App crashes, and grapheneOS notifies that "memory tagging detected an error in REDnote"
Here's the log:
type: crash
flags: dev options enabled
package: com.xingin.xhs:8590163, targetSdk 34
osVersion: google/shiba/shiba:15/AP4A.250105.002/2025010700:user/release-keys
uid: 10173 (u:r:untrusted_app:s0:c173,c256,c512,c768)
cmdline: com.xingin.xhs
processUptime: 2s
signal: 11 (SIGSEGV), code 9 (SEGV_MTESERR), faultAddr caa2401bda5f
threadName: xy_pool_newThre
MTE: enabled
backtrace:
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/split_config.arm64_v8a.apk!libsmsdk.so (pc 4932c)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/split_config.arm64_v8a.apk!libsmsdk.so (pc 4c994)
/system/framework/arm64/boot-core-libart.oat (art_jni_trampoline+140, pc 16c9c)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/oat/arm64/base.odex (com.ishumei.dfp.SMSDK.x5+88, pc 9febfa8)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/oat/arm64/base.odex (com.ishumei.O0000O000000oO.O00O0000OooO$O00O0000o00O.O000O00000o0O+284, pc aa8e23c)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/oat/arm64/base.odex (com.ishumei.O0000O000000oO.O00O0000OooO$O000O00000OoO.O000O00000oO+152, pc a6d3538)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/oat/arm64/base.odex (com.ishumei.O0000O000000oO.O00O0000OooO.O000O00000OoO+408, pc 9fbdaf8)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/oat/arm64/base.odex (com.ishumei.smantifraud.SmAntiFraud.O0000O000000oO+428, pc 9ff71fc)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/oat/arm64/base.odex (com.ishumei.smantifraud.SmAntiFraud.create+272, pc 9ff83b0)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/oat/arm64/base.odex (mr6.a.c+268, pc 1ddca80c)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/oat/arm64/base.odex (com.xingin.xhs.net.x0.C+692, pc 20389944)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/oat/arm64/base.odex (com.xingin.xhs.app.SkynetTaskFactory$SecurityTask.run+160, pc 1f272690)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/oat/arm64/base.odex (sa1.c.run+1092, pc 105f9b74)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/oat/arm64/base.odex (iu6.h.execute+336, pc 1e6a5860)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/oat/arm64/base.odex (iu6.g.run+88, pc 1e3be058)
/system/framework/arm64/boot.oat (java.util.concurrent.Executors$RunnableAdapter.call+60, pc 211f7c)
/system/framework/arm64/boot.oat (java.util.concurrent.FutureTask.run+164, pc 211174)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/oat/arm64/base.odex (xr6.h.A+36, pc 1e0c0144)
/data/app/~~b2FzSviiilsqXfWOxHrrog==/com.xingin.xhs-xX3jllZpSKTvSg4sEqHCHw==/oat/arm64/base.odex (xr6.h.run+372, pc 1e0c1564)
/system/framework/arm64/boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+724, pc 21b8f4)
/system/framework/arm64/boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+56, pc 220948)
/system/framework/arm64/boot.oat (java.lang.Thread.run+64, pc b0690)
/apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+612, pc 41e594)
/apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136, pc 26e088)
/apex/com.android.art/lib64/libart.so (art::Thread::CreateCallback(void*)+1096, pc 4cc618)
/apex/com.android.art/lib64/libart.so (art::Thread::CreateCallbackWithUffdGc(void*)+12, pc 4cc1bc)
/apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+132, pc 7ba94)
/apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+68, pc 6b474)
```
`
Is it possible this is an intentional attempt to exploit my phone? Or is that way too paranoid?