Kitt-AI / snowboy

Future versions with model training module will be maintained through a forked version here: https://github.com/seasalt-ai/snowboy
Other
3.08k stars 999 forks source link

Fatal signal 6 (SIGABRT), code -6 in tid 8320 #595

Open ghost opened 5 years ago

ghost commented 5 years ago

Hi Team, I created a new Android Project. Then using swig created the .so files from and copied them to the designated places in my project. Then i copied the generated the Classes from swig and copied them to the My project. Copied the model from this repository in assets.

I was using the model already given in the resources folder from this repository and it was working fine without any issue.

My team requested the new Model (alexa.umdl) i replaced this model and now it giving me this error

Fatal signal 6 (SIGABRT), code -6 in tid 8320

here's the log

2019-07-03 11:52:04.588 8320-8320/com.app.snowboytestsample E/AppResCopy: overriding file /storage/emulated/0/snowboy///alexa.umdl 2019-07-03 11:52:04.596 8320-8320/com.app.snowboytestsample E/AppResCopy: overriding file /storage/emulated/0/snowboy///common.res 2019-07-03 11:52:04.612 8320-8320/com.app.snowboytestsample E/AppResCopy: overriding file /storage/emulated/0/snowboy///ding.wav 2019-07-03 11:52:04.613 8320-8320/com.app.snowboytestsample E/AppResCopy: overriding file /storage/emulated/0/snowboy///dong.wav 2019-07-03 11:52:04.615 8320-8320/com.app.snowboytestsample E/AudioDataSaver: /storage/emulated/0/snowboy//recording.pcm 2019-07-03 11:52:04.621 8320-8320/com.app.snowboytestsample A/libc: Fatal signal 6 (SIGABRT), code -6 in tid 8320 (n.sample)

i tried the solution provided in the issues but didn't work for me.

irux commented 5 years ago

I think I am having the same problem:

2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: Build fingerprint: 'OnePlus/OnePlus5T/OnePlus5T:9/PKQ1.180716.001/1905271747:user/release-keys'
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: Revision: '0'
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: ABI: 'arm64'
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: pid: 14623, tid: 14623, name: tt.snowboy.demo  >>> ai.kitt.snowboy.demo <<<
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x0  0000000000000000  x1  000000000000391f  x2  0000000000000006  x3  0000000000000008
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x4  fefefefefefefeff  x5  fefefefefefefeff  x6  fefefefefefefeff  x7  7f7f7f7f7f7f7f7f
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x8  0000000000000083  x9  62db29ce7c7bed25  x10 0000000000000000  x11 fffffffc7ffffbdf
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x12 0000000000000001  x13 0000000000000000  x14 ffffffffffffffff  x15 ffffffffffffffff
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x16 0000007c1fca92a8  x17 0000007c1fbc8954  x18 0000000000000000  x19 000000000000391f
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x20 000000000000391f  x21 0000007b809e4000  x22 0000007b9b3ddf80  x23 0000000000000004
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x24 0000000000000000  x25 0000007fdf54e228  x26 0000000000000000  x27 0000000000000000
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     x28 0000007fdf54ed10  x29 0000007fdf54c840
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG:     sp  0000007fdf54c800  lr  0000007c1fbbc084  pc  0000007c1fbbc0ac
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: backtrace:
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #00 pc 00000000000220ac  /system/lib64/libc.so (abort+116)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #01 pc 00000000000ecae4  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (__gnu_cxx::__verbose_terminate_handler()+348)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #02 pc 000000000009a740  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (__cxxabiv1::__terminate(void (*)())+8)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #03 pc 00000000000ebd48  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #04 pc 000000000009a1a8  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (__gxx_personality_v0+156)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #05 pc 00000000000fe7a0  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #06 pc 00000000000feac4  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (_Unwind_RaiseException+252)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #07 pc 000000000009a8dc  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (__cxa_throw+124)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #08 pc 000000000004cc14  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::SnowboyLogMsg::~SnowboyLogMsg()+776)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #09 pc 0000000000046b18  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::ExpectToken(bool, char const*, std::istream*)+412)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #10 pc 000000000007cb04  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::UnpackPipelineResource(std::string const&, std::string*)+104)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #11 pc 00000000000414ac  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::PipelineItf::SetResource(std::string const&)+452)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #12 pc 000000000002b3ec  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::SnowboyDetect::SnowboyDetect(std::string const&, std::string const&)+124)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #13 pc 00000000000260c0  /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (Java_ai_kitt_snowboy_snowboyJNI_new_1SnowboyDetect+212)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #14 pc 000000000055e7e0  /system/lib64/libart.so (art_quick_generic_jni_trampoline+144)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #15 pc 0000000000555a4c  /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #16 pc 00000000000cf6e8  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #17 pc 000000000027f2b8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #18 pc 00000000002792c0  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #19 pc 0000000000526298  /system/lib64/libart.so (MterpInvokeStatic+204)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #20 pc 0000000000547e94  /system/lib64/libart.so (ExecuteMterpImpl+14612)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #21 pc 000000000000a4ca  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/split_lib_slice_5_apk.apk (deleted) (ai.kitt.snowboy.SnowboyDetect.<init>+90)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #22 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #23 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #24 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #25 pc 00000000005260d4  /system/lib64/libart.so (MterpInvokeDirect+296)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #26 pc 0000000000547e14  /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #27 pc 0000000000001e80  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/split_lib_slice_3_apk.apk (deleted) (ai.kitt.snowboy.audio.RecordingThread.<init>+200)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #28 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #29 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #30 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #31 pc 00000000005260d4  /system/lib64/libart.so (MterpInvokeDirect+296)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #32 pc 0000000000547e14  /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #33 pc 00000000000091de  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/split_lib_slice_5_apk.apk (deleted) (ai.kitt.snowboy.Demo.onCreate+98)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #34 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #35 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #36 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #37 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #38 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #39 pc 00000000003a3c5e  /system/framework/boot-framework.vdex (android.app.Activity.performCreate+24)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #40 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #41 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #42 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #43 pc 0000000000527dd8  /system/lib64/libart.so (MterpInvokeVirtualQuick+584)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #44 pc 000000000054ba94  /system/lib64/libart.so (ExecuteMterpImpl+29972)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #45 pc 00000000004db3c4  /system/framework/boot-framework.vdex (android.app.Activity.performCreate+2)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #46 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #47 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #48 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #49 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #50 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #51 pc 00000000003c344c  /system/framework/boot-framework.vdex (android.app.Instrumentation.callActivityOnCreate+6)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #52 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #53 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #54 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #55 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #56 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #57 pc 000000000039a354  /system/framework/boot-framework.vdex (android.app.ActivityThread.performLaunchActivity+1044)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #58 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #59 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #60 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #61 pc 00000000005260d4  /system/lib64/libart.so (MterpInvokeDirect+296)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #62 pc 0000000000547e14  /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #63 pc 0000000000399eb6  /system/framework/boot-framework.vdex (android.app.ActivityThread.handleLaunchActivity+124)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #64 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #65 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #66 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #67 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #68 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG:     #69 pc 00000000003e1888  /system/framework/boot-framework.vdex (android.app.servertransaction.LaunchActivityItem.execute+114)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #70 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #71 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #72 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #73 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #74 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #75 pc 00000000003e2544  /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.executeCallbacks+198)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #76 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #77 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #78 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #79 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #80 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #81 pc 00000000003e2456  /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.execute+68)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #82 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #83 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #84 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #85 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #86 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #87 pc 00000000003995d4  /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+128)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #88 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #89 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #90 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #91 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #92 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #93 pc 0000000000b1b642  /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #94 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #95 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #96 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #97 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #98 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #99 pc 0000000000b227d2  /system/framework/boot-framework.vdex (android.os.Looper.loop+406)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #100 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #101 pc 0000000000258ab8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #102 pc 00000000002792a4  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #103 pc 0000000000526298  /system/lib64/libart.so (MterpInvokeStatic+204)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #104 pc 0000000000547e94  /system/lib64/libart.so (ExecuteMterpImpl+14612)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #105 pc 00000000003a00f2  /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #106 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #107 pc 0000000000515628  /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #108 pc 000000000055e8fc  /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #109 pc 0000000000555a4c  /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #110 pc 00000000000cf6e8  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #111 pc 000000000045cd00  /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #112 pc 000000000045e754  /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #113 pc 00000000003ee5b0  /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #114 pc 000000000011f6d4  /system/framework/arm64/boot-core-oj.oat (offset 0x115000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #115 pc 0000000000555788  /system/lib64/libart.so (art_quick_invoke_stub+584)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #116 pc 00000000000cf6c8  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #117 pc 000000000027f2b8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #118 pc 00000000002792c0  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #119 pc 0000000000524d94  /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #120 pc 0000000000547d14  /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #121 pc 0000000000c47ac6  /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #122 pc 0000000000252fc4  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #123 pc 0000000000515628  /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #124 pc 000000000055e8fc  /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #125 pc 0000000000c0b680  /system/framework/arm64/boot-framework.oat (offset 0x3d7000) (com.android.internal.os.ZygoteInit.main+3088)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #126 pc 0000000000555a4c  /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #127 pc 00000000000cf6e8  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #128 pc 000000000045cd00  /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #129 pc 000000000045c960  /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+424)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #130 pc 0000000000361b64  /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+652)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #131 pc 00000000000b28cc  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #132 pc 00000000000b53b4  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+948)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #133 pc 000000000000251c  /system/bin/app_process64 (main+2000)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG:     #134 pc 00000000000c8418  /system/lib64/libc.so (__libc_init+88)

I don't really undestand what is happening... @rmushtaqCB are you using the arm64 version ?