question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Fatal signal 11 (SIGSEGV), code 2 (SEGV_ACCERR)

See original GitHub issue

Hey there,

we recently upgraded to react-native 0.63.2 and we get the following launch crash on Samsung S9 devices running Android 10 in production (We don’t get that on other devices - i.e Google Pixel ones). Hermes is enabled.

The stacktrace that we get from our crash reporter is the following:

signal 11 (SIGSEGV), code 2 (SEGV_ACCERR)

*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
pid: 0, tid: 0 >>> com.example.app.android <<<

backtrace:
  #00  pc 00000000001ebcd0  /data/app/com.example.app.android-Ms1jPEUnno8T7Tc2wKQi7g==/split_config.arm64_v8a.apk!libregister.so (offset 0x134a000)
  #01  pc 0000000000415560  /data/app/com.example.app.android-Ms1jPEUnno8T7Tc2wKQi7g==/split_config.arm64_v8a.apk!libregister.so (offset 0x134a000)
  #02  pc 0000000000306b1c  /data/app/com.example.app.android-Ms1jPEUnno8T7Tc2wKQi7g==/split_config.arm64_v8a.apk!libregister.so (offset 0x134a000)
  #03  pc 00000000006593b0  /data/app/com.example.app.android-Ms1jPEUnno8T7Tc2wKQi7g==/split_config.arm64_v8a.apk!libregister.so (offset 0x134a000) (JNI_OnLoad+48028)
  #04  pc 000000000037cf34  /apex/com.android.runtime/lib64/libart.so (art::JavaVMExt::LoadNativeLibrary(_JNIEnv*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, _jobject*, _jclass*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>*)+3228)
  #05  pc 0000000000005184  /apex/com.android.runtime/lib64/libopenjdkjvm.so (JVM_NativeLoad+412)
  #06  pc 00000000000bfaf4  /system/framework/arm64/boot.oat (art_jni_trampoline+228)
  #07  pc 00000000000de63c  /system/framework/arm64/boot.oat (java.lang.Runtime.loadLibrary0+236)
  #08  pc 00000000000df5f4  /system/framework/arm64/boot.oat (java.lang.Runtime.loadLibrary0+180)
  #09  pc 00000000000e4150  /system/framework/arm64/boot.oat (java.lang.System.loadLibrary+96)
  #10  pc 00000000001375b8  /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568)
  #11  pc 00000000001460cc  /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276)
  #12  pc 00000000002e3d38  /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384)
  #13  pc 00000000002dedc4  /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+900)
  #14  pc 00000000005a5538  /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+368)
  #15  pc 0000000000131994  /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20)
  #16  pc 0000000002d86814  /data/app/com.example.app.android-Ms1jPEUnno8T7Tc2wKQi7g==/oat/arm64/base.vdex (shadow.com.getkeepsafe.relinker.SystemLibraryLoader.loadLibrary)
  #17  pc 00000000005a4494  /apex/com.android.runtime/lib64/libart.so (MterpInvokeInterface+1740)
  #18  pc 0000000000131a14  /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_interface+20)
  #19  pc 0000000002d8647e  /data/app/com.example.app.android-Ms1jPEUnno8T7Tc2wKQi7g==/oat/arm64/base.vdex (shadow.com.getkeepsafe.relinker.ReLinkerInstance.loadLibraryInternal+54)
  #20  pc 00000000005a5030  /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168)
  #21  pc 0000000000131914  /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20)
  #22  pc 0000000002d862cc  /data/app/com.example.app.android-Ms1jPEUnno8T7Tc2wKQi7g==/oat/arm64/base.vdex (shadow.com.getkeepsafe.relinker.ReLinkerInstance.access$000)
  #23  pc 00000000005a5838  /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1136)
  #24  pc 0000000000131994  /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20)
  #25  pc 0000000002d860d8  /data/app/com.example.app.android-Ms1jPEUnno8T7Tc2wKQi7g==/oat/arm64/base.vdex (shadow.com.getkeepsafe.relinker.ReLinkerInstance$1.run+16)
  #26  pc 00000000002b4668  /apex/com.android.runtime/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.llvm.16017486636107417700)+240)
  #27  pc 0000000000593e30  /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1024)
  #28  pc 0000000000140468  /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88)
  #29  pc 00000000001b6818  /system/framework/arm64/boot.oat (java.lang.Thread.run+72)
  #30  pc 0000000000137334  /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548)
  #31  pc 00000000001460ac  /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+244)
  #32  pc 00000000004b2c20  /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
  #33  pc 00000000004b3cd0  /apex/com.android.runtime/lib64/libart.so (art::InvokeVirtualOrInterfaceWithJValues(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, jvalue const*)+416)
  #34  pc 00000000004f47f8  /apex/com.android.runtime/lib64/libart.so (art::Thread::CreateCallback(void*)+1176)
  #35  pc 00000000000e3b24  /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+36)
  #36  pc 0000000000085330  /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64)

Running the release version of our app on a physical device we own resulted in the following stacktrace:

Fatal signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x7f7d93d018 in tid 17939 (Thread-20), pid 17841 (ing.app.android)
07-28 17:41:21.801 17973 17973 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
07-28 17:41:21.802 17973 17973 F DEBUG   : Build fingerprint: 'samsung/starltexx/starlte:10/QP1A.190711.020/G960FXXU7DTAA:user/release-keys'
07-28 17:41:21.802 17973 17973 F DEBUG   : Revision: '26'
07-28 17:41:21.802 17973 17973 F DEBUG   : ABI: 'arm64'
07-28 17:41:21.802 17973 17973 F DEBUG   : Timestamp: 2020-07-28 17:41:21+0100
07-28 17:41:21.802 17973 17973 F DEBUG   : pid: 17841, tid: 17939, name: Thread-20  >>> com.example.app.android <<<
07-28 17:41:21.802 17973 17973 F DEBUG   : uid: 10060
07-28 17:41:21.802 17973 17973 F DEBUG   : signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x7f7d93d018
07-28 17:41:21.802 17973 17973 F DEBUG   : Cause: execute-only (no-read) memory access error; likely due to data in .text.
07-28 17:41:21.802 17973 17973 F DEBUG   :     x0  0000007e68cd2008  x1  0000007f7d93ddd8  x2  0000000000000000  x3  0000000000000000
07-28 17:41:21.802 17973 17973 F DEBUG   :     x4  00000000ffffffff  x5  0000000000000000  x6  0000000000000080  x7  ff63606e4b6d4e5e
07-28 17:41:21.802 17973 17973 F DEBUG   :     x8  0000007f7d93d018  x9  0000007e5af2bccc  x10 0000007f7d93d000  x11 0000000000000002
07-28 17:41:21.802 17973 17973 F DEBUG   :     x12 0000000000001000  x13 0000001042204000  x14 000000104224c000  x15 0000001042201020
07-28 17:41:21.803 17973 17973 F DEBUG   :     x16 0000007e5b4fbc78  x17 0000007f7ecac260  x18 000000104224c000  x19 ffffffffffffffff
07-28 17:41:21.803 17973 17973 F DEBUG   :     x20 0000007e68cccdd7  x21 0000000000000000  x22 0000007f7d93d018  x23 ffffffffffffffff
07-28 17:41:21.803 17973 17973 F DEBUG   :     x24 0000007e5b38d814  x25 0000007e666d1b80  x26 0000007e88436380  x27 0000007f800df1c0
07-28 17:41:21.803 17973 17973 F DEBUG   :     x28 0000000000000000  x29 0000007e68ccd900
07-28 17:41:21.803 17973 17973 F DEBUG   :     sp  0000007e68ccbe30  lr  0000007e5af2cb1c  pc  0000007e5af2bcd0
07-28 17:41:21.966 17973 17973 F DEBUG   : 
07-28 17:41:21.966 17973 17973 F DEBUG   : backtrace:
07-28 17:41:21.966 17973 17973 F DEBUG   :       #00 pc 00000000001ebcd0  /data/app/com.example.app.android-CG3VCWpjGA_DUn5p0fG6PA==/split_config.arm64_v8a.apk!libregister.so (offset 0x134a000) (BuildId: bafb0d916e821fca828747ed033a55c7d9c53f3a)
07-28 17:41:21.966 17973 17973 F DEBUG   :       #01 pc 0000000000415560  /data/app/com.example.app.android-CG3VCWpjGA_DUn5p0fG6PA==/split_config.arm64_v8a.apk!libregister.so (offset 0x134a000) (BuildId: bafb0d916e821fca828747ed033a55c7d9c53f3a)
07-28 17:41:21.966 17973 17973 F DEBUG   :       #02 pc 0000000000306b1c  /data/app/com.example.app.android-CG3VCWpjGA_DUn5p0fG6PA==/split_config.arm64_v8a.apk!libregister.so (offset 0x134a000) (BuildId: bafb0d916e821fca828747ed033a55c7d9c53f3a)
07-28 17:41:21.966 17973 17973 F DEBUG   :       #03 pc 00000000006593b0  /data/app/com.example.app.android-CG3VCWpjGA_DUn5p0fG6PA==/split_config.arm64_v8a.apk!libregister.so (offset 0x134a000) (JNI_OnLoad+48028) (BuildId: bafb0d916e821fca828747ed033a55c7d9c53f3a)
07-28 17:41:21.966 17973 17973 F DEBUG   :       #04 pc 000000000037cddc  /apex/com.android.runtime/lib64/libart.so (art::JavaVMExt::LoadNativeLibrary(_JNIEnv*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, _jobject*, _jclass*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>*)+3228) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #05 pc 0000000000005184  /apex/com.android.runtime/lib64/libopenjdkjvm.so (JVM_NativeLoad+412) (BuildId: 81a06bf05ce656f30f4f987ab8a00066)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #06 pc 00000000000b9af4  /system/framework/arm64/boot.oat (art_jni_trampoline+228) (BuildId: b92495b97bd2b9b94ff49baeb11f3347ca279c52)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #07 pc 00000000000d6eec  /system/framework/arm64/boot.oat (java.lang.Runtime.loadLibrary0+236) (BuildId: b92495b97bd2b9b94ff49baeb11f3347ca279c52)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #08 pc 00000000000d7ed4  /system/framework/arm64/boot.oat (java.lang.Runtime.loadLibrary0+180) (BuildId: b92495b97bd2b9b94ff49baeb11f3347ca279c52)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #09 pc 00000000000dcab0  /system/framework/arm64/boot.oat (java.lang.System.loadLibrary+96) (BuildId: b92495b97bd2b9b94ff49baeb11f3347ca279c52)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #10 pc 00000000001375b8  /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #11 pc 00000000001460cc  /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #12 pc 00000000002e3be8  /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #13 pc 00000000002dec74  /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+900) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #14 pc 00000000005a5340  /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+368) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #15 pc 0000000000131994  /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #16 pc 0000000002d86814  /data/app/com.example.app.android-CG3VCWpjGA_DUn5p0fG6PA==/oat/arm64/base.vdex (shadow.com.getkeepsafe.relinker.SystemLibraryLoader.loadLibrary)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #17 pc 00000000005a429c  /apex/com.android.runtime/lib64/libart.so (MterpInvokeInterface+1740) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #18 pc 0000000000131a14  /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_interface+20) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #19 pc 0000000002d8647e  /data/app/com.example.app.android-CG3VCWpjGA_DUn5p0fG6PA==/oat/arm64/base.vdex (shadow.com.getkeepsafe.relinker.ReLinkerInstance.loadLibraryInternal+54)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #20 pc 00000000005a4e38  /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #21 pc 0000000000131914  /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #22 pc 0000000002d862cc  /data/app/com.example.app.android-CG3VCWpjGA_DUn5p0fG6PA==/oat/arm64/base.vdex (shadow.com.getkeepsafe.relinker.ReLinkerInstance.access$000)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #23 pc 00000000005a5640  /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1136) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #24 pc 0000000000131994  /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #25 pc 0000000002d860d8  /data/app/com.example.app.android-CG3VCWpjGA_DUn5p0fG6PA==/oat/arm64/base.vdex (shadow.com.getkeepsafe.relinker.ReLinkerInstance$1.run+16)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #26 pc 00000000002b4518  /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.14549768435847923494+240) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #27 pc 0000000000593c38  /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1024) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.967 17973 17973 F DEBUG   :       #28 pc 0000000000140468  /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.968 17973 17973 F DEBUG   :       #29 pc 00000000001a5568  /system/framework/arm64/boot.oat (java.lang.Thread.run+72) (BuildId: b92495b97bd2b9b94ff49baeb11f3347ca279c52)
07-28 17:41:21.968 17973 17973 F DEBUG   :       #30 pc 0000000000137334  /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.968 17973 17973 F DEBUG   :       #31 pc 00000000001460ac  /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+244) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.968 17973 17973 F DEBUG   :       #32 pc 00000000004b2aa0  /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.968 17973 17973 F DEBUG   :       #33 pc 00000000004b3b50  /apex/com.android.runtime/lib64/libart.so (art::InvokeVirtualOrInterfaceWithJValues(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, jvalue const*)+416) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.968 17973 17973 F DEBUG   :       #34 pc 00000000004f4600  /apex/com.android.runtime/lib64/libart.so (art::Thread::CreateCallback(void*)+1176) (BuildId: 646dedb2d1e7f719c8ef5314f8894d5e)
07-28 17:41:21.968 17973 17973 F DEBUG   :       #35 pc 00000000000e3b14  /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+36) (BuildId: 220051b49364b1c2da3adf10c30832cc)
07-28 17:41:21.968 17973 17973 F DEBUG   :       #36 pc 0000000000085330  /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64) (BuildId: 220051b49364b1c2da3adf10c30832cc)

React Native version:

System:
    OS: macOS 10.15.5
    CPU: (12) x64 Intel(R) Core(TM) i7-8750H CPU @ 2.20GHz
    Memory: 354.10 MB / 32.00 GB
    Shell: 5.7.1 - /bin/zsh
  Binaries:
    Node: 10.19.0 - ~/.nvm/versions/node/v10.19.0/bin/node
    Yarn: 1.22.0 - ~/.yarn/bin/yarn
    npm: 6.13.4 - ~/.nvm/versions/node/v10.19.0/bin/npm
    Watchman: 4.9.0 - /usr/local/bin/watchman
  Managers:
    CocoaPods: 1.9.3 - /Users/ikokkinidis/.rbenv/shims/pod
  SDKs:
    iOS SDK:
      Platforms: iOS 13.5, DriverKit 19.0, macOS 10.15, tvOS 13.4, watchOS 6.2
    Android SDK:
      API Levels: 28, 29
      Build Tools: 28.0.3, 29.0.2, 29.0.3
      System Images: android-29 | Intel x86 Atom, android-29 | Intel x86 Atom_64, android-29 | Google APIs Intel x86 Atom, android-29 | Google APIs Intel x86 Atom_64
      Android NDK: Not Found
  IDEs:
    Android Studio: 3.5 AI-191.8026.42.35.6010548
    Xcode: 11.5/11E608c - /usr/bin/xcodebuild
  Languages:
    Java: 1.8.0_211 - /usr/bin/javac
    Python: 2.7.16 - /usr/bin/python
  npmPackages:
    @react-native-community/cli: ^4.5.1 => 4.10.1
    react: 16.13.1 => 16.13.1
    react-native: ^0.63.1 => 0.63.2
  npmGlobalPackages:
    *react-native*: Not Found

Expected Results

No crashes

Snack, code example, screenshot, or link to a repository:

The binary that crashes on Samsung S9 can be downloaded from Google play here - beta version 4.9.6 of our app

Issue Analytics

  • State:open
  • Created 3 years ago
  • Reactions:6
  • Comments:28 (11 by maintainers)

github_iconTop GitHub Comments

5reactions
MayoudPcommented, Jan 13, 2021

Any update on this, getting the same in react-native 0.63 with Hermes enabled only in releaseMode…

3reactions
ninad458commented, Mar 16, 2021

Same here @balao7. Need a solution. The crashes are happening on 5.x devices. Samsung only.

signal 11 (SIGSEGV), code 2 (SEGV_ACCERR) art::ArtField_getNameNative(_JNIEnv*, _jobject*)

backtrace: #00 pc 000000000020d9d2 /system/lib/libart.so (art::ArtField_getNameNative(_JNIEnv*, _jobject*)+281) #00 pc 00000000000000e7 /system/framework/arm/boot.oat

Using android app bundles.

Read more comments on GitHub >

github_iconTop Results From Across the Web

A/libc: Fatal signal 11 (SIGSEGV), code 2 (SEGV_ACCERR ...
Android 10 seems to have problems with Arm64 based architecture. Which give you Execute-only memory violation for some libraries.
Read more >
[libc] Fatal signal 11 (SIGSEGV), code 2 (SEGV_ACCERR ...
It seems that the problem is not the product issue, but the code itself. “signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x7fd9d3bfd0...
Read more >
A/libc: Fatal signal 11 (SIGSEGV), code 2 (SEGV_ACCERR ...
Hello Guys, While integrating CloudXR 3.2 library with Hello XR test application, I'm facing Fatal error as below : A/libc: Fatal signal 11...
Read more >
Xamarin Android - Run time crash - [libc] Fatal signal 11 ...
Fatal signal 11 (SIGSEGV), code 2 (SEGV_ACCERR) means that there is an illegal address access. We need more detailed error log information to ......
Read more >
Signal 11 (SIGSEGV), code 2 (SEGV_ACCERR)
This is specifically crashing for samsung devices. Following is the crash logs. The crashes are happening on 5.x devices. Samsung only.
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found