So, the app had been kinda glitchy for a couple days now (and yes, I know that AV is generally not advisable with GOS, but I mainly use it for the app lock) and when I saw there was an update available I thought this behaviour would stop, but instead, as soon as I updated it, I got an error message about an error with hardened memory, and then the app kept crashing afterwards.
I have already contacted the eset devs, but other than asking generic questions (phone model, license etc) I haven't received anything else, but for precaution I uninstalled the app in the mean time.
I have not been using grapheneos for long, and not sure if this is important to mention, but the reason I switched to it was a creppy run-in with hacker/cyberstalker who targerted me directly (admittedly, some of this was due to me being careless and overly trusting at the time) on all my devices some months ago.
The glitchy behavior I noticed before this:
- the app lock would take a few seconds longer to appear on the locked apps/settings
- Sometimes it appeared twice.
- at times the app lock would appear when it shouldn't or didn't appear when it should.
If anyone has any insights or recommendations I would appreciate it.
I also have the detailed report from the system here:
type: crash
osVersion: google/bluejay/bluejay:16/BP2A.250705.008.A1/2025081400:user/release-keys
package: com.eset.ems2.gp:281100026, targetSdk 35
process: com.eset.ems2.gp
installer: com.android.vending
signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------
Abort message: 'hardened_malloc: fatal allocator error: canary corrupted'
backtrace:
#00 pc 000000000007727c /apex/com.android.runtime/lib64/bionic/libc.so (abort+156) (BuildId: 31925e1fc9d3c1ed63fabe9cc089b405)
#01 pc 0000000000060984 /apex/com.android.runtime/lib64/bionic/libc.so (fatal_error+44) (BuildId: 31925e1fc9d3c1ed63fabe9cc089b405)
#02 pc 000000000005e298 /apex/com.android.runtime/lib64/bionic/libc.so (deallocate_small+1272) (BuildId: 31925e1fc9d3c1ed63fabe9cc089b405)
#03 pc 00000000002ab980 /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/split_config.arm64_v8a.apk!libems.so (offset 0x12c000) (BuildId: 3913803fd79f5aab41c46ea4ccfe2d0b920d25f1)
#04 pc 00000000002c9a04 /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/split_config.arm64_v8a.apk!libems.so (offset 0x12c000) (BuildId: 3913803fd79f5aab41c46ea4ccfe2d0b920d25f1)
#05 pc 00000000002c9c3c /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/split_config.arm64_v8a.apk!libems.so (offset 0x12c000) (BuildId: 3913803fd79f5aab41c46ea4ccfe2d0b920d25f1)
#06 pc 00000000002c9aec /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/split_config.arm64_v8a.apk!libems.so (offset 0x12c000) (BuildId: 3913803fd79f5aab41c46ea4ccfe2d0b920d25f1)
#07 pc 00000000002b832c /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/split_config.arm64_v8a.apk!libems.so (offset 0x12c000) (BuildId: 3913803fd79f5aab41c46ea4ccfe2d0b920d25f1)
#08 pc 000000000011f450 /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/split_config.arm64_v8a.apk!libems.so (offset 0x12c000) (BuildId: 3913803fd79f5aab41c46ea4ccfe2d0b920d25f1)
#09 pc 00000000002ab7b0 /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/split_config.arm64_v8a.apk!libems.so (offset 0x12c000) (Java_com_eset_nativeapi_framework_NativeCommandHandler_handleCommand+176) (BuildId: 3913803fd79f5aab41c46ea4ccfe2d0b920d25f1)
#10 pc 00000000002d6ba8 /system/framework/arm64/boot.oat (art_jni_trampoline+136) (BuildId: f2f02556ff35bd5d85c16569149b82ddcb76427b)
#11 pc 00000000031b6238 /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/oat/arm64/base.odex (com.eset.nativeapi.framework.NativeCommandHandler.d+136)
#12 pc 000000000354a458 /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/oat/arm64/base.odex (fjc.m+888)
#13 pc 0000000003da60bc /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/oat/arm64/base.odex (uic$a.E+380)
#14 pc 0000000002f88a24 /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/oat/arm64/base.odex (zx1.t+180)
#15 pc 00000000036a6700 /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/oat/arm64/base.odex (lq5.run+1616)
#16 pc 0000000002441dc0 /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/oat/arm64/base.odex (gf4$c.b+176)
#17 pc 0000000002443eb0 /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/oat/arm64/base.odex (gf4$c.m+1232)
#18 pc 00000000024446b4 /data/app/~nbpFPNU21L8_Y1RHIAFRPw==/com.eset.ems2.gp-QNOmIN1n5IBeyMtak97adw==/oat/arm64/base.odex (gf4$c.run+36)
#19 pc 0000000000323b94 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+612) (BuildId: 229ce263737eb16ebea3e4cc46779c65)
#20 pc 00000000003125f8 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+216) (BuildId: 229ce263737eb16ebea3e4cc46779c65)
#21 pc 00000000004292b8 /apex/com.android.art/lib64/libart.so (art::Thread::CreateCallback(void*)+936) (BuildId: 229ce263737eb16ebea3e4cc46779c65)
#22 pc 0000000000428ef8 /apex/com.android.art/lib64/libart.so (art::Thread::CreateCallbackWithUffdGc(void*)+8) (BuildId: 229ce263737eb16ebea3e4cc46779c65)
#23 pc 0000000000087c3c /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+236) (BuildId: 31925e1fc9d3c1ed63fabe9cc089b405)
#24 pc 000000000007a200 /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64) (BuildId: 31925e1fc9d3c1ed63fabe9cc089b405)