Android Question Repeated fatal crashes on two different devices since BA 10.2 Beta #1

agraham

Expert
Licensed User
Longtime User
This may be coincidence but since using B4A 10.2 Beta #1 I have been experiencing repeated low level crashes. I at first thought it was my Xiaomi Mi Max 3 dying so I ordered a replacement phone and while waiting for it switched to a newly purchased Samsung Tab A which immediately started exhibiting the same problem. I hardly ever use debug mode and am running the app I am developing in release mode with #Bridgelogger: True. I am using reflection to set the touch listener for a Label view so I can drag it around and the crash happens when I lift my finger off the view. The crash is only intermittent and occurs after maybe ten or twenty touch, or sometimes straight away after restarting the app.
B4X:
    'why reflection instead of the regular Panel_Touch event?
    'because B4A Panel_Touch events go through the message loop and cause delays when dragging
    Dim r As Reflector
    r.Target = lblView
    r.SetOnTouchListener("lblName_Touch")
Xiaomi
Logger connected to: Xiaomi MI MAX 3
--------- beginning of crash
Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x2010200000000 in tid 7158 (asicidedesigner), pid 7158 (asicidedesigner)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'Xiaomi/nitrogen/nitrogen:10/QKQ1.190910.002/V11.0.4.0.QEDMIXM:user/release-keys'
Revision: '0'
ABI: 'arm64'
Timestamp: 2020-08-29 16:52:51+0100
pid: 7158, tid: 7158, name: asicidedesigner >>> b4a.agraham.basicidedesigner <<<
uid: 10396
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x2010200000000
x0 0000000000000001 x1 0000007eb8bffb80 x2 0000007eb66239ad x3 0000000000000040
x4 0000000000000075 x5 0000000000000000 x6 0000007fcf792c28 x7 0000007fcf792c24
x8 817a98424892ae69 x9 817a98424892ae69 x10 0000000000430000 x11 0000000000000001
x12 0000000000000074 x13 0000000000000000 x14 0000000000000002 x15 0000000000000002
x16 0000007eb67aeb88 x17 0000007eb66f14e8 x18 0000007eb906a000 x19 0000007eb8bf71c0
x20 0000007eb8bf7268 x21 0000000000000000 x22 0000007dca5714b0 x23 0002010200000000
x24 0000000000000038 x25 0000007eb8d4c020 x26 0000000000000001 x27 0000000000000038
x28 0000000000000001 x29 0000007fcf792ec0
sp 0000007fcf792d20 lr 0000007eb63a7370 pc 0000007eb63a7398
backtrace:
#00 pc 0000000000018398 /system/lib64/libutils.so (android::Looper::pollInner(int)+876) (BuildId: 8dcc6a23d7b5c85e8562aa5394a3a42f)
#01 pc 0000000000017f8c /system/lib64/libutils.so (android::Looper::pollOnce(int, int*, int*, void**)+56) (BuildId: 8dcc6a23d7b5c85e8562aa5394a3a42f)
#02 pc 000000000013e0f0 /system/lib64/libandroid_runtime.so (android::android_os_MessageQueue_nativePollOnce(_JNIEnv*, _jobject*, long, int)+44) (BuildId: 1c5a9609207ebdc0cc5cbe06733eb23c)
#03 pc 0000000001407e7c /system/framework/arm64/boot-framework.oat (art_jni_trampoline+140) (BuildId: a02d46c8cd87e011ceda6aa0c889373f581a3391)
#04 pc 0000000001684d04 /system/framework/arm64/boot-framework.oat (android.os.MessageQueue.next+228) (BuildId: a02d46c8cd87e011ceda6aa0c889373f581a3391)
#05 pc 0000000001680198 /system/framework/arm64/boot-framework.oat (android.os.Looper.loop+680) (BuildId: a02d46c8cd87e011ceda6aa0c889373f581a3391)
#06 pc 0000000000cbc634 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+756) (BuildId: a02d46c8cd87e011ceda6aa0c889373f581a3391)
#07 pc 00000000001365b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: b654ed69285ad225af54abe2040ff6a0)
#08 pc 000000000014500c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: b654ed69285ad225af54abe2040ff6a0)
#09 pc 00000000004afd24 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: b654ed69285ad225af54abe2040ff6a0)
#10 pc 00000000004b18c8 /apex/com.android.runtime/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1480) (BuildId: b654ed69285ad225af54abe2040ff6a0)
#11 pc 000000000043cc6c /apex/com.android.runtime/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: b654ed69285ad225af54abe2040ff6a0)
#12 pc 00000000006d4ea4 /system/framework/arm64/boot.oat (art_jni_trampoline+180) (BuildId: a6973b1e8c18b6e767725e93b70198ecf24e2444)
#13 pc 00000000022eced8 /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136) (BuildId: a02d46c8cd87e011ceda6aa0c889373f581a3391)
#14 pc 000000000230d724 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+2100) (BuildId: a02d46c8cd87e011ceda6aa0c889373f581a3391)
#15 pc 00000000001365b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: b654ed69285ad225af54abe2040ff6a0)
#16 pc 000000000014500c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: b654ed69285ad225af54abe2040ff6a0)
#17 pc 00000000004afd24 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: b654ed69285ad225af54abe2040ff6a0)
#18 pc 00000000004af914 /apex/com.android.runtime/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: b654ed69285ad225af54abe2040ff6a0)
#19 pc 00000000003ba6b0 /apex/com.android.runtime/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+624) (BuildId: b654ed69285ad225af54abe2040ff6a0)
#20 pc 00000000000c19ec /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: 1c5a9609207ebdc0cc5cbe06733eb23c)
#21 pc 00000000000c49b0 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+944) (BuildId: 1c5a9609207ebdc0cc5cbe06733eb23c)
#22 pc 00000000000035bc /system/bin/app_process64 (main+1388) (BuildId: ce48e0d699607c7f61196c3c69ba2920)
#23 pc 000000000007e898 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: 328a3518945f3e056fc055f1eea1cc35)
Samsung
Logger connected to: samsung SM-T295
--------- beginning of crash
Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0 in tid 29945 (asicidedesigner), pid 29945 (asicidedesigner)
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'samsung/gtoeea/gto:10/QP1A.190711.020/T295XXU3BTFG:user/release-keys'
Revision: '4'
ABI: 'arm64'
Timestamp: 2020-09-08 17:24:30+0100
pid: 29945, tid: 29945, name: asicidedesigner >>> b4a.agraham.basicidedesigner <<<
uid: 10257
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0
Cause: null pointer dereference
x0 0000007c554b6ed0 x1 0000007fc349d3f0 x2 0000007c6c2119c0 x3 0000007c5569c180
x4 0000000000000000 x5 0000007c6c24ff40 x6 0000007fc349d02c x7 0000000000000000
x8 0000007c554b6400 x9 0000000000000ad0 x10 0000000000000001 x11 0000000000000000
x12 3000000000201000 x13 0000000000000001 x14 0000000000000000 x15 0000000070aa6a90
x16 0000007cf02e0260 x17 0000007cee265640 x18 0000007cf2e36000 x19 0000000000000000
x20 0000007fc349d3f0 x21 0000007c554b6ed0 x22 000000001b4327a0 x23 0000007c554b6400
x24 000000001b3fb410 x25 000000001b3c4150 x26 000000001b4325c0 x27 000000001b3c38c0
x28 0000000070c42d38 x29 0000007fc349d3e0
sp 0000007fc349d3c0 lr 0000007cf01c46d8 pc 0000007cee26565c
backtrace:
#00 pc 000000000000f65c /system/lib64/libutils.so (android::RefBase::decStrong(void const*) const+28) (BuildId: 20de081ed8a6ac2ff437b1ba7349bda7)
#01 pc 000000000013e6d4 /system/lib64/libandroid_runtime.so (android::nativeDispose(_JNIEnv*, _jclass*, long)+124) (BuildId: 6eb2d53db7e12e7dda4f3eaaf23a588d)
#02 pc 00000000002e77e8 /system/framework/arm64/boot-framework.oat (art_jni_trampoline+152) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#03 pc 0000000000a2edb4 /system/framework/arm64/boot-framework.oat (android.view.InputEventReceiver.dispose+148) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#04 pc 0000000000b51c1c /system/framework/arm64/boot-framework.oat (android.view.ViewRootImpl.dispatchDetachedFromWindow+1420) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#05 pc 0000000000b51fb4 /system/framework/arm64/boot-framework.oat (android.view.ViewRootImpl.doDie+116) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#06 pc 0000000000b51354 /system/framework/arm64/boot-framework.oat (android.view.ViewRootImpl.die+68) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#07 pc 0000000000a45c84 /system/framework/arm64/boot-framework.oat (android.view.WindowManagerGlobal.removeViewLocked+356) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#08 pc 0000000000a470dc /system/framework/arm64/boot-framework.oat (android.view.WindowManagerGlobal.removeView+220) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#09 pc 0000000000bd88b4 /system/framework/arm64/boot-framework.oat (android.view.WindowManagerImpl.removeViewImmediate+68) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#10 pc 00000000005540d4 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.handleDestroyActivity+324) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#11 pc 000000000076fb48 /system/framework/arm64/boot-framework.oat (android.app.servertransaction.DestroyActivityItem.execute+136) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#12 pc 000000000047ea84 /system/framework/arm64/boot-framework.oat (android.app.servertransaction.TransactionExecutor.executeLifecycleState+340) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#13 pc 000000000047f248 /system/framework/arm64/boot-framework.oat (android.app.servertransaction.TransactionExecutor.execute+776) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#14 pc 000000000053b490 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread$H.handleMessage+864) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#15 pc 00000000007e63a4 /system/framework/arm64/boot-framework.oat (android.os.Handler.dispatchMessage+180) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#16 pc 00000000007e9a18 /system/framework/arm64/boot-framework.oat (android.os.Looper.loop+1448) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#17 pc 000000000054d314 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+772) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#18 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 0ac28eb852b265c04c7e1adc653916f4)
#19 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: 0ac28eb852b265c04c7e1adc653916f4)
#20 pc 00000000004b141c /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 0ac28eb852b265c04c7e1adc653916f4)
#21 pc 00000000004b2fc0 /apex/com.android.runtime/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1480) (BuildId: 0ac28eb852b265c04c7e1adc653916f4)
#22 pc 000000000043dd60 /apex/com.android.runtime/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: 0ac28eb852b265c04c7e1adc653916f4)
#23 pc 00000000000c9d34 /system/framework/arm64/boot.oat (art_jni_trampoline+180) (BuildId: b184aa47c12308a5f6448751965aee429b3dfbaf)
#24 pc 0000000000aa2468 /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#25 pc 0000000000aaabb4 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+3012) (BuildId: 8fda693b7c9d766378baf56f054d4119f99c9a0d)
#26 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 0ac28eb852b265c04c7e1adc653916f4)
#27 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: 0ac28eb852b265c04c7e1adc653916f4)
#28 pc 00000000004b141c /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 0ac28eb852b265c04c7e1adc653916f4)
#29 pc 00000000004b100c /apex/com.android.runtime/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: 0ac28eb852b265c04c7e1adc653916f4)
#30 pc 00000000003bbbac /apex/com.android.runtime/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+624) (BuildId: 0ac28eb852b265c04c7e1adc653916f4)
#31 pc 00000000000ec05c /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: 6eb2d53db7e12e7dda4f3eaaf23a588d)
#32 pc 00000000000ef17c /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+792) (BuildId: 6eb2d53db7e12e7dda4f3eaaf23a588d)
#33 pc 0000000000003510 /system/bin/app_process64 (main+1216) (BuildId: 7d3f47fd3a3570f96f228ed9b81ec20e)
#34 pc 000000000007e898 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: f01801c7f4bffc48d4929a6d39b53a2f)
 

agraham

Expert
Licensed User
Longtime User
Unlikely to be related to the new version.
It's not. I went back to B4A v10.0 and it happened straight away! However

.....

I think I found it. Look carefully at the reflection code above - It's in there (I think, subject to further testing)
 
Upvote 0
Top