GNU bug report logs - #79590
Termux crash following Android update

Previous Next

Package: emacs;

Reported by: Clément Pit-Claudel <cpitclaudel <at> gmail.com>

Date: Tue, 7 Oct 2025 00:22:01 UTC

Severity: normal

To reply to this bug, email your comments to 79590 AT debbugs.gnu.org.

Toggle the display of automated, internal messages from the tracker.

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to bug-gnu-emacs <at> gnu.org:
bug#79590; Package emacs. (Tue, 07 Oct 2025 00:22:01 GMT) Full text and rfc822 format available.

Acknowledgement sent to Clément Pit-Claudel <cpitclaudel <at> gmail.com>:
New bug report received and forwarded. Copy sent to bug-gnu-emacs <at> gnu.org. (Tue, 07 Oct 2025 00:22:02 GMT) Full text and rfc822 format available.

Message #5 received at submit <at> debbugs.gnu.org (full text, mbox):

From: Clément Pit-Claudel <cpitclaudel <at> gmail.com>
To: bug-gnu-emacs <at> gnu.org
Subject: Termux crash following Android update
Date: Mon, 6 Oct 2025 17:20:37 -0700
[Message part 1 (text/plain, inline)]
Hi all,

My android device recently updated, and I cannot run the Emacs-friendly
build of Termux found at
https://sourceforge.net/projects/android-ports-for-gnu-emacs/files/termux/termux-app_apt-android-7-release_universal.apk/download
anymore: Termux crashes immediately on launch.  The same install worked 6
months ago, but now crashes; clearing the app's data and reinstalling it
did not help.

More precisely, I followed the instructions in "INSTALLATION WITH TERMUX
SUPPORT" at https://ftp.gnu.org/gnu/emacs/android/README and installed the
Emacs-provided termux APK.  It displayed a warning: "This app was built for
an older version of Android and doesn't include the latest privacy
protections."  I ignored the warning, and attempted to run Termux.  This
fails with an immediate crash.  The logs show a null pointer dereference: I
copied the backtrace at the end of this message.

- Installing the latest termux from F-Droid works fine.  Is there perhaps a
corresponding updated build of Termux for Emacs somewhere that I missed?

I copied the system information below.  Let me know if I can include
further information.  Thanks a lot! And sorry if this is a duplicate report.

Clément.

```
Build: AP3A.240905.015.A2.X810XXS5CYG1
Build fingerprint:
'samsung/gts9pwifieea/gts9pwifi:15/AP3A.240905.015.A2/X810XXS5CYG1:user/release-keys'
Bootloader: X810XXS5CYG1
Module Metadata version: 360969404
Android SDK version: 35
SDK extensions: [ad_services=19, b=<not set>, r=19, s=19, t=19, u=19, v=19]
Kernel: Linux version 5.15.153-android13-8-30958166-abX810XXS5CYG1
(build-user <at> build-host) (Android (8508608, based on r450784e) clang version
14.0.7 (https://android.googlesource.com/toolchain/llvm-project
4c603efb0cca074e9238af8b4106c30add4418f6), LLD 14.0.7) #1 SMP PREEMPT Wed
Jul 2 03:23:47 UTC 2025
```

Backtrace:
```
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : *** *** *** *** *** ***
*** *** *** *** *** *** *** *** *** ***
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Build fingerprint:
'samsung/gts9pwifieea/gts9pwifi:15/AP3A.240905.015.A2/X810XXS5CYG1:user/release-keys'
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Revision: '6'
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : ABI: 'arm64'
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Processor: '7'
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Timestamp: 2025-10-06
16:18:30.475373628-0700
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Process uptime: 1s
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Cmdline: com.termux
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : pid: 21909, tid: 21909,
name: com.termux  >>> com.termux <<<
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : uid: 10364
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : tagged_addr_ctrl:
0000000000000001 (PR_TAGGED_ADDR_ENABLE)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : pac_enabled_keys:
000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY,
PR_PAC_APDBKEY)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : signal 11 (SIGSEGV), code
1 (SEGV_MAPERR), fault addr 0x000000000000000c
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Cause: null pointer
dereference
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x0  0000000071302ba8
x1  000000007048d428  x2  0000000000000000  x3  000000000000000c
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x4  0000007e6da22e30
x5  0000007e704c2d97  x6  0000000000000012  x7  0000007e6da22e1e
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x8  0000007e6da1e931
x9  0000007e6da1e936  x10 0000000000000004  x11 0000000000000000
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x12 00000000000026c8
x13 0000007e6d9ef270  x14 b400007e7046ec00  x15 0000007dd828dfd8
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x16 0000000000000000
x17 0000000000000000  x18 0000007f32364000  x19 b400007e7046ec00
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x20 0000000000000000
x21 b400007e7046ecc0  x22 0000007dd845832e  x23 0000007e6da1e932
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x24 0000007e6e480880
x25 0000007fed6014c0  x26 0000000010380009  x27 0000000000000034
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x28 0000007fed601530
x29 0000007fed6014f8
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     lr  0000007e6e48a984
sp  0000007fed601480  pc  00000000725e7574  pst 0000000080001000
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : 55 total frames
10-06 16:18:30.556 10364 21928 21928 F DEBUG   : backtrace:
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #00 pc
0000000000da7574
/data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
(art_jni_trampoline+4)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #01 pc
000000000068a980  /apex/com.android.art/lib64/libart.so (nterp_helper+5648)
(BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #02 pc
00000000001e532e
/data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
(org.lsposed.hiddenapibypass.HiddenApiBypass.getDeclaredMethods+190)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #03 pc
0000000000689408  /apex/com.android.art/lib64/libart.so (nterp_helper+152)
(BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #04 pc
00000000001e5198
/data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
(org.lsposed.hiddenapibypass.HiddenApiBypass.setHiddenApiExemptions+4)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #05 pc
0000000000317460  /apex/com.android.art/lib64/libart.so
(art_quick_invoke_static_stub+640) (BuildId:
eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #06 pc
000000000066ab80  /apex/com.android.art/lib64/libart.so (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*,
art::ShadowFrame&, art::Instruction const*, unsigned short, bool,
art::JValue*)+2088) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #07 pc
0000000000671998  /apex/com.android.art/lib64/libart.so (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+1280)
(BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #08 pc
00000000002ff738  /apex/com.android.art/lib64/libart.so
(ExecuteSwitchImplAsm+8) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #09 pc
00000000001e50f0
/data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
(org.lsposed.hiddenapibypass.HiddenApiBypass.addHiddenApiExemptions+0)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #10 pc
00000000002ff130  /apex/com.android.art/lib64/libart.so
(art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*,
art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+412)
(BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #11 pc
000000000066ab6c  /apex/com.android.art/lib64/libart.so (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*,
art::ShadowFrame&, art::Instruction const*, unsigned short, bool,
art::JValue*)+2068) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #12 pc
0000000000671998  /apex/com.android.art/lib64/libart.so (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+1280)
(BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #13 pc
00000000002ff738  /apex/com.android.art/lib64/libart.so
(ExecuteSwitchImplAsm+8) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #14 pc
00000000001a68a4
/data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
(com.termux.shared.reflection.ReflectionUtils.bypassHiddenAPIReflectionRestrictions+0)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #15 pc
00000000002ff130  /apex/com.android.art/lib64/libart.so
(art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*,
art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+412)
(BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #16 pc
000000000066ab6c  /apex/com.android.art/lib64/libart.so (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*,
art::ShadowFrame&, art::Instruction const*, unsigned short, bool,
art::JValue*)+2068) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #17 pc
0000000000671998  /apex/com.android.art/lib64/libart.so (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+1280)
(BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #18 pc
00000000002ff738  /apex/com.android.art/lib64/libart.so
(ExecuteSwitchImplAsm+8) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #19 pc
000000000019ab10
/data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
(com.termux.shared.android.SELinuxUtils.getContext+0)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #20 pc
0000000000300b2c  /apex/com.android.art/lib64/libart.so
(art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&,
art::ShadowFrame&, art::JValue, bool, bool)
(.__uniq.112435418011751916792819755956732575238.llvm.4837409187647361565)+332)
(BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #21 pc
0000000000300360  /apex/com.android.art/lib64/libart.so
(artQuickToInterpreterBridge+888) (BuildId:
eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #22 pc
000000000032e638  /apex/com.android.art/lib64/libart.so
(art_quick_to_interpreter_bridge+88) (BuildId:
eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #23 pc
0000000000689408  /apex/com.android.art/lib64/libart.so (nterp_helper+152)
(BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #24 pc
00000000001b42e0
/data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
(com.termux.shared.termux.shell.command.environment.TermuxAppShellEnvironment.setTermuxAppEnvironment+432)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #25 pc
0000000000317460  /apex/com.android.art/lib64/libart.so
(art_quick_invoke_static_stub+640) (BuildId:
eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #26 pc
000000000066ab80  /apex/com.android.art/lib64/libart.so (bool
art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*,
art::ShadowFrame&, art::Instruction const*, unsigned short, bool,
art::JValue*)+2088) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #27 pc
0000000000671998  /apex/com.android.art/lib64/libart.so (void
art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+1280)
(BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #28 pc
00000000002ff738  /apex/com.android.art/lib64/libart.so
(ExecuteSwitchImplAsm+8) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #29 pc
00000000001b4610
/data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
(com.termux.shared.termux.shell.command.environment.TermuxShellEnvironment.init+0)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #30 pc
0000000000300b2c  /apex/com.android.art/lib64/libart.so
(art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&,
art::ShadowFrame&, art::JValue, bool, bool)
(.__uniq.112435418011751916792819755956732575238.llvm.4837409187647361565)+332)
(BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #31 pc
0000000000300360  /apex/com.android.art/lib64/libart.so
(artQuickToInterpreterBridge+888) (BuildId:
eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #32 pc
000000000032e638  /apex/com.android.art/lib64/libart.so
(art_quick_to_interpreter_bridge+88) (BuildId:
eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #33 pc
0000000000689408  /apex/com.android.art/lib64/libart.so (nterp_helper+152)
(BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #34 pc
000000000018e536
/data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
(com.termux.app.TermuxApplication.onCreate+214)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #35 pc
0000000000613340
/data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
(android.app.Instrumentation.callApplicationOnCreate+48)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #36 pc
00000000006dd250
/data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
(android.app.ActivityThread.handleBindApplication+4896)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #37 pc
00000000006d7434
/data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
(android.app.ActivityThread$H.handleMessage+8676)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #38 pc
000000000093e458
/data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
(android.os.Handler.dispatchMessage+152)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #39 pc
0000000000941de4
/data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
(android.os.Looper.loopOnce+980)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #40 pc
0000000000941968
/data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
(android.os.Looper.loop+632)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #41 pc
00000000006e7494
/data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
(android.app.ActivityThread.main+2132)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #42 pc
0000000000317460  /apex/com.android.art/lib64/libart.so
(art_quick_invoke_static_stub+640) (BuildId:
eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #43 pc
0000000000311508  /apex/com.android.art/lib64/libart.so (_jobject*
art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable
const&, _jobject*, _jobject*, _jobject*, unsigned long)+544) (BuildId:
eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #44 pc
00000000005c82c8  /apex/com.android.art/lib64/libart.so
(art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)
(.__uniq.165753521025965369065708152063621506277)+32) (BuildId:
eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #45 pc
0000000000da4814
/data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
(art_jni_trampoline+116)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #46 pc
0000000000c5d8d4
/data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
(com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #47 pc
0000000000c67ce8
/data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
(com.android.internal.os.ZygoteInit.main+3272)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #48 pc
0000000000317460  /apex/com.android.art/lib64/libart.so
(art_quick_invoke_static_stub+640) (BuildId:
eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #49 pc
0000000000316100  /apex/com.android.art/lib64/libart.so (art::JValue
art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable
const&, _jobject*, _jmethodID*, std::__va_list)+800) (BuildId:
eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #50 pc
0000000000639868  /apex/com.android.art/lib64/libart.so
(art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*,
std::__va_list)+156) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #51 pc
00000000000df42c  /system/lib64/libandroid_runtime.so
(_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108) (BuildId:
1676db8399791974bcbbb31c378100db)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #52 pc
00000000000f5328  /system/lib64/libandroid_runtime.so
(android::AndroidRuntime::start(char const*,
android::Vector<android::String8> const&, bool)+928) (BuildId:
1676db8399791974bcbbb31c378100db)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #53 pc
00000000000025c8  /system/bin/app_process64 (main+1288) (BuildId:
9846ac260d944f605cabbd1beb7a7aa0)
10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #54 pc
000000000008f91c  /apex/com.android.runtime/lib64/bionic/libc.so
(__libc_init+120) (BuildId: d02d1c3363b4a4418dcd98f4845bd7a4)
```
[Message part 2 (text/html, inline)]

Information forwarded to bug-gnu-emacs <at> gnu.org:
bug#79590; Package emacs. (Tue, 07 Oct 2025 06:22:02 GMT) Full text and rfc822 format available.

Message #8 received at 79590 <at> debbugs.gnu.org (full text, mbox):

From: Eli Zaretskii <eliz <at> gnu.org>
To: Clément Pit-Claudel <cpitclaudel <at> gmail.com>,
 Po Lu <luangruo <at> yahoo.com>
Cc: 79590 <at> debbugs.gnu.org
Subject: Re: bug#79590: Termux crash following Android update
Date: Tue, 07 Oct 2025 09:21:22 +0300
> From: Clément Pit-Claudel <cpitclaudel <at> gmail.com>
> Date: Mon, 6 Oct 2025 17:20:37 -0700
> 
> My android device recently updated, and I cannot run the Emacs-friendly build of Termux found at
> https://sourceforge.net/projects/android-ports-for-gnu-emacs/files/termux/termux-app_apt-android-7-release_universal.apk/download
> anymore: Termux crashes immediately on launch.  The same install worked 6 months ago, but now crashes;
> clearing the app's data and reinstalling it did not help.
> 
> More precisely, I followed the instructions in "INSTALLATION WITH TERMUX SUPPORT" at
> https://ftp.gnu.org/gnu/emacs/android/README and installed the Emacs-provided termux APK.  It displayed
> a warning: "This app was built for an older version of Android and doesn't include the latest privacy
> protections."  I ignored the warning, and attempted to run Termux.  This fails with an immediate crash.  The
> logs show a null pointer dereference: I copied the backtrace at the end of this message.
> 
> - Installing the latest termux from F-Droid works fine.  Is there perhaps a corresponding updated build of
> Termux for Emacs somewhere that I missed?
> 
> I copied the system information below.  Let me know if I can include further information.  Thanks a lot! And
> sorry if this is a duplicate report.

Thanks.  Po Lu, any comments or suggestions?

> 
> Clément.
> 
> ```
> Build: AP3A.240905.015.A2.X810XXS5CYG1
> Build fingerprint:
> 'samsung/gts9pwifieea/gts9pwifi:15/AP3A.240905.015.A2/X810XXS5CYG1:user/release-keys'
> Bootloader: X810XXS5CYG1
> Module Metadata version: 360969404
> Android SDK version: 35
> SDK extensions: [ad_services=19, b=<not set>, r=19, s=19, t=19, u=19, v=19]
> Kernel: Linux version 5.15.153-android13-8-30958166-abX810XXS5CYG1 (build-user <at> build-host) (Android
> (8508608, based on r450784e) clang version 14.0.7
> (https://android.googlesource.com/toolchain/llvm-project 4c603efb0cca074e9238af8b4106c30add4418f6),
> LLD 14.0.7) #1 SMP PREEMPT Wed Jul 2 03:23:47 UTC 2025
> ```
> 
> Backtrace:
> ```
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Build fingerprint:
> 'samsung/gts9pwifieea/gts9pwifi:15/AP3A.240905.015.A2/X810XXS5CYG1:user/release-keys'
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Revision: '6'
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : ABI: 'arm64'
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Processor: '7'
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Timestamp: 2025-10-06 16:18:30.475373628-0700
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Process uptime: 1s
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Cmdline: com.termux
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : pid: 21909, tid: 21909, name: com.termux  >>>
> com.termux <<<
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : uid: 10364
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : tagged_addr_ctrl: 0000000000000001
> (PR_TAGGED_ADDR_ENABLE)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : pac_enabled_keys: 000000000000000f
> (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault
> addr 0x000000000000000c
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Cause: null pointer dereference
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x0  0000000071302ba8  x1  000000007048d428 
> x2  0000000000000000  x3  000000000000000c
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x4  0000007e6da22e30  x5  0000007e704c2d97 
> x6  0000000000000012  x7  0000007e6da22e1e
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x8  0000007e6da1e931  x9  0000007e6da1e936 
> x10 0000000000000004  x11 0000000000000000
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x12 00000000000026c8  x13 0000007e6d9ef270 
> x14 b400007e7046ec00  x15 0000007dd828dfd8
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x16 0000000000000000  x17 0000000000000000 
> x18 0000007f32364000  x19 b400007e7046ec00
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x20 0000000000000000  x21 b400007e7046ecc0 
> x22 0000007dd845832e  x23 0000007e6da1e932
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x24 0000007e6e480880  x25 0000007fed6014c0 
> x26 0000000010380009  x27 0000000000000034
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x28 0000007fed601530  x29 0000007fed6014f8
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     lr  0000007e6e48a984  sp  0000007fed601480  pc
>  00000000725e7574  pst 0000000080001000
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : 55 total frames
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : backtrace:
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #00 pc 0000000000da7574 
> /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+4)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #01 pc 000000000068a980 
> /apex/com.android.art/lib64/libart.so (nterp_helper+5648) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #02 pc 00000000001e532e 
> /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> (org.lsposed.hiddenapibypass.HiddenApiBypass.getDeclaredMethods+190)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #03 pc 0000000000689408 
> /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #04 pc 00000000001e5198 
> /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> (org.lsposed.hiddenapibypass.HiddenApiBypass.setHiddenApiExemptions+4)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #05 pc 0000000000317460 
> /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #06 pc 000000000066ab80 
> /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*,
> art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2088) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #07 pc 0000000000671998 
> /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>
> (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #08 pc 00000000002ff738 
> /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #09 pc 00000000001e50f0 
> /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> (org.lsposed.hiddenapibypass.HiddenApiBypass.addHiddenApiExemptions+0)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #10 pc 00000000002ff130 
> /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*,
> art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+412) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #11 pc 000000000066ab6c 
> /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*,
> art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2068) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #12 pc 0000000000671998 
> /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>
> (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #13 pc 00000000002ff738 
> /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #14 pc 00000000001a68a4 
> /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> (com.termux.shared.reflection.ReflectionUtils.bypassHiddenAPIReflectionRestrictions+0)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #15 pc 00000000002ff130 
> /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*,
> art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+412) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #16 pc 000000000066ab6c 
> /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*,
> art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2068) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #17 pc 0000000000671998 
> /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>
> (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #18 pc 00000000002ff738 
> /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #19 pc 000000000019ab10 
> /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> (com.termux.shared.android.SELinuxUtils.getContext+0)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #20 pc 0000000000300b2c 
> /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor
> const&, art::ShadowFrame&, art::JValue, bool, bool)
> (.__uniq.112435418011751916792819755956732575238.llvm.4837409187647361565)+332) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #21 pc 0000000000300360 
> /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+888) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #22 pc 000000000032e638 
> /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #23 pc 0000000000689408 
> /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #24 pc 00000000001b42e0 
> /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> (com.termux.shared.termux.shell.command.environment.TermuxAppShellEnvironment.setTermuxAppEnvironment+432)
> 
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #25 pc 0000000000317460 
> /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #26 pc 000000000066ab80 
> /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*,
> art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2088) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #27 pc 0000000000671998 
> /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>
> (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #28 pc 00000000002ff738 
> /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #29 pc 00000000001b4610 
> /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> (com.termux.shared.termux.shell.command.environment.TermuxShellEnvironment.init+0)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #30 pc 0000000000300b2c 
> /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor
> const&, art::ShadowFrame&, art::JValue, bool, bool)
> (.__uniq.112435418011751916792819755956732575238.llvm.4837409187647361565)+332) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #31 pc 0000000000300360 
> /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+888) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #32 pc 000000000032e638 
> /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #33 pc 0000000000689408 
> /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #34 pc 000000000018e536 
> /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> (com.termux.app.TermuxApplication.onCreate+214)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #35 pc 0000000000613340 
> /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
> (android.app.Instrumentation.callApplicationOnCreate+48)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #36 pc 00000000006dd250 
> /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
> (android.app.ActivityThread.handleBindApplication+4896)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #37 pc 00000000006d7434 
> /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
> (android.app.ActivityThread$H.handleMessage+8676)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #38 pc 000000000093e458 
> /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
> (android.os.Handler.dispatchMessage+152)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #39 pc 0000000000941de4 
> /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+980)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #40 pc 0000000000941968 
> /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+632)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #41 pc 00000000006e7494 
> /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+2132)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #42 pc 0000000000317460 
> /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #43 pc 0000000000311508 
> /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>
> (art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+544)
> (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #44 pc 00000000005c82c8 
> /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)
> (.__uniq.165753521025965369065708152063621506277)+32) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #45 pc 0000000000da4814 
> /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #46 pc 0000000000c5d8d4 
> /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
> (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #47 pc 0000000000c67ce8 
> /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
> (com.android.internal.os.ZygoteInit.main+3272)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #48 pc 0000000000317460 
> /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #49 pc 0000000000316100 
> /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>
> (art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+800) (BuildId:
> eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #50 pc 0000000000639868 
> /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*,
> std::__va_list)+156) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #51 pc 00000000000df42c 
> /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108) (BuildId:
> 1676db8399791974bcbbb31c378100db)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #52 pc 00000000000f5328 
> /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*,
> android::Vector<android::String8> const&, bool)+928) (BuildId: 1676db8399791974bcbbb31c378100db)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #53 pc 00000000000025c8 
> /system/bin/app_process64 (main+1288) (BuildId: 9846ac260d944f605cabbd1beb7a7aa0)
> 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #54 pc 000000000008f91c 
> /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+120) (BuildId:
> d02d1c3363b4a4418dcd98f4845bd7a4)
> ```




Information forwarded to bug-gnu-emacs <at> gnu.org:
bug#79590; Package emacs. (Sat, 25 Oct 2025 10:16:01 GMT) Full text and rfc822 format available.

Message #11 received at 79590 <at> debbugs.gnu.org (full text, mbox):

From: Eli Zaretskii <eliz <at> gnu.org>
To: Po Lu <luangruo <at> yahoo.com>
Cc: 79590 <at> debbugs.gnu.org, cpitclaudel <at> gmail.com
Subject: Re: bug#79590: Termux crash following Android update
Date: Sat, 25 Oct 2025 13:15:20 +0300
Ping!  Po Lu, please respond.

> Cc: 79590 <at> debbugs.gnu.org
> Date: Tue, 07 Oct 2025 09:21:22 +0300
> From: Eli Zaretskii <eliz <at> gnu.org>
> 
> > From: Clément Pit-Claudel <cpitclaudel <at> gmail.com>
> > Date: Mon, 6 Oct 2025 17:20:37 -0700
> > 
> > My android device recently updated, and I cannot run the Emacs-friendly build of Termux found at
> > https://sourceforge.net/projects/android-ports-for-gnu-emacs/files/termux/termux-app_apt-android-7-release_universal.apk/download
> > anymore: Termux crashes immediately on launch.  The same install worked 6 months ago, but now crashes;
> > clearing the app's data and reinstalling it did not help.
> > 
> > More precisely, I followed the instructions in "INSTALLATION WITH TERMUX SUPPORT" at
> > https://ftp.gnu.org/gnu/emacs/android/README and installed the Emacs-provided termux APK.  It displayed
> > a warning: "This app was built for an older version of Android and doesn't include the latest privacy
> > protections."  I ignored the warning, and attempted to run Termux.  This fails with an immediate crash.  The
> > logs show a null pointer dereference: I copied the backtrace at the end of this message.
> > 
> > - Installing the latest termux from F-Droid works fine.  Is there perhaps a corresponding updated build of
> > Termux for Emacs somewhere that I missed?
> > 
> > I copied the system information below.  Let me know if I can include further information.  Thanks a lot! And
> > sorry if this is a duplicate report.
> 
> Thanks.  Po Lu, any comments or suggestions?
> 
> > 
> > Clément.
> > 
> > ```
> > Build: AP3A.240905.015.A2.X810XXS5CYG1
> > Build fingerprint:
> > 'samsung/gts9pwifieea/gts9pwifi:15/AP3A.240905.015.A2/X810XXS5CYG1:user/release-keys'
> > Bootloader: X810XXS5CYG1
> > Module Metadata version: 360969404
> > Android SDK version: 35
> > SDK extensions: [ad_services=19, b=<not set>, r=19, s=19, t=19, u=19, v=19]
> > Kernel: Linux version 5.15.153-android13-8-30958166-abX810XXS5CYG1 (build-user <at> build-host) (Android
> > (8508608, based on r450784e) clang version 14.0.7
> > (https://android.googlesource.com/toolchain/llvm-project 4c603efb0cca074e9238af8b4106c30add4418f6),
> > LLD 14.0.7) #1 SMP PREEMPT Wed Jul 2 03:23:47 UTC 2025
> > ```
> > 
> > Backtrace:
> > ```
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Build fingerprint:
> > 'samsung/gts9pwifieea/gts9pwifi:15/AP3A.240905.015.A2/X810XXS5CYG1:user/release-keys'
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Revision: '6'
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : ABI: 'arm64'
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Processor: '7'
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Timestamp: 2025-10-06 16:18:30.475373628-0700
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Process uptime: 1s
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Cmdline: com.termux
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : pid: 21909, tid: 21909, name: com.termux  >>>
> > com.termux <<<
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : uid: 10364
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : tagged_addr_ctrl: 0000000000000001
> > (PR_TAGGED_ADDR_ENABLE)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : pac_enabled_keys: 000000000000000f
> > (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault
> > addr 0x000000000000000c
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : Cause: null pointer dereference
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x0  0000000071302ba8  x1  000000007048d428 
> > x2  0000000000000000  x3  000000000000000c
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x4  0000007e6da22e30  x5  0000007e704c2d97 
> > x6  0000000000000012  x7  0000007e6da22e1e
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x8  0000007e6da1e931  x9  0000007e6da1e936 
> > x10 0000000000000004  x11 0000000000000000
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x12 00000000000026c8  x13 0000007e6d9ef270 
> > x14 b400007e7046ec00  x15 0000007dd828dfd8
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x16 0000000000000000  x17 0000000000000000 
> > x18 0000007f32364000  x19 b400007e7046ec00
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x20 0000000000000000  x21 b400007e7046ecc0 
> > x22 0000007dd845832e  x23 0000007e6da1e932
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x24 0000007e6e480880  x25 0000007fed6014c0 
> > x26 0000000010380009  x27 0000000000000034
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     x28 0000007fed601530  x29 0000007fed6014f8
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :     lr  0000007e6e48a984  sp  0000007fed601480  pc
> >  00000000725e7574  pst 0000000080001000
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : 55 total frames
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   : backtrace:
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #00 pc 0000000000da7574 
> > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+4)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #01 pc 000000000068a980 
> > /apex/com.android.art/lib64/libart.so (nterp_helper+5648) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #02 pc 00000000001e532e 
> > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> > (org.lsposed.hiddenapibypass.HiddenApiBypass.getDeclaredMethods+190)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #03 pc 0000000000689408 
> > /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #04 pc 00000000001e5198 
> > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> > (org.lsposed.hiddenapibypass.HiddenApiBypass.setHiddenApiExemptions+4)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #05 pc 0000000000317460 
> > /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #06 pc 000000000066ab80 
> > /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*,
> > art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2088) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #07 pc 0000000000671998 
> > /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>
> > (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #08 pc 00000000002ff738 
> > /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #09 pc 00000000001e50f0 
> > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> > (org.lsposed.hiddenapibypass.HiddenApiBypass.addHiddenApiExemptions+0)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #10 pc 00000000002ff130 
> > /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*,
> > art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+412) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #11 pc 000000000066ab6c 
> > /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*,
> > art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2068) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #12 pc 0000000000671998 
> > /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>
> > (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #13 pc 00000000002ff738 
> > /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #14 pc 00000000001a68a4 
> > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> > (com.termux.shared.reflection.ReflectionUtils.bypassHiddenAPIReflectionRestrictions+0)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #15 pc 00000000002ff130 
> > /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*,
> > art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+412) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #16 pc 000000000066ab6c 
> > /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*,
> > art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2068) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #17 pc 0000000000671998 
> > /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>
> > (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #18 pc 00000000002ff738 
> > /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #19 pc 000000000019ab10 
> > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> > (com.termux.shared.android.SELinuxUtils.getContext+0)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #20 pc 0000000000300b2c 
> > /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor
> > const&, art::ShadowFrame&, art::JValue, bool, bool)
> > (.__uniq.112435418011751916792819755956732575238.llvm.4837409187647361565)+332) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #21 pc 0000000000300360 
> > /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+888) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #22 pc 000000000032e638 
> > /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #23 pc 0000000000689408 
> > /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #24 pc 00000000001b42e0 
> > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> > (com.termux.shared.termux.shell.command.environment.TermuxAppShellEnvironment.setTermuxAppEnvironment+432)
> > 
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #25 pc 0000000000317460 
> > /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #26 pc 000000000066ab80 
> > /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*,
> > art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2088) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #27 pc 0000000000671998 
> > /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>
> > (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #28 pc 00000000002ff738 
> > /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #29 pc 00000000001b4610 
> > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> > (com.termux.shared.termux.shell.command.environment.TermuxShellEnvironment.init+0)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #30 pc 0000000000300b2c 
> > /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor
> > const&, art::ShadowFrame&, art::JValue, bool, bool)
> > (.__uniq.112435418011751916792819755956732575238.llvm.4837409187647361565)+332) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #31 pc 0000000000300360 
> > /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+888) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #32 pc 000000000032e638 
> > /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #33 pc 0000000000689408 
> > /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #34 pc 000000000018e536 
> > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex
> > (com.termux.app.TermuxApplication.onCreate+214)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #35 pc 0000000000613340 
> > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
> > (android.app.Instrumentation.callApplicationOnCreate+48)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #36 pc 00000000006dd250 
> > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
> > (android.app.ActivityThread.handleBindApplication+4896)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #37 pc 00000000006d7434 
> > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
> > (android.app.ActivityThread$H.handleMessage+8676)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #38 pc 000000000093e458 
> > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
> > (android.os.Handler.dispatchMessage+152)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #39 pc 0000000000941de4 
> > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+980)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #40 pc 0000000000941968 
> > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+632)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #41 pc 00000000006e7494 
> > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+2132)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #42 pc 0000000000317460 
> > /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #43 pc 0000000000311508 
> > /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>
> > (art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+544)
> > (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #44 pc 00000000005c82c8 
> > /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)
> > (.__uniq.165753521025965369065708152063621506277)+32) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #45 pc 0000000000da4814 
> > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #46 pc 0000000000c5d8d4 
> > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
> > (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #47 pc 0000000000c67ce8 
> > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat
> > (com.android.internal.os.ZygoteInit.main+3272)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #48 pc 0000000000317460 
> > /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #49 pc 0000000000316100 
> > /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>
> > (art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+800) (BuildId:
> > eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #50 pc 0000000000639868 
> > /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*,
> > std::__va_list)+156) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #51 pc 00000000000df42c 
> > /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108) (BuildId:
> > 1676db8399791974bcbbb31c378100db)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #52 pc 00000000000f5328 
> > /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*,
> > android::Vector<android::String8> const&, bool)+928) (BuildId: 1676db8399791974bcbbb31c378100db)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #53 pc 00000000000025c8 
> > /system/bin/app_process64 (main+1288) (BuildId: 9846ac260d944f605cabbd1beb7a7aa0)
> > 10-06 16:18:30.556 10364 21928 21928 F DEBUG   :       #54 pc 000000000008f91c 
> > /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+120) (BuildId:
> > d02d1c3363b4a4418dcd98f4845bd7a4)
> > ```
> 
> 
> 
> 




This bug report was last modified 11 days ago.

Previous Next


GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.