Uploaded image for project: 'Realm Java SDK'
  1. Realm Java SDK
  2. RJAVA-845

App crashes with "JNI ERROR (app bug): local reference table overflow (max=512)"

      We noticed that our app crashes sometimes with "JNI ERROR (app bug): local reference table overflow (max=512)". Can you tell us what might be happening, please? We had reported a similar error at #7217 but it was fixed and we haven't experienced that error after the new update. This one looks similar to that but the source of this one seems different though.

      Version of Realm and tooling

      Realm version(s): 10.2.0

      Realm Sync feature enabled: Yes

      Android Studio version: 4.1.1

      Android Build Tools version: 30.0.2

      Gradle version: Android Gradle Plugin 4.1.1 with Gradle 6.5

      Which Android version and device(s): A custom Android tablet which runs Android 7.1.2

      Logs

      ********** Crash dump: **********
      Build fingerprint: 'Android/tab173_rk_gen2/tab173_rk_gen2:7.1.2/2.0/buildk11202149:user/release-keys'
      Abort message: 'art/runtime/indirect_reference_table.cc:132] JNI ERROR (app bug): local reference table overflow (max=512)'
      #00 0x0004a0c0 /system/lib/libc.so (tgkill+12)
      #01 0x00047853 /system/lib/libc.so (pthread_kill+34)
      #02 0x0001d8b5 /system/lib/libc.so (raise+10)
      #03 0x00019401 /system/lib/libc.so (__libc_android_abort+34)
      #04 0x00017048 /system/lib/libc.so (abort+4)
      #05 0x0031d8cd /system/lib/libart.so (_ZN3art7Runtime5AbortEPKc+328)
      #06 0x000b5503 /system/lib/libart.so (_ZN3art10LogMessageD2Ev+1134)
      #07 0x001bd92f /system/lib/libart.so (_ZN3art22IndirectReferenceTable3AddEjPNS_6mirror6ObjectE+194)
      #08 0x002660d7 /system/lib/libart.so (_ZN3art3JNI10NewObjectVEP7_JNIEnvP7_jclassP10_jmethodIDSt9__va_list+478)
      #09 0x00013565 /system/lib/libjavacore.so
      #10 0x0001d055 /system/lib/libjavacore.so
      #11 0x0001d341 /system/lib/libjavacore.so
      #12 0x00018a09 /system/lib/libjavacore.so
      #13 0x0067e62b /system/framework/arm/boot-core-libart.oat (offset 0x47d000) (libcore.io.Posix.android_getaddrinfo+126)
      #14 0x00670c43 /system/framework/arm/boot-core-libart.oat (offset 0x47d000) (libcore.io.ForwardingOs.android_getaddrinfo+62)
      #15 0x005c4081 /system/framework/arm/boot.oat (offset 0x51b000) (java.net.InetAddress.parseNumericAddressNoThrow+268)
      #16 0x005c3de1 /system/framework/arm/boot.oat (offset 0x51b000) (java.net.InetAddress.isNumeric+44)
      #17 0x0009cfb7 /system/framework/arm/boot-conscrypt.oat (offset 0x6b000) (com.android.org.conscrypt.Platform.isLiteralIpAddress+42)
      #18 0x0006c46d /system/framework/arm/boot-conscrypt.oat (offset 0x6b000) (com.android.org.conscrypt.AddressUtils.isValidSniHostname+80)
      #19 0x0009cef7 /system/framework/arm/boot-conscrypt.oat (offset 0x6b000) (com.android.org.conscrypt.Platform.getSSLParameters+154)
      #20 0x000941c5 /system/framework/arm/boot-conscrypt.oat (offset 0x6b000) (com.android.org.conscrypt.OpenSSLSocketImpl.getSSLParameters+72)
      #21 0x000a3ccf /system/framework/arm/boot-conscrypt.oat (offset 0x6b000) (com.android.org.conscrypt.TrustManagerImpl.getTrustedChainForServer+106)
      #22 0x01cd21b3 /system/framework/arm/boot-framework.oat (offset 0x15cb000) (android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted+54)
      #23 0x01cd2d67 /system/framework/arm/boot-framework.oat (offset 0x15cb000) (android.security.net.config.RootTrustManager.checkServerTrusted+250)
      #24 0x0009c793 /system/framework/arm/boot-conscrypt.oat (offset 0x6b000) (com.android.org.conscrypt.Platform.checkServerTrusted+246)
      #25 0x00095e29 /system/framework/arm/boot-conscrypt.oat (offset 0x6b000) (com.android.org.conscrypt.OpenSSLSocketImpl.verifyCertificateChain+540)
      #26 0x000a99c1 /system/lib/libart.so (art_quick_invoke_stub_internal+64)
      #27 0x00409185 /system/lib/libart.so (art_quick_invoke_stub+232)
      #28 0x000b0c89 /system/lib/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+136)
      #29 0x003187c3 /system/lib/libart.so (_ZN3artL18InvokeWithArgArrayERKNS_33ScopedObjectAccessAlreadyRunnableEPNS_9ArtMethodEPNS_8ArgArrayEPNS_6JValueEPKc+58)
      #30 0x00319755 /system/lib/libart.so (_ZN3art35InvokeVirtualOrInterfaceWithVarArgsERKNS_33ScopedObjectAccessAlreadyRunnableEP8_jobjectP10_jmethodIDSt9__va_list+256)
      #31 0x0026be0d /system/lib/libart.so (_ZN3art3JNI15CallVoidMethodVEP7_JNIEnvP8_jobjectP10_jmethodIDSt9__va_list+444)
      #32 0x00011939 /system/lib/libjavacrypto.so
      #33 0x00011ef5 /system/lib/libjavacrypto.so
      #34 0x00016f7f /system/lib/libssl.so
      #35 0x0000feed /system/lib/libssl.so
      #36 0x0000f0a7 /system/lib/libssl.so
      #37 0x0000e8dd /system/lib/libjavacrypto.so
      #38 0x0007888f /system/framework/arm/boot-conscrypt.oat (offset 0x6b000) (com.android.org.conscrypt.NativeCrypto.SSL_do_handshake+210)
      #39 0x0009556d /system/framework/arm/boot-conscrypt.oat (offset 0x6b000) (com.android.org.conscrypt.OpenSSLSocketImpl.startHandshake+1072)
      #40 0x0005863f /dev/ashmem/dalvik-jit-code-cache (deleted)
      

            Assignee:
            Unassigned Unassigned
            Reporter:
            unitosyncbot Unito Sync Bot
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated:
              Resolved: