I am getting below crash after upgrading Android SDK to 30
pid: 0, tid: 0 >>> com.asda.android <<<
backtrace:
#00 pc 0000000000051010 /apex/com.android.runtime/lib64/bionic/libc.so (abort+164)
#00 pc 00000000006d7c3c /apex/com.android.art/lib64/libart.so (art::Runtime::Abort(char const*)+668)
#00 pc 000000000001595c /apex/com.android.art/lib64/libbase.so (android::base::SetAborter(std::__1::function<void (char const*)>&&)::$_3::__invoke(char const*)+76)
#00 pc 0000000000014f8c /apex/com.android.art/lib64/libbase.so (android::base::LogMessage::~LogMessage()+364)
#00 pc 00000000002922fc /apex/com.android.art/lib64/libart.so (art::Thread::AssertNoPendingException() const+1536)
#00 pc 000000000031f2a0 /apex/com.android.art/lib64/libart.so (artStringBuilderAppend+116)
#00 pc 00000000002d7e18 /apex/com.android.art/lib64/libart.so (art_quick_string_builder_append+56)
#00 pc 0000000000a74df8 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.view.ViewRootImpl.lambda$createFrameCompleteCallback$4$ViewRootImpl+184)
#00 pc 0000000000a51d3c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.view.ViewRootImpl$$ExternalSyntheticLambda2.onFrameComplete+108)
#00 pc 00000000002cdd64 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+548)
#00 pc 000000000043a59c /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeVirtualOrInterfaceWithVarArgs<art::ArtMethod*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+880)
#00 pc 00000000005b20b0 /apex/com.android.art/lib64/libart.so (art::JNI<false>::CallVoidMethodV(_JNIEnv*, _jobject*, _jmethodID*, std::__va_list)+300)
#00 pc 00000000006e85b0 /system/lib64/libhwui.so (_JNIEnv::CallVoidMethod(_jobject*, _jmethodID*, ...)+120)
#00 pc 000000000073d9a0 /system/lib64/libhwui.so (android::FrameCompleteWrapper::onFrameComplete(long)+156)
#00 pc 0000000000616d2c /system/lib64/libhwui.so (android::uirenderer::renderthread::CanvasContext::draw()+1724)
#00 pc 000000000061573c /system/lib64/libhwui.so (_ZNSt3__110__function6__funcIZN7android10uirenderer12renderthread13DrawFrameTask11postAndWaitEvE3$_0NS_9allocatorIS6_EEFvvEEclEv$c1671e787f244890c877724752face20+596)
#00 pc 000000000062b138 /system/lib64/libhwui.so (android::uirenderer::WorkQueue::process()+156)
#00 pc 000000000062aea4 /system/lib64/libhwui.so (android::uirenderer::renderthread::RenderThread::threadLoop()+84)
#00 pc 00000000000120a8 /system/lib64/libutils.so (android::Thread::_threadLoop(void*)+260)
#00 pc 0000000000011960 /system/lib64/libutils.so (thread_data_t::trampoline(thread_data_t const*)+404)
#00 pc 00000000000b2fd0 /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+264)
#00 pc 0000000000052834 /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64)
I was not getting this crash before sdk migration to android 30
Related
I am trying to run a tensorflow lite model in the background (while the app is closed) quite frequently (once every few minutes).
After the app has run for several hours I got this error message signal 11 (SIGSEGV), code 1 (SEGV_MAPERR).
I am aware that there are other people who have received similar issues, but after trying every solution I could find, I think that this might be a different issue.
Google Play Console Crash Log
pid: 0, tid: 0 >>> com.DD.GooglePlay <<<
backtrace:
#00 pc 00000000001cf138 /data/app/~~PXyjTXZK6uVX_JbQzF-CNA==/com.DD.GooglePlay-qOnVNcJEpWKOgoYLG3cmFQ==/base.apk!libtensorflowlite_jni.so (offset 0xe52000)
#00 pc 00000000001cef98 /data/app/~~PXyjTXZK6uVX_JbQzF-CNA==/com.DD.GooglePlay-qOnVNcJEpWKOgoYLG3cmFQ==/base.apk!libtensorflowlite_jni.so (offset 0xe52000)
#00 pc 00000000001c75ec /data/app/~~PXyjTXZK6uVX_JbQzF-CNA==/com.DD.GooglePlay-qOnVNcJEpWKOgoYLG3cmFQ==/base.apk!libtensorflowlite_jni.so (offset 0xe52000)
#00 pc 00000000000828b0 /data/app/~~PXyjTXZK6uVX_JbQzF-CNA==/com.DD.GooglePlay-qOnVNcJEpWKOgoYLG3cmFQ==/base.apk!libtensorflowlite_jni.so (offset 0xe52000)
#00 pc 00000000000822dc /data/app/~~PXyjTXZK6uVX_JbQzF-CNA==/com.DD.GooglePlay-qOnVNcJEpWKOgoYLG3cmFQ==/base.apk!libtensorflowlite_jni.so (offset 0xe52000)
#00 pc 00000000000b2ba4 /data/app/~~PXyjTXZK6uVX_JbQzF-CNA==/com.DD.GooglePlay-qOnVNcJEpWKOgoYLG3cmFQ==/base.apk!libtensorflowlite_jni.so (offset 0xe52000)
#00 pc 00000000000b8470 /data/app/~~PXyjTXZK6uVX_JbQzF-CNA==/com.DD.GooglePlay-qOnVNcJEpWKOgoYLG3cmFQ==/base.apk!libtensorflowlite_jni.so (offset 0xe52000)
#00 pc 00000000000b70a0 /data/app/~~PXyjTXZK6uVX_JbQzF-CNA==/com.DD.GooglePlay-qOnVNcJEpWKOgoYLG3cmFQ==/base.apk!libtensorflowlite_jni.so (offset 0xe52000)
#00 pc 00000000000b13a8 /data/app/~~PXyjTXZK6uVX_JbQzF-CNA==/com.DD.GooglePlay-qOnVNcJEpWKOgoYLG3cmFQ==/base.apk!libtensorflowlite_jni.so (offset 0xe52000)
#00 pc 00000000001dd640 /data/app/~~PXyjTXZK6uVX_JbQzF-CNA==/com.DD.GooglePlay-qOnVNcJEpWKOgoYLG3cmFQ==/base.apk!libtensorflowlite_jni.so (offset 0xe52000)
#00 pc 00000000001e0414 /data/app/~~PXyjTXZK6uVX_JbQzF-CNA==/com.DD.GooglePlay-qOnVNcJEpWKOgoYLG3cmFQ==/base.apk!libtensorflowlite_jni.so (offset 0xe52000)
#00 pc 000000000004af50 /data/app/~~PXyjTXZK6uVX_JbQzF-CNA==/com.DD.GooglePlay-qOnVNcJEpWKOgoYLG3cmFQ==/base.apk!libtensorflowlite_jni.so (offset 0xe52000) (Java_org_tensorflow_lite_NativeInterpreterWrapper_run+32)
#00 pc 000000000013ded4 /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+148)
#00 pc 0000000002023f64 /memfd:jit-cache (org.tensorflow.lite.NativeInterpreterWrapper.run+436)
#00 pc 0000000000134564 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+548)
#00 pc 0000000000198e94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
#00 pc 000000000030c254 /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+376)
#00 pc 000000000030736c /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+884)
#00 pc 000000000063b0d4 /apex/com.android.art/lib64/libart.so (MterpInvokeVirtual+868)
#00 pc 000000000012e814 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_virtual+20)
#00 pc 000000000031b136 [anon:dalvik-classes.dex (org.tensorflow.lite.Interpreter.runForMultipleInputsOutputs+10)
#00 pc 000000000063b310 /apex/com.android.art/lib64/libart.so (MterpInvokeVirtual+1440)
#00 pc 000000000012e814 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_virtual+20)
#00 pc 000000000031b114 [anon:dalvik-classes.dex (org.tensorflow.lite.Interpreter.run+36)
#00 pc 000000000063b310 /apex/com.android.art/lib64/libart.so (MterpInvokeVirtual+1440)
#00 pc 000000000012e814 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_virtual+20)
#00 pc 000000000000f884 [anon:dalvik-classes3.dex (com.DD.GooglePlay.TensorFlowImageClassifier.recognizeImage+36)
#00 pc 000000000063cca4 /apex/com.android.art/lib64/libart.so (MterpInvokeInterface+1840)
#00 pc 000000000012ea14 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_interface+20)
#00 pc 000000000000c30a [anon:dalvik-classes3.dex (com.DD.GooglePlay.PhotoTaker.delete+334)
#00 pc 00000000002fed48 /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.llvm.18441993989064323955)+268)
#00 pc 0000000000629a84 /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+796)
#00 pc 000000000013dff8 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88)
#00 pc 00000000020098e8 /memfd:jit-cache (com.DD.GooglePlay.PhotoTaker$3.run+6344)
#00 pc 0000000000134564 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+548)
#00 pc 0000000000198e94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
#00 pc 0000000000532198 /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
#00 pc 0000000000533398 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeVirtualOrInterfaceWithJValues<art::ArtMethod*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, jvalue const*)+440)
#00 pc 00000000005808b8 /apex/com.android.art/lib64/libart.so (art::Thread::CreateCallback(void*)+1272)
#00 pc 00000000000b6374 /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+64)
#00 pc 0000000000050fa4 /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64)
Attempted Solutions
I tried to change the tensorflow version according to this. Additionally, I tried changing the tensorflow implementation the way they did here.
anyone has solved the above? I get the same thing while trying to run the model in the background on a physical device.
I have tried all the solution i could find on internet but with no success.
In my Flutter app, I got following crash log at Google Play Console which is a native crash. I am not able to understand it fully. This Flutter app has android java code as well. In the crash log, it is pointing to my android java code com.xxxx.xxx where I have already handled the Exception and Error.
pid: 0, tid: 0 >>> com.xxxx.xxxx <<<
backtrace:
#00 pc 000000000005f356 /apex/com.android.runtime/lib/bionic/libc.so (abort+166)
#00 pc 0000000000021d38 /system/lib/libinput.so (abort_with_message(char const*)+24)
#00 pc 0000000000021d7c /system/lib/libinput.so (ubsan_handle_sub_overflow_minimal_abort+24)
#00 pc 0000000000012cb9 /system/lib/libinput.so (android::MotionEvent::getAxisValue(int, unsigned int) const+236)
#00 pc 0000000002202d19 /system/framework/arm/boot-framework.oat (art_jni_trampoline+128)
#00 pc 000000000204b00d /memfd:/jit-cache (com.xxxx.d.a.a.a+1484)
#00 pc 00000000000d7bc5 /apex/com.android.runtime/lib/libart.so (art_quick_invoke_stub_internal+68)
#00 pc 000000000042e457 /apex/com.android.runtime/lib/libart.so (art_quick_invoke_stub+250)
#00 pc 00000000000dffb7 /apex/com.android.runtime/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+174)
#00 pc 0000000000210a09 /apex/com.android.runtime/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+280)
#00 pc 000000000020d009 /apex/com.android.runtime/lib/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+524)
#00 pc 0000000000427ee5 /apex/com.android.runtime/lib/libart.so (MterpInvokeDirectRange+240)
#00 pc 00000000000d2c14 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_direct_range+20)
#00 pc 00000000009188d2 /data/app/com.xxxx.xxxx-s9KFO5IYGTIBXr0bo3dYLA==/oat/arm/base.vdex (com.xxxx.d.a.a.<init>+42)
#00 pc 00000000004280b5 /apex/com.android.runtime/lib/libart.so (MterpInvokeDirectRange+704)
#00 pc 00000000000d2c14 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_direct_range+20)
#00 pc 000000000092b4e4 /data/app/com.xxxx.xxxx-s9KFO5IYGTIBXr0bo3dYLA==/oat/arm/base.vdex (com.xxxx.services.xxxx.f.a+44)
#00 pc 0000000000425edf /apex/com.android.runtime/lib/libart.so (MterpInvokeStatic+910)
#00 pc 00000000000d2994 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_static+20)
#00 pc 0000000000929e42 /data/app/com.xxxx.xxxx-s9KFO5IYGTIBXr0bo3dYLA==/oat/arm/base.vdex (com.xxxx.services.xxxx.f$17.run+54)
#00 pc 00000000001ec285 /apex/com.android.runtime/lib/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.llvm.4051875684531665263)+192)
#00 pc 00000000001f0a69 /apex/com.android.runtime/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+124)
#00 pc 0000000000417fc9 /apex/com.android.runtime/lib/libart.so (artQuickToInterpreterBridge+808)
#00 pc 00000000000dc5a1 /apex/com.android.runtime/lib/libart.so (art_quick_to_interpreter_bridge+32)
#00 pc 000000000138be01 /system/framework/arm/boot-framework.oat (android.os.Handler.dispatchMessage+64)
#00 pc 0000000001392dbf /system/framework/arm/boot-framework.oat (android.os.Looper.loop+1302)
I am aware about abort and signal crashes, due to such crashes app gets crashed even before the application code handles the crash. Is there any way we can prevent or handle the native crashes (C, C++)?
I have seen a lot of Android cash reports in 2021 in Google Play Console, the crash is thrown from libstagefright.so library, it's native code, I have no way to find from where or which activiy they are throwing.
Here is the stack trace:
backtrace:
#00 pc 00000000000b24a4 /system/lib/libstagefright.so (android::DataConverter::convert(android::spandroid::MediaCodecBuffer const&, android::spandroid::MediaCodecBuffer&)+27)
#00 pc 000000000009d14b /system/lib/libstagefright.so (android::ACodec::BaseState::onOMXFillBufferDone(unsigned int, unsigned int, unsigned int, unsigned int, long long, int)+594)
#00 pc 000000000009ca8f /system/lib/libstagefright.so (android::ACodec::BaseState::onOMXMessage(android::spandroid::AMessage const&)+274)
#00 pc 000000000000fc0b /system/lib/libstagefright_foundation.so (android::AHierarchicalStateMachine::handleMessage(android::spandroid::AMessage const&)+58)
#00 pc 000000000009c887 /system/lib/libstagefright.so (android::ACodec::BaseState::onOMXMessageList(android::spandroid::AMessage const&)+106)
#00 pc 000000000009c4e1 /system/lib/libstagefright.so (android::ACodec::BaseState::onMessageReceived(android::spandroid::AMessage const&)+460)
#00 pc 000000000000fc0b /system/lib/libstagefright_foundation.so (android::AHierarchicalStateMachine::handleMessage(android::spandroid::AMessage const&)+58)
#00 pc 000000000000fa85 /system/lib/libstagefright_foundation.so (android::AHandler::deliverMessage(android::spandroid::AMessage const&)+24)
#00 pc 0000000000011f91 /system/lib/libstagefright_foundation.so (android::AMessage::deliver()+60)
#00 pc 00000000000106eb /system/lib/libstagefright_foundation.so (android::ALooper::loop()+470)
#00 pc 000000000000d32b /system/lib/libutils.so (android::Thread::_threadLoop(void*)+270)
#00 pc 000000000006e919 /system/lib/libandroid_runtime.so (android::AndroidRuntime::javaThreadShell(void*)+80)
#00 pc 0000000000047ba3 /system/lib/libc.so (__pthread_start(void*)+22)
#00 pc 000000000001b067 /system/lib/libc.so (__start_thread+32)
This is new bug that happens only on Samsung Qualcomm Snapdragon Android 11 devices.
(Samsung Galaxy S21 Ultra 5G, Samsung Galaxy Note20 Ultra 5G,Samsung Galaxy S10+..)
I have no idea how to even start debugging it - any clue will be helpful
I have reported it to Samsung developer support a month ago - but the only thing they have done is to ask me if they can close this case because there is no new data.
Any other - more serious place to report android bugs?
Any idea how to fix it or debug it if I do not have a USA version?
It happens mostly when choosing high FPS like 60,120 or 240.
backtrace:
#00 pc 000000000004eee4 /apex/com.android.runtime/lib64/bionic/libc.so (abort+164)
#00 pc 0000000000042b00 /apex/com.android.runtime/lib64/bionic/libc.so (scudo::die()+8)
#00 pc 0000000000042444 /apex/com.android.runtime/lib64/bionic/libc.so (scudo::dieOnMapUnmapError(bool)+56)
#00 pc 0000000000042bbc /apex/com.android.runtime/lib64/bionic/libc.so (scudo::map(void*, unsigned long, char const*, unsigned long, scudo::MapPlatformData*)+184)
#00 pc 0000000000046554 /apex/com.android.runtime/lib64/bionic/libc.so (scudo::MapAllocator<scudo::MapAllocatorCache<256u, 256u, 33554432ul, 0, 1000> >::allocate(unsigned long, unsigned long, unsigned long*, bool)+408)
#00 pc 00000000000446ec /apex/com.android.runtime/lib64/bionic/libc.so (scudo::Allocator<scudo::AndroidConfig, &(scudo_malloc_postinit)>::allocate(unsigned long, scudo::Chunk::Origin, unsigned long, bool)+1196)
#00 pc 00000000000441c0 /apex/com.android.runtime/lib64/bionic/libc.so (scudo_calloc+48)
#00 pc 000000000003badc /apex/com.android.runtime/lib64/bionic/libc.so (calloc+52)
#00 pc 0000000000006fb8 /system/lib64/libcamera_metadata.so (allocate_camera_metadata+60)
#00 pc 000000000005696c /system/lib64/libcamera_client.so (android::CameraMetadata::resizeIfNeeded(unsigned long, unsigned long)+144)
#00 pc 0000000000056e00 /system/lib64/libcamera_client.so (android::CameraMetadata::updateImpl(unsigned int, void const*, unsigned long)+312)
#00 pc 0000000000153d34 /system/lib64/libandroid_runtime.so (CameraMetadata_writeValues(_JNIEnv*, _jclass*, int, _jbyteArray*, long)+848)
#00 pc 000000000024bf88 /system/framework/arm64/boot-framework.oat (art_jni_trampoline+200)
#00 pc 000000000200b630 /memfd:jit-cache (android.hardware.camera2.impl.CameraMetadataNative.setBase+752)
#00 pc 0000000002006a40 /memfd:jit-cache (android.hardware.camera2.impl.CameraMetadataNative.set+336)
#00 pc 0000000002003720 /memfd:jit-cache (android.hardware.camera2.impl.CameraDeviceImpl$CameraDeviceCallbacks.onResultReceived+544)
#00 pc 0000000002002bc8 /memfd:jit-cache (android.hardware.camera2.ICameraDeviceCallbacks$Stub.onTransact+856)
#00 pc 000000000074aaec /system/framework/arm64/boot-framework.oat (android.os.Binder.execTransactInternal+844)
#00 pc 000000000074a678 /system/framework/arm64/boot-framework.oat (android.os.Binder.execTransact+296)
#00 pc 0000000000134564 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+548)
#00 pc 0000000000198e94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
#00 pc 00000000005309a8 /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
#00 pc 0000000000531f44 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeVirtualOrInterfaceWithVarArgs<art::ArtMethod*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+448)
#00 pc 0000000000532128 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeVirtualOrInterfaceWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+92)
#00 pc 000000000038c958 /apex/com.android.art/lib64/libart.so (art::JNI<false>::CallBooleanMethodV(_JNIEnv*, _jobject*, _jmethodID*, std::__va_list)+660)
#00 pc 000000000009eaa8 /system/lib64/libandroid_runtime.so (_JNIEnv::CallBooleanMethod(_jobject*, _jmethodID*, ...)+124)
#00 pc 000000000012cf8c /system/lib64/libandroid_runtime.so (JavaBBinder::onTransact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+160)
#00 pc 000000000004a834 /system/lib64/libbinder.so (android::BBinder::transact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+232)
#00 pc 0000000000053ab4 /system/lib64/libbinder.so (android::IPCThreadState::executeCommand(int)+700)
#00 pc 0000000000053748 /system/lib64/libbinder.so (android::IPCThreadState::getAndExecuteCommand()+156)
#00 pc 0000000000054304 /system/lib64/libbinder.so (android::IPCThreadState::joinThreadPool(bool)+116)
#00 pc 000000000007cc00 /system/lib64/libbinder.so (android::PoolThread::threadLoop()+24)
#00 pc 000000000001553c /system/lib64/libutils.so (android::Thread::_threadLoop(void*)+320)
#00 pc 00000000000a48a8 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::javaThreadShell(void*)+144)
#00 pc 0000000000014db0 /system/lib64/libutils.so (thread_data_t::trampoline(thread_data_t const*)+408)
#00 pc 00000000000b61f4 /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+64)
#00 pc 0000000000050e24 /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64)
I've searched on Google many times but did not find a way to locate the error code.
I'm seeing this native crash with the following stack trace.
Android 8.0
pid: 0, tid: 0 >>> package name <<<
Case 1
backtrace:
#00 pc 000000000004b10c /system/lib/libc.so (tgkill+12)
#01 pc 000000000001a9a3 /system/lib/libc.so (abort+54)
#02 pc 0000000000006849 /system/lib/liblog.so (__android_log_assert+152)
#03 pc 00000000000c72b7 /system/lib/libandroid_runtime.so (_ZN7android6bitmap8toBitmapEP7_JNIEnvP8_jobject+34)
#04 pc 00000000000d8003 /system/lib/libandroid_runtime.so (_ZL24BitmapShader_constructorP7_JNIEnvP8_jobjectxS2_ii+38)
#05 pc 0000000000a43c1b /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.nativeCreate [DEDUPED]+146)
#06 pc 0000000000a43d5d /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.createNativeInstance+68)
#07 pc 0000000000a436d5 /system/framework/arm/boot-framework.oat (android.graphics.Shader.getNativeInstance+100)
#08 pc 0000000000a5fcb5 /system/framework/arm/boot-framework.oat (android.graphics.Paint.getNativeInstance+68)
#09 pc 000000000110ed69 /system/framework/arm/boot-framework.oat (android.view.RecordingCanvas.drawCircle+64)
#10 pc 000000000001abf1 /dev/ashmem/dalvik-jit-code-cache (deleted)
Case 2
backtrace:
#00 pc 000000000004add4 /system/lib/libc.so (tgkill+12)
#01 pc 000000000001a6c3 /system/lib/libc.so (abort+54)
#02 pc 00000000000065f9 /system/lib/liblog.so (__android_log_assert+152)
#03 pc 00000000000c711f /system/lib/libandroid_runtime.so (_ZN7android6bitmap8toBitmapEP7_JNIEnvP8_jobject+34)
#04 pc 00000000000d7ec3 /system/lib/libandroid_runtime.so (_ZL24BitmapShader_constructorP7_JNIEnvP8_jobjectxS2_ii+38)
#05 pc 0000000000a15103 /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.nativeCreate [DEDUPED]+146)
#06 pc 0000000000a15245 /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.createNativeInstance+68)
#07 pc 0000000000a14bbd /system/framework/arm/boot-framework.oat (android.graphics.Shader.getNativeInstance+100)
#08 pc 0000000000a3115d /system/framework/arm/boot-framework.oat (android.graphics.Paint.getNativeInstance+68)
#09 pc 0000000000a173e7 /system/framework/arm/boot-framework.oat (android.graphics.Canvas.drawCircle+126)
#10 pc 0000000000023d49 /dev/ashmem/dalvik-jit-code-cache (deleted)
Case 3
backtrace:
#00 pc 000000000001a39a /system/lib/libc.so (abort+63)
#01 pc 000000000000655d /system/lib/liblog.so (__android_log_assert+156)
#02 pc 00000000000c125b /system/lib/libandroid_runtime.so (android::bitmap::toBitmap(_JNIEnv*, _jobject*)+34)
#03 pc 00000000000d19b5 /system/lib/libandroid_runtime.so (BitmapShader_constructor(_JNIEnv*, _jobject*, long long, _jobject*, int, int)+32)
#04 pc 00000000009da043 /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.nativeCreate [DEDUPED]+146)
#05 pc 00000000009da173 /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.createNativeInstance+66)
#06 pc 00000000009d9bb3 /system/framework/arm/boot-framework.oat (android.graphics.Shader.getNativeInstance+98)
#07 pc 00000000009f497f /system/framework/arm/boot-framework.oat (android.graphics.Paint.getNativeInstance+70)
#08 pc 0000000000ff3d51 /system/framework/arm/boot-framework.oat (android.view.RecordingCanvas.drawCircle+64)
#09 pc 0000000000001e4d /dev/ashmem/dalvik-jit-code-cache (deleted)
Android7.0/7.1
Case 1
backtrace:
#00 pc 000000000004a230 /system/lib/libc.so (tgkill+12)
#01 pc 00000000000479c3 /system/lib/libc.so (pthread_kill+34)
#02 pc 000000000001d9c5 /system/lib/libc.so (raise+10)
#03 pc 0000000000019511 /system/lib/libc.so (__libc_android_abort+34)
#04 pc 0000000000017150 /system/lib/libc.so (abort+4)
#05 pc 000000000000c687 /system/lib/libcutils.so (__android_log_assert+114)
#06 pc 00000000000a424b /system/lib/libandroid_runtime.so (_ZN7android6Bitmap15pinPixelsLockedEv+54)
#07 pc 00000000000a4283 /system/lib/libandroid_runtime.so (_ZN7android6Bitmap17refPixelRefLockedEv+34)
#08 pc 00000000000a43b9 /system/lib/libandroid_runtime.so (_ZN7android6Bitmap11getSkBitmapEP8SkBitmap+32)
#09 pc 00000000000ad57b /system/lib/libandroid_runtime.so
#10 pc 00000000021f0407 /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.nativeCreate+114)
#11 pc 00000000021f0349 /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.<init>+124)
#12 pc 00000000000002a1 /dev/ashmem/dalvik-jit-code-cache_8544_8544 (deleted)
Case 2
backtrace:
#00 pc 000000000004a720 /system/lib/libc.so (tgkill+12)
#01 pc 0000000000047eb3 /system/lib/libc.so (pthread_kill+34)
#02 pc 000000000001d955 /system/lib/libc.so (raise+10)
#03 pc 00000000000194a1 /system/lib/libc.so (__libc_android_abort+34)
#04 pc 00000000000170e4 /system/lib/libc.so (abort+4)
#05 pc 000000000000d6af /vendor/lib/libcutils.so (__android_log_assert+114)
#06 pc 00000000000a603f /system/lib/libandroid_runtime.so (_ZN7android6Bitmap15pinPixelsLockedEv+54)
#07 pc 00000000000a6077 /system/lib/libandroid_runtime.so (_ZN7android6Bitmap17refPixelRefLockedEv+34)
#08 pc 00000000000a61a5 /system/lib/libandroid_runtime.so (_ZN7android6Bitmap11getSkBitmapEP8SkBitmap+48)
#09 pc 00000000000b1237 /system/lib/libandroid_runtime.so
#10 pc 0000000074d013d7 /data/dalvik-cache/arm/system#framework#boot-framework.oat
Android 6.0
backtrace:
#00 pc 000000000004323c /system/lib/libc.so (tgkill+12)
#01 pc 0000000000041e45 /system/lib/libc.so (pthread_kill+32)
#02 pc 000000000001bb53 /system/lib/libc.so (raise+10)
#03 pc 0000000000018db1 /system/lib/libc.so (__libc_android_abort+34)
#04 pc 000000000001696c /system/lib/libc.so (abort+4)
#05 pc 00000000000091cb /system/lib/libcutils.so (__android_log_assert+86)
#06 pc 0000000000090fdf /system/lib/libandroid_runtime.so (_ZNK7android6Bitmap11assertValidEv+18)
#07 pc 000000000009105b /system/lib/libandroid_runtime.so (_ZN7android6Bitmap11getSkBitmapEP8SkBitmap+6)
#08 pc 000000000009a17b /system/lib/libandroid_runtime.so
#09 pc 000000007269b57f /data/dalvik-cache/arm/system#framework#boot.oat
Here's a list of devices that are effected:
1.According to Android Vitals statistics, This mainly happens in Android 8.0.A few parts occur on Android 7 & 7.1.