Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"com.samsung.android.fingerprint.FingerprintManager" to update AndroidExcludedRefs.java #129

Closed
sergeykomlach opened this issue May 19, 2015 · 3 comments

Comments

@sergeykomlach
Copy link

Trace:

05-19 12:24:49.162: D/LeakCanary(4994): * com.example.testfingerprint.AlternativeUnlockActivity has leaked:
05-19 12:24:49.162: D/LeakCanary(4994): * GC ROOT static com.samsung.android.fingerprint.FingerprintManager.mContext
05-19 12:24:49.162: D/LeakCanary(4994): * leaks com.example.testfingerprint.AlternativeUnlockActivity instance
05-19 12:24:49.162: D/LeakCanary(4994): * Reference Key: 91bce66c-74cc-4e6e-ba9c-5911d64e7f11
05-19 12:24:49.162: D/LeakCanary(4994): * Device: samsung samsung SM-G900H k3gxx
05-19 12:24:49.162: D/LeakCanary(4994): * Android Version: 5.0 API: 21 LeakCanary: 1.3.1
05-19 12:24:49.162: D/LeakCanary(4994): * Durations: watch=5046ms, gc=225ms, heap dump=6504ms, analysis=50261ms
05-19 12:24:49.162: D/LeakCanary(4994): * Details:
05-19 12:24:49.162: D/LeakCanary(4994): * Class com.samsung.android.fingerprint.FingerprintManager
05-19 12:24:49.162: D/LeakCanary(4994): | static $staticOverhead = byte[] [id=0x71265339;length=496;size=512]
05-19 12:24:49.162: D/LeakCanary(4994): | static CLIENTSPEC_KEY_ACCURACY = java.lang.String [id=0x6fb40a18]
05-19 12:24:49.162: D/LeakCanary(4994): | static CLIENTSPEC_KEY_ALLOW_INDEXES = java.lang.String [id=0x6fc18680]
05-19 12:24:49.162: D/LeakCanary(4994): | static CLIENTSPEC_KEY_APPNAME = java.lang.String [id=0x6fb8bc18]
05-19 12:24:49.162: D/LeakCanary(4994): | static CLIENTSPEC_KEY_BACKGROUND = java.lang.String [id=0x6fb07f70]
05-19 12:24:49.162: D/LeakCanary(4994): | static CLIENTSPEC_KEY_DEMANDED_PROPERTY_NAME = java.lang.String [id=0x12fed780]
05-19 12:24:49.162: D/LeakCanary(4994): | static CLIENTSPEC_KEY_DEMAND_EXTRA_EVENT = java.lang.String [id=0x6fd4a3b0]
05-19 12:24:49.162: D/LeakCanary(4994): | static CLIENTSPEC_KEY_OWN_NAME = java.lang.String [id=0x6fb4a890]
05-19 12:24:49.162: D/LeakCanary(4994): | static CLIENTSPEC_KEY_PACKAGE_NAME = java.lang.String [id=0x6fd4dbf0]
05-19 12:24:49.162: D/LeakCanary(4994): | static CLIENTSPEC_KEY_SECURITY_LEVEL = java.lang.String [id=0x6fb9d400]
05-19 12:24:49.162: D/LeakCanary(4994): | static CLIENTSPEC_KEY_USE_MANUAL_TIMEOUT = java.lang.String [id=0x6fc07d30]
05-19 12:24:49.162: D/LeakCanary(4994): | static ENROLL_FINISHED = java.lang.String [id=0x6fd30fd0]
05-19 12:24:49.162: D/LeakCanary(4994): | static ERROR_MSG_SERVICE_NOT_FOUND = java.lang.String [id=0x6fbc3628]
05-19 12:24:49.162: D/LeakCanary(4994): | static EXTRAS_KEY_TOKEN = java.lang.String [id=0x6fc8d6b8]
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_PERMISSION_DELIMITER = java.lang.String [id=0x6f6e0940]
05-19 12:24:49.162: D/LeakCanary(4994): | static SERVICE_NAME = java.lang.String [id=0x6fc8b310]
05-19 12:24:49.162: D/LeakCanary(4994): | static START_ENROLL_ACTIVITY_COMPONENT = android.content.ComponentName [id=0x12f0beb0]
05-19 12:24:49.162: D/LeakCanary(4994): | static TAG = java.lang.String [id=0x6fe55060]
05-19 12:24:49.162: D/LeakCanary(4994): | static mCallerActivity = null
05-19 12:24:49.162: D/LeakCanary(4994): | static mCallerApplication = null
05-19 12:24:49.162: D/LeakCanary(4994): | static mContext = com.example.testfingerprint.AlternativeUnlockActivity [id=0x12c74070]
05-19 12:24:49.162: D/LeakCanary(4994): | static mEnrollListener = null
05-19 12:24:49.162: D/LeakCanary(4994): | static mFpClient = null
05-19 12:24:49.162: D/LeakCanary(4994): | static mIdentifyDialog = null
05-19 12:24:49.162: D/LeakCanary(4994): | static mService = com.samsung.android.fingerprint.IFingerprintManager$Stub$Proxy [id=0x12f0bf40]
05-19 12:24:49.162: D/LeakCanary(4994): | static mStringId = null
05-19 12:24:49.162: D/LeakCanary(4994): | static mWaitLock = java.lang.Object [id=0x12f0bec0]
05-19 12:24:49.162: D/LeakCanary(4994): | static sInstance = com.samsung.android.fingerprint.FingerprintManager [id=0x12fed8a0]
05-19 12:24:49.162: D/LeakCanary(4994): | static DEBUG = false
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_ALL = 21
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_LEFT_INDEX = 2
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_LEFT_INDEX_2ND = 12
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_LEFT_LITTLE = 5
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_LEFT_LITTLE_2ND = 15
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_LEFT_MIDDLE = 3
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_LEFT_MIDDLE_2ND = 13
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_LEFT_RING = 4
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_LEFT_RING_2ND = 14
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_LEFT_THUMB = 1
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_LEFT_THUMB_2ND = 11
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_NOT_SPECIFIED = 0
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_NUMBER_FOR_ONE = 10
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_RIGHT_INDEX = 7
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_RIGHT_INDEX_2ND = 17
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_RIGHT_LITTLE = 10
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_RIGHT_LITTLE_2ND = 20
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_RIGHT_MIDDLE = 8
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_RIGHT_MIDDLE_2ND = 18
05-19 12:24:49.162: D/LeakCanary(4994): | static FINGER_RIGHT_RING = 9
05-19 12:24:49.167: D/LeakCanary(4994): | static FINGER_RIGHT_RING_2ND = 19
05-19 12:24:49.167: D/LeakCanary(4994): | static FINGER_RIGHT_THUMB = 6
05-19 12:24:49.167: D/LeakCanary(4994): | static FINGER_RIGHT_THUMB_2ND = 16
05-19 12:24:49.167: D/LeakCanary(4994): | static SECURITY_LEVEL_HIGH = 2
05-19 12:24:49.167: D/LeakCanary(4994): | static SECURITY_LEVEL_LOW = 0
05-19 12:24:49.167: D/LeakCanary(4994): | static SECURITY_LEVEL_REGULAR = 1
05-19 12:24:49.167: D/LeakCanary(4994): | static SECURITY_LEVEL_VERY_HIGH = 3
05-19 12:24:49.167: D/LeakCanary(4994): | static SENSOR_TYPE_SWIPE = 1
05-19 12:24:49.167: D/LeakCanary(4994): | static SENSOR_TYPE_TOUCH = 2
05-19 12:24:49.167: D/LeakCanary(4994): | static USE_LAST_QUALITY_FEEDBACK = -1
05-19 12:24:49.167: D/LeakCanary(4994): | static mEnrollFinishResult = -1
05-19 12:24:49.167: D/LeakCanary(4994): | static mIndex = -1
05-19 12:24:49.167: D/LeakCanary(4994): | static mIsLinkedDeathRecipient = false
05-19 12:24:49.167: D/LeakCanary(4994): | static mSecurityLevel = 1
05-19 12:24:49.167: D/LeakCanary(4994): * Instance of com.example.testfingerprint.AlternativeUnlockActivity
05-19 12:24:49.167: D/LeakCanary(4994): | fingerButton = android.widget.ImageButton [id=0x12f42400]
05-19 12:24:49.167: D/LeakCanary(4994): | fingerProtection = null
05-19 12:24:49.167: D/LeakCanary(4994): | loginButton = com.stickypassword.android.fontviews.AssetsFontButton [id=0x131ea000]
05-19 12:24:49.167: D/LeakCanary(4994): | passwordEditText = com.stickypassword.android.fontviews.AssetsFontEditText [id=0x131e9000]
05-19 12:24:49.167: D/LeakCanary(4994): | voiceButton = android.widget.ImageButton [id=0x12f3e800]
05-19 12:24:49.167: D/LeakCanary(4994): | ignorePasswordOnGlobalLayout = true
05-19 12:24:49.167: D/LeakCanary(4994): | resetNextIgnorePasswordOnGlobalLayout = true
05-19 12:24:49.167: D/LeakCanary(4994): | mSherlock = com.actionbarsherlock.internal.ActionBarSherlockNative [id=0x12f4c840]
05-19 12:24:49.167: D/LeakCanary(4994): | materialMenu = com.balysv.materialmenu.MaterialMenuImpl [id=0x12f4c860]
05-19 12:24:49.167: D/LeakCanary(4994): | mActionBar = com.android.internal.app.WindowDecorActionBar [id=0x12c8f660]
05-19 12:24:49.167: D/LeakCanary(4994): | mActivityInfo = android.content.pm.ActivityInfo [id=0x12f01190]
05-19 12:24:49.167: D/LeakCanary(4994): | mActivityTransitionState = android.app.ActivityTransitionState [id=0x12ecbf40]
05-19 12:24:49.167: D/LeakCanary(4994): | mAllLoaderManagers = android.util.ArrayMap [id=0x12ffe5e0]
05-19 12:24:49.167: D/LeakCanary(4994): | mApplication = com.stickypassword.android.StickyPasswordApp [id=0x12c0e190]
05-19 12:24:49.167: D/LeakCanary(4994): | mComponent = android.content.ComponentName [id=0x12dff120]
05-19 12:24:49.167: D/LeakCanary(4994): | mContainer = android.app.Activity$1 [id=0x12f065a0]
05-19 12:24:49.167: D/LeakCanary(4994): | mCurrentConfig = android.content.res.Configuration [id=0x12ef4970]
05-19 12:24:49.167: D/LeakCanary(4994): | mDecor = null
05-19 12:24:49.167: D/LeakCanary(4994): | mDefaultKeySsb = null
05-19 12:24:49.167: D/LeakCanary(4994): | mEmbeddedID = null
05-19 12:24:49.167: D/LeakCanary(4994): | mEnterTransitionListener = android.app.SharedElementCallback$1 [id=0x71b3a158]
05-19 12:24:49.167: D/LeakCanary(4994): | mExitTransitionListener = android.app.SharedElementCallback$1 [id=0x71b3a158]
05-19 12:24:49.167: D/LeakCanary(4994): | mFeatureContextMenuListener = android.app.Activity$FeatureContextMenuListener [id=0x12f06570]
05-19 12:24:49.167: D/LeakCanary(4994): | mFragments = android.app.FragmentManagerImpl [id=0x12ef4890]
05-19 12:24:49.167: D/LeakCanary(4994): | mHandler = android.os.Handler [id=0x12f4c0a0]
05-19 12:24:49.167: D/LeakCanary(4994): | mInjectionManager = null
05-19 12:24:49.167: D/LeakCanary(4994): | mInstanceTracker = android.os.StrictMode$InstanceTracker [id=0x12f065b0]
05-19 12:24:49.167: D/LeakCanary(4994): | mInstrumentation = android.app.Instrumentation [id=0x12c4afc0]
05-19 12:24:49.167: D/LeakCanary(4994): | mIntent = android.content.Intent [id=0x12ff2070]
05-19 12:24:49.167: D/LeakCanary(4994): | mLastNonConfigurationInstances = null
05-19 12:24:49.167: D/LeakCanary(4994): | mLauncherBooster = null
05-19 12:24:49.167: D/LeakCanary(4994): | mLoaderManager = null
05-19 12:24:49.167: D/LeakCanary(4994): | mMainThread = android.app.ActivityThread [id=0x12c371e0]
05-19 12:24:49.167: D/LeakCanary(4994): | mManagedCursors = java.util.ArrayList [id=0x12f4c060]
05-19 12:24:49.167: D/LeakCanary(4994): | mManagedDialogs = null
05-19 12:24:49.167: D/LeakCanary(4994): | mMenuInflater = android.view.MenuInflater [id=0x1305cec0]
05-19 12:24:49.167: D/LeakCanary(4994): | mMultiWindowStyle = com.samsung.android.multiwindow.MultiWindowStyle [id=0x12ff5460]
05-19 12:24:49.167: D/LeakCanary(4994): | mParent = null
05-19 12:24:49.167: D/LeakCanary(4994): | mResultData = null
05-19 12:24:49.167: D/LeakCanary(4994): | mSearchManager = null
05-19 12:24:49.167: D/LeakCanary(4994): | mTitle = java.lang.String [id=0x12dd44e0]
05-19 12:24:49.167: D/LeakCanary(4994): | mToken = android.os.BinderProxy [id=0x12e76180]
05-19 12:24:49.167: D/LeakCanary(4994): | mTranslucentCallback = null
05-19 12:24:49.167: D/LeakCanary(4994): | mUiThread = java.lang.Thread [id=0x865e5ef0]
05-19 12:24:49.167: D/LeakCanary(4994): | mVoiceInteractor = null
05-19 12:24:49.167: D/LeakCanary(4994): | mWindow = com.android.internal.policy.impl.PhoneWindow [id=0x12e05df0]
05-19 12:24:49.167: D/LeakCanary(4994): | mWindowManager = android.view.WindowManagerImpl [id=0x12f4c440]
05-19 12:24:49.167: D/LeakCanary(4994): | myName = java.lang.String [id=0x12e67180]
05-19 12:24:49.167: D/LeakCanary(4994): | DEBUG_ELASTIC = true
05-19 12:24:49.167: D/LeakCanary(4994): | isElasticEnabled = false
05-19 12:24:49.167: D/LeakCanary(4994): | mCalled = true
05-19 12:24:49.167: D/LeakCanary(4994): | mChangeCanvasToTranslucent = false
05-19 12:24:49.167: D/LeakCanary(4994): | mChangingConfigurations = false
05-19 12:24:49.167: D/LeakCanary(4994): | mCheckedForLoaderManager = true
05-19 12:24:49.167: D/LeakCanary(4994): | mConfigChangeFlags = 0
05-19 12:24:49.167: D/LeakCanary(4994): | mDefaultKeyMode = 0
05-19 12:24:49.167: D/LeakCanary(4994): | mDestroyed = true
05-19 12:24:49.167: D/LeakCanary(4994): | mDoReportFullyDrawn = false
05-19 12:24:49.167: D/LeakCanary(4994): | mEnableDefaultActionBarUp = false
05-19 12:24:49.167: D/LeakCanary(4994): | mFinished = true
05-19 12:24:49.167: D/LeakCanary(4994): | mFlipfont = 0
05-19 12:24:49.167: D/LeakCanary(4994): | mIdent = 365185988
05-19 12:24:49.167: D/LeakCanary(4994): | mLoadersStarted = false
05-19 12:24:49.167: D/LeakCanary(4994): | mPreventEmbeddedTabs = false
05-19 12:24:49.167: D/LeakCanary(4994): | mResultCode = 0
05-19 12:24:49.167: D/LeakCanary(4994): | mResumed = false
05-19 12:24:49.167: D/LeakCanary(4994): | mStackedHeight = -1
05-19 12:24:49.167: D/LeakCanary(4994): | mStartedActivity = false
05-19 12:24:49.167: D/LeakCanary(4994): | mStopped = true
05-19 12:24:49.167: D/LeakCanary(4994): | mTemporaryPause = false
05-19 12:24:49.167: D/LeakCanary(4994): | mTitleColor = 0
05-19 12:24:49.167: D/LeakCanary(4994): | mTitleReady = true
05-19 12:24:49.167: D/LeakCanary(4994): | mVisibleBehind = false
05-19 12:24:49.167: D/LeakCanary(4994): | mVisibleFromClient = true
05-19 12:24:49.167: D/LeakCanary(4994): | mVisibleFromServer = true
05-19 12:24:49.167: D/LeakCanary(4994): | mWindowAdded = true
05-19 12:24:49.167: D/LeakCanary(4994): | mInflater = com.android.internal.policy.impl.PhoneLayoutInflater [id=0x12ff5670]
05-19 12:24:49.167: D/LeakCanary(4994): | mOverrideConfiguration = null
05-19 12:24:49.167: D/LeakCanary(4994): | mResources = android.content.res.Resources [id=0x12c28800]
05-19 12:24:49.167: D/LeakCanary(4994): | mTheme = android.content.res.Resources$Theme [id=0x12f4c460]
05-19 12:24:49.167: D/LeakCanary(4994): | mThemeResource = 2131558492
05-19 12:24:49.167: D/LeakCanary(4994): | mBase = android.app.ContextImpl [id=0x12c8f390]

@pepyakin
Copy link

@Salat-Cx65 can you format trace and strip logcat stuff like in this issue, please?
@pyricau maybe we should add trace formatting guidance into CONTRIBUTING.md?

Just in case, here is regexp to strip logcat buzz: ^.*D/LeakCanary\(\d*\):\W

@pyricau
Copy link
Member

pyricau commented May 19, 2015

@pyricau
Copy link
Member

pyricau commented Sep 19, 2016

Thank you for your report, it looks like this might be a leak in the Android SDK.

Please read the following entry in our FAQ: Can a leak be caused by the Android SDK?.

We don't have enough time to do the investigative work on this type of issue, so I will close this issue for now. We'll happily take contributions to AndroidExcludedRefs.java, if the leak is demonstrated and the fix provided to AOSP.

@pyricau pyricau closed this as completed Sep 19, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants