Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fatal signal 6 (SIGABRT), code -6 in tid 8320 #595

Open
ghost opened this issue Jul 3, 2019 · 1 comment
Open

Fatal signal 6 (SIGABRT), code -6 in tid 8320 #595

ghost opened this issue Jul 3, 2019 · 1 comment

Comments

@ghost
Copy link

ghost commented Jul 3, 2019

Hi Team,
I created a new Android Project. Then using swig created the .so files from and copied them to the designated places in my project.
Then i copied the generated the Classes from swig and copied them to the My project.
Copied the model from this repository in assets.

I was using the model already given in the resources folder from this repository and it was working fine without any issue.

My team requested the new Model (alexa.umdl) i replaced this model and now it giving me this error

Fatal signal 6 (SIGABRT), code -6 in tid 8320

here's the log

2019-07-03 11:52:04.588 8320-8320/com.app.snowboytestsample E/AppResCopy: overriding file /storage/emulated/0/snowboy///alexa.umdl
2019-07-03 11:52:04.596 8320-8320/com.app.snowboytestsample E/AppResCopy: overriding file /storage/emulated/0/snowboy///common.res
2019-07-03 11:52:04.612 8320-8320/com.app.snowboytestsample E/AppResCopy: overriding file /storage/emulated/0/snowboy///ding.wav
2019-07-03 11:52:04.613 8320-8320/com.app.snowboytestsample E/AppResCopy: overriding file /storage/emulated/0/snowboy///dong.wav
2019-07-03 11:52:04.615 8320-8320/com.app.snowboytestsample E/AudioDataSaver: /storage/emulated/0/snowboy//recording.pcm
2019-07-03 11:52:04.621 8320-8320/com.app.snowboytestsample A/libc: Fatal signal 6 (SIGABRT), code -6 in tid 8320 (n.sample)

i tried the solution provided in the issues but didn't work for me.

@irux
Copy link

irux commented Jul 21, 2019

I think I am having the same problem:

2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: Build fingerprint: 'OnePlus/OnePlus5T/OnePlus5T:9/PKQ1.180716.001/1905271747:user/release-keys'
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: Revision: '0'
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: ABI: 'arm64'
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: pid: 14623, tid: 14623, name: tt.snowboy.demo  >>> ai.kitt.snowboy.demo <<<
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x0  0000000000000000  x1  000000000000391f  x2  0000000000000006  x3  0000000000000008
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x4  fefefefefefefeff  x5  fefefefefefefeff  x6  fefefefefefefeff  x7  7f7f7f7f7f7f7f7f
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x8  0000000000000083  x9  62db29ce7c7bed25  x10 0000000000000000  x11 fffffffc7ffffbdf
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x12 0000000000000001  x13 0000000000000000  x14 ffffffffffffffff  x15 ffffffffffffffff
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x16 0000007c1fca92a8  x17 0000007c1fbc8954  x18 0000000000000000  x19 000000000000391f
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x20 000000000000391f  x21 0000007b809e4000  x22 0000007b9b3ddf80  x23 0000000000000004
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x24 0000000000000000  x25 0000007fdf54e228  x26 0000000000000000  x27 0000000000000000
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x28 0000007fdf54ed10  x29 0000007fdf54c840
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     sp  0000007fdf54c800  lr  0000007c1fbbc084  pc  0000007c1fbbc0ac
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: backtrace:
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #00 pc 00000000000220ac  /system/lib64/libc.so (abort+116)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #01 pc 00000000000ecae4  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (__gnu_cxx::__verbose_terminate_handler()+348)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #02 pc 000000000009a740  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (__cxxabiv1::__terminate(void (*)())+8)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #03 pc 00000000000ebd48  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #04 pc 000000000009a1a8  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (__gxx_personality_v0+156)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #05 pc 00000000000fe7a0  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #06 pc 00000000000feac4  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (_Unwind_RaiseException+252)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #07 pc 000000000009a8dc  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (__cxa_throw+124)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #08 pc 000000000004cc14  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::SnowboyLogMsg::~SnowboyLogMsg()+776)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #09 pc 0000000000046b18  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::ExpectToken(bool, char const*, std::istream*)+412)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #10 pc 000000000007cb04  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::UnpackPipelineResource(std::string const&, std::string*)+104)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #11 pc 00000000000414ac  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::PipelineItf::SetResource(std::string const&)+452)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #12 pc 000000000002b3ec  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::SnowboyDetect::SnowboyDetect(std::string const&, std::string const&)+124)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #13 pc 00000000000260c0  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (Java_ai_kitt_snowboy_snowboyJNI_new_1SnowboyDetect+212)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #14 pc 000000000055e7e0  /system/lib64/libart.so (art_quick_generic_jni_trampoline+144)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #15 pc 0000000000555a4c  /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #16 pc 00000000000cf6e8  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #17 pc 000000000027f2b8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #18 pc 00000000002792c0  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #19 pc 0000000000526298  /system/lib64/libart.so (MterpInvokeStatic+204)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #20 pc 0000000000547e94  /system/lib64/libart.so (ExecuteMterpImpl+14612)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #21 pc 000000000000a4ca  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/split_lib_slice_5_apk.apk (deleted) (ai.kitt.snowboy.SnowboyDetect.<init>+90)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #22 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #23 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #24 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #25 pc 00000000005260d4  /system/lib64/libart.so (MterpInvokeDirect+296)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #26 pc 0000000000547e14  /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #27 pc 0000000000001e80  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/split_lib_slice_3_apk.apk (deleted) (ai.kitt.snowboy.audio.RecordingThread.<init>+200)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #28 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #29 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #30 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #31 pc 00000000005260d4  /system/lib64/libart.so (MterpInvokeDirect+296)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #32 pc 0000000000547e14  /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #33 pc 00000000000091de  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/split_lib_slice_5_apk.apk (deleted) (ai.kitt.snowboy.Demo.onCreate+98)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #34 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #35 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #36 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #37 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #38 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #39 pc 00000000003a3c5e  /system/framework/boot-framework.vdex (android.app.Activity.performCreate+24)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #40 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #41 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #42 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #43 pc 0000000000527dd8  /system/lib64/libart.so (MterpInvokeVirtualQuick+584)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #44 pc 000000000054ba94  /system/lib64/libart.so (ExecuteMterpImpl+29972)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #45 pc 00000000004db3c4  /system/framework/boot-framework.vdex (android.app.Activity.performCreate+2)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #46 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #47 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #48 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #49 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #50 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #51 pc 00000000003c344c  /system/framework/boot-framework.vdex (android.app.Instrumentation.callActivityOnCreate+6)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #52 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #53 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #54 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #55 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #56 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #57 pc 000000000039a354  /system/framework/boot-framework.vdex (android.app.ActivityThread.performLaunchActivity+1044)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #58 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #59 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #60 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #61 pc 00000000005260d4  /system/lib64/libart.so (MterpInvokeDirect+296)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #62 pc 0000000000547e14  /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #63 pc 0000000000399eb6  /system/framework/boot-framework.vdex (android.app.ActivityThread.handleLaunchActivity+124)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #64 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #65 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #66 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #67 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #68 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #69 pc 00000000003e1888  /system/framework/boot-framework.vdex (android.app.servertransaction.LaunchActivityItem.execute+114)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #70 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #71 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #72 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #73 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #74 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #75 pc 00000000003e2544  /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.executeCallbacks+198)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #76 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #77 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #78 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #79 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #80 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #81 pc 00000000003e2456  /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.execute+68)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #82 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #83 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #84 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #85 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #86 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #87 pc 00000000003995d4  /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+128)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #88 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #89 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #90 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #91 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #92 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #93 pc 0000000000b1b642  /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #94 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #95 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #96 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #97 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #98 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #99 pc 0000000000b227d2  /system/framework/boot-framework.vdex (android.os.Looper.loop+406)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #100 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #101 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #102 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #103 pc 0000000000526298  /system/lib64/libart.so (MterpInvokeStatic+204)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #104 pc 0000000000547e94  /system/lib64/libart.so (ExecuteMterpImpl+14612)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #105 pc 00000000003a00f2  /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #106 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #107 pc 0000000000515628  /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #108 pc 000000000055e8fc  /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #109 pc 0000000000555a4c  /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #110 pc 00000000000cf6e8  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #111 pc 000000000045cd00  /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #112 pc 000000000045e754  /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #113 pc 00000000003ee5b0  /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #114 pc 000000000011f6d4  /system/framework/arm64/boot-core-oj.oat (offset 0x115000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #115 pc 0000000000555788  /system/lib64/libart.so (art_quick_invoke_stub+584)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #116 pc 00000000000cf6c8  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #117 pc 000000000027f2b8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #118 pc 00000000002792c0  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #119 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #120 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #121 pc 0000000000c47ac6  /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #122 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #123 pc 0000000000515628  /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #124 pc 000000000055e8fc  /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #125 pc 0000000000c0b680  /system/framework/arm64/boot-framework.oat (offset 0x3d7000) (com.android.internal.os.ZygoteInit.main+3088)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #126 pc 0000000000555a4c  /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #127 pc 00000000000cf6e8  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #128 pc 000000000045cd00  /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #129 pc 000000000045c960  /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+424)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #130 pc 0000000000361b64  /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+652)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #131 pc 00000000000b28cc  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #132 pc 00000000000b53b4  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+948)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #133 pc 000000000000251c  /system/bin/app_process64 (main+2000)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #134 pc 00000000000c8418  /system/lib64/libc.so (__libc_init+88)

I don't really undestand what is happening... @rmushtaqCB are you using the arm64 version ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant