You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This issue does not happen consistently; it seems to be a one-time occurrence during stress testing.
I am using OkHttp 4.10.0, and the backtrace log is provided below.
Has this issue already been reported?
11-18 19:56:30.927 F 15295 15295 DEBUG : signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x0000006f000f0fc0
11-18 19:56:30.927 F 15295 15295 DEBUG : x0 0000006ff8a13898 x1 0000006fe92c7da0 x2 0000006fe92c7e20 x3 0000006fe92c7af0
11-18 19:56:30.927 F 15295 15295 DEBUG : x4 0000006fe92c7ae8 x5 0000006fe92c7ae0 x6 0000006fe92c7adc x7 0000000000000018
11-18 19:56:30.927 F 15295 15295 DEBUG : x8 0000006f000f0fc0 x9 0000000000000000 x10 0000006f000eefc0 x11 0000000000000001
11-18 19:56:30.927 F 15295 15295 DEBUG : x12 0000006fddcaa3d8 x13 000000000000001c x14 000000000000000a x15 0000000014350f34
11-18 19:56:30.927 F 15295 15295 DEBUG : x16 00000072a6308230 x17 00000072a4e2cfb8 x18 0000006ed173a000 x19 0000006fe92c7ae8
11-18 19:56:30.927 F 15295 15295 DEBUG : x20 0000006fe92c7e20 x21 0000006fe92c7adc x22 0000006fe92c7af0 x23 0000006fe92c7ae0
11-18 19:56:30.927 F 15295 15295 DEBUG : x24 0000006f001f5000 x25 0000007001e950b0 x26 0000007001e950b0 x27 00000072a6309328
11-18 19:56:30.927 F 15295 15295 DEBUG : x28 0000000000000000 x29 0000006fe92c7a80
11-18 19:56:30.927 F 15295 15295 DEBUG : lr 0018bfeff830eb54 sp 0000006fe92c7a60 pc 0000006ff87355ec pst 0000000080001000
11-18 19:56:30.927 F 15295 15295 DEBUG : backtrace:
11-18 19:56:30.928 F 15295 15295 DEBUG : #00 pc 00000000007355ec /apex/com.android.art/lib64/libart.so (art::FaultManager::GetMethodAndReturnPcAndSp(siginfo*, void*, art::ArtMethod**, unsigned long*, unsigned long*, bool*)+136) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #1 pc 000000000030eb50 /apex/com.android.art/lib64/libart.so (art::FaultManager::IsInGeneratedCode(siginfo*, void*, bool)+172) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #2 pc 000000000030e59c /apex/com.android.art/lib64/libart.so (art::FaultManager::HandleFault(int, siginfo*, void*)+96) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #3 pc 0000000000002338 /apex/com.android.art/lib64/libsigchain.so (art::SignalChain::Handler(int, siginfo*, void*)+664) (BuildId: 68f0a1dc44f1db023e992ca3a07b361c)
11-18 19:56:30.928 F 15295 15295 DEBUG : #4 pc 000000000000084c [vdso]
11-18 19:56:30.928 F 15295 15295 DEBUG : #5 pc 0000000000641770 /apex/com.android.art/lib64/libart.so (art::StackVisitor::StackVisitor(art::Thread*, art::Context*, art::StackVisitor::StackWalkKind, bool)+104) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #6 pc 000000000066a208 /apex/com.android.art/lib64/libart.so (art::Thread::IsJniTransitionReference(_jobject*) const+148) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #7 pc 0000000000446f70 /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::ScopedCheck::CheckInstance(art::ScopedObjectAccess&, art::(anonymous namespace)::ScopedCheck::InstanceKind, _jobject*, bool)+184) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #8 pc 0000000000445ac0 /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::ScopedCheck::CheckPossibleHeapValue(art::ScopedObjectAccess&, char, art::(anonymous namespace)::JniValueType)+624) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #9 pc 000000000044519c /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::ScopedCheck::Check(art::ScopedObjectAccess&, bool, char const*, art::(anonymous namespace)::JniValueType*)+796) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #10 pc 000000000044c834 /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::CheckJNI::GetField(char const*, _JNIEnv*, _jobject*, _jfieldID*, bool, art::Primitive::Type)+656) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #11 pc 0000000000439c18 /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::CheckJNI::GetIntField(_JNIEnv*, _jobject*, _jfieldID*) (.llvm.6146486393825068690)+40) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #12 pc 000000000002b168 /apex/com.android.art/lib64/libopenjdk.so (SocketInputStream_socketRead0+120) (BuildId: f917216b99bf8c1ae94b166fa019c416)
11-18 19:56:30.928 F 15295 15295 DEBUG : #13 pc 000000000009a2d0 /system/framework/arm64/boot.oat (art_jni_trampoline+144) (BuildId: 87b08e02b2245437b28f15a710c1909b81a235f4)
11-18 19:56:30.928 F 15295 15295 DEBUG : #14 pc 0000000002000448 /memfd:jit-cache (deleted) (offset 0x2000000) (java.net.SocketInputStream.socketRead+120)
11-18 19:56:30.928 F 15295 15295 DEBUG : #15 pc 000000000217f300 /memfd:jit-cache (deleted) (offset 0x2000000) (java.net.SocketInputStream.read+496)
11-18 19:56:30.928 F 15295 15295 DEBUG : #16 pc 000000000229e6d8 /memfd:jit-cache (deleted) (offset 0x2000000) (java.net.SocketInputStream.read+232)
11-18 19:56:30.928 F 15295 15295 DEBUG : #17 pc 0000000002160080 /memfd:jit-cache (deleted) (offset 0x2000000) (com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.readFromSocket+384)
11-18 19:56:30.928 F 15295 15295 DEBUG : #18 pc 00000000020c5bb4 /memfd:jit-cache (deleted) (offset 0x2000000) (com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.processDataFromSocket+1236)
11-18 19:56:30.928 F 15295 15295 DEBUG : #19 pc 000000000020a2b0 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #20 pc 0000000000017d0c /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.-$$Nest$mprocessDataFromSocket+0)
11-18 19:56:30.928 F 15295 15295 DEBUG : #21 pc 000000000200d4a8 /memfd:jit-cache (deleted) (offset 0x2000000) (com.android.org.conscrypt.ConscryptEngineSocket.doHandshake+856)
11-18 19:56:30.928 F 15295 15295 DEBUG : #22 pc 00000000021880ac /memfd:jit-cache (deleted) (offset 0x2000000) (com.android.org.conscrypt.ConscryptEngineSocket.startHandshake+460)
11-18 19:56:30.928 F 15295 15295 DEBUG : #23 pc 00000000021fdd14 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.RealConnection.connectTls+1108)
11-18 19:56:30.928 F 15295 15295 DEBUG : #24 pc 000000000209a3dc /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.RealConnection.establishProtocol+812)
11-18 19:56:30.928 F 15295 15295 DEBUG : #25 pc 0000000002073594 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.RealConnection.connect+2244)
11-18 19:56:30.928 F 15295 15295 DEBUG : #26 pc 0000000002013f68 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.ExchangeFinder.findConnection+3512)
11-18 19:56:30.928 F 15295 15295 DEBUG : #27 pc 00000000021f5af8 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.ExchangeFinder.findHealthyConnection+136)
11-18 19:56:30.928 F 15295 15295 DEBUG : #28 pc 000000000229a99c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.ExchangeFinder.find+636)
11-18 19:56:30.928 F 15295 15295 DEBUG : #29 pc 000000000201d688 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.RealCall.initExchange$okhttp+312)
11-18 19:56:30.928 F 15295 15295 DEBUG : #30 pc 00000000020fa790 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.ConnectInterceptor.intercept+288)
11-18 19:56:30.928 F 15295 15295 DEBUG : #31 pc 00000000022fa51c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RealInterceptorChain.proceed+1180)
11-18 19:56:30.929 F 15295 15295 DEBUG : #32 pc 000000000221e510 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.cache.CacheInterceptor.intercept+2496)
11-18 19:56:30.929 F 15295 15295 DEBUG : #33 pc 00000000022fa51c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RealInterceptorChain.proceed+1180)
11-18 19:56:30.930 F 15295 15295 DEBUG : #34 pc 00000000021d888c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.BridgeInterceptor.intercept+2076)
11-18 19:56:30.931 F 15295 15295 DEBUG : #35 pc 00000000022fa51c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RealInterceptorChain.proceed+1180)
11-18 19:56:30.932 F 15295 15295 DEBUG : #36 pc 0000000002299a54 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RetryAndFollowUpInterceptor.intercept+580)
11-18 19:56:30.932 F 15295 15295 DEBUG : #37 pc 00000000022fa51c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RealInterceptorChain.proceed+1180)
Many thanks in advance.
The text was updated successfully, but these errors were encountered:
OkHttp is in the stacktrace, but it's nowhere near the bottom. I can't see how this would be related to anything this library is specifically doing as it interacts with the multiple lower layers below which this exception occurs.
This issue does not happen consistently; it seems to be a one-time occurrence during stress testing.
I am using OkHttp 4.10.0, and the backtrace log is provided below.
Has this issue already been reported?
11-18 19:56:30.927 F 15295 15295 DEBUG : signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x0000006f000f0fc0
11-18 19:56:30.927 F 15295 15295 DEBUG : x0 0000006ff8a13898 x1 0000006fe92c7da0 x2 0000006fe92c7e20 x3 0000006fe92c7af0
11-18 19:56:30.927 F 15295 15295 DEBUG : x4 0000006fe92c7ae8 x5 0000006fe92c7ae0 x6 0000006fe92c7adc x7 0000000000000018
11-18 19:56:30.927 F 15295 15295 DEBUG : x8 0000006f000f0fc0 x9 0000000000000000 x10 0000006f000eefc0 x11 0000000000000001
11-18 19:56:30.927 F 15295 15295 DEBUG : x12 0000006fddcaa3d8 x13 000000000000001c x14 000000000000000a x15 0000000014350f34
11-18 19:56:30.927 F 15295 15295 DEBUG : x16 00000072a6308230 x17 00000072a4e2cfb8 x18 0000006ed173a000 x19 0000006fe92c7ae8
11-18 19:56:30.927 F 15295 15295 DEBUG : x20 0000006fe92c7e20 x21 0000006fe92c7adc x22 0000006fe92c7af0 x23 0000006fe92c7ae0
11-18 19:56:30.927 F 15295 15295 DEBUG : x24 0000006f001f5000 x25 0000007001e950b0 x26 0000007001e950b0 x27 00000072a6309328
11-18 19:56:30.927 F 15295 15295 DEBUG : x28 0000000000000000 x29 0000006fe92c7a80
11-18 19:56:30.927 F 15295 15295 DEBUG : lr 0018bfeff830eb54 sp 0000006fe92c7a60 pc 0000006ff87355ec pst 0000000080001000
11-18 19:56:30.927 F 15295 15295 DEBUG : backtrace:
11-18 19:56:30.928 F 15295 15295 DEBUG : #00 pc 00000000007355ec /apex/com.android.art/lib64/libart.so (art::FaultManager::GetMethodAndReturnPcAndSp(siginfo*, void*, art::ArtMethod**, unsigned long*, unsigned long*, bool*)+136) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #1 pc 000000000030eb50 /apex/com.android.art/lib64/libart.so (art::FaultManager::IsInGeneratedCode(siginfo*, void*, bool)+172) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #2 pc 000000000030e59c /apex/com.android.art/lib64/libart.so (art::FaultManager::HandleFault(int, siginfo*, void*)+96) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #3 pc 0000000000002338 /apex/com.android.art/lib64/libsigchain.so (art::SignalChain::Handler(int, siginfo*, void*)+664) (BuildId: 68f0a1dc44f1db023e992ca3a07b361c)
11-18 19:56:30.928 F 15295 15295 DEBUG : #4 pc 000000000000084c [vdso]
11-18 19:56:30.928 F 15295 15295 DEBUG : #5 pc 0000000000641770 /apex/com.android.art/lib64/libart.so (art::StackVisitor::StackVisitor(art::Thread*, art::Context*, art::StackVisitor::StackWalkKind, bool)+104) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #6 pc 000000000066a208 /apex/com.android.art/lib64/libart.so (art::Thread::IsJniTransitionReference(_jobject*) const+148) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #7 pc 0000000000446f70 /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::ScopedCheck::CheckInstance(art::ScopedObjectAccess&, art::(anonymous namespace)::ScopedCheck::InstanceKind, _jobject*, bool)+184) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #8 pc 0000000000445ac0 /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::ScopedCheck::CheckPossibleHeapValue(art::ScopedObjectAccess&, char, art::(anonymous namespace)::JniValueType)+624) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #9 pc 000000000044519c /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::ScopedCheck::Check(art::ScopedObjectAccess&, bool, char const*, art::(anonymous namespace)::JniValueType*)+796) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #10 pc 000000000044c834 /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::CheckJNI::GetField(char const*, _JNIEnv*, _jobject*, _jfieldID*, bool, art::Primitive::Type)+656) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #11 pc 0000000000439c18 /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::CheckJNI::GetIntField(_JNIEnv*, _jobject*, _jfieldID*) (.llvm.6146486393825068690)+40) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #12 pc 000000000002b168 /apex/com.android.art/lib64/libopenjdk.so (SocketInputStream_socketRead0+120) (BuildId: f917216b99bf8c1ae94b166fa019c416)
11-18 19:56:30.928 F 15295 15295 DEBUG : #13 pc 000000000009a2d0 /system/framework/arm64/boot.oat (art_jni_trampoline+144) (BuildId: 87b08e02b2245437b28f15a710c1909b81a235f4)
11-18 19:56:30.928 F 15295 15295 DEBUG : #14 pc 0000000002000448 /memfd:jit-cache (deleted) (offset 0x2000000) (java.net.SocketInputStream.socketRead+120)
11-18 19:56:30.928 F 15295 15295 DEBUG : #15 pc 000000000217f300 /memfd:jit-cache (deleted) (offset 0x2000000) (java.net.SocketInputStream.read+496)
11-18 19:56:30.928 F 15295 15295 DEBUG : #16 pc 000000000229e6d8 /memfd:jit-cache (deleted) (offset 0x2000000) (java.net.SocketInputStream.read+232)
11-18 19:56:30.928 F 15295 15295 DEBUG : #17 pc 0000000002160080 /memfd:jit-cache (deleted) (offset 0x2000000) (com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.readFromSocket+384)
11-18 19:56:30.928 F 15295 15295 DEBUG : #18 pc 00000000020c5bb4 /memfd:jit-cache (deleted) (offset 0x2000000) (com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.processDataFromSocket+1236)
11-18 19:56:30.928 F 15295 15295 DEBUG : #19 pc 000000000020a2b0 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 6a54f8661962284dce5ff311454a3f9a)
11-18 19:56:30.928 F 15295 15295 DEBUG : #20 pc 0000000000017d0c /apex/com.android.conscrypt/javalib/conscrypt.jar (com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.-$$Nest$mprocessDataFromSocket+0)
11-18 19:56:30.928 F 15295 15295 DEBUG : #21 pc 000000000200d4a8 /memfd:jit-cache (deleted) (offset 0x2000000) (com.android.org.conscrypt.ConscryptEngineSocket.doHandshake+856)
11-18 19:56:30.928 F 15295 15295 DEBUG : #22 pc 00000000021880ac /memfd:jit-cache (deleted) (offset 0x2000000) (com.android.org.conscrypt.ConscryptEngineSocket.startHandshake+460)
11-18 19:56:30.928 F 15295 15295 DEBUG : #23 pc 00000000021fdd14 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.RealConnection.connectTls+1108)
11-18 19:56:30.928 F 15295 15295 DEBUG : #24 pc 000000000209a3dc /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.RealConnection.establishProtocol+812)
11-18 19:56:30.928 F 15295 15295 DEBUG : #25 pc 0000000002073594 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.RealConnection.connect+2244)
11-18 19:56:30.928 F 15295 15295 DEBUG : #26 pc 0000000002013f68 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.ExchangeFinder.findConnection+3512)
11-18 19:56:30.928 F 15295 15295 DEBUG : #27 pc 00000000021f5af8 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.ExchangeFinder.findHealthyConnection+136)
11-18 19:56:30.928 F 15295 15295 DEBUG : #28 pc 000000000229a99c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.ExchangeFinder.find+636)
11-18 19:56:30.928 F 15295 15295 DEBUG : #29 pc 000000000201d688 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.RealCall.initExchange$okhttp+312)
11-18 19:56:30.928 F 15295 15295 DEBUG : #30 pc 00000000020fa790 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.connection.ConnectInterceptor.intercept+288)
11-18 19:56:30.928 F 15295 15295 DEBUG : #31 pc 00000000022fa51c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RealInterceptorChain.proceed+1180)
11-18 19:56:30.929 F 15295 15295 DEBUG : #32 pc 000000000221e510 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.cache.CacheInterceptor.intercept+2496)
11-18 19:56:30.929 F 15295 15295 DEBUG : #33 pc 00000000022fa51c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RealInterceptorChain.proceed+1180)
11-18 19:56:30.930 F 15295 15295 DEBUG : #34 pc 00000000021d888c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.BridgeInterceptor.intercept+2076)
11-18 19:56:30.931 F 15295 15295 DEBUG : #35 pc 00000000022fa51c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RealInterceptorChain.proceed+1180)
11-18 19:56:30.932 F 15295 15295 DEBUG : #36 pc 0000000002299a54 /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RetryAndFollowUpInterceptor.intercept+580)
11-18 19:56:30.932 F 15295 15295 DEBUG : #37 pc 00000000022fa51c /memfd:jit-cache (deleted) (offset 0x2000000) (okhttp3.internal.http.RealInterceptorChain.proceed+1180)
Many thanks in advance.
The text was updated successfully, but these errors were encountered: