 f5d1f040
40118310 e92d4001 e3520010 3a00003f e3520d0d
40118320 aa00004c e2603000 e213300f 0a00000e
40118330 e0422003 e1b0cf83 44d1e001 44c0e001
40118340 24d1c001 24d1e001 24c0c001 24c0e001
40118350 e1b0ce83 aa000001 f4a1030d f480031d
40118360 3a000001 f421070d f400071d e2522080
40118370 3a000014 f4210acd f4000acd f4210acd
40118380 f4000acd f4210acd f4000acd f4210acd
40118390 f4000acd f4210acd f4000acd f4210acd
401183a0 f4000acd f4210acd f4000acd f4210acd
code around lr:
401090c0 447b4b13 42b3e010 4812d10e 44786a1e
401090d0 ec90f7fb ea42f00d 46224631 e8f2f00f
401090e0 d00a3001 e00b2400 2b00681b 480ad1eb
401090f0 44782403 ec7ef7fb f001e002 6804fa87
40109100 fa84f001 46206005 bf00bd70 0003c2e2
40109110 0003c2d6 0003c2ce 0003c2aa bf7ef7ff
40109120 4a3e4b3d 43f0e92d 4606b08b 447b460d
40109130 6823589c 930946a1 fa68f001 8000f8d0
40109140 d0482d00 f0104628 280ff8af d8444604
40109150 ffe4f7ff d1064286 4629200f e90cf00d
40109160 d03c2800 482ee02e f7fb4478 482debc2
40109170 e0154478 d11342b0 482b6a06 f7fb4478
40109180 4a2aec3a 46332120 447aa801 fdd4f013
40109190 a8012101 f8d6f01b 46061c42 e011d104
401091a0 28006800 e02cd1e6 46294630 f00d4622
401091b0 1c43e948 d11e4607 fa28f001 29046801
Similar errors have occurred for other apps, which are caused by Android OS bugs.
Remove your bitmap.recycle() calls and set all your bitmaps = null when your done using them. Let the GC clear the bitmaps.
using Retrofit 1.6.0 I get the following errors on devices (not emulators) that updated to Android 4.4.2
Current Configuration
compile('com.squareup.okhttp:okhttp-urlconnection:1.6.0')
compile('com.squareup.okhttp:okhttp:1.6.0')
compile('com.squareup.retrofit:retrofit:1.6.0')
Error Log
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'samsung/hlltexx/hllte:4.4.2/KOT49H/N7505XXUCNG5:user/release-keys'
Revision: '10'
pid: 30127, tid: 30197, name: Retrofit-Idle >>> cz.cisla <<<
signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
r0 00000000 r1 000075f5 r2 00000006 r3 00000000
r4 00000006 r5 00000073 r6 000075f5 r7 0000010c
r8 7afaab10 r9 7ad6fbe8 sl 7a6e03d8 fp 7afaab24
ip 77b3a034 sp 7afaa850 lr 4003f121 pc 4004e310 cpsr 000f0010
d0 74726f6261204d56 d1 6f72646e41246d6e
d2 696f72646e412475 d3 75722e312432246c
d4 6164416570795465 d5 7463614672657470
d6 427465672e79726f d7 6c656946646e756f
d8 0000000000000000 d9 0000000000000000
d10 0000000000000000 d11 0000000000000000
d12 0000000000000000 d13 0000000000000000
d14 0000000000000000 d15 0000000000000000
d16 000000000000001c d17 0000000000000007
d18 0000000000001185 d19 0000000008000000
d20 0000000000ffffff d21 0000000000000000
d22 0000000009000000 d23 000000000009f000
d24 0000000000000e00 d25 0000000033000000
d26 ffffffffffffffff d27 ffffffffffffffff
d28 0000000000000002 d29 0000000000000002
d30 0000007a6d651000 d31 0000000000ffffff
scr 60000010
backtrace:
#00 pc 00022310 /system/lib/libc.so (tgkill+12)
#01 pc 0001311d /system/lib/libc.so (pthread_kill+48)
#02 pc 00013331 /system/lib/libc.so (raise+10)
#03 pc 00012067 /system/lib/libc.so
#04 pc 00021bc4 /system/lib/libc.so (abort+4)
#05 pc 00046c33 /system/lib/libdvm.so (dvmAbort+78)
#06 pc 0004b543 /system/lib/libdvm.so (dvmDecodeIndirectRef(Thread*, _jobject*)+146)
#07 pc 0004e2fd /system/lib/libdvm.so
#08 pc 0006886d /system/lib/libdvm.so (Java_java_lang_Class_getDex(_JNIEnv*, _jclass*)+144)
#09 pc 0001eb0c /system/lib/libdvm.so (dvmPlatformInvoke+112)
#10 pc 0004f08b /system/lib/libdvm.so (dvmCallJNIMethod(unsigned int const*, JValue*, Method const*, Thread*)+398)
#11 pc 00027f20 /system/lib/libdvm.so
#12 pc 0002ef54 /system/lib/libdvm.so (dvmMterpStd(Thread*)+76)
#13 pc 0002c5b8 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#14 pc 00061489 /system/lib/libdvm.so (dvmCallMethodV(Thread*, Method const*, Object*, bool, JValue*, std::__va_list)+336)
#15 pc 000614ad /system/lib/libdvm.so (dvmCallMethod(Thread*, Method const*, Object*, JValue*, ...)+20)
#16 pc 0005619b /system/lib/libdvm.so
#17 pc 0000d280 /system/lib/libc.so (__thread_entry+72)
#18 pc 0000d418 /system/lib/libc.so (pthread_create+240)
code around pc:
4004e2f0 e8bd00f0 e3700a01 912fff1e e2600000
4004e300 ea006e86 e92d50f0 e3a07f43 ef000000
4004e310 e8bd50f0 e3700a01 912fff1e e2600000
4004e320 ea006e7e e92d50f0 e3a070ee ef000000
4004e330 e8bd50f0 e3700a01 912fff1e e2600000
4004e340 ea006e76 e1520003 8a00008c f5d1f040
4004e350 e92d4001 e3520010 3a000024 e2603000
4004e360 e213300f 0a00000e e0422003 e1b0cf83
4004e370 44d1e001 44c0e001 24d1c001 24d1e001
4004e380 24c0c001 24c0e001 e1b0ce83 aa000001
4004e390 f4a1030d f480031d 3a000001 f421070d
4004e3a0 f400071d e2522040 3a000006 f421020d
4004e3b0 f421420d f5d1f100 e2522040 f400022d
4004e3c0 f400422d 2afffff8 e2922020 3a000002
4004e3d0 f421020d e2422020 f400022d e2822020
4004e3e0 e3120010 0a000001 f4210a0d f4000a2d
code around lr:
4003f100 447b4b13 42b3e010 4812d10e 44786a1e
4003f110 ec90f7fb ea42f00d 46224631 e8f2f00f
4003f120 d00a3001 e00b2400 2b00681b 480ad1eb
4003f130 44782403 ec7ef7fb f001e002 6804fa87
4003f140 fa84f001 46206005 bf00bd70 0003b2a2
4003f150 0003b296 0003b28e 0003b26a bf7ef7ff
4003f160 4a3e4b3d 43f0e92d 4606b08b 447b460d
4003f170 6823589c 930946a1 fa68f001 8000f8d0
4003f180 d0482d00 f00f4628 280fffc3 d8444604
4003f190 ffe4f7ff d1064286 4629200f e90cf00d
4003f1a0 d03c2800 482ee02e f7fb4478 482debc2
4003f1b0 e0154478 d11342b0 482b6a06 f7fb4478
4003f1c0 4a2aec3a 46332120 447aa801 fb44f013
4003f1d0 a8012101 fe46f01a 46061c42 e011d104
4003f1e0 28006800 e02cd1e6 46294630 f00d4622
4003f1f0 1c43e948 d11e4607 fa28f001 29046801
Do you have any idea how to solve this? I will try to update to the latest version (currently 1.7.0) and also increase the version of okHttp. I don't have any hints where this bug is happening as on my device and simulator it is working fine. Maybe it is of some help that Retrofit-Idle is a thread.
Okey, so the problem is with Apk Protect and not with Retrofit.
Currently, the ApkProtect supports only versions 2.1-4.2.
http://www.apkprotect.com/apkprotectpc.html
I've got a fairly popular app on Google Play which recently have been stormed by some native crashes on libwebviewchromium.so. The webview in question has no fancy stuff, only a small login form with scrolling disabled.
Naturally this only happens on Android 4.4+ (WebViews started to be based on Chromium ). There's a dump of a crash:
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'motorola/ghost_repw/ghost:4.4.2/KXA20.16-1.24-1.12/12:user/release-keys'
Revision: 'p300'
pid: 22986, tid: 22986
signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
r0 00000000 r1 000059ca r2 00000006 r3 00000000
r4 00000006 r5 0000000b r6 000059ca r7 0000010c
r8 6015d758 r9 57735070 sl 57619830 fp 57734ee0
ip 40121384 sp bef3a088 lr 400e60bd pc 400f5068 cpsr 00060010
d0 4373746e65746e6f d1 697242746e65696c
d2 756f68732e656764 d3 69727265764f646c
d4 616f4c6c72556564 d5 43774128676e6964
d6 4373746e65746e6f d7 697242746e65696c
d8 00000000438e8000 d9 0000000043956b80
d10 0000000000000000 d11 0000000000000000
d12 0000000000000000 d13 0000000000000000
d14 0000000000000000 d15 0000000000000000
d16 2e6c616e7265746e d17 746f67795a2e736f
d18 616d2e74696e4965 d19 746f67795a286e69
d20 616a2e74696e4965 d21 0a293130363a6176
d22 766c616420746109 d23 65747379732e6b69
d24 0000000000000000 d25 0000000000000000
d26 0000000000000000 d27 0000000000000000
d28 0000000000000000 d29 0000000000000000
d30 0000000000000000 d31 0000000000000000
scr 68000013
backtrace:
#00 pc 00022068 /system/lib/libc.so (tgkill+12)
#01 pc 000130b9 /system/lib/libc.so (pthread_kill+48)
#02 pc 000132cd /system/lib/libc.so (raise+10)
#03 pc 00012003 /system/lib/libc.so
#04 pc 0002191c /system/lib/libc.so (abort+4)
#05 pc 001c46b1 /system/lib/libwebviewchromium.so
#06 pc 001c1c4b /system/lib/libwebviewchromium.so
#07 pc 00196ebd /system/lib/libwebviewchromium.so
#08 pc 0018bd73 /system/lib/libwebviewchromium.so
#09 pc 0018bb8d /system/lib/libwebviewchromium.so
#10 pc 0018bc0d /system/lib/libwebviewchromium.so
#11 pc 008e6c29 /system/lib/libwebviewchromium.so
#12 pc 008e6bcd /system/lib/libwebviewchromium.so
#13 pc 001cf1ef /system/lib/libwebviewchromium.so
#14 pc 001cfcf1 /system/lib/libwebviewchromium.so
#15 pc 001cfe4f /system/lib/libwebviewchromium.so
#16 pc 001dfc57 /system/lib/libwebviewchromium.so
#17 pc 0002034c /system/lib/libdvm.so (dvmPlatformInvoke+112)
#18 pc 00050e6b /system/lib/libdvm.so (dvmCallJNIMethod(unsigned int const*, JValue*, Method const*, Thread*)+398)
#19 pc 000297e0 /system/lib/libdvm.so
#20 pc 00030ae8 /system/lib/libdvm.so (dvmMterpStd(Thread*)+76)
#21 pc 0002e180 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#22 pc 00063751 /system/lib/libdvm.so (dvmInvokeMethod(Object*, Method const*, ArrayObject*, ArrayObject*, ClassObject*, bool)+392)
#23 pc 0006b713 /system/lib/libdvm.so
#24 pc 000297e0 /system/lib/libdvm.so
#25 pc 00030ae8 /system/lib/libdvm.so (dvmMterpStd(Thread*)+76)
#26 pc 0002e180 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#27 pc 0006346d /system/lib/libdvm.so (dvmCallMethodV(Thread*, Method const*, Object*, bool, JValue*, std::__va_list)+336)
#28 pc 0004ca37 /system/lib/libdvm.so
#29 pc 0004d0f7 /system/lib/libandroid_runtime.so
#30 pc 0004de1b /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, char const*)+354)
#31 pc 0000105b /system/bin/app_process
code around pc:
400f5048 e8bd00f0 e3700a01 912fff1e e2600000
400f5058 ea006e4c e92d50f0 e3a07f43 ef000000
400f5068 e8bd50f0 e3700a01 912fff1e e2600000
400f5078 ea006e44 e92d50f0 e3a070ee ef000000
400f5088 e8bd50f0 e3700a01 912fff1e e2600000
400f5098 ea006e3c f200429a bf0080b9 f040f891
400f50a8 4001e92d f2c02a04 2a1080a5 8093f2c0
400f50b8 f2c02a20 2a408088 ea4fdb7f f1bc1c92
400f50c8 dd6c0f0a 0600e92d 0f40f1bc f500dd4a
400f50d8 f5016e80 ebae7920 ea4f0e09 ea4f5e4e
400f50e8 f50e5e5e ebbc7e20 dd3b1f9e f04fbfc4
400f50f8 ebd9090a dd35199e 0a0eeb01 0a3ff02a
400f5108 1c9eebac bfd245e1 0c09ebac f04f46e1
400f5118 f8910c00 f891f240 f921f280 f921028d
400f5128 f8da428d f1b93000 f9000901 f900028d
400f5138 f10a428d d1ee0a40 0f00f1bc f5bcd02b
code around lr:
400e609c 447b4b13 42b3e010 6a1ed10e 44784811
400e60ac ec80f7fb ea0ef00d 46224631 efd0f00e
400e60bc d00a3001 e00b2400 2b00681b 480ad1eb
400e60cc 44782403 ec6ef7fb f001e002 6804fa23
400e60dc fa20f001 46206005 bf00bd70 0003b306
400e60ec 0003b2fa 0003b2f2 0003b2ce bf7ef7ff
400e60fc 4a3e4b3d e92d447b b08b43f0 4606589c
400e610c 6823460d 930946a1 fa04f001 8000f8d0
400e611c d0482d00 f0104628 280ff88b d8444604
400e612c ffe4f7ff d1064286 4629200f e8d8f00d
400e613c d03c2800 482ee02e f7fb4478 482debb2
400e614c e0154478 d11342b0 482b6a06 f7fb4478
400e615c 4a2aec2a 46332120 a801447a f9eef013
400e616c a8012101 fd08f01a 46061c42 e011d104
400e617c 28006800 e02cd1e6 46294630 f00d4622
400e618c 1c43e914 d11e4607 f9c4f001 29046801
Unfortunately, i've not been able to replicate this problem neither on actual devices or emulators, and user feedback is not helpful. No clue why this crash happens.
I've learned to use the NDK tools to interpret the stack trace, but I still need a version of libwebviewchromium.so with debug symbols (and preferably the exact same version that is running on each of the users devices).
So, the questions:
Am I missing something? / Did anyone came across something similar?
Assuming that I can find the version of libwebviewchromium.so in use, is it possible to find builds with debug symbols, or will I need to compile them from scratch?
Thanks!
This could be caused from a graphic memory bug, so you can try to disable some CSS using any -CSS webkit-transform like " -webkit-transform: rotate(0deg) scaleX(1) scaleY(1); ". (I saw this same bug on iOS if you load too many data in GPU memory).
I built an app that plays YouTube iframe video via WebView and controls video with YouTube iframe api.
(I know that YouTube SDK for Android may be more recommended for Android app development, but for now only iframe api fits our need)
I found out that the app randomly crashes when running under Android 4.4 KitKat.
This is the complete crash log from Google Play console:
Native crash at /system/lib/libc.so
in /system/lib/libc.so (tgkill+12), /system/lib/libc.so (pthread_kill+48)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'samsung/lt02ltespr/lt02ltespr:4.4.2/KOT49H/T217SVPUBNH4:user/release-keys'
Revision: '9'
pid: 10404, tid: 10660, name: rbbb.myapp >>> com.kkkkrbbb.myapp <<<
signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
r0 00000000 r1 000029a4 r2 00000006 r3 00000000
r4 00000006 r5 00000000 r6 000029a4 r7 0000010c
r8 630b10d0 r9 578211e8 sl 576f7830 fp 57821058
ip 4016f394 sp 6b8df9e8 lr 4013419d pc 40143144 cpsr 000b0010
d0 64207461090a2939 d1 79732e6b69766c61
d2 74614e2e6d657473 d3 7472617453657669
d4 031c01f305bb0022 d5 017009920185050a
d6 fe160e5fffb70c29 d7 fe98145bffc7133e
d8 3f8000003f800000 d9 4298000000000000
d10 00000000420c0000 d11 0000000000000000
d12 0000000000000000 d13 0000000000000000
d14 0000000000000000 d15 0000000000000000
d16 74614e286e75722e d17 6874654d20657669
d18 656c65722e656764 d19 757074754f657361
d20 2872656666754274 d21 646f43616964654d
d22 6567646972426365 d23 38313a6176616a2e
d24 3ff89499f93ebf0f d25 400921fb54442d18
d26 bfadde2f1100f60a d27 3fa97b4beb58fff5
d28 3f90ad3ae322da11 d29 3f53891194985e55
d30 3fd555562f68cf9d d31 bfc9999aecd3aacb
scr 28000013
backtrace:
#00 pc 00022144 /system/lib/libc.so (tgkill+12)
#01 pc 00013199 /system/lib/libc.so (pthread_kill+48)
#02 pc 000133ad /system/lib/libc.so (raise+10)
#03 pc 000120e3 /system/lib/libc.so
#04 pc 000219f8 /system/lib/libc.so (abort+4)
#05 pc 001c46f9 /system/lib/libwebviewchromium.so
#06 pc 001c1c9b /system/lib/libwebviewchromium.so
#07 pc 00afcb27 /system/lib/libwebviewchromium.so
#08 pc 00afc40b /system/lib/libwebviewchromium.so
#09 pc 001cf24f /system/lib/libwebviewchromium.so
#10 pc 001cfd51 /system/lib/libwebviewchromium.so
#11 pc 001cfeaf /system/lib/libwebviewchromium.so
#12 pc 001cffbd /system/lib/libwebviewchromium.so
#13 pc 001cf575 /system/lib/libwebviewchromium.so
#14 pc 001d403f /system/lib/libwebviewchromium.so
#15 pc 001cedaf /system/lib/libwebviewchromium.so
#16 pc 001dc42d /system/lib/libwebviewchromium.so
#17 pc 001da25b /system/lib/libwebviewchromium.so
#18 pc 0000d288 /system/lib/libc.so (__thread_entry+72)
#19 pc 0000d420 /system/lib/libc.so (pthread_create+240)
code around pc:
40143124 e8bd00f0 e3700a01 912fff1e e2600000
40143134 ea006e4f e92d50f0 e3a07f43 ef000000
40143144 e8bd50f0 e3700a01 912fff1e e2600000
40143154 ea006e47 e92d50f0 e3a070ee ef000000
40143164 e8bd50f0 e3700a01 912fff1e e2600000
40143174 ea006e3f f200429a bf0080b9 f040f891
40143184 4001e92d f2c02a04 2a1080a5 8093f2c0
40143194 f2c02a20 2a408088 ea4fdb7f f1bc1c92
401431a4 dd6c0f0a 0600e92d 0f40f1bc f500dd4a
401431b4 f5016e80 ebae7920 ea4f0e09 ea4f5e4e
401431c4 f50e5e5e ebbc7e20 dd3b1f9e f04fbfc4
401431d4 ebd9090a dd35199e 0a0eeb01 0a3ff02a
401431e4 1c9eebac bfd245e1 0c09ebac f04f46e1
401431f4 f8910c00 f891f240 f921f280 f921028d
40143204 f8da428d f1b93000 f9000901 f900028d
40143214 f10a428d d1ee0a40 0f00f1bc f5bcd02b
code around lr:
4013417c 447b4b13 42b3e010 6a1ed10e 44784811
4013418c ec84f7fb ea0cf00d 46224631 efcef00e
4013419c d00a3001 e00b2400 2b00681b 480ad1eb
401341ac 44782403 ec72f7fb f001e002 6804fa23
401341bc fa20f001 46206005 bf00bd70 0003b236
401341cc 0003b22a 0003b222 0003b1fe bf7ef7ff
401341dc 4a3e4b3d e92d447b b08b43f0 4606589c
401341ec 6823460d 930946a1 fa04f001 8000f8d0
401341fc d0482d00 f0104628 280ff889 d8444604
4013420c ffe4f7ff d1064286 4629200f e8d6f00d
4013421c d03c2800 482ee02e f7fb4478 482debb6
4013422c e0154478 d11342b0 482b6a06 f7fb4478
4013423c 4a2aec2e 46332120 a801447a f92af013
4013424c a8012101 fc48f01a 46061c42 e011d104
4013425c 28006800 e02cd1e6 46294630 f00d4622
4013426c 1c43e912 d11e4607 f9c4f001 29046801
And feedbacks from users are "It won't stop after I press stop button" and "It accidentally stopped".
Since this problem randomly happens, I cannot reproduce it and yet don't know how to fix it.
Any suggestion is highly appreciated! Thank you :)
Maybe you are trying to display a corrupted JPEG file. Try to open them all and see if there isn't one that fails to load.