Comments (6)
There are some similar issues, but now it seems that this issue mainly erupts on Android 10 devices, which have been running without any problems before. Suddenly, one day, it erupts and the volume is large
from conscrypt.
#00 pc 000000000003b6f0 /apex/com.android.conscrypt/lib64/libssl.so (SSL_SESSION_get_time+4)
#1 pc 00000000000336b0 /apex/com.android.conscrypt/lib64/libjavacrypto.so (_ZL25NativeCrypto_SSL_get_timeP7_JNIEnvP7_jclasslP8_jobject+124)
#2 pc 0000000000151350 /apex/com.android.runtime/lib64/libart.so (art_quick_generic_jni_trampoline+144)
#3 pc 00000000001485b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568)
#4 pc 00000000001571d4 /apex/com.android.runtime/lib64/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+284)
#5 pc 00000000002fe588 /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreter34ArtInterpreterToCompiledCodeBridgeEPNS_6ThreadEPNS_9ArtMethodEPNS_11ShadowFrameEtPNS_6JValueE+384)
#6 pc 00000000002f9858 /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreter6DoCallILb0ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+912)
#7 pc 00000000005d3ca8 /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+368)
#8 pc 0000000000142994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20)
#9 pc 00000000005d1400 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432)
#10 pc 0000000000142814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20)
#11 pc 00000000005d1400 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432)
#12 pc 0000000000142814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20)
#13 pc 00000000005d2c00 /apex/com.android.runtime/lib64/libart.so (MterpInvokeInterface+1752)
#14 pc 0000000000142a14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_interface+20)
#15 pc 00000000005d379c /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168)
#16 pc 0000000000142914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20)
#17 pc 00000000005d379c /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168)
#18 pc 0000000000142914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20)
#19 pc 00000000002ceeb4 /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.14109938010406342239+320)
#20 pc 00000000005c0d08 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012)
#21 pc 0000000000151468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88)
#22 pc 000000000002dc14 /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.internal.Util.closeQuietly+52)
#23 pc 000000000001bef4 /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.ConnectionPool.cleanup+628)
#24 pc 000000000001b61c /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.ConnectionPool$1.run+108)
#25 pc 00000000003d8d08 /system/framework/arm64/boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+984)
#26 pc 00000000003d5880 /system/framework/arm64/boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+64)
#27 pc 0000000000217fc8 /system/framework/arm64/boot.oat (java.lang.Thread.run+72)
#28 pc 0000000000148334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548)
#29 pc 00000000001571b4 /apex/com.android.runtime/lib64/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+252)
#30 pc 00000000004d9510 /apex/com.android.runtime/lib64/libart.so (_ZN3art12_GLOBAL__N_118InvokeWithArgArrayERKNS_33ScopedObjectAccessAlreadyRunnableEPNS_9ArtMethodEPNS0_8ArgArrayEPNS_6JValueEPKc+104)
#31 pc 00000000004da5a4 /apex/com.android.runtime/lib64/libart.so (_ZN3art35InvokeVirtualOrInterfaceWithJValuesERKNS_33ScopedObjectAccessAlreadyRunnableEP8_jobjectP10_jmethodIDPK6jvalue+416)
#32 pc 000000000051eb10 /apex/com.android.runtime/lib64/libart.so (_ZN3art6Thread14CreateCallbackEPv+1232)
#33 pc 00000000000cf7c0 /apex/com.android.runtime/lib64/bionic/libc.so (_ZL15__pthread_startPv+36)
#34 pc 00000000000721a8 /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64)
at com.android.org.conscrypt.NativeCrypto.SSL_get_time(Native method)
at com.android.org.conscrypt.NativeSsl.getTime(NativeSsl.java:101)
at com.android.org.conscrypt.ActiveSession.isValid(ActiveSession.java:148)
at com.android.org.conscrypt.ActiveSession.getSessionContext(ActiveSession.java:67)
at com.android.org.conscrypt.SessionSnapshot.(SessionSnapshot.java:46)
at com.android.org.conscrypt.ConscryptFileDescriptorSocket.transitionTo(ConscryptFileDescriptorSocket.java:1168)
at com.android.org.conscrypt.ConscryptFileDescriptorSocket.close(ConscryptFileDescriptorSocket.java:970)
at com.android.okhttp.internal.Util.closeQuietly(Util.java:91)
at com.android.okhttp.ConnectionPool.cleanup(ConnectionPool.java:288)
at com.android.okhttp.ConnectionPool$1.run(ConnectionPool.java:99)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1167)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:641)
at java.lang.Thread.run(Thread.java:929)
from conscrypt.
Could this be related to the below issue?
#1131
from conscrypt.
More complete information。
07-14 10:11:00.455 2536 2536 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
07-14 10:11:00.455 2536 2536 F DEBUG : Build fingerprint: 'HUAWEI/VOG-AL00/HWVOG:10/HUAWEIVOG-AL00/10.1.0.162C00:user/release-keys'
07-14 10:11:00.455 2536 2536 F DEBUG : Revision: '0'
07-14 10:11:00.455 2536 2536 F DEBUG : ABI: 'arm64'
07-14 10:11:00.458 2536 2536 F DEBUG : SYSVMTYPE: Maple
07-14 10:11:00.458 2536 2536 F DEBUG : APPVMTYPE: Art
07-14 10:11:00.459 2536 2536 F DEBUG : Timestamp: 2023-07-14 10:11:00+0800
07-14 10:11:00.459 2536 2536 F DEBUG : pid: 30436, tid: 30658, name: OkHttp Connecti >>> com.liquid.poros <<<
07-14 10:11:00.459 2536 2536 F DEBUG : uid: 10830
07-14 10:11:00.459 2536 2536 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x10000012c
07-14 10:11:00.459 2536 2536 F DEBUG : Abort message: '=== crash(signal 11) ==='
07-14 10:11:00.459 2536 2536 F DEBUG : x0 0000000100000064 x1 00000077119127c4 x2 0000007720e48448 x3 00000077119127c8
07-14 10:11:00.459 2536 2536 F DEBUG : x4 0000000000000000 x5 0000000000000001 x6 000000000000000d x7 0000000000000001
07-14 10:11:00.459 2536 2536 F DEBUG : x8 00000076b707d708 x9 a20c4170e74c4ead x10 0000000000430000 x11 0000007711912740
07-14 10:11:00.459 2536 2536 F DEBUG : x12 00000077119127c8 x13 00000077119127b8 x14 0000000000000001 x15 0000000000000000
07-14 10:11:00.459 2536 2536 F DEBUG : x16 000000777b6bbdd8 x17 000000777b7fd6ec x18 000000770b734000 x19 0000000100000064
07-14 10:11:00.459 2536 2536 F DEBUG : x20 0000000000000000 x21 0000000000000000 x22 0000007711912a50 x23 000000778b2ab24e
07-14 10:11:00.459 2536 2536 F DEBUG : x24 000000000000000c x25 0000007711914020 x26 0000007720d8b4b0 x27 0000000000000003
07-14 10:11:00.459 2536 2536 F DEBUG : x28 00000077119127d0 x29 0000007711912790
07-14 10:11:00.459 2536 2536 F DEBUG : sp 0000007711912770 lr 000000777b6ac6b4 pc 000000777b7fd6f0
07-14 10:11:00.628 2536 2536 F DEBUG :
07-14 10:11:00.628 2536 2536 F DEBUG : backtrace:
07-14 10:11:00.628 2536 2536 F DEBUG : #00 pc 000000000003b6f0 /apex/com.android.conscrypt/lib64/libssl.so (SSL_SESSION_get_time+4) (BuildId: 261c5413c2ac743c85e74a96f5b0302d)
07-14 10:11:00.628 2536 2536 F DEBUG : #1 pc 00000000000336b0 /apex/com.android.conscrypt/lib64/libjavacrypto.so (NativeCrypto_SSL_get_time(_JNIEnv*, _jclass*, long, _jobject*)+124) (BuildId: 4b40e90656ffeb62f3d075f027ef342e)
07-14 10:11:00.628 2536 2536 F DEBUG : #2 pc 0000000000151350 /apex/com.android.runtime/lib64/libart.so (art_quick_generic_jni_trampoline+144) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #3 pc 00000000001485b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #4 pc 00000000001571d4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+284) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #5 pc 00000000002fe588 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #6 pc 00000000002f9858 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+912) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #7 pc 00000000005d3ca8 /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+368) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #8 pc 0000000000142994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #9 pc 00000000000229ac /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.NativeSsl.getTime+4)
07-14 10:11:00.628 2536 2536 F DEBUG : #10 pc 00000000005d1400 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #11 pc 0000000000142814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #12 pc 000000000001414a /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ActiveSession.isValid+10)
07-14 10:11:00.628 2536 2536 F DEBUG : #13 pc 00000000005d1400 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #14 pc 0000000000142814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #15 pc 00000000000144a4 /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ActiveSession.getSessionContext)
07-14 10:11:00.628 2536 2536 F DEBUG : #16 pc 00000000005d2c00 /apex/com.android.runtime/lib64/libart.so (MterpInvokeInterface+1752) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #17 pc 0000000000142a14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_interface+20) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #18 pc 000000000003475a /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.SessionSnapshot.+6)
07-14 10:11:00.628 2536 2536 F DEBUG : #19 pc 00000000005d379c /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #20 pc 0000000000142914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #21 pc 000000000001b970 /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ConscryptFileDescriptorSocket.transitionTo+48)
07-14 10:11:00.628 2536 2536 F DEBUG : #22 pc 00000000005d379c /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #23 pc 0000000000142914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #24 pc 000000000001aec0 /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ConscryptFileDescriptorSocket.close+32)
07-14 10:11:00.628 2536 2536 F DEBUG : #25 pc 00000000002ceeb4 /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.14109938010406342239+320) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #26 pc 00000000005c0d08 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #27 pc 0000000000151468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.628 2536 2536 F DEBUG : #28 pc 000000000002dc14 /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.internal.Util.closeQuietly+52) (BuildId: 4ee8c3ad33f07198b6f51719dbbfc3605e114d58)
07-14 10:11:00.628 2536 2536 F DEBUG : #29 pc 000000000001bef4 /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.ConnectionPool.cleanup+628) (BuildId: 4ee8c3ad33f07198b6f51719dbbfc3605e114d58)
07-14 10:11:00.628 2536 2536 F DEBUG : #30 pc 000000000001b61c /system/framework/arm64/boot-okhttp.oat (com.android.okhttp.ConnectionPool$1.run+108) (BuildId: 4ee8c3ad33f07198b6f51719dbbfc3605e114d58)
07-14 10:11:00.628 2536 2536 F DEBUG : #31 pc 00000000003d8d08 /system/framework/arm64/boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+984) (BuildId: be0636a8794e8476014dfe666990f9ea4ca89df2)
07-14 10:11:00.628 2536 2536 F DEBUG : #32 pc 00000000003d5880 /system/framework/arm64/boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+64) (BuildId: be0636a8794e8476014dfe666990f9ea4ca89df2)
07-14 10:11:00.628 2536 2536 F DEBUG : #33 pc 0000000000217fc8 /system/framework/arm64/boot.oat (java.lang.Thread.run+72) (BuildId: be0636a8794e8476014dfe666990f9ea4ca89df2)
07-14 10:11:00.628 2536 2536 F DEBUG : #34 pc 0000000000148334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.629 2536 2536 F DEBUG : #35 pc 00000000001571b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+252) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.629 2536 2536 F DEBUG : #36 pc 00000000004d9510 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.629 2536 2536 F DEBUG : #37 pc 00000000004da5a4 /apex/com.android.runtime/lib64/libart.so (art::InvokeVirtualOrInterfaceWithJValues(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, jvalue const*)+416) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.629 2536 2536 F DEBUG : #38 pc 000000000051eb10 /apex/com.android.runtime/lib64/libart.so (art::Thread::CreateCallback(void*)+1232) (BuildId: 73a2145672853571ef40097e4441d44e)
07-14 10:11:00.629 2536 2536 F DEBUG : #39 pc 00000000000cf7c0 /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+36) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
07-14 10:11:00.629 2536 2536 F DEBUG : #40 pc 00000000000721a8 /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
from conscrypt.
Could this be related to the below issue? #1131
Nope, that's something different (but I don't know what).
from conscrypt.
Sorry, I meant to get to this last week... Responded on https://issuetracker.google.com/291528229
from conscrypt.
Related Issues (20)
- Value of Public Exponent is longer than 5 bytes, Signature.isVerify will always return false. HOT 4
- are methods connect() and accept() asynchronous in conscrypt? HOT 1
- Certificate verify in conscrypt is not follow RFC2818 HOT 2
- Decrypt conscrypt code
- Additional secure PSK cipher suites
- Need help to understand this point of validating the trust. HOT 2
- Virtual thread pinning using Conscrypt with Socket APIs HOT 5
- jmigrate reports errors with org.conscrypt.Platform library HOT 1
- Remove sun.security.x509 dependency
- Can armeabi architecture be supported?
- May I ask how to build Android so files? HOT 2
- OpenSSLX509CRLEntry.hasUnsupportedCriticalExtension shouldn't call X509_supported_extensions HOT 2
- Sangat Berpuas Hati Dengan meneruskan, anda bersetuju Google menggunakan jawapan, maklumat akaun & sistem anda untuk meningkatkan perkhidmatan, mengikut Privasi & Syarat kami . HOT 1
- Native crash with latest BoringSSL HOT 8
- Recommended way to use Pre-Shared Key ?
- OkHttp Websocket connection failing few seconds after getting connected
- RSA "NoPadding" encryption is considered not secure but required by conscrypt to support TLS RSA-PSS signing algorithm HOT 8
- SSP... VLMC.Hammer HOT 2
- Compatibility Issue with GLIBC 2.12 on CentOS 6
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from conscrypt.