Barmer Health Insurance App Crash /e/OS 3.4-a15
- /e/OS version: e/OS 3.4-a15-20260114569178-official-FP6
- Device model(s): Fairphone 6
- Impacted Application: Barmer App 4.31.8
- Affected application/URL: de.barmergek.serviceapp
- Browser/client and version: -
The problem
Describe precisely the problem you're facing and add screenshots to illustrate
Steps to reproduce
As you can see opening the app will just crash.
I talked with the Barmer service and they said the problem is that the Google Chrome browser is missing as a dependency. As I tried to download Chrome, it failed so I cannot prove this. Falling back to the system browser, Vivaldi or Brave did not do the trick.
So my educated guess is they have a hard dependency on Google Chrome Custom Tabs for authentication. The log says that its an internal error, so maybe its not fixable at all.
In the end its not that deep since the app is just a website wrapper and no functionality out of this app is really needed for the end user.
Technical details
Paste any relevant logs (adb logcat) in the codeblock below if you have any
--------- beginning of crash
01-30 09:57:16.262 6913 6913 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
01-30 09:57:16.262 6913 6913 F DEBUG : LineageOS Version: 'unknown'
01-30 09:57:16.262 6913 6913 F DEBUG : Build fingerprint: 'Fairphone/FP6/FP6:15/FP6.QREL.15.162.0/VS1V:user/release-keys'
01-30 09:57:16.262 6913 6913 F DEBUG : Revision: '0'
01-30 09:57:16.262 6913 6913 F DEBUG : ABI: 'arm64'
01-30 09:57:16.262 6913 6913 F DEBUG : Timestamp: 2026-01-30 09:57:16.059394257+0100
01-30 09:57:16.262 6913 6913 F DEBUG : Process uptime: 2s
01-30 09:57:16.262 6913 6913 F DEBUG : Cmdline: de.barmergek.serviceapp
01-30 09:57:16.262 6913 6913 F DEBUG : pid: 6913, tid: 6913, name: rgek.serviceapp >>> de.barmergek.serviceapp <<<
01-30 09:57:16.262 6913 6913 F DEBUG : uid: 10241
01-30 09:57:16.262 6913 6913 F DEBUG : tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE)
01-30 09:57:16.262 6913 6913 F DEBUG : pac_enabled_keys: 000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY)
01-30 09:57:16.262 6913 6913 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr --------
01-30 09:57:16.262 6913 6913 F DEBUG : Cause: null pointer dereference
01-30 09:57:16.262 6913 6913 F DEBUG : x0 00000000ffffffff x1 0000006c910a7352 x2 0000007fc1be2630 x3 0000007fc1be2840
01-30 09:57:16.262 6913 6913 F DEBUG : x4 0000000000000040 x5 0000000000000004 x6 0000006fef11fa40 x7 00000000ebad6077
01-30 09:57:16.262 6913 6913 F DEBUG : x8 0000000000000000 x9 0000000000004200 x10 0000000000000000 x11 0000007fc1be276c
01-30 09:57:16.262 6913 6913 F DEBUG : x12 0000006f87b2ab62 x13 0000006c910e1000 x14 0000007fc1be2810 x15 0000006c91bae000
01-30 09:57:16.262 6913 6913 F DEBUG : x16 0000006fc38d3eb8 x17 0000006fc385cc44 x18 0000006fefe98000 x19 0000006fef11fa40
01-30 09:57:16.262 6913 6913 F DEBUG : x20 000000009a23ef8d x21 0000006c910c4470 x22 00000000000018ae x23 00000000000f0003
01-30 09:57:16.262 6913 6913 F DEBUG : x24 b400006d5dae9550 x25 000000003b9ac9ff x26 b400006eadb0caf0 x27 0000007fc1c1d1d0
01-30 09:57:16.262 6913 6913 F DEBUG : x28 00000000d61f0000 x29 0000007fc1be2770
01-30 09:57:16.262 6913 6913 F DEBUG : lr 0000006fc387d5d4 sp 0000007fc1be2630 pc 0000006fc387d5d8 pst 0000000060001000
01-30 09:57:16.262 6913 6913 F DEBUG : 47 total frames
01-30 09:57:16.262 6913 6913 F DEBUG : backtrace:
01-30 09:57:16.262 6913 6913 F DEBUG : #00 pc 000000000007c5d8 /apex/com.android.runtime/lib64/bionic/libc.so (vsnprintf+192) (BuildId: b6eea540a07778448828dc0b29715fbd)
01-30 09:57:16.262 6913 6913 F DEBUG : #01 pc 0000000000754018 /data/app/~~pcy_n-XyiLa-Df2pyF0WFQ==/de.barmergek.serviceapp-4rqaAPRAAaxOnfW2_F4Ekg==/lib/arm64/libtak.so (BuildId: 697f31280e0bb7343e5e107955c7ef661c2c8343)
01-30 09:57:16.262 6913 6913 F DEBUG : #02 pc 000000000099a1bc /data/app/~~pcy_n-XyiLa-Df2pyF0WFQ==/de.barmergek.serviceapp-4rqaAPRAAaxOnfW2_F4Ekg==/lib/arm64/libtak.so (BuildId: 697f31280e0bb7343e5e107955c7ef661c2c8343)
01-30 09:57:16.262 6913 6913 F DEBUG : #03 pc 00000000005fb580 /data/app/~~pcy_n-XyiLa-Df2pyF0WFQ==/de.barmergek.serviceapp-4rqaAPRAAaxOnfW2_F4Ekg==/lib/arm64/libtak.so (BuildId: 697f31280e0bb7343e5e107955c7ef661c2c8343)
01-30 09:57:16.262 6913 6913 F DEBUG : #04 pc 00000000000494b8 /system/framework/arm64/boot-core-libart.oat (art_jni_trampoline+168) (BuildId: 2237feee2e8302373aa60e449d64f28263381d60)
01-30 09:57:16.262 6913 6913 F DEBUG : #05 pc 000000000078e120 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #06 pc 00000000004aac5e /data/app/~~pcy_n-XyiLa-Df2pyF0WFQ==/de.barmergek.serviceapp-4rqaAPRAAaxOnfW2_F4Ekg==/base.apk
01-30 09:57:16.262 6913 6913 F DEBUG : #07 pc 000000000078e0c4 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #08 pc 00000000004af5a0 /data/app/~~pcy_n-XyiLa-Df2pyF0WFQ==/de.barmergek.serviceapp-4rqaAPRAAaxOnfW2_F4Ekg==/base.apk
01-30 09:57:16.262 6913 6913 F DEBUG : #09 pc 000000000078e0c4 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #10 pc 00000000004af5c6 /data/app/~~pcy_n-XyiLa-Df2pyF0WFQ==/de.barmergek.serviceapp-4rqaAPRAAaxOnfW2_F4Ekg==/base.apk
01-30 09:57:16.262 6913 6913 F DEBUG : #11 pc 000000000078e7c8 /apex/com.android.art/lib64/libart.so (nterp_helper+5720) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #12 pc 000000000025833e /data/app/~~pcy_n-XyiLa-Df2pyF0WFQ==/de.barmergek.serviceapp-4rqaAPRAAaxOnfW2_F4Ekg==/base.apk
01-30 09:57:16.262 6913 6913 F DEBUG : #13 pc 000000000078eee4 /apex/com.android.art/lib64/libart.so (nterp_helper+7540) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #14 pc 00000000002949de /data/app/~~pcy_n-XyiLa-Df2pyF0WFQ==/de.barmergek.serviceapp-4rqaAPRAAaxOnfW2_F4Ekg==/base.apk
01-30 09:57:16.262 6913 6913 F DEBUG : #15 pc 000000000078e0c4 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #16 pc 0000000000214278 /data/app/~~pcy_n-XyiLa-Df2pyF0WFQ==/de.barmergek.serviceapp-4rqaAPRAAaxOnfW2_F4Ekg==/base.apk
01-30 09:57:16.262 6913 6913 F DEBUG : #17 pc 000000000078e0c4 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #18 pc 0000000000213ec6 /data/app/~~pcy_n-XyiLa-Df2pyF0WFQ==/de.barmergek.serviceapp-4rqaAPRAAaxOnfW2_F4Ekg==/base.apk
01-30 09:57:16.262 6913 6913 F DEBUG : #19 pc 000000000078e0c4 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #20 pc 00000000005aedc6 /data/app/~~pcy_n-XyiLa-Df2pyF0WFQ==/de.barmergek.serviceapp-4rqaAPRAAaxOnfW2_F4Ekg==/base.apk
01-30 09:57:16.262 6913 6913 F DEBUG : #21 pc 000000000078e0c4 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #22 pc 00000000005af154 /data/app/~~pcy_n-XyiLa-Df2pyF0WFQ==/de.barmergek.serviceapp-4rqaAPRAAaxOnfW2_F4Ekg==/base.apk
01-30 09:57:16.262 6913 6913 F DEBUG : #23 pc 000000000078eee4 /apex/com.android.art/lib64/libart.so (nterp_helper+7540) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #24 pc 00000000002f9646 /data/app/~~pcy_n-XyiLa-Df2pyF0WFQ==/de.barmergek.serviceapp-4rqaAPRAAaxOnfW2_F4Ekg==/base.apk
01-30 09:57:16.262 6913 6913 F DEBUG : #25 pc 000000000078eee4 /apex/com.android.art/lib64/libart.so (nterp_helper+7540) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #26 pc 00000000002f689e /data/app/~~pcy_n-XyiLa-Df2pyF0WFQ==/de.barmergek.serviceapp-4rqaAPRAAaxOnfW2_F4Ekg==/base.apk
01-30 09:57:16.262 6913 6913 F DEBUG : #27 pc 00000000002a8a00 /system/framework/arm64/boot-framework.oat (android.app.Instrumentation.callApplicationOnCreate+48) (BuildId: 56d256e2e27eb5919a582f74c08374258496ff34)
01-30 09:57:16.262 6913 6913 F DEBUG : #28 pc 000000000022a3e4 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.handleBindApplication+5284) (BuildId: 56d256e2e27eb5919a582f74c08374258496ff34)
01-30 09:57:16.262 6913 6913 F DEBUG : #29 pc 0000000000223a8c /system/framework/arm64/boot-framework.oat (android.app.ActivityThread$H.handleMessage+8220) (BuildId: 56d256e2e27eb5919a582f74c08374258496ff34)
01-30 09:57:16.262 6913 6913 F DEBUG : #30 pc 00000000004b2498 /system/framework/arm64/boot-framework.oat (android.os.Handler.dispatchMessage+152) (BuildId: 56d256e2e27eb5919a582f74c08374258496ff34)
01-30 09:57:16.262 6913 6913 F DEBUG : #31 pc 00000000004e7358 /system/framework/arm64/boot-framework.oat (android.os.Looper.loopOnce+1048) (BuildId: 56d256e2e27eb5919a582f74c08374258496ff34)
01-30 09:57:16.262 6913 6913 F DEBUG : #32 pc 00000000004e6ec4 /system/framework/arm64/boot-framework.oat (android.os.Looper.loop+244) (BuildId: 56d256e2e27eb5919a582f74c08374258496ff34)
01-30 09:57:16.262 6913 6913 F DEBUG : #33 pc 0000000000232e7c /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+1564) (BuildId: 56d256e2e27eb5919a582f74c08374258496ff34)
01-30 09:57:16.262 6913 6913 F DEBUG : #34 pc 000000000036b060 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #35 pc 000000000035b1e4 /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+884) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #36 pc 0000000000696a0c /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+36) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #37 pc 00000000002cf2e4 /system/framework/arm64/boot.oat (art_jni_trampoline+116) (BuildId: dd54bc1506749dccf4fa522f633950cbfd53ea12)
01-30 09:57:16.262 6913 6913 F DEBUG : #38 pc 000000000079c1d4 /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116) (BuildId: 56d256e2e27eb5919a582f74c08374258496ff34)
01-30 09:57:16.262 6913 6913 F DEBUG : #39 pc 00000000007a3474 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+3028) (BuildId: 56d256e2e27eb5919a582f74c08374258496ff34)
01-30 09:57:16.262 6913 6913 F DEBUG : #40 pc 000000000036b060 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #41 pc 0000000000369a28 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+772) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #42 pc 00000000007339c8 /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104) (BuildId: 28dab34fc017baebaa9c23ca6ee683dd)
01-30 09:57:16.262 6913 6913 F DEBUG : #43 pc 00000000000f68e0 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108) (BuildId: c8ac3eaf074160cc95615206b3677055)
01-30 09:57:16.262 6913 6913 F DEBUG : #44 pc 00000000001193f4 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+900) (BuildId: c8ac3eaf074160cc95615206b3677055)
01-30 09:57:16.262 6913 6913 F DEBUG : #45 pc 0000000000004564 /system/bin/app_process64 (main+1188) (BuildId: efe4ef5c2e5a2ee5f2b33b809deb4318)
01-30 09:57:16.262 6913 6913 F DEBUG : #46 pc 0000000000055674 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+120) (BuildId: b6eea540a07778448828dc0b29715fbd)
01-30 09:57:16.308 2356 3461 I ActivityManager: Process de.barmergek.serviceapp (pid 6913) has died: fg CEM