Hello, would like your help on a native crash when reading this specific document using the latest 3.53.4 version of the Android SDK. But we didn't encounter this crash when using 3.52.4 version of the Android SDK.
See the PDF file in
app.box.com/s/phi8uo25udlwy0pnjs7zgsmzvfuixprv (5.43MB PDF file)
I'm not sure if this is caused by premature closure of the parent Document object, or if this is an issue with the library. Asking for your help to check the native stack trace
Thanks!
2020-04-22 10:28:21.329 17126-17398/com.sample.myapp A/libc: Fatal signal 6 (SIGABRT), code -6 (SI_TKILL) in tid 17398 (pool-26-thread-), pid 17126 (ple.myapp)
2020-04-22 10:28:21.368 17126-17370/com.sample.myapp D/com.sample.myapp.o.d: Done watching Thread-16
2020-04-22 10:28:21.415 17407-17407/? E/DEBUG: failed to readlink /proc/17398/fd/89: No such file or directory
2020-04-22 10:28:21.417 17407-17407/? E/DEBUG: failed to readlink /proc/17398/fd/149: No such file or directory
2020-04-22 10:28:21.439 741-741/? I/SurfaceFlinger: Display 0 HWC layers:
type | handle | flag | format | source crop (l,t,r,b) | frame | name
------------+--------------+------+-----------+----------------------------+---------------------+------
Device | 0x7861284540 | 0000 | RGBA_8888 | 0.0 0.0 2560.0 1600.0 | 0 0 2560 1600 | com.sample.myapp/com.sample.myap[...]activity.MainActivity[17126]#0
Device | 0x7861284930 | 0000 | RGBA_8888 | 0.0 0.0 190.0 138.0 | 1630 176 1820 314 | PopupWindow:f2ca3c1[17126]#0
Device | 0x7861638fe0 | 0000 | RGBA_8888 | 0.0 0.0 200.0 239.0 | 2280 176 2480 415 | PopupWindow:59928c0[17126]#0
Device | 0x7861284cb0 | 0000 | RGBA_8888 | 0.0 0.0 200.0 80.0 | 1817 176 2017 256 | PopupWindow:d04ff31[17126]#0
Device | 0x7861639750 | 0000 | RGBA_8888 | 0.0 0.0 360.0 378.0 | 2184 176 2544 554 | PopupWindow:fd0fa33[17126]#0
Device | 0x7861639bb0 | 0000 | RGBA_8888 | 0.0 0.0 130.0 109.0 | 2222 176 2352 285 | Pop
2020-04-22 10:28:21.439 741-741/? I/SurfaceFlinger: upWindow:63dcd25[17126]#0
Device | 0x7861639de0 | 0000 | RGBA_8888 | 0.0 0.0 191.0 210.0 | 1936 176 2127 386 | PopupWindow:fbf3887[17126]#0
Client | 0x7861639ad0 | 0000 | RGBA_8888 | 0.0 0.0 160.0 80.0 | 2065 176 2225 256 | PopupWindow:856f8d9[17126]#0
Client | 0x7861284ee0 | 0000 | RGBA_8888 | 0.0 0.0 536.0 66.0 | 1012 767 1548 833 | PopupWindow:2c4e69b[17126]#0
Client | 0x7861639130 | 0000 | RGBA_8888 | 0.0 0.0 2560.0 48.0 | 0 0 2560 48 | StatusBar[1839]#0
Client | 0x786163a010 | 0000 | RGBA_8888 | 0.0 0.0 2560.0 96.0 | 0 1504 2560 1600 | NavigationBar[1839]#0
Client | 0x786163a780 | 0000 | RGBA_8888 | 0.0 0.0 23.0 1600.0 | 0 0 23 1600 | ScreenDecorOverlay[1839]#0
Client | 0x786163ac50 | 0000 | RGBA_8888 | 0.0 0.0 23.0 1600.0 | 2537 0 2560 1600 | ScreenDecorOverlayBottom[1839]#0
2020-04-22 10:28:21.485 17407-17407/? I/crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone
2020-04-22 10:28:21.487 1007-1007/? I//system/bin/tombstoned: received crash request for pid 17398
2020-04-22 10:28:21.489 17407-17407/? I/crash_dump64: performing dump of process 17126 (target tid = 17398)
2020-04-22 10:28:21.500 17407-17407/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: Build fingerprint: 'samsung/gts4lvxx/gts4lv:9/PPR1.180610.011/T725XXU1ASG3:user/release-keys'
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: Revision: '5'
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: ABI: 'arm64'
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: pid: 17126, tid: 17398, name: pool-26-thread- >>> com.sample.myapp <<<
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: Abort message: 'FORTIFY: strcat: prevented write past end of 0-byte buffer'
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: x0 0000000000000000 x1 00000000000043f6 x2 0000000000000006 x3 0000000000000008
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: x4 0000000000000000 x5 0000000000000000 x6 0000000000000000 x7 0000000000000018
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: x8 0000000000000083 x9 c67ca812cb2d9092 x10 0000000000000000 x11 fffffffc7ffffbdf
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: x12 0000000000000001 x13 000000005e9fabc5 x14 001377ffb5eedade x15 00002a35de15102d
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: x16 00000078bd19c298 x17 00000078bd0bd0fc x18 0000000000000001 x19 00000000000042e6
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: x20 00000000000043f6 x21 0000000000000020 x22 000000781cd5d803 x23 0000000000000000
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: x24 0000007818afa3b0 x25 0000000000000000 x26 000000781640ec00 x27 0000000000000000
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: x28 0000007818af8060 x29 000000781c0dd730
2020-04-22 10:28:21.501 17407-17407/? A/DEBUG: sp 000000781c0dd6f0 lr 00000078bd0af5cc pc 00000078bd0af5f4
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: backtrace:
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #00 pc 00000000000225f4 /system/lib64/libc.so (abort+116)
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #01 pc 000000000004d928 /system/lib64/libc.so (__fortify_fatal(char const*, ...)+120)
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #02 pc 000000000004e780 /system/lib64/libc.so (__strcat_chk+120)
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #03 pc 0000000000110278 /data/app/com.sample.myapp-y_NNr2kdfY4VjpVMMCftIQ==/lib/arm64/librdpdf.so
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #04 pc 00000000001122f8 /data/app/com.sample.myapp-y_NNr2kdfY4VjpVMMCftIQ==/lib/arm64/librdpdf.so
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #05 pc 00000000001282d4 /data/app/com.sample.myapp-y_NNr2kdfY4VjpVMMCftIQ==/lib/arm64/librdpdf.so
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #06 pc 000000000011fc80 /data/app/com.sample.myapp-y_NNr2kdfY4VjpVMMCftIQ==/lib/arm64/librdpdf.so
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #07 pc 000000000012723c /data/app/com.sample.myapp-y_NNr2kdfY4VjpVMMCftIQ==/lib/arm64/librdpdf.so
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #08 pc 000000000012ebb4 /data/app/com.sample.myapp-y_NNr2kdfY4VjpVMMCftIQ==/lib/arm64/librdpdf.so
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #09 pc 000000000011e6cc /data/app/com.sample.myapp-y_NNr2kdfY4VjpVMMCftIQ==/lib/arm64/librdpdf.so
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #10 pc 0000000000127190 /data/app/com.sample.myapp-y_NNr2kdfY4VjpVMMCftIQ==/lib/arm64/librdpdf.so
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #11 pc 0000000000163358 /data/app/com.sample.myapp-y_NNr2kdfY4VjpVMMCftIQ==/lib/arm64/librdpdf.so
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #12 pc 00000000000fea20 /data/app/com.sample.myapp-y_NNr2kdfY4VjpVMMCftIQ==/lib/arm64/librdpdf.so
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #13 pc 000000000005ec90 /data/app/com.sample.myapp-y_NNr2kdfY4VjpVMMCftIQ==/lib/arm64/librdpdf.so (Java_com_radaee_pdf_Page_render+452)
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #14 pc 0000000000561fe0 /system/lib64/libart.so (art_quick_generic_jni_trampoline+144)
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #15 pc 000000000055924c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2020-04-22 10:28:21.679 17407-17407/? A/DEBUG: #16 pc 00000000000d00e8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)