Package: emacs;
Reported by: Clément Pit-Claudel <cpitclaudel <at> gmail.com>
Date: Tue, 7 Oct 2025 00:22:01 UTC
Severity: normal
To reply to this bug, email your comments to 79590 AT debbugs.gnu.org.
Toggle the display of automated, internal messages from the tracker.
View this report as an mbox folder, status mbox, maintainer mbox
bug-gnu-emacs <at> gnu.org:bug#79590; Package emacs.
(Tue, 07 Oct 2025 00:22:01 GMT) Full text and rfc822 format available.Clément Pit-Claudel <cpitclaudel <at> gmail.com>:bug-gnu-emacs <at> gnu.org.
(Tue, 07 Oct 2025 00:22:02 GMT) Full text and rfc822 format available.Message #5 received at submit <at> debbugs.gnu.org (full text, mbox):
From: Clément Pit-Claudel <cpitclaudel <at> gmail.com> To: bug-gnu-emacs <at> gnu.org Subject: Termux crash following Android update Date: Mon, 6 Oct 2025 17:20:37 -0700
[Message part 1 (text/plain, inline)]
Hi all, My android device recently updated, and I cannot run the Emacs-friendly build of Termux found at https://sourceforge.net/projects/android-ports-for-gnu-emacs/files/termux/termux-app_apt-android-7-release_universal.apk/download anymore: Termux crashes immediately on launch. The same install worked 6 months ago, but now crashes; clearing the app's data and reinstalling it did not help. More precisely, I followed the instructions in "INSTALLATION WITH TERMUX SUPPORT" at https://ftp.gnu.org/gnu/emacs/android/README and installed the Emacs-provided termux APK. It displayed a warning: "This app was built for an older version of Android and doesn't include the latest privacy protections." I ignored the warning, and attempted to run Termux. This fails with an immediate crash. The logs show a null pointer dereference: I copied the backtrace at the end of this message. - Installing the latest termux from F-Droid works fine. Is there perhaps a corresponding updated build of Termux for Emacs somewhere that I missed? I copied the system information below. Let me know if I can include further information. Thanks a lot! And sorry if this is a duplicate report. Clément. ``` Build: AP3A.240905.015.A2.X810XXS5CYG1 Build fingerprint: 'samsung/gts9pwifieea/gts9pwifi:15/AP3A.240905.015.A2/X810XXS5CYG1:user/release-keys' Bootloader: X810XXS5CYG1 Module Metadata version: 360969404 Android SDK version: 35 SDK extensions: [ad_services=19, b=<not set>, r=19, s=19, t=19, u=19, v=19] Kernel: Linux version 5.15.153-android13-8-30958166-abX810XXS5CYG1 (build-user <at> build-host) (Android (8508608, based on r450784e) clang version 14.0.7 (https://android.googlesource.com/toolchain/llvm-project 4c603efb0cca074e9238af8b4106c30add4418f6), LLD 14.0.7) #1 SMP PREEMPT Wed Jul 2 03:23:47 UTC 2025 ``` Backtrace: ``` 10-06 16:18:30.556 10364 21928 21928 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Build fingerprint: 'samsung/gts9pwifieea/gts9pwifi:15/AP3A.240905.015.A2/X810XXS5CYG1:user/release-keys' 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Revision: '6' 10-06 16:18:30.556 10364 21928 21928 F DEBUG : ABI: 'arm64' 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Processor: '7' 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Timestamp: 2025-10-06 16:18:30.475373628-0700 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Process uptime: 1s 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Cmdline: com.termux 10-06 16:18:30.556 10364 21928 21928 F DEBUG : pid: 21909, tid: 21909, name: com.termux >>> com.termux <<< 10-06 16:18:30.556 10364 21928 21928 F DEBUG : uid: 10364 10-06 16:18:30.556 10364 21928 21928 F DEBUG : tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : pac_enabled_keys: 000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x000000000000000c 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Cause: null pointer dereference 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x0 0000000071302ba8 x1 000000007048d428 x2 0000000000000000 x3 000000000000000c 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x4 0000007e6da22e30 x5 0000007e704c2d97 x6 0000000000000012 x7 0000007e6da22e1e 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x8 0000007e6da1e931 x9 0000007e6da1e936 x10 0000000000000004 x11 0000000000000000 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x12 00000000000026c8 x13 0000007e6d9ef270 x14 b400007e7046ec00 x15 0000007dd828dfd8 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x16 0000000000000000 x17 0000000000000000 x18 0000007f32364000 x19 b400007e7046ec00 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x20 0000000000000000 x21 b400007e7046ecc0 x22 0000007dd845832e x23 0000007e6da1e932 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x24 0000007e6e480880 x25 0000007fed6014c0 x26 0000000010380009 x27 0000000000000034 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x28 0000007fed601530 x29 0000007fed6014f8 10-06 16:18:30.556 10364 21928 21928 F DEBUG : lr 0000007e6e48a984 sp 0000007fed601480 pc 00000000725e7574 pst 0000000080001000 10-06 16:18:30.556 10364 21928 21928 F DEBUG : 55 total frames 10-06 16:18:30.556 10364 21928 21928 F DEBUG : backtrace: 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #00 pc 0000000000da7574 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+4) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #01 pc 000000000068a980 /apex/com.android.art/lib64/libart.so (nterp_helper+5648) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #02 pc 00000000001e532e /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex (org.lsposed.hiddenapibypass.HiddenApiBypass.getDeclaredMethods+190) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #03 pc 0000000000689408 /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #04 pc 00000000001e5198 /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex (org.lsposed.hiddenapibypass.HiddenApiBypass.setHiddenApiExemptions+4) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #05 pc 0000000000317460 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #06 pc 000000000066ab80 /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2088) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #07 pc 0000000000671998 /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #08 pc 00000000002ff738 /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #09 pc 00000000001e50f0 /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex (org.lsposed.hiddenapibypass.HiddenApiBypass.addHiddenApiExemptions+0) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #10 pc 00000000002ff130 /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+412) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #11 pc 000000000066ab6c /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2068) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #12 pc 0000000000671998 /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #13 pc 00000000002ff738 /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #14 pc 00000000001a68a4 /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex (com.termux.shared.reflection.ReflectionUtils.bypassHiddenAPIReflectionRestrictions+0) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #15 pc 00000000002ff130 /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+412) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #16 pc 000000000066ab6c /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2068) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #17 pc 0000000000671998 /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #18 pc 00000000002ff738 /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #19 pc 000000000019ab10 /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex (com.termux.shared.android.SELinuxUtils.getContext+0) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #20 pc 0000000000300b2c /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.4837409187647361565)+332) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #21 pc 0000000000300360 /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+888) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #22 pc 000000000032e638 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #23 pc 0000000000689408 /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #24 pc 00000000001b42e0 /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex (com.termux.shared.termux.shell.command.environment.TermuxAppShellEnvironment.setTermuxAppEnvironment+432) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #25 pc 0000000000317460 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #26 pc 000000000066ab80 /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2088) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #27 pc 0000000000671998 /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #28 pc 00000000002ff738 /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #29 pc 00000000001b4610 /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex (com.termux.shared.termux.shell.command.environment.TermuxShellEnvironment.init+0) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #30 pc 0000000000300b2c /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.4837409187647361565)+332) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #31 pc 0000000000300360 /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+888) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #32 pc 000000000032e638 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #33 pc 0000000000689408 /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #34 pc 000000000018e536 /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex (com.termux.app.TermuxApplication.onCreate+214) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #35 pc 0000000000613340 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.Instrumentation.callApplicationOnCreate+48) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #36 pc 00000000006dd250 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.handleBindApplication+4896) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #37 pc 00000000006d7434 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread$H.handleMessage+8676) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #38 pc 000000000093e458 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Handler.dispatchMessage+152) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #39 pc 0000000000941de4 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+980) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #40 pc 0000000000941968 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+632) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #41 pc 00000000006e7494 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+2132) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #42 pc 0000000000317460 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #43 pc 0000000000311508 /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+544) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #44 pc 00000000005c82c8 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #45 pc 0000000000da4814 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #46 pc 0000000000c5d8d4 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #47 pc 0000000000c67ce8 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+3272) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #48 pc 0000000000317460 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #49 pc 0000000000316100 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+800) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #50 pc 0000000000639868 /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+156) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #51 pc 00000000000df42c /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108) (BuildId: 1676db8399791974bcbbb31c378100db) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #52 pc 00000000000f5328 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+928) (BuildId: 1676db8399791974bcbbb31c378100db) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #53 pc 00000000000025c8 /system/bin/app_process64 (main+1288) (BuildId: 9846ac260d944f605cabbd1beb7a7aa0) 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #54 pc 000000000008f91c /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+120) (BuildId: d02d1c3363b4a4418dcd98f4845bd7a4) ```
[Message part 2 (text/html, inline)]
bug-gnu-emacs <at> gnu.org:bug#79590; Package emacs.
(Tue, 07 Oct 2025 06:22:02 GMT) Full text and rfc822 format available.Message #8 received at 79590 <at> debbugs.gnu.org (full text, mbox):
From: Eli Zaretskii <eliz <at> gnu.org> To: Clément Pit-Claudel <cpitclaudel <at> gmail.com>, Po Lu <luangruo <at> yahoo.com> Cc: 79590 <at> debbugs.gnu.org Subject: Re: bug#79590: Termux crash following Android update Date: Tue, 07 Oct 2025 09:21:22 +0300
> From: Clément Pit-Claudel <cpitclaudel <at> gmail.com> > Date: Mon, 6 Oct 2025 17:20:37 -0700 > > My android device recently updated, and I cannot run the Emacs-friendly build of Termux found at > https://sourceforge.net/projects/android-ports-for-gnu-emacs/files/termux/termux-app_apt-android-7-release_universal.apk/download > anymore: Termux crashes immediately on launch. The same install worked 6 months ago, but now crashes; > clearing the app's data and reinstalling it did not help. > > More precisely, I followed the instructions in "INSTALLATION WITH TERMUX SUPPORT" at > https://ftp.gnu.org/gnu/emacs/android/README and installed the Emacs-provided termux APK. It displayed > a warning: "This app was built for an older version of Android and doesn't include the latest privacy > protections." I ignored the warning, and attempted to run Termux. This fails with an immediate crash. The > logs show a null pointer dereference: I copied the backtrace at the end of this message. > > - Installing the latest termux from F-Droid works fine. Is there perhaps a corresponding updated build of > Termux for Emacs somewhere that I missed? > > I copied the system information below. Let me know if I can include further information. Thanks a lot! And > sorry if this is a duplicate report. Thanks. Po Lu, any comments or suggestions? > > Clément. > > ``` > Build: AP3A.240905.015.A2.X810XXS5CYG1 > Build fingerprint: > 'samsung/gts9pwifieea/gts9pwifi:15/AP3A.240905.015.A2/X810XXS5CYG1:user/release-keys' > Bootloader: X810XXS5CYG1 > Module Metadata version: 360969404 > Android SDK version: 35 > SDK extensions: [ad_services=19, b=<not set>, r=19, s=19, t=19, u=19, v=19] > Kernel: Linux version 5.15.153-android13-8-30958166-abX810XXS5CYG1 (build-user <at> build-host) (Android > (8508608, based on r450784e) clang version 14.0.7 > (https://android.googlesource.com/toolchain/llvm-project 4c603efb0cca074e9238af8b4106c30add4418f6), > LLD 14.0.7) #1 SMP PREEMPT Wed Jul 2 03:23:47 UTC 2025 > ``` > > Backtrace: > ``` > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Build fingerprint: > 'samsung/gts9pwifieea/gts9pwifi:15/AP3A.240905.015.A2/X810XXS5CYG1:user/release-keys' > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Revision: '6' > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : ABI: 'arm64' > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Processor: '7' > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Timestamp: 2025-10-06 16:18:30.475373628-0700 > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Process uptime: 1s > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Cmdline: com.termux > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : pid: 21909, tid: 21909, name: com.termux >>> > com.termux <<< > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : uid: 10364 > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : tagged_addr_ctrl: 0000000000000001 > (PR_TAGGED_ADDR_ENABLE) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : pac_enabled_keys: 000000000000000f > (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault > addr 0x000000000000000c > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Cause: null pointer dereference > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x0 0000000071302ba8 x1 000000007048d428 > x2 0000000000000000 x3 000000000000000c > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x4 0000007e6da22e30 x5 0000007e704c2d97 > x6 0000000000000012 x7 0000007e6da22e1e > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x8 0000007e6da1e931 x9 0000007e6da1e936 > x10 0000000000000004 x11 0000000000000000 > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x12 00000000000026c8 x13 0000007e6d9ef270 > x14 b400007e7046ec00 x15 0000007dd828dfd8 > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x16 0000000000000000 x17 0000000000000000 > x18 0000007f32364000 x19 b400007e7046ec00 > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x20 0000000000000000 x21 b400007e7046ecc0 > x22 0000007dd845832e x23 0000007e6da1e932 > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x24 0000007e6e480880 x25 0000007fed6014c0 > x26 0000000010380009 x27 0000000000000034 > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x28 0000007fed601530 x29 0000007fed6014f8 > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : lr 0000007e6e48a984 sp 0000007fed601480 pc > 00000000725e7574 pst 0000000080001000 > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : 55 total frames > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : backtrace: > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #00 pc 0000000000da7574 > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+4) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #01 pc 000000000068a980 > /apex/com.android.art/lib64/libart.so (nterp_helper+5648) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #02 pc 00000000001e532e > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > (org.lsposed.hiddenapibypass.HiddenApiBypass.getDeclaredMethods+190) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #03 pc 0000000000689408 > /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #04 pc 00000000001e5198 > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > (org.lsposed.hiddenapibypass.HiddenApiBypass.setHiddenApiExemptions+4) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #05 pc 0000000000317460 > /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #06 pc 000000000066ab80 > /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, > art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2088) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #07 pc 0000000000671998 > /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false> > (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #08 pc 00000000002ff738 > /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #09 pc 00000000001e50f0 > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > (org.lsposed.hiddenapibypass.HiddenApiBypass.addHiddenApiExemptions+0) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #10 pc 00000000002ff130 > /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, > art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+412) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #11 pc 000000000066ab6c > /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, > art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2068) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #12 pc 0000000000671998 > /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false> > (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #13 pc 00000000002ff738 > /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #14 pc 00000000001a68a4 > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > (com.termux.shared.reflection.ReflectionUtils.bypassHiddenAPIReflectionRestrictions+0) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #15 pc 00000000002ff130 > /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, > art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+412) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #16 pc 000000000066ab6c > /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, > art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2068) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #17 pc 0000000000671998 > /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false> > (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #18 pc 00000000002ff738 > /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #19 pc 000000000019ab10 > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > (com.termux.shared.android.SELinuxUtils.getContext+0) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #20 pc 0000000000300b2c > /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor > const&, art::ShadowFrame&, art::JValue, bool, bool) > (.__uniq.112435418011751916792819755956732575238.llvm.4837409187647361565)+332) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #21 pc 0000000000300360 > /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+888) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #22 pc 000000000032e638 > /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #23 pc 0000000000689408 > /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #24 pc 00000000001b42e0 > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > (com.termux.shared.termux.shell.command.environment.TermuxAppShellEnvironment.setTermuxAppEnvironment+432) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #25 pc 0000000000317460 > /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #26 pc 000000000066ab80 > /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, > art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2088) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #27 pc 0000000000671998 > /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false> > (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #28 pc 00000000002ff738 > /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #29 pc 00000000001b4610 > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > (com.termux.shared.termux.shell.command.environment.TermuxShellEnvironment.init+0) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #30 pc 0000000000300b2c > /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor > const&, art::ShadowFrame&, art::JValue, bool, bool) > (.__uniq.112435418011751916792819755956732575238.llvm.4837409187647361565)+332) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #31 pc 0000000000300360 > /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+888) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #32 pc 000000000032e638 > /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #33 pc 0000000000689408 > /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #34 pc 000000000018e536 > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > (com.termux.app.TermuxApplication.onCreate+214) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #35 pc 0000000000613340 > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat > (android.app.Instrumentation.callApplicationOnCreate+48) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #36 pc 00000000006dd250 > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat > (android.app.ActivityThread.handleBindApplication+4896) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #37 pc 00000000006d7434 > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat > (android.app.ActivityThread$H.handleMessage+8676) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #38 pc 000000000093e458 > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat > (android.os.Handler.dispatchMessage+152) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #39 pc 0000000000941de4 > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+980) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #40 pc 0000000000941968 > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+632) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #41 pc 00000000006e7494 > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+2132) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #42 pc 0000000000317460 > /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #43 pc 0000000000311508 > /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8> > (art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+544) > (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #44 pc 00000000005c82c8 > /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) > (.__uniq.165753521025965369065708152063621506277)+32) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #45 pc 0000000000da4814 > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #46 pc 0000000000c5d8d4 > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat > (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #47 pc 0000000000c67ce8 > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat > (com.android.internal.os.ZygoteInit.main+3272) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #48 pc 0000000000317460 > /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #49 pc 0000000000316100 > /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*> > (art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+800) (BuildId: > eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #50 pc 0000000000639868 > /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, > std::__va_list)+156) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #51 pc 00000000000df42c > /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108) (BuildId: > 1676db8399791974bcbbb31c378100db) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #52 pc 00000000000f5328 > /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, > android::Vector<android::String8> const&, bool)+928) (BuildId: 1676db8399791974bcbbb31c378100db) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #53 pc 00000000000025c8 > /system/bin/app_process64 (main+1288) (BuildId: 9846ac260d944f605cabbd1beb7a7aa0) > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #54 pc 000000000008f91c > /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+120) (BuildId: > d02d1c3363b4a4418dcd98f4845bd7a4) > ```
bug-gnu-emacs <at> gnu.org:bug#79590; Package emacs.
(Sat, 25 Oct 2025 10:16:01 GMT) Full text and rfc822 format available.Message #11 received at 79590 <at> debbugs.gnu.org (full text, mbox):
From: Eli Zaretskii <eliz <at> gnu.org> To: Po Lu <luangruo <at> yahoo.com> Cc: 79590 <at> debbugs.gnu.org, cpitclaudel <at> gmail.com Subject: Re: bug#79590: Termux crash following Android update Date: Sat, 25 Oct 2025 13:15:20 +0300
Ping! Po Lu, please respond. > Cc: 79590 <at> debbugs.gnu.org > Date: Tue, 07 Oct 2025 09:21:22 +0300 > From: Eli Zaretskii <eliz <at> gnu.org> > > > From: Clément Pit-Claudel <cpitclaudel <at> gmail.com> > > Date: Mon, 6 Oct 2025 17:20:37 -0700 > > > > My android device recently updated, and I cannot run the Emacs-friendly build of Termux found at > > https://sourceforge.net/projects/android-ports-for-gnu-emacs/files/termux/termux-app_apt-android-7-release_universal.apk/download > > anymore: Termux crashes immediately on launch. The same install worked 6 months ago, but now crashes; > > clearing the app's data and reinstalling it did not help. > > > > More precisely, I followed the instructions in "INSTALLATION WITH TERMUX SUPPORT" at > > https://ftp.gnu.org/gnu/emacs/android/README and installed the Emacs-provided termux APK. It displayed > > a warning: "This app was built for an older version of Android and doesn't include the latest privacy > > protections." I ignored the warning, and attempted to run Termux. This fails with an immediate crash. The > > logs show a null pointer dereference: I copied the backtrace at the end of this message. > > > > - Installing the latest termux from F-Droid works fine. Is there perhaps a corresponding updated build of > > Termux for Emacs somewhere that I missed? > > > > I copied the system information below. Let me know if I can include further information. Thanks a lot! And > > sorry if this is a duplicate report. > > Thanks. Po Lu, any comments or suggestions? > > > > > Clément. > > > > ``` > > Build: AP3A.240905.015.A2.X810XXS5CYG1 > > Build fingerprint: > > 'samsung/gts9pwifieea/gts9pwifi:15/AP3A.240905.015.A2/X810XXS5CYG1:user/release-keys' > > Bootloader: X810XXS5CYG1 > > Module Metadata version: 360969404 > > Android SDK version: 35 > > SDK extensions: [ad_services=19, b=<not set>, r=19, s=19, t=19, u=19, v=19] > > Kernel: Linux version 5.15.153-android13-8-30958166-abX810XXS5CYG1 (build-user <at> build-host) (Android > > (8508608, based on r450784e) clang version 14.0.7 > > (https://android.googlesource.com/toolchain/llvm-project 4c603efb0cca074e9238af8b4106c30add4418f6), > > LLD 14.0.7) #1 SMP PREEMPT Wed Jul 2 03:23:47 UTC 2025 > > ``` > > > > Backtrace: > > ``` > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Build fingerprint: > > 'samsung/gts9pwifieea/gts9pwifi:15/AP3A.240905.015.A2/X810XXS5CYG1:user/release-keys' > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Revision: '6' > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : ABI: 'arm64' > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Processor: '7' > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Timestamp: 2025-10-06 16:18:30.475373628-0700 > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Process uptime: 1s > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Cmdline: com.termux > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : pid: 21909, tid: 21909, name: com.termux >>> > > com.termux <<< > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : uid: 10364 > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : tagged_addr_ctrl: 0000000000000001 > > (PR_TAGGED_ADDR_ENABLE) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : pac_enabled_keys: 000000000000000f > > (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault > > addr 0x000000000000000c > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : Cause: null pointer dereference > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x0 0000000071302ba8 x1 000000007048d428 > > x2 0000000000000000 x3 000000000000000c > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x4 0000007e6da22e30 x5 0000007e704c2d97 > > x6 0000000000000012 x7 0000007e6da22e1e > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x8 0000007e6da1e931 x9 0000007e6da1e936 > > x10 0000000000000004 x11 0000000000000000 > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x12 00000000000026c8 x13 0000007e6d9ef270 > > x14 b400007e7046ec00 x15 0000007dd828dfd8 > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x16 0000000000000000 x17 0000000000000000 > > x18 0000007f32364000 x19 b400007e7046ec00 > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x20 0000000000000000 x21 b400007e7046ecc0 > > x22 0000007dd845832e x23 0000007e6da1e932 > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x24 0000007e6e480880 x25 0000007fed6014c0 > > x26 0000000010380009 x27 0000000000000034 > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : x28 0000007fed601530 x29 0000007fed6014f8 > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : lr 0000007e6e48a984 sp 0000007fed601480 pc > > 00000000725e7574 pst 0000000080001000 > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : 55 total frames > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : backtrace: > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #00 pc 0000000000da7574 > > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+4) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #01 pc 000000000068a980 > > /apex/com.android.art/lib64/libart.so (nterp_helper+5648) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #02 pc 00000000001e532e > > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > > (org.lsposed.hiddenapibypass.HiddenApiBypass.getDeclaredMethods+190) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #03 pc 0000000000689408 > > /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #04 pc 00000000001e5198 > > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > > (org.lsposed.hiddenapibypass.HiddenApiBypass.setHiddenApiExemptions+4) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #05 pc 0000000000317460 > > /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #06 pc 000000000066ab80 > > /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, > > art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2088) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #07 pc 0000000000671998 > > /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false> > > (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #08 pc 00000000002ff738 > > /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #09 pc 00000000001e50f0 > > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > > (org.lsposed.hiddenapibypass.HiddenApiBypass.addHiddenApiExemptions+0) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #10 pc 00000000002ff130 > > /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, > > art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+412) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #11 pc 000000000066ab6c > > /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, > > art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2068) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #12 pc 0000000000671998 > > /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false> > > (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #13 pc 00000000002ff738 > > /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #14 pc 00000000001a68a4 > > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > > (com.termux.shared.reflection.ReflectionUtils.bypassHiddenAPIReflectionRestrictions+0) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #15 pc 00000000002ff130 > > /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, > > art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+412) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #16 pc 000000000066ab6c > > /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, > > art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2068) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #17 pc 0000000000671998 > > /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false> > > (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #18 pc 00000000002ff738 > > /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #19 pc 000000000019ab10 > > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > > (com.termux.shared.android.SELinuxUtils.getContext+0) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #20 pc 0000000000300b2c > > /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor > > const&, art::ShadowFrame&, art::JValue, bool, bool) > > (.__uniq.112435418011751916792819755956732575238.llvm.4837409187647361565)+332) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #21 pc 0000000000300360 > > /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+888) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #22 pc 000000000032e638 > > /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #23 pc 0000000000689408 > > /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #24 pc 00000000001b42e0 > > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > > (com.termux.shared.termux.shell.command.environment.TermuxAppShellEnvironment.setTermuxAppEnvironment+432) > > > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #25 pc 0000000000317460 > > /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #26 pc 000000000066ab80 > > /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, > > art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2088) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #27 pc 0000000000671998 > > /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false> > > (art::interpreter::SwitchImplContext*)+1280) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #28 pc 00000000002ff738 > > /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #29 pc 00000000001b4610 > > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > > (com.termux.shared.termux.shell.command.environment.TermuxShellEnvironment.init+0) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #30 pc 0000000000300b2c > > /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor > > const&, art::ShadowFrame&, art::JValue, bool, bool) > > (.__uniq.112435418011751916792819755956732575238.llvm.4837409187647361565)+332) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #31 pc 0000000000300360 > > /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+888) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #32 pc 000000000032e638 > > /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #33 pc 0000000000689408 > > /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #34 pc 000000000018e536 > > /data/app/~~t-hGHZ7jFeFhez2MxibMZQ==/com.termux-4QdbMo_kdzt9w3nwKJQB1g==/oat/arm64/base.vdex > > (com.termux.app.TermuxApplication.onCreate+214) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #35 pc 0000000000613340 > > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat > > (android.app.Instrumentation.callApplicationOnCreate+48) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #36 pc 00000000006dd250 > > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat > > (android.app.ActivityThread.handleBindApplication+4896) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #37 pc 00000000006d7434 > > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat > > (android.app.ActivityThread$H.handleMessage+8676) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #38 pc 000000000093e458 > > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat > > (android.os.Handler.dispatchMessage+152) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #39 pc 0000000000941de4 > > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loopOnce+980) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #40 pc 0000000000941968 > > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Looper.loop+632) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #41 pc 00000000006e7494 > > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.app.ActivityThread.main+2132) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #42 pc 0000000000317460 > > /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #43 pc 0000000000311508 > > /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8> > > (art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+544) > > (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #44 pc 00000000005c82c8 > > /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) > > (.__uniq.165753521025965369065708152063621506277)+32) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #45 pc 0000000000da4814 > > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (art_jni_trampoline+116) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #46 pc 0000000000c5d8d4 > > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat > > (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #47 pc 0000000000c67ce8 > > /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat > > (com.android.internal.os.ZygoteInit.main+3272) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #48 pc 0000000000317460 > > /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #49 pc 0000000000316100 > > /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*> > > (art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+800) (BuildId: > > eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #50 pc 0000000000639868 > > /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, > > std::__va_list)+156) (BuildId: eb4ec0f1d1c7267591d83fa87cb36390) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #51 pc 00000000000df42c > > /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108) (BuildId: > > 1676db8399791974bcbbb31c378100db) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #52 pc 00000000000f5328 > > /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, > > android::Vector<android::String8> const&, bool)+928) (BuildId: 1676db8399791974bcbbb31c378100db) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #53 pc 00000000000025c8 > > /system/bin/app_process64 (main+1288) (BuildId: 9846ac260d944f605cabbd1beb7a7aa0) > > 10-06 16:18:30.556 10364 21928 21928 F DEBUG : #54 pc 000000000008f91c > > /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+120) (BuildId: > > d02d1c3363b4a4418dcd98f4845bd7a4) > > ``` > > > >
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.