Open ghost opened 5 years ago
I think I am having the same problem:
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: Build fingerprint: 'OnePlus/OnePlus5T/OnePlus5T:9/PKQ1.180716.001/1905271747:user/release-keys'
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: Revision: '0'
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: ABI: 'arm64'
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: pid: 14623, tid: 14623, name: tt.snowboy.demo >>> ai.kitt.snowboy.demo <<<
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: x0 0000000000000000 x1 000000000000391f x2 0000000000000006 x3 0000000000000008
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: x4 fefefefefefefeff x5 fefefefefefefeff x6 fefefefefefefeff x7 7f7f7f7f7f7f7f7f
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: x8 0000000000000083 x9 62db29ce7c7bed25 x10 0000000000000000 x11 fffffffc7ffffbdf
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: x12 0000000000000001 x13 0000000000000000 x14 ffffffffffffffff x15 ffffffffffffffff
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: x16 0000007c1fca92a8 x17 0000007c1fbc8954 x18 0000000000000000 x19 000000000000391f
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: x20 000000000000391f x21 0000007b809e4000 x22 0000007b9b3ddf80 x23 0000000000000004
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: x24 0000000000000000 x25 0000007fdf54e228 x26 0000000000000000 x27 0000000000000000
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: x28 0000007fdf54ed10 x29 0000007fdf54c840
2019-07-21 14:28:56.281 14666-14666/? A/DEBUG: sp 0000007fdf54c800 lr 0000007c1fbbc084 pc 0000007c1fbbc0ac
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: backtrace:
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #00 pc 00000000000220ac /system/lib64/libc.so (abort+116)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #01 pc 00000000000ecae4 /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (__gnu_cxx::__verbose_terminate_handler()+348)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #02 pc 000000000009a740 /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (__cxxabiv1::__terminate(void (*)())+8)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #03 pc 00000000000ebd48 /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #04 pc 000000000009a1a8 /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (__gxx_personality_v0+156)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #05 pc 00000000000fe7a0 /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #06 pc 00000000000feac4 /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (_Unwind_RaiseException+252)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #07 pc 000000000009a8dc /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (__cxa_throw+124)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #08 pc 000000000004cc14 /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::SnowboyLogMsg::~SnowboyLogMsg()+776)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #09 pc 0000000000046b18 /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::ExpectToken(bool, char const*, std::istream*)+412)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #10 pc 000000000007cb04 /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::UnpackPipelineResource(std::string const&, std::string*)+104)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #11 pc 00000000000414ac /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::PipelineItf::SetResource(std::string const&)+452)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #12 pc 000000000002b3ec /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (snowboy::SnowboyDetect::SnowboyDetect(std::string const&, std::string const&)+124)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #13 pc 00000000000260c0 /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/lib/arm64/libsnowboy-detect-android.so (Java_ai_kitt_snowboy_snowboyJNI_new_1SnowboyDetect+212)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #14 pc 000000000055e7e0 /system/lib64/libart.so (art_quick_generic_jni_trampoline+144)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #15 pc 0000000000555a4c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #16 pc 00000000000cf6e8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #17 pc 000000000027f2b8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #18 pc 00000000002792c0 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #19 pc 0000000000526298 /system/lib64/libart.so (MterpInvokeStatic+204)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #20 pc 0000000000547e94 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #21 pc 000000000000a4ca /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/split_lib_slice_5_apk.apk (deleted) (ai.kitt.snowboy.SnowboyDetect.<init>+90)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #22 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #23 pc 0000000000258ab8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #24 pc 00000000002792a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #25 pc 00000000005260d4 /system/lib64/libart.so (MterpInvokeDirect+296)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #26 pc 0000000000547e14 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #27 pc 0000000000001e80 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/split_lib_slice_3_apk.apk (deleted) (ai.kitt.snowboy.audio.RecordingThread.<init>+200)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #28 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #29 pc 0000000000258ab8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #30 pc 00000000002792a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #31 pc 00000000005260d4 /system/lib64/libart.so (MterpInvokeDirect+296)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #32 pc 0000000000547e14 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #33 pc 00000000000091de /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/ai.kitt.snowboy.demo-6p_uLacNvEdYBEmPfOgcUg==/split_lib_slice_5_apk.apk (deleted) (ai.kitt.snowboy.Demo.onCreate+98)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #34 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #35 pc 0000000000258ab8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #36 pc 00000000002792a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #37 pc 0000000000524d94 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #38 pc 0000000000547d14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #39 pc 00000000003a3c5e /system/framework/boot-framework.vdex (android.app.Activity.performCreate+24)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #40 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #41 pc 0000000000258ab8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #42 pc 00000000002792a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #43 pc 0000000000527dd8 /system/lib64/libart.so (MterpInvokeVirtualQuick+584)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #44 pc 000000000054ba94 /system/lib64/libart.so (ExecuteMterpImpl+29972)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #45 pc 00000000004db3c4 /system/framework/boot-framework.vdex (android.app.Activity.performCreate+2)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #46 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #47 pc 0000000000258ab8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #48 pc 00000000002792a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #49 pc 0000000000524d94 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #50 pc 0000000000547d14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #51 pc 00000000003c344c /system/framework/boot-framework.vdex (android.app.Instrumentation.callActivityOnCreate+6)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #52 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #53 pc 0000000000258ab8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #54 pc 00000000002792a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #55 pc 0000000000524d94 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #56 pc 0000000000547d14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #57 pc 000000000039a354 /system/framework/boot-framework.vdex (android.app.ActivityThread.performLaunchActivity+1044)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #58 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #59 pc 0000000000258ab8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #60 pc 00000000002792a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #61 pc 00000000005260d4 /system/lib64/libart.so (MterpInvokeDirect+296)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #62 pc 0000000000547e14 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #63 pc 0000000000399eb6 /system/framework/boot-framework.vdex (android.app.ActivityThread.handleLaunchActivity+124)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #64 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #65 pc 0000000000258ab8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #66 pc 00000000002792a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #67 pc 0000000000524d94 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #68 pc 0000000000547d14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.432 14666-14666/? A/DEBUG: #69 pc 00000000003e1888 /system/framework/boot-framework.vdex (android.app.servertransaction.LaunchActivityItem.execute+114)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #70 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #71 pc 0000000000258ab8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #72 pc 00000000002792a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #73 pc 0000000000524d94 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #74 pc 0000000000547d14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #75 pc 00000000003e2544 /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.executeCallbacks+198)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #76 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #77 pc 0000000000258ab8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #78 pc 00000000002792a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #79 pc 0000000000524d94 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #80 pc 0000000000547d14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #81 pc 00000000003e2456 /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.execute+68)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #82 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #83 pc 0000000000258ab8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #84 pc 00000000002792a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #85 pc 0000000000524d94 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #86 pc 0000000000547d14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #87 pc 00000000003995d4 /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+128)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #88 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #89 pc 0000000000258ab8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #90 pc 00000000002792a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #91 pc 0000000000524d94 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #92 pc 0000000000547d14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #93 pc 0000000000b1b642 /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #94 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #95 pc 0000000000258ab8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #96 pc 00000000002792a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #97 pc 0000000000524d94 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #98 pc 0000000000547d14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #99 pc 0000000000b227d2 /system/framework/boot-framework.vdex (android.os.Looper.loop+406)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #100 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #101 pc 0000000000258ab8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #102 pc 00000000002792a4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #103 pc 0000000000526298 /system/lib64/libart.so (MterpInvokeStatic+204)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #104 pc 0000000000547e94 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #105 pc 00000000003a00f2 /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #106 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #107 pc 0000000000515628 /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #108 pc 000000000055e8fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #109 pc 0000000000555a4c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #110 pc 00000000000cf6e8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #111 pc 000000000045cd00 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #112 pc 000000000045e754 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #113 pc 00000000003ee5b0 /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #114 pc 000000000011f6d4 /system/framework/arm64/boot-core-oj.oat (offset 0x115000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #115 pc 0000000000555788 /system/lib64/libart.so (art_quick_invoke_stub+584)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #116 pc 00000000000cf6c8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #117 pc 000000000027f2b8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #118 pc 00000000002792c0 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #119 pc 0000000000524d94 /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #120 pc 0000000000547d14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #121 pc 0000000000c47ac6 /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #122 pc 0000000000252fc4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1133985933+488)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #123 pc 0000000000515628 /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #124 pc 000000000055e8fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #125 pc 0000000000c0b680 /system/framework/arm64/boot-framework.oat (offset 0x3d7000) (com.android.internal.os.ZygoteInit.main+3088)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #126 pc 0000000000555a4c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #127 pc 00000000000cf6e8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #128 pc 000000000045cd00 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #129 pc 000000000045c960 /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+424)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #130 pc 0000000000361b64 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+652)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #131 pc 00000000000b28cc /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #132 pc 00000000000b53b4 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+948)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #133 pc 000000000000251c /system/bin/app_process64 (main+2000)
2019-07-21 14:28:56.433 14666-14666/? A/DEBUG: #134 pc 00000000000c8418 /system/lib64/libc.so (__libc_init+88)
I don't really undestand what is happening... @rmushtaqCB are you using the arm64 version ?
Hi Team, I created a new Android Project. Then using swig created the .so files from and copied them to the designated places in my project. Then i copied the generated the Classes from swig and copied them to the My project. Copied the model from this repository in assets.
I was using the model already given in the resources folder from this repository and it was working fine without any issue.
My team requested the new Model (alexa.umdl) i replaced this model and now it giving me this error
Fatal signal 6 (SIGABRT), code -6 in tid 8320
here's the log
2019-07-03 11:52:04.588 8320-8320/com.app.snowboytestsample E/AppResCopy: overriding file /storage/emulated/0/snowboy///alexa.umdl 2019-07-03 11:52:04.596 8320-8320/com.app.snowboytestsample E/AppResCopy: overriding file /storage/emulated/0/snowboy///common.res 2019-07-03 11:52:04.612 8320-8320/com.app.snowboytestsample E/AppResCopy: overriding file /storage/emulated/0/snowboy///ding.wav 2019-07-03 11:52:04.613 8320-8320/com.app.snowboytestsample E/AppResCopy: overriding file /storage/emulated/0/snowboy///dong.wav 2019-07-03 11:52:04.615 8320-8320/com.app.snowboytestsample E/AudioDataSaver: /storage/emulated/0/snowboy//recording.pcm 2019-07-03 11:52:04.621 8320-8320/com.app.snowboytestsample A/libc: Fatal signal 6 (SIGABRT), code -6 in tid 8320 (n.sample)
i tried the solution provided in the issues but didn't work for me.