Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Crash when accepting/rejecting certain custom certificates (since 4.4.6) #1288

Closed
rfc2822 opened this issue Feb 1, 2025 · 2 comments · Fixed by #1290
Closed

Crash when accepting/rejecting certain custom certificates (since 4.4.6) #1288

rfc2822 opened this issue Feb 1, 2025 · 2 comments · Fixed by #1290
Assignees
Labels
bug Something isn't working

Comments

@rfc2822
Copy link
Member

rfc2822 commented Feb 1, 2025

DAVx5 crashes when accepting/rejecting custom certificates.

From Google Play console / crashes:

*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 26574 >>> at.bitfire.davdroid <<<

backtrace:
  #00  pc 0x00000000000950b0  /apex/com.android.runtime/lib64/bionic/libc.so (abort+168)
  #01  pc 0x0000000000140fbc  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/split_config.arm64_v8a.apk!libconscrypt_jni.so (X509_NAME_print+344) (BuildId: f1446306c60470b344a50f938f9632ca54d8b4e4)
  #02  pc 0x000000000014027c  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/split_config.arm64_v8a.apk!libconscrypt_jni.so (X509_print_ex+664) (BuildId: f1446306c60470b344a50f938f9632ca54d8b4e4)
  #03  pc 0x00000000000790d8  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/split_config.arm64_v8a.apk!libconscrypt_jni.so (BuildId: f1446306c60470b344a50f938f9632ca54d8b4e4)
  #04  pc 0x00000000000ed5e8  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (art_jni_trampoline+136)
  #05  pc 0x000000000078007c  /apex/com.android.art/lib64/libart.so (nterp_helper+3852)
  #06  pc 0x000000000004b15a  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/base.apk (org.conscrypt.OpenSSLX509Certificate.toString+34)
  #07  pc 0x000000000049ec68  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (java.lang.StringBuilder.append+72)
  #08  pc 0x0000000000780120  /apex/com.android.art/lib64/libart.so (nterp_helper+4016)
  #09  pc 0x00000000003e9116  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/base.apk (at.bitfire.cert4android.CustomCertStore.setTrustedByUser+38)
  #10  pc 0x00000000007800c4  /apex/com.android.art/lib64/libart.so (nterp_helper+3924)
  #11  pc 0x00000000003ec356  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/base.apk (at.bitfire.cert4android.UserDecisionRegistry.onUserDecision+70)
  #12  pc 0x00000000007800c4  /apex/com.android.art/lib64/libart.so (nterp_helper+3924)
  #13  pc 0x00000000003eac10  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/base.apk (at.bitfire.cert4android.TrustCertificateActivity$Model.registerDecision+28)
  #14  pc 0x00000000007800c4  /apex/com.android.art/lib64/libart.so (nterp_helper+3924)
  #15  pc 0x00000000003eb27c  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/base.apk (at.bitfire.cert4android.TrustCertificateActivity$onCreate$2$1.invoke$lambda$1$lambda$0+8)
  #16  pc 0x000000000077f1a4  /apex/com.android.art/lib64/libart.so (nterp_helper+52)
  #17  pc 0x00000000003eb258  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/base.apk (at.bitfire.cert4android.TrustCertificateActivity$onCreate$2$1.$r8$lambda$Q6sgGvT7cnfNjvg_QqRRe_TpPgk)
  #18  pc 0x000000000077f1a4  /apex/com.android.art/lib64/libart.so (nterp_helper+52)
  #19  pc 0x00000000003eb19c  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/base.apk (at.bitfire.cert4android.TrustCertificateActivity$onCreate$2$1$$ExternalSyntheticLambda0.invoke+16)
  #20  pc 0x0000000000780ee4  /apex/com.android.art/lib64/libart.so (nterp_helper+7540)
  #21  pc 0x00000000003e97f0  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/base.apk (at.bitfire.cert4android.TrustCertificateActivity$CertificateCard$1.invoke$lambda$13$lambda$12$lambda$9$lambda$8+4)
  #22  pc 0x000000000077f208  /apex/com.android.art/lib64/libart.so (nterp_helper+152)
  #23  pc 0x00000000003e97b0  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/base.apk (at.bitfire.cert4android.TrustCertificateActivity$CertificateCard$1.$r8$lambda$nQT5pD7IfTapQMqzJqq8iwSRlAU)
  #24  pc 0x000000000077f208  /apex/com.android.art/lib64/libart.so (nterp_helper+152)
  #25  pc 0x00000000003e9690  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/base.apk (at.bitfire.cert4android.TrustCertificateActivity$CertificateCard$1$$ExternalSyntheticLambda3.invoke+4)
  #26  pc 0x000000000016da6c  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (androidx.compose.foundation.ClickableNode$clickPointerInput$3.invoke+108)
  #27  pc 0x0000000000197cb4  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (androidx.compose.foundation.gestures.TapGestureDetectorKt$detectTapAndPress$2$1.invokeSuspend+1316)
  #28  pc 0x0000000002094610  /memfd:jit-cache (kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith+160)
  #29  pc 0x0000000000445570  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (kotlinx.coroutines.DispatchedTaskKt.resume+368)
  #30  pc 0x0000000000442100  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (kotlinx.coroutines.CancellableContinuationImpl.dispatchResume+1248)
  #31  pc 0x00000000020d98f8  /memfd:jit-cache (kotlinx.coroutines.CancellableContinuationImpl.resumeImpl$kotlinx_coroutines_core+680)
  #32  pc 0x0000000000442ca0  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (kotlinx.coroutines.CancellableContinuationImpl.resumeWith+192)
  #33  pc 0x0000000002011c18  /memfd:jit-cache (androidx.compose.ui.input.pointer.SuspendingPointerInputModifierNodeImpl.dispatchPointerEvent+344)
  #34  pc 0x000000000201191c  /memfd:jit-cache (androidx.compose.ui.input.pointer.SuspendingPointerInputModifierNodeImpl.onPointerEvent-H0pRuoY+284)
  #35  pc 0x00000000001642dc  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (androidx.compose.foundation.AbstractClickableNode.onPointerEvent-H0pRuoY+700)
  #36  pc 0x0000000000332b40  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (androidx.compose.ui.input.pointer.Node.dispatchMainEventPass+4384)
  #37  pc 0x0000000000332580  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (androidx.compose.ui.input.pointer.Node.dispatchMainEventPass+2912)
  #38  pc 0x0000000000332580  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (androidx.compose.ui.input.pointer.Node.dispatchMainEventPass+2912)
  #39  pc 0x0000000000332580  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (androidx.compose.ui.input.pointer.Node.dispatchMainEventPass+2912)
  #40  pc 0x0000000000332580  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (androidx.compose.ui.input.pointer.Node.dispatchMainEventPass+2912)
  #41  pc 0x000000000032d8fc  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (androidx.compose.ui.input.pointer.HitPathTracker.dispatchChanges+236)
  #42  pc 0x0000000000335910  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (androidx.compose.ui.input.pointer.PointerInputEventProcessor.process-BIzXfog+976)
  #43  pc 0x00000000003ad26c  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (androidx.compose.ui.platform.AndroidComposeView.sendMotionEvent-8iAsVTc+460)
  #44  pc 0x00000000003a4114  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (androidx.compose.ui.platform.AndroidComposeView.handleMotionEvent-8iAsVTc+2612)
  #45  pc 0x00000000003a2644  /data/app/~~Mmesx0RsGUN6IYUUeqvLtQ==/at.bitfire.davdroid-37BdOv-PJij-dgCu8VwQsw==/oat/arm64/base.odex (androidx.compose.ui.platform.AndroidComposeView.dispatchTouchEvent+836)
  #46  pc 0x0000000000c0a8a8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewGroup.dispatchTransformedTouchEvent+392)
  #47  pc 0x0000000000c11f2c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewGroup.dispatchTouchEvent+3948)
  #48  pc 0x0000000000c0a8a8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewGroup.dispatchTransformedTouchEvent+392)
  #49  pc 0x0000000000c11f2c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewGroup.dispatchTouchEvent+3948)
  #50  pc 0x0000000000c0a8a8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewGroup.dispatchTransformedTouchEvent+392)
  #51  pc 0x0000000000c11f2c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewGroup.dispatchTouchEvent+3948)
  #52  pc 0x0000000000c0a8a8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewGroup.dispatchTransformedTouchEvent+392)
  #53  pc 0x0000000000c11f2c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewGroup.dispatchTouchEvent+3948)
  #54  pc 0x0000000000d01e1c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.policy.DecorView.superDispatchTouchEvent+44)
  #55  pc 0x0000000000cdf694  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.policy.PhoneWindow.superDispatchTouchEvent+52)
  #56  pc 0x00000000008b167c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.Activity.dispatchTouchEvent+316)
  #57  pc 0x0000000000cfd168  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.policy.DecorView.dispatchTouchEvent+88)
  #58  pc 0x0000000000b972a8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl$ViewPostImeInputStage.processPointerEvent+872)
  #59  pc 0x0000000000b976c8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl$ViewPostImeInputStage.onProcess+136)
  #60  pc 0x0000000000ad22e8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl$InputStage.deliver+152)
  #61  pc 0x0000000000ad25b4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl$InputStage.onDeliverToNext+356)
  #62  pc 0x0000000000b94ff8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl$AsyncInputStage.forward+72)
  #63  pc 0x0000000000ad2174  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl$InputStage.apply+52)
  #64  pc 0x0000000000b94ec8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl$AsyncInputStage.apply+88)
  #65  pc 0x0000000000ad2368  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl$InputStage.deliver+280)
  #66  pc 0x0000000000ad25b4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl$InputStage.onDeliverToNext+356)
  #67  pc 0x0000000000ad242c  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl$InputStage.forward+44)
  #68  pc 0x0000000000ad2174  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl$InputStage.apply+52)
  #69  pc 0x0000000000ad2368  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl$InputStage.deliver+280)
  #70  pc 0x0000000000b9de88  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl.deliverInputEvent+2904)
  #71  pc 0x0000000000bb4a60  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl.doProcessInputEvents+432)
  #72  pc 0x0000000000bb50dc  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl.enqueueInputEvent+1148)
  #73  pc 0x0000000000b9a080  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.ViewRootImpl$WindowInputEventReceiver.onInputEvent+1632)
  #74  pc 0x0000000000ac3d20  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.view.InputEventReceiver.dispatchInputEvent+112)
  #75  pc 0x000000000036d574  /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+612)
  #76  pc 0x000000000036be04  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeVirtualOrInterfaceWithVarArgs<art::ArtMethod*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+812)
  #77  pc 0x000000000072de0c  /apex/com.android.art/lib64/libart.so (art::JNI<false>::CallVoidMethodV(_JNIEnv*, _jobject*, _jmethodID*, std::__va_list)+192)
  #78  pc 0x00000000000e3618  /system/lib64/libandroid_runtime.so (_JNIEnv::CallVoidMethod(_jobject*, _jmethodID*, ...)+124)
  #79  pc 0x0000000000159868  /system/lib64/libandroid_runtime.so (android::NativeInputEventReceiver::consumeEvents(_JNIEnv*, bool, long, bool*)+316)
  #80  pc 0x0000000000159664  /system/lib64/libandroid_runtime.so (android::NativeInputEventReceiver::handleEvent(int, int, void*)+180)
  #81  pc 0x0000000000018b70  /system/lib64/libutils.so (android::Looper::pollInner(int)+1252)
  #82  pc 0x0000000000018628  /system/lib64/libutils.so (android::Looper::pollOnce(int, int*, int*, void**)+124)
  #83  pc 0x0000000000190554  /system/lib64/libandroid_runtime.so (android::android_os_MessageQueue_nativePollOnce(_JNIEnv*, _jobject*, long, int)+48)
  #84  pc 0x00000000003323c0  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+112)
  #85  pc 0x0000000000977f68  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.MessageQueue.next+280)
  #86  pc 0x0000000000974fb8  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+88)
  #87  pc 0x0000000000974ec4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+916)
  #88  pc 0x0000000000708cc0  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+2128)
  #89  pc 0x000000000036d840  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #90  pc 0x0000000000369190  /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+732)
  #91  pc 0x00000000006c9134  /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32)
  #92  pc 0x0000000000338234  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
  #93  pc 0x0000000000ca5c44  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116)
  #94  pc 0x0000000000cb06c4  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+3396)
  #95  pc 0x000000000036d840  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640)
  #96  pc 0x0000000000358c08  /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
  #97  pc 0x0000000000356bbc  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+512)
  #98  pc 0x000000000073cefc  /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104)
  #99  pc 0x00000000000e4be8  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108)
  #00  pc 0x00000000000f15bc  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+856)
  #01  pc 0x0000000000002558  /system/bin/app_process64 (main+1280)
  #02  pc 0x000000000008d7c8  /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108)

Depends on bitfireAT/cert4android#47

@rfc2822 rfc2822 added the bug Something isn't working label Feb 1, 2025
@rfc2822
Copy link
Member Author

rfc2822 commented Feb 1, 2025

Looks like google/conscrypt#1268

@rfc2822 rfc2822 changed the title SIGABRT [split_config.arm64_v8a.apk!libconscrypt_jni.so] X509_NAME_print since 4.4.6 Crash when accepting/rejecting certain custom certificates (since 4.4.6) Feb 2, 2025
@github-actions github-actions bot removed the dependent label Feb 2, 2025
Copy link

github-actions bot commented Feb 2, 2025

@rfc2822 rfc2822 self-assigned this Feb 2, 2025
@github-project-automation github-project-automation bot moved this from Todo to Done in DAVx⁵ Releases Feb 2, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
Archived in project
Development

Successfully merging a pull request may close this issue.

1 participant