Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The crash occurred while executing the RetryInterceptor. #8594

Closed
soulArche opened this issue Nov 26, 2024 · 1 comment
Closed

The crash occurred while executing the RetryInterceptor. #8594

soulArche opened this issue Nov 26, 2024 · 1 comment
Labels
bug Bug in existing code

Comments

@soulArche
Copy link

This issue does not happen consistently; it seems to be a one-time occurrence during stress testing.
I am using OkHttp 4.10.0, and the backtrace log is provided below.

Has this issue already been reported?

11-18 19:56:30.927 F 15295 15295 DEBUG : signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x0000006f000f0fc0
11-18 19:56:30.927 F 15295 15295 DEBUG : x0 0000006ff8a13898 x1 0000006fe92c7da0 x2 0000006fe92c7e20 x3 0000006fe92c7af0
11-18 19:56:30.927 F 15295 15295 DEBUG : x4 0000006fe92c7ae8 x5 0000006fe92c7ae0 x6 0000006fe92c7adc x7 0000000000000018
11-18 19:56:30.927 F 15295 15295 DEBUG : x8 0000006f000f0fc0 x9 0000000000000000 x10 0000006f000eefc0 x11 0000000000000001
11-18 19:56:30.927 F 15295 15295 DEBUG : x12 0000006fddcaa3d8 x13 000000000000001c x14 000000000000000a x15 0000000014350f34
11-18 19:56:30.927 F 15295 15295 DEBUG : x16 00000072a6308230 x17 00000072a4e2cfb8 x18 0000006ed173a000 x19 0000006fe92c7ae8
11-18 19:56:30.927 F 15295 15295 DEBUG : x20 0000006fe92c7e20 x21 0000006fe92c7adc x22 0000006fe92c7af0 x23 0000006fe92c7ae0
11-18 19:56:30.927 F 15295 15295 DEBUG : x24 0000006f001f5000 x25 0000007001e950b0 x26 0000007001e950b0 x27 00000072a6309328
11-18 19:56:30.927 F 15295 15295 DEBUG : x28 0000000000000000 x29 0000006fe92c7a80
11-18 19:56:30.927 F 15295 15295 DEBUG : lr 0018bfeff830eb54 sp 0000006fe92c7a60 pc 0000006ff87355ec pst 0000000080001000
11-18 19:56:30.927 F 15295 15295 DEBUG : backtrace:
11-18 19:56:30.928 F 15295 15295 DEBUG : #00 pc 00000000007355ec /apex/com.android.art/lib64/libart.so (art::FaultManager::GetMethodAndReturnPcAndSp(siginfo*, void*, art::ArtMethod**, unsigned long*, unsigned long*, bool*)+136) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #1 pc 000000000030eb50 /apex/com.android.art/lib64/libart.so (art::FaultManager::IsInGeneratedCode(siginfo*, void*, bool)+172) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #2 pc 000000000030e59c /apex/com.android.art/lib64/libart.so (art::FaultManager::HandleFault(int, siginfo*, void*)+96) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #3 pc 0000000000002338 /apex/com.android.art/lib64/libsigchain.so (art::SignalChain::Handler(int, siginfo*, void*)+664) (BuildId: 68f0a1dc44f1db023e992ca3a07b361c)
11-18 19:56:30.928 F 15295 15295 DEBUG : #4 pc 000000000000084c [vdso]
11-18 19:56:30.928 F 15295 15295 DEBUG : #5 pc 0000000000641770 /apex/com.android.art/lib64/libart.so (art::StackVisitor::StackVisitor(art::Thread*, art::Context*, art::StackVisitor::StackWalkKind, bool)+104) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #6 pc 000000000066a208 /apex/com.android.art/lib64/libart.so (art::Thread::IsJniTransitionReference(_jobject*) const+148) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #7 pc 0000000000446f70 /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::ScopedCheck::CheckInstance(art::ScopedObjectAccess&, art::(anonymous namespace)::ScopedCheck::InstanceKind, _jobject*, bool)+184) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #8 pc 0000000000445ac0 /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::ScopedCheck::CheckPossibleHeapValue(art::ScopedObjectAccess&, char, art::(anonymous namespace)::JniValueType)+624) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #9 pc 000000000044519c /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::ScopedCheck::Check(art::ScopedObjectAccess&, bool, char const*, art::(anonymous namespace)::JniValueType*)+796) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #10 pc 000000000044c834 /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::CheckJNI::GetField(char const*, _JNIEnv*, _jobject*, _jfieldID*, bool, art::Primitive::Type)+656) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #11 pc 0000000000439c18 /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::CheckJNI::GetIntField(_JNIEnv*, _jobject*, _jfieldID*) (.llvm.6146486393825068690)+40) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #12 pc 000000000002b168 /apex/com.android.art/lib64/libopenjdk.so (SocketInputStream_socketRead0+120) (BuildId: f917216b99bf8c1ae94b166fa019c416)
11-18 19:56:30.928 F 15295 15295 DEBUG : #13 pc 000000000009a2d0 /system/framework/arm64/boot.oat (art_jni_trampoline+144) (BuildId: 87b08e02b2245437b28f15a710c1909b81a235f4)
11-18 19:56:30.928 F 15295 15295 DEBUG : #14 pc 0000000002000448 /memfd:jit-cache (deleted) (offset 0x2000000) (java.net.SocketInputStream.socketRead+120)
11-18 19:56:30.928 F 15295 15295 DEBUG : #15 pc 000000000217f300 /memfd:jit-cache (deleted) (offset 0x2000000) (java.net.SocketInputStream.read+496)
11-18 19:56:30.928 F 15295 15295 DEBUG : #16 pc 000000000229e6d8 /memfd:jit-cache (deleted) (offset 0x2000000) (java.net.SocketInputStream.read+232)
11-18 19:56:30.928 F 15295 15295 DEBUG : #17 pc 0000000002160080 /memfd:jit-cache (deleted) (offset 0x2000000) (com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.readFromSocket+384)
11-18 19:56:30.928 F 15295 15295 DEBUG : #18 pc 00000000020c5bb4 /memfd:jit-cache (deleted) (offset 0x2000000) (com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.processDataFromSocket+1236)
11-18 19:56:30.928 F 15295 15295 DEBUG : #19 pc 000000000020a2b0 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #20 pc 0000000000017d0c /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.-$$Nest$mprocessDataFromSocket+0)
11-18 19:56:30.928 F 15295 15295 DEBUG : #21 pc 000000000200d4a8 /memfd:jit-cache (deleted) (offset 0x2000000) (com.android.org.conscrypt.ConscryptEngineSocket.doHandshake+856)
11-18 19:56:30.928 F 15295 15295 DEBUG : #22 pc 00000000021880ac /memfd:jit-cache (deleted) (offset 0x2000000) (com.android.org.conscrypt.ConscryptEngineSocket.startHandshake+460)
11-18 19:56:30.928 F 15295 15295 DEBUG : #23 pc 00000000021fdd14 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.RealConnection.connectTls+1108)
11-18 19:56:30.928 F 15295 15295 DEBUG : #24 pc 000000000209a3dc /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.RealConnection.establishProtocol+812)
11-18 19:56:30.928 F 15295 15295 DEBUG : #25 pc 0000000002073594 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.RealConnection.connect+2244)
11-18 19:56:30.928 F 15295 15295 DEBUG : #26 pc 0000000002013f68 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.ExchangeFinder.findConnection+3512)
11-18 19:56:30.928 F 15295 15295 DEBUG : #27 pc 00000000021f5af8 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.ExchangeFinder.findHealthyConnection+136)
11-18 19:56:30.928 F 15295 15295 DEBUG : #28 pc 000000000229a99c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.ExchangeFinder.find+636)
11-18 19:56:30.928 F 15295 15295 DEBUG : #29 pc 000000000201d688 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.RealCall.initExchange$okhttp+312)
11-18 19:56:30.928 F 15295 15295 DEBUG : #30 pc 00000000020fa790 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.ConnectInterceptor.intercept+288)
11-18 19:56:30.928 F 15295 15295 DEBUG : #31 pc 00000000022fa51c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RealInterceptorChain.proceed+1180)
11-18 19:56:30.929 F 15295 15295 DEBUG : #32 pc 000000000221e510 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.cache.CacheInterceptor.intercept+2496)
11-18 19:56:30.929 F 15295 15295 DEBUG : #33 pc 00000000022fa51c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RealInterceptorChain.proceed+1180)
11-18 19:56:30.930 F 15295 15295 DEBUG : #34 pc 00000000021d888c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.BridgeInterceptor.intercept+2076)
11-18 19:56:30.931 F 15295 15295 DEBUG : #35 pc 00000000022fa51c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RealInterceptorChain.proceed+1180)
11-18 19:56:30.932 F 15295 15295 DEBUG : #36 pc 0000000002299a54 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RetryAndFollowUpInterceptor.intercept+580)
11-18 19:56:30.932 F 15295 15295 DEBUG : #37 pc 00000000022fa51c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RealInterceptorChain.proceed+1180)

Many thanks in advance.

@soulArche soulArche added the bug Bug in existing code label Nov 26, 2024
@JakeWharton
Copy link
Collaborator

OkHttp is in the stacktrace, but it's nowhere near the bottom. I can't see how this would be related to anything this library is specifically doing as it interacts with the multiple lower layers below which this exception occurs.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Bug in existing code
Projects
None yet
Development

No branches or pull requests

3 participants