Android10 华为 荣耀设备在HarmonyOS鸿蒙Next中app调用CookieManager#getCookie方法崩溃

Android10 华为 荣耀设备在HarmonyOS鸿蒙Next中app调用CookieManager#getCookie方法崩溃 Android10 华为/荣耀设备上,app通过CookieManager获取cookie时,出现内存分配的native crash,崩溃日志如下:

native崩溃失败地址: 0x6f846a63a0

异常名: Signal: 5 (SIGTRAP), Code: 1 (TRAP_BRKPT)

backtrace <<<<

#00 pc 00000000001fd3a0 /system/product/app/HwTriWebviewLib/HwTriWebviewLib.apk!libbase.huawei.so base::internal::PartitionFree(base::allocator::AllocatorDispatch const*, void*, void*) + 912
#01 pc 00000000012ad8f4 /system/product/app/HwTriWebviewLib/HwTriWebviewLib.apk!libwebviewchromium.huawei.so Java_J_N_MwtyXc6D() + 88
#02 pc 00000000001ba3f0 /data/dalvik-cache/arm64/system@product@app@HwWebview@HwWebview.apk@classes.dex (art_jni_trampoline+208)
#03 pc 0000000000296234 /data/dalvik-cache/arm64/system@product@app@HwWebview@HwWebview.apk@classes.dex (com.android.webview.chromium.a.getCookie+164)
#04 pc 0000000000148334 /apex/com.android.runtime/lib64/libart.so art_quick_invoke_stub() + 548
#05 pc 00000000001571b4 /apex/com.android.runtime/lib64/libart.so art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*) + 252
#06 pc 00000000002fe588 /apex/com.android.runtime/lib64/libart.so art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*) + 384
#07 pc 00000000002f9858 /apex/com.android.runtime/lib64/libart.so boolean art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*) + 912
#08 pc 00000000005d7314 /apex/com.android.runtime/lib64/libart.so MterpInvokeVirtualQuick() + 596
#09 pc 0000000000146594 /apex/com.android.runtime/lib64/libart.so mterp_op_invoke_virtual_quick() + 20
#10 pc 00000000005d7618 /apex/com.android.runtime/lib64/libart.so MterpInvokeVirtualQuick() + 1368
#11 pc 0000000000146594 /apex/com.android.runtime/lib64/libart.so mterp_op_invoke_virtual_quick() + 20
#12 pc 00000000005d379c /apex/com.android.runtime/lib64/libart.so MterpInvokeDirect() + 1168
#13 pc 0000000000142914 /apex/com.android.runtime/lib64/libart.so mterp_op_invoke_direct() + 20
#14 pc 00000000005d7618 /apex/com.android.runtime/lib64/libart.so MterpInvokeVirtualQuick() + 1368
#15 pc 0000000000146594 /apex/com.android.runtime/lib64/libart.so mterp_op_invoke_virtual_quick() + 20
#16 pc 00000000005d7618 /apex/com.android.runtime/lib64/libart.so MterpInvokeVirtualQuick() + 1368
#17 pc 0000000000146594 /apex/com.android.runtime/lib64/libart.so mterp_op_invoke_virtual_quick() + 20
#18 pc 00000000005d3fa8 /apex/com.android.runtime/lib64/libart.so MterpInvokeStatic() + 1136
#19 pc 0000000000142994 /apex/com.android.runtime/lib64/libart.so mterp_op_invoke_static() + 20
#20 pc 00000000005d66b4 /apex/com.android.runtime/lib64/libart.so MterpInvokeDirectRange() + 788
#21 pc 0000000000142c14 /apex/com.android.runtime/lib64/libart.so mterp_op_invoke_direct_range() + 20
#22 pc 00000000005d66b4 /apex/com.android.runtime/lib64/libart.so MterpInvokeDirectRange() + 788
#23 pc 0000000000142c14 /apex/com.android.runtime/lib64/libart.so mterp_op_invoke_direct_range() + 20
#24 pc 00000000005d379c /apex/com.android.runtime/lib64/libart.so MterpInvokeDirect() + 1168
#25 pc 0000000000142914 /apex/com.android.runtime/lib64/libart.so mterp_op_invoke_direct() + 20
#26 pc 00000000005d3fa8 /apex/com.android.runtime/lib64/libart.so MterpInvokeStatic() + 1136
#27 pc 0000000000142994 /apex/com.android.runtime/lib64/libart.so mterp_op_invoke_static() + 20
#28 pc 00000000005d7618 /apex/com.android.runtime/lib64/libart.so MterpInvokeVirtualQuick() + 1368
#29 pc 0000000000146594 /apex/com.android.runtime/lib64/libart.so mterp_op_invoke_virtual_quick() + 20
#30 pc 00000000002ceeb4 /apex/com.android.runtime/lib64/libart.so 14109938010406342239() + 320
#31 pc 00000000005c0d08 /apex/com.android.runtime/lib64/libart.so artQuickToInterpreterBridge() + 1012
#32 pc 0000000000151468 /apex/com.android.runtime/lib64/libart.so art_quick_to_interpreter_bridge() + 88
#33 pc 000000000065e610 /data/app/com.qiyi.video.child-PIKFhfjMiqxZG3zXpWDNiA==/oat/arm64/base.odex (com.iqiyi.passportsdk.d.com1$prn.b+256)
#34 pc 000000000094b2f4 /data/app/com.qiyi.video.child-PIKFhfjMiqxZG3zXpWDNiA==/oat/arm64/base.odex (n.c.c.a.con$con.a+116)
#35 pc 00000000009cdab0 /data/app/com.qiyi.video.child-PIKFhfjMiqxZG3zXpWDNiA==/oat/arm64/base.odex (org.qiyi.net.callback.nul.b+112)
#36 pc 0000000000988e98 /data/app/com.qiyi.video.child-PIKFhfjMiqxZG3zXpWDNiA==/oat/arm64/base.odex (org.qiyi.net.Request.deliverResponse+584)
#37 pc 0000000000990d10 /data/app/com.qiyi.video.child-PIKFhfjMiqxZG3zXpWDNiA==/oat/arm64/base.odex (org.qiyi.net.dispatcher.com8$con.run+928)
#38 pc 0000000000991ac0 /data/app/com.qiyi.video.child-PIKFhfjMiqxZG3zXpWDNiA==/oat/arm64/base.odex (org.qiyi.net.dispatcher.com8.a+2688)
#39 pc 0000000000991e78 /data/app/com.qiyi.video.child-PIKFhfjMiqxZG3zXpWDNiA==/oat/arm64/base.odex (org.qiyi.net.dispatcher.com8.d+264)
#40 pc 0000000000991d48 /data/app/com.qiyi.video.child-PIKFhfjMiqxZG3zXpWDNiA==/oat/arm64/base.odex (org.qiyi.net.dispatcher.com8.c+56)
#41 pc 000000000098d58c /data/app/com.qiyi.video.child-PIKFhfjMiqxZG3zXpWDNiA==/oat/arm64/base.odex (org.qiyi.net.dispatcher.com2.e+1068)
#42 pc 000000000098cc98 /data/app/com.qiyi.video.child-PIKFhfjMiqxZG3zXpWDNiA==/oat/arm64/base.odex (org.qiyi.net.dispatcher.com2$aux.run+344)
#43 pc 00000000003d8d08 /system/framework/arm64/boot.oat runWorker() + 984
#44 pc 00000000003d5880 /system/framework/arm64/boot.oat run() + 64
#45 pc 0000000000217fc8 /system/framework/arm64/boot.oat run() + 72
#46 pc 0000000000148334 /apex/com.android.runtime/lib64/libart.so art_quick_invoke_stub() + 548
#47 pc 00000000001571b4 /apex/com.android.runtime/lib64/libart.so art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*) + 252
#48 pc 00000000004d9510 /apex/com.android.runtime/lib64/libart.so art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*) + 104
#49 pc 00000000004da5a4 /apex/com.android.runtime/lib64/libart.so art::InvokeVirtualOrInterfaceWithJValues(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, jvalue const*) + 416
#50 pc 000000000051eb10 /apex/com.android.runtime/lib64/libart.so art::Thread::CreateCallback(void*) + 1232
#51 pc 00000000000cf7c0 /apex/com.android.runtime/lib64/bionic/libc.so __pthread_start(void*) + 36
#52 pc 00000000000721a8 /apex/com.android.runtime/lib64/bionic/libc.so __start_thread() + 64

java backtrace <<<<

at J.N::MwtyXc6D(Native method)
at b5::b(HwWebview-12.1.2.314.4673:2)
at com.android.webview.chromium.a::getCookie(HwWebview-12.1.2.314.4673:1)
at h.e.q.a.d.nul::K(Proguard:4)
at h.e.q.a.d.nul::Z(Proguard:3)
at h.e.q.a.d.nul::d1(Proguard:7)

java调用CookieManager#getCookie方法时,出现上述崩溃,麻烦华为工作人员们帮忙看下原因


更多关于Android10 华为 荣耀设备在HarmonyOS鸿蒙Next中app调用CookieManager#getCookie方法崩溃的实战教程也可以访问 https://www.itying.com/category-93-b0.html

5 回复

您好,您的问题需要进一步分析,请您通过在线提单进一步解决:https://developer.huawei.com/consumer/cn/support/feedback/#/,感谢您的反馈和支持。

更多关于Android10 华为 荣耀设备在HarmonyOS鸿蒙Next中app调用CookieManager#getCookie方法崩溃的实战系列教程也可以访问 https://www.itying.com/category-93-b0.html


提交了工单,但是客服回复说这个不属于“联盟”的业务,我理解想知道怎么给华为手机操作系统的技术人员提交工单呢?

没地方提,你问就是提工单,可是工单提到哪里? 人都都说不归人家管

在鸿蒙Next中,Android 10的华为和荣耀设备调用CookieManager#getCookie方法时崩溃,可能是由于鸿蒙系统与Android系统在实现上的差异导致的。鸿蒙系统虽然兼容Android应用,但在底层实现上有所不同,特别是在处理WebView和Cookie管理时。CookieManager是Android API的一部分,鸿蒙系统可能未完全实现或适配该方法,导致调用时出现崩溃。建议检查鸿蒙系统文档,确认CookieManager相关API的兼容性情况。

在HarmonyOS鸿蒙Next中,Android 10的华为荣耀设备调用CookieManager#getCookie方法崩溃,可能是由于系统兼容性问题或API变更导致的。建议检查以下方面:

  1. API兼容性:确保CookieManager在HarmonyOS中的实现与Android 10一致。
  2. 权限检查:确认应用已获取必要的网络权限。
  3. 异常捕获:在调用getCookie方法时添加异常捕获,记录详细日志以便排查。
  4. 系统更新:检查设备系统是否为最新版本,可能存在已知问题修复。

如问题持续,建议联系华为开发者支持获取进一步帮助。

回到顶部