Closed Tisckkytt closed 3 months ago
This seems to happen to a number of people, not sure why.
Someone emailed me their logs, containing this stack trace (Android 9):
02-21 08:41:04.005 30556 30633 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 30633 (AsyncTask #2), pid 30556 (tywatch.android)
02-21 08:41:04.086 30669 30669 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
02-21 08:41:04.087 30669 30669 F DEBUG : Build fingerprint: 'vivo/1820/1820:8.1.0/O11019/1610956190:user/release-keys'
02-21 08:41:04.087 30669 30669 F DEBUG : Revision: '0'
02-21 08:41:04.087 30669 30669 F DEBUG : ABI: 'arm64'
02-21 08:41:04.087 30669 30669 F DEBUG : pid: 30556, tid: 30633, name: AsyncTask #2 >>> net.activitywatch.android <<<
02-21 08:41:04.087 30669 30669 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
02-21 08:41:04.087 30669 30669 F DEBUG : x0 0000000000000000 x1 00000000000077a9 x2 0000000000000006 x3 0000000000000008
02-21 08:41:04.087 30669 30669 F DEBUG : x4 0000007dd1a31200 x5 0000007dd1a31200 x6 0000007dd1a31200 x7 0000007dd1a31000
02-21 08:41:04.087 30669 30669 F DEBUG : x8 0000000000000083 x9 0000000010000000 x10 0000007dd5a88960 x11 0000000000000001
02-21 08:41:04.087 30669 30669 F DEBUG : x12 346dc5d63886594b x13 0000000000002710 x14 0000000051eb851f x15 0000000000000064
02-21 08:41:04.087 30669 30669 F DEBUG : x16 0000006120bb5fa8 x17 0000007e76075da4 x18 0000007e760e1000 x19 000000000000775c
02-21 08:41:04.087 30669 30669 F DEBUG : x20 00000000000077a9 x21 0000000000000083 x22 0000007ddb9ff468 x23 0000007ddb5cec88
02-21 08:41:04.087 30669 30669 F DEBUG : x24 0000000000000001 x25 0000000000000000 x26 0000007dd5e78aa0 x27 0000000000000005
02-21 08:41:04.087 30669 30669 F DEBUG : x28 0000000000000003 x29 0000007dd5a889a0 x30 0000007e7602a7a0
02-21 08:41:04.087 30669 30669 F DEBUG : sp 0000007dd5a88960 pc 0000007e7602a7c8 pstate 0000000060000000
02-21 08:41:04.088 30669 30669 F DEBUG :
02-21 08:41:04.088 30669 30669 F DEBUG : backtrace:
02-21 08:41:04.088 30669 30669 F DEBUG : #00 pc 000000000001d7c8 /system/lib64/libc.so (abort+120)
02-21 08:41:04.089 30669 30669 F DEBUG : #01 pc 000000000001d79c /system/lib64/libc.so (abort+76)
02-21 08:41:04.387 20064 30293 E : nFreeSize: 5720518656
02-21 08:41:04.447 9294 9294 I GoogleInputMethodService: GoogleInputMethodService.onFinishInput():3341
02-21 08:41:04.447 9294 9294 I GoogleInputMethodService: GoogleInputMethodService.onStartInput():1906
02-21 08:41:04.549 20064 30293 E : nFreeSize: 5720449024
02-21 08:41:07.659 9294 9294 I GoogleInputMethodService: GoogleInputMethodService.onFinishInput():3341
02-21 08:41:07.660 9294 9294 I GoogleInputMethodService: GoogleInputMethodService.onStartInput():1906
02-21 08:41:08.569 30688 30764 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 30764 (AsyncTask #2), pid 30688 (tywatch.android)
02-21 08:41:08.644 30798 30798 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
02-21 08:41:08.644 30798 30798 F DEBUG : Build fingerprint: 'vivo/1820/1820:8.1.0/O11019/1610956190:user/release-keys'
02-21 08:41:08.644 30798 30798 F DEBUG : Revision: '0'
02-21 08:41:08.644 30798 30798 F DEBUG : ABI: 'arm64'
02-21 08:41:08.644 30798 30798 F DEBUG : pid: 30688, tid: 30764, name: AsyncTask #2 >>> net.activitywatch.android <<<
02-21 08:41:08.644 30798 30798 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
02-21 08:41:08.644 30798 30798 F DEBUG : x0 0000000000000000 x1 000000000000782c x2 0000000000000006 x3 0000000000000008
02-21 08:41:08.644 30798 30798 F DEBUG : x4 0000007dd5c90200 x5 0000007dd5c90200 x6 0000007dd5c90200 x7 0000007dd5c90000
02-21 08:41:08.644 30798 30798 F DEBUG : x8 0000000000000083 x9 0000000010000000 x10 0000007dd5b8f960 x11 0000000000000001
02-21 08:41:08.644 30798 30798 F DEBUG : x12 346dc5d63886594b x13 0000000000002710 x14 0000000051eb851f x15 0000000000000064
02-21 08:41:08.645 30798 30798 F DEBUG : x16 0000006120bb5fa8 x17 0000007e76075da4 x18 0000007e760e1000 x19 00000000000077e0
02-21 08:41:08.645 30798 30798 F DEBUG : x20 000000000000782c x21 0000000000000083 x22 0000007ddb9fa468 x23 0000007ddb5c9c88
02-21 08:41:08.645 30798 30798 F DEBUG : x24 0000000000000001 x25 0000000000000000 x26 0000007dd5e67aa0 x27 0000000000000005
02-21 08:41:08.645 30798 30798 F DEBUG : x28 0000000000000003 x29 0000007dd5b8f9a0 x30 0000007e7602a7a0
02-21 08:41:08.645 30798 30798 F DEBUG : sp 0000007dd5b8f960 pc 0000007e7602a7c8 pstate 0000000060000000
02-21 08:41:08.646 30798 30798 F DEBUG :
02-21 08:41:08.646 30798 30798 F DEBUG : backtrace:
02-21 08:41:08.646 30798 30798 F DEBUG : #00 pc 000000000001d7c8 /system/lib64/libc.so (abort+120)
02-21 08:41:08.646 30798 30798 F DEBUG : #01 pc 000000000001d79c /system/lib64/libc.so (abort+76)
02-21 08:41:08.940 20064 30293 E : nFreeSize: 5719990272
02-21 08:41:09.005 9294 9294 I GoogleInputMethodService: GoogleInputMethodService.onFinishInput():3341
02-21 08:41:09.006 9294 9294 I GoogleInputMethodService: GoogleInputMethodService.onStartInput():1906
02-21 08:41:09.069 20064 30293 E : nFreeSize: 5719920640
02-21 08:41:15.284 9294 9294 I GoogleInputMethodService: GoogleInputMethodService.onFinishInput():3341
02-21 08:41:15.286 9294 9294 I GoogleInputMethodService: GoogleInputMethodService.onStartInput():1906
02-21 08:41:16.150 30815 30894 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 30894 (AsyncTask #2), pid 30815 (tywatch.android)
02-21 08:41:16.226 30929 30929 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
02-21 08:41:16.226 30929 30929 F DEBUG : Build fingerprint: 'vivo/1820/1820:8.1.0/O11019/1610956190:user/release-keys'
02-21 08:41:16.226 30929 30929 F DEBUG : Revision: '0'
02-21 08:41:16.226 30929 30929 F DEBUG : ABI: 'arm64'
02-21 08:41:16.226 30929 30929 F DEBUG : pid: 30815, tid: 30894, name: AsyncTask #2 >>> net.activitywatch.android <<<
02-21 08:41:16.226 30929 30929 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
02-21 08:41:16.226 30929 30929 F DEBUG : x0 0000000000000000 x1 00000000000078ae x2 0000000000000006 x3 0000000000000008
02-21 08:41:16.226 30929 30929 F DEBUG : x4 0000007dd5c88200 x5 0000007dd5c88200 x6 0000007dd5c88200 x7 0000007dd5c88000
02-21 08:41:16.226 30929 30929 F DEBUG : x8 0000000000000083 x9 0000000010000000 x10 0000007dd5a8a960 x11 0000000000000001
02-21 08:41:16.226 30929 30929 F DEBUG : x12 346dc5d63886594b x13 0000000000002710 x14 0000000051eb851f x15 0000000000000064
02-21 08:41:16.226 30929 30929 F DEBUG : x16 0000006120bb5fa8 x17 0000007e76075da4 x18 0000007e760e1000 x19 000000000000785f
02-21 08:41:16.226 30929 30929 F DEBUG : x20 00000000000078ae x21 0000000000000083 x22 0000007ddb9f8468 x23 0000007ddb5c7c88
02-21 08:41:16.226 30929 30929 F DEBUG : x24 0000000000000001 x25 0000000000000000 x26 0000007dd5e73aa0 x27 0000000000000005
02-21 08:41:16.226 30929 30929 F DEBUG : x28 0000000000000003 x29 0000007dd5a8a9a0 x30 0000007e7602a7a0
02-21 08:41:16.226 30929 30929 F DEBUG : sp 0000007dd5a8a960 pc 0000007e7602a7c8 pstate 0000000060000000
02-21 08:41:16.227 30929 30929 F DEBUG :
02-21 08:41:16.227 30929 30929 F DEBUG : backtrace:
02-21 08:41:16.227 30929 30929 F DEBUG : #00 pc 000000000001d7c8 /system/lib64/libc.so (abort+120)
02-21 08:41:16.227 30929 30929 F DEBUG : #01 pc 000000000001d79c /system/lib64/libc.so (abort+76)
There are more stacktraces reported in the Play Store developer console, but this one is suspiciously short (and I've seen it a few times). Maybe the device is out of memory?
This seems to happen commonly on Android 11 (8 impacted users):
********** Crash dump: **********
#00 0x000000000004e2cc /apex/com.android.runtime/lib64/bionic/libc.so (abort+164)
#00 0x00000000004e55c0 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (std::sys::unix::abort_internal::h748977a2819cc6c0+4)
#00 0x00000000004e1ec8 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (std::sys_common::util::abort::h75b577bd61c7f10e+60)
#00 0x00000000004e2f58 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (rust_panic+72)
#00 0x00000000004e2ee0 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (std::panicking::rust_panic_with_hook::h9f57cb2f6667519b+452)
#00 0x00000000004e2a0c /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::hc8a51f46c13c17e5+144)
#00 0x00000000004e101c /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (std::sys_common::backtrace::__rust_end_short_backtrace::hed5a74b6adf6da2e+28)
#00 0x00000000004e2974 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (rust_begin_unwind+60)
#00 0x00000000004f8f34 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (core::panicking::panic_fmt::ha9032b28d8e00c81+36)
#00 0x00000000004fd1b0 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (core::str::slice_error_fail::ha89f60df3d1e6d85+344)
#00 0x00000000004fb918 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (_$LT$str$u20$as$u20$core..fmt..Debug$GT$::fmt::ha51cc98ba13d586e+904)
#00 0x00000000004f9480 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (core::fmt::builders::DebugTuple::field::he50dcf273b04a724+152)
#00 0x0000000000223614 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (_$LT$aw_datastore..DatastoreError$u20$as$u20$core..fmt..Debug$GT$::fmt::ha3c1f6e101a49779+216)
#00 0x00000000004fa790 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (core::fmt::write::hed043646315264aa+416)
#00 0x00000000004f3fb0 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (alloc::fmt::format::h22299e4ae9ab53a9+308)
#00 0x00000000001c8530 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/lib/arm64/libaw_server.so (Java_net_activitywatch_android_RustInterface_heartbeat+440)
#00 0x000000000002d4cc /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/oat/arm64/base.odex (art_jni_trampoline+188)
#00 0x0000000000082450 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/oat/arm64/base.odex (net.activitywatch.android.watcher.UsageStatsWatcher$SendHeartbeatsTask.doInBackground+2912)
#00 0x0000000000082974 /data/app/~~bXmifU6CeOgvG1pKBppWpg==/net.activitywatch.android-P7ovmCaknWToLYdOFxYUIQ==/oat/arm64/base.odex (net.activitywatch.android.watcher.UsageStatsWatcher$SendHeartbeatsTask.doInBackground+84)
#00 0x00000000006d89c8 /system/framework/arm64/boot-framework.oat (android.os.AsyncTask$3.call+168)
#00 0x000000000023e3c8 /apex/com.android.art/javalib/arm64/boot.oat (java.util.concurrent.FutureTask.run+200)
#00 0x0000000000624448 /system/framework/arm64/boot-framework.oat (android.os.AsyncTask$SerialExecutor$1.run+72)
#00 0x000000000029d318 /apex/com.android.art/javalib/arm64/boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+984)
#00 0x000000000029a510 /apex/com.android.art/javalib/arm64/boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+64)
#00 0x000000000015ab08 /apex/com.android.art/javalib/arm64/boot.oat (java.lang.Thread.run+72)
#00 0x0000000000133564 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+548)
#00 0x00000000001a8a78 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
#00 0x0000000000553890 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeVirtualOrInterfaceWithJValues<art::ArtMethod*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, jvalue const*)+460)
#00 0x00000000005a2c2c /apex/com.android.art/lib64/libart.so (art::Thread::CreateCallback(void*)+1308)
#00 0x00000000000afd4c /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+64)
#00 0x0000000000050288 /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64)
@johan-bjareholt Do you have any idea about that last one?
Going to run it on an Android 11 virtual device and see if I can replicate.
Looks like it can't listen to the port? But it's a bit weird because right before I see this in the logs:
I/aw-server-rust: rocket::rocket: Rocket has launched from http://127.0.0.1:5600
But maybe that's just a premature assumption that rocket has started listening?
I also noticed this happened right before the crash:
12984-12984/? A/crashpad: dlopen: dlopen failed: library "libandroidicu.so" not found: needed by /system/lib/libharfbuzz_ng.so in namespace (default)
From a quick search it looks like I might need to update the NDK. (edit: I did, but didn't make a difference it seems...)
It's crashing for me on Android 11, I got it from the Play store, is there anything I can do to help? I assume a solution hasn't been found yet
@eamon0989 Unfortunately I got stuck on this issue. I'm not quite sure what to do about it at this point, might ask on StackOverflow or similar to see if some Android NDK expert can chime in.
Installed today from play store and facing the same issue :(
Weirdly enough, it works on my (and I think also @johan-bjareholt's) Android 11 phone (mine is Poco F3, so not-so-stock Android), so at least it isn't broken for all Android 11 phones...
It would be helpful if people could provide what Android 11 phones they have. That might help us figure out what the real discriminator is.
What we know so far: It doesn't work in the Android 11 emulator (and which phones?).
Weirdly enough, it works on my (and I think also @johan-bjareholt's) Android 11 phone (mine is Poco F3, so not-so-stock Android), so at least it isn't broken for all Android 11 phones...
It would be helpful if people could provide what Android 11 phones they have. That might help us figure out what the real discriminator is.
What we know so far: It doesn't work in the Android 11 emulator (and which phones?).
POCO X3 NFC (surya) running custom AOSP ROM (crdroid) here. I can grab logs if they are needed.
@yshalsager I'm assuming you'll see the same logs as the one I posted above, but if you could confirm that is the case then that would give us some confidence in where the issue stems from :)
Same error on Redmi Note 8t (SparkOs)
Works on potato open source project and lineage os. Both on android 11
Old issue, has since been fixed.
Version: 0.10.0 Installed From: Playstore Android Version: 11 (AOSPA)
Scoop app couldn't register any crashes (weirdly), so can't provide logs, but if necessary I can use Matlog or something.