crdroidandroid / issue_tracker

all crDroid related issues should go here
12 stars 1 forks source link

Phone crashes when double click to sleep (randomly) #475

Closed iozho closed 5 days ago

iozho commented 1 month ago

Issue type

Other

Device

Xiaomi Redmi Note 8

crDroid version

crDroid 10

Exact version / Build date

10.6

Bug description

Sometimes when I double click on the top left corner(to lock the device), the phone freezes and reboots.

Steps to reproduce

  1. Open some app (firefox for instances). Make sure status bar is visible.
  2. Double click on top left corner to lock the device.

Relevant log (logcat/build log)

6>[42423.265438] PM: PM: suspend entry 2024-07-29 11:17:50.010814631 UTC
<6>[42423.265444] PM: suspend entry (deep)
<6>[42423.276009] Freezing user space processes ... 
<6>[42423.700747] PM: Pending Wakeup Sources: NETLINK NETLINK 
<3>[42423.700761] Freezing of tasks aborted after 0.424 seconds
<6>[42423.700778] Restarting tasks ... done.
<6>[42423.728423] Abort: Pending Wakeup Sources: NETLINK NETLINK 
<6>[42423.728440] PM: PM: suspend exit 2024-07-29 11:17:50.473823172 UTC
<6>[42423.728441] PM: suspend exit
<6>[42423.929442] PM: PM: suspend entry 2024-07-29 11:17:50.674818745 UTC
<6>[42423.929450] PM: suspend entry (deep)
<6>[42423.940021] Freezing user space processes ... (elapsed 0.016 seconds) done.
<6>[42423.956093] Freezing remaining freezable tasks ... (elapsed 0.006 seconds) done.
<4>[42423.962453] Suspending console(s) (use no_console_suspend to debug)
<3>[42424.022133] [NVT-ts] nvt_pm_suspend 2468: pm suspend
<6>[42424.046021] Disabling non-boot CPUs ...
<4>[42424.094155] process 3747 (Cleaner-6) no longer affine to cpu2
<6>[42424.180057] Enabling non-boot CPUs ...
<6>[42424.185910] arch_timer: CPU4: Trapping CNTVCT access
<6>[42424.187271] arch_timer: CPU5: Trapping CNTVCT access
<6>[42424.188316] arch_timer: CPU6: Trapping CNTVCT access
<6>[42424.189411] arch_timer: CPU7: Trapping CNTVCT access
<3>[42424.201148] [NVT-ts] nvt_pm_resume 2479: pm resume
<6>[42424.213731] Restarting tasks ... done.
<6>[42424.233552] Resume cause unknown
<6>[42424.233578] PM: PM: suspend exit 2024-07-29 11:17:54.552086035 UTC
<6>[42424.233579] PM: suspend exit
<14>[42424.272716] rmt_storage:INFO:rmt_storage_rw_iovec_cb: Write iovec request (req_h 0xc1 wr_count 186) received for /boot/modem_fs1
<14>[42424.273267] rmt_storage:INFO:rmt_storage_client_thread: Calling Write [offset=0, size=2097152, req_h 0xc1, wr_count 186] for /boot/modem_fs1!
<14>[42424.321465] rmt_storage:INFO:rmt_storage_client_thread: Done Write (bytes = 2097152, req_h 0xc1, wr_count 186) for /boot/modem_fs1!
<6>[42424.335645] PM: PM: suspend entry 2024-07-29 11:17:54.654144837 UTC
<6>[42424.335656] PM: suspend entry (deep)
<6>[42424.346300] Freezing user space processes ... (elapsed 0.019 seconds) done.
<6>[42424.365961] Freezing remaining freezable tasks ... (elapsed 0.008 seconds) done.
<4>[42424.374935] Suspending console(s) (use no_console_suspend to debug)
<3>[42424.414680] [NVT-ts] nvt_pm_suspend 2468: pm suspend
<6>[42424.441878] Disabling non-boot CPUs ...
<6>[42424.568579] Enabling non-boot CPUs ...
<6>[42424.577721] arch_timer: CPU4: Trapping CNTVCT access
<6>[42424.579760] arch_timer: CPU5: Trapping CNTVCT access
<6>[42424.581716] arch_timer: CPU6: Trapping CNTVCT access
<6>[42424.583320] arch_timer: CPU7: Trapping CNTVCT access
<3>[42424.601792] [NVT-ts] nvt_pm_resume 2479: pm resume
<6>[42424.615922] Restarting tasks ... done.
<6>[42424.652655] Resume cause unknown
<6>[42424.657316] PM: PM: suspend exit 2024-07-29 11:18:33.324170135 UTC
<6>[42424.657323] PM: suspend exit
<3>[42424.810077] swr-wcd tx_swr_ctrl: SWR unknown interrupt
<6>[42426.206059] simple_lmk: Killing thetileapp.tile with adj 915 to free 148652 KiB
<6>[42426.208623] simple_lmk: Killing d.process.acore with adj 935 to free 114092 KiB
<12>[42427.286160] servicemanager: Isolated app with UID 99161 requested 'network_management', but the service is not allowed for isolated apps.
<12>[42427.291541] servicemanager: Isolated app with UID 99161 requested 'connectivity', but the service is not allowed for isolated apps.
<12>[42427.302510] servicemanager: Isolated app with UID 99161 requested 'content_capture', but the service is not allowed for isolated apps.
<14>[42427.816077] servicemanager: Could not find android.hardware.graphics.allocator.IAllocator/default in the VINTF manifest. No alternative instances declared in VINTF.
<14>[42427.834392] servicemanager: Could not find android.hardware.graphics.allocator.IAllocator/default in the VINTF manifest. No alternative instances declared in VINTF.
<6>[42428.892316] simple_lmk: Killing com.viber.voip with adj 905 to free 339212 KiB
<4>[42429.089435] gf_irq:shedule_work
<6>[42429.089458] dsi-drm:[dsi_bridge_interface_enable] dsi_bridge_interface_enable: start
<6>[42429.089507] dsi-ctrl:[_dsi_ctrl_setup_isr] [DSI_0] IRQ 224 registered
<36>[42429.257027] type=1400 audit(1722251917.922:20394): avc:  denied  { read } for  comm="fingerprint@2.1" name="/" dev="mmcblk0p87" ino=3 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=0
<36>[42429.257296] type=1400 audit(1722251917.922:20395): avc:  denied  { read } for  comm="fingerprint@2.1" name="u:object_r:default_prop:s0" dev="tmpfs" ino=4190 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0
<36>[42429.276602] type=1400 audit(1722251917.938:20396): avc:  denied  { read } for  comm="fingerprint@2.1" name="/" dev="mmcblk0p87" ino=3 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=0
<36>[42429.277672] type=1400 audit(1722251917.938:20397): avc:  denied  { read } for  comm="fingerprint@2.1" name="/" dev="mmcblk0p87" ino=3 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=0
<6>[42429.278704] gf_spi: [info] goodix_fb_state_chg_callback go to the goodix_fb_state_chg_callback value = 2
<4>[42429.278709] thermal_notifier_callback 3707
<6>[42429.278711] thermal_notifier lct_backlight_off:0
<6>[42429.278812] smblib_set_prop_system_temp_level val=0, chg->system_temp_level=0, LctThermal=1, lct_backlight_off= 0, IsInCall=0 
<6>[42429.278812]  
<6>[42429.279680] gf_spi: [info] goodix_fb_state_chg_callback go to the goodix_fb_state_chg_callback value = 1
<3>[42429.279707] [NVT-ts] nvt_drm_notifier_callback 2401: event=1, *blank=0
<4>[42429.279736] thermal_notifier_callback 3707
<3>[42429.279765] [NVT-ts] nvt_ts_resume 2335: start
<3>[42429.279776] [NVT-ts] update_firmware_request 318: filename is novatek_ts_tianma_fw.bin
<14>[42429.284126] ueventd: firmware: loading 'novatek_ts_tianma_fw.bin' for '/devices/platform/soc/4a88000.spi/spi_master/spi1/spi1.0/firmware/novatek_ts_tianma_fw.bin'
<14>[42429.290313] ueventd: loading /devices/platform/soc/4a88000.spi/spi_master/spi1/spi1.0/firmware/novatek_ts_tianma_fw.bin took 6ms
<3>[42429.293156] [NVT-ts] nvt_get_fw_need_write_size 69: fw_need_write_size = 110592(0x1b000), NVT end flag
<3>[42429.293175] [NVT-ts] nvt_bin_header_parser 176: ovly_info = 0, ilm_dlm_num = 2, ovly_sec_num = 0, info_sec_num = 13, partition = 15
<4>[42429.367631] gf_irq:shedule_work
<6>[42429.367655] dsi-drm:[dsi_bridge_interface_enable] dsi_bridge_interface_enable: start
<6>[42429.386049] simple_lmk: Killing ndroid.settings with adj 910 to free 145280 KiB
<6>[42429.386514] simple_lmk: Killing receiver.module with adj 925 to free 99840 KiB
<6>[42429.386747] simple_lmk: Killing prjkt.gamespace with adj 915 to free 92216 KiB
<3>[42429.416542] [NVT-ts] nvt_update_firmware 937: Update firmware success! <123348 us>
<3>[42429.422984] [NVT-ts] nvt_get_fw_info 766: FW type is 0x01
<3>[42429.433718] [NVT-ts] nvt_read_pid 708: PID=591F
<3>[42429.433956] [NVT-ts] nvt_irq_enable 267: enable=1, desc->depth=0
<3>[42429.433966] [NVT-ts] nvt_ts_resume 2370: end
<36>[42429.445764] type=1400 audit(1722251918.110:20398): avc:  denied  { read } for  comm="fingerprint@2.1" name="u:object_r:default_prop:s0" dev="tmpfs" ino=4190 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0
<12>[42429.482503] healthd: battery l=90 v=4077 t=30.4 h=2 st=3 c=978852 fc=3963000 cc=413 chg=
<6>[42429.621634] simple_lmk: Killing com.fsck.k9 with adj 200 to free 301480 KiB
<6>[42430.240196] simple_lmk: Killing kup.smscontacts with adj 200 to free 207296 KiB
<6>[42430.241988] simple_lmk: Killing webview_service with adj 905 to free 84088 KiB
<36>[42430.892710] type=1400 audit(1722251919.554:20399): avc:  granted  { execute } for  comm="microsoft.teams" path="/data/data/com.microsoft.teams/mam_libs/arm64-v8a/libmsmam-pre.so" dev="mmcblk0p87" ino=30288 scontext=u:r:untrusted_app:s0:c216,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c216,c257,c512,c768 tclass=file app=com.microsoft.teams
<36>[42430.902228] type=1400 audit(1722251919.566:20400): avc:  granted  { execute } for  comm="microsoft.teams" path="/data/data/com.microsoft.teams/mam_libs/arm64-v8a/aes/libwolfssl.so" dev="mmcblk0p87" ino=30316 scontext=u:r:untrusted_app:s0:c216,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c216,c257,c512,c768 tclass=file app=com.microsoft.teams
<36>[42430.907959] type=1400 audit(1722251919.570:20401): avc:  granted  { execute } for  comm="microsoft.teams" path="/data/data/com.microsoft.teams/mam_libs/arm64-v8a/libmsmdmarp.so" dev="mmcblk0p87" ino=30360 scontext=u:r:untrusted_app:s0:c216,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c216,c257,c512,c768 tclass=file app=com.microsoft.teams
<36>[42430.917062] type=1400 audit(1722251919.582:20402): avc:  granted  { execute } for  comm="microsoft.teams" path="/data/data/com.microsoft.teams/mam_libs/arm64-v8a/liborigin.so" dev="mmcblk0p87" ino=45407 scontext=u:r:untrusted_app:s0:c216,c257,c512,c768 tcontext=u:object_r:app_data_file:s0:c216,c257,c512,c768 tclass=file app=com.microsoft.teams
<36>[42430.956036] type=1400 audit(1722251919.618:20403): avc:  denied  { search } for  comm="microsoft.teams" name="vendor" dev="tmpfs" ino=3111 scontext=u:r:untrusted_app:s0:c216,c257,c512,c768 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=0 app=com.microsoft.teams
<4>[42430.956090] audit: audit_lost=15228 audit_rate_limit=5 audit_backlog_limit=64
<3>[42430.956092] audit: rate limit exceeded
<14>[42431.580806] init: Untracked pid 19127 exited with status 0
<14>[42431.580829] init: Untracked pid 19127 did not have an associated service entry and will not be reaped
<14>[42431.647531] init: Untracked pid 19131 exited with status 0
<14>[42431.647557] init: Untracked pid 19131 did not have an associated service entry and will not be reaped
<6>[42432.446671] gf_spi: [info] goodix_fb_state_chg_callback go to the goodix_fb_state_chg_callback value = 2
<3>[42432.446705] [NVT-ts] nvt_drm_notifier_callback 2395: event=2, *blank=1
<3>[42432.446721] [NVT-ts] nvt_irq_enable 267: enable=0, desc->depth=1
<3>[42432.446724] [NVT-ts] nvt_ts_suspend 2270: start
<14>[42432.471871] init: starting service 'bootanim'...
<3>[42432.500419] [NVT-ts] nvt_ts_suspend 2314: end
<4>[42432.500434] thermal_notifier_callback 3707
<14>[42432.518042] init: ... started service 'bootanim' has pid 19366
<14>[42432.518071] init: Control message: Processed ctl.start for 'bootanim' from pid: 564 (/system/bin/surfaceflinger)
<14>[42432.535733] init: Service 'zygote' (pid 2968) received signal 9
<14>[42432.535765] init: Sending signal 9 to service 'zygote' (pid 2968) process group...
<14>[42432.560939] libprocessgroup: Removed cgroup /sys/fs/cgroup/uid_0/pid_2968
<11>[42432.618375] cutils-trace: Error opening trace file: No such file or directory (2)
<15>[42432.618997] vdc: Waited 0ms for vold
<6>[42432.631689] binder: 2970:2982 ioctl c0306201 76a93fab98 returned -14
<1>[42432.654349] BUG: Bad page state in process wpa_supplicant  pfn:11434d
<0>[42432.654370] page:ffffffbf2e50d340 count:0 mapcount:0 mapping:          (null) index:0x1
<0>[42432.654378] flags: 0x4000000000000004(uptodate)
<1>[42432.654387] raw: 4000000000000004 0000000000000000 0000000000000001 00000000ffffffff
<1>[42432.654393] raw: dead000000000100 dead000000000200 0000000000000000 0000000000000000
<1>[42432.654397] page dumped because: PAGE_FLAGS_CHECK_AT_PREP flag set
<1>[42432.654402] bad because of flags: 0x4(uptodate)
<4>[42432.654405] Modules linked in:
<4>[42432.654412] CPU: 2 PID: 17330 Comm: wpa_supplicant Tainted: G S      W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.654414] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.654416] Call trace:
<4>[42432.654426]  dump_backtrace+0x0/0x390
<4>[42432.654432]  dump_stack+0xcc/0x110
<4>[42432.654438]  bad_page+0x10c/0x160
<4>[42432.654441]  get_populated_pcp_list+0x1388/0x1880
<4>[42432.654444]  get_page_from_freelist+0x1258/0x16b0
<4>[42432.654448]  __alloc_pages_nodemask+0xe0/0x1d0
<4>[42432.654451]  __do_page_cache_readahead+0x120/0x320
<4>[42432.654453]  filemap_fault+0x500/0xa30
<4>[42432.654458]  ext4_filemap_fault+0x34/0x50
<4>[42432.654462]  handle_pte_fault+0xaa4/0x1060
<4>[42432.654465]  handle_mm_fault+0x22c/0x280
<4>[42432.654469]  do_page_fault+0x3ac/0x590
<4>[42432.654471]  do_translation_fault+0x44/0xb0
<4>[42432.654475]  do_el0_ia_bp_hardening+0x84/0x170
<4>[42432.654477]  el0_ia+0x18/0x1c
<4>[42432.654479] Disabling lock debugging due to kernel taint
<1>[42432.654484] BUG: Bad page state in process wpa_supplicant  pfn:126a16
<0>[42432.654489] page:ffffffbf2e9a8580 count:0 mapcount:0 mapping:          (null) index:0x1
<0>[42432.654495] flags: 0x4000000000000004(uptodate)
<1>[42432.654500] raw: 4000000000000004 0000000000000000 0000000000000001 00000000ffffffff
<1>[42432.654507] raw: dead000000000100 dead000000000200 0000000000000000 0000000000000000
<1>[42432.654512] page dumped because: PAGE_FLAGS_CHECK_AT_PREP flag set
<1>[42432.654516] bad because of flags: 0x4(uptodate)
<4>[42432.654519] Modules linked in:
<4>[42432.654523] CPU: 2 PID: 17330 Comm: wpa_supplicant Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.654525] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.654526] Call trace:
<4>[42432.654530]  dump_backtrace+0x0/0x390
<4>[42432.654534]  dump_stack+0xcc/0x110
<4>[42432.654537]  bad_page+0x10c/0x160
<4>[42432.654540]  get_populated_pcp_list+0x1388/0x1880
<4>[42432.654542]  get_page_from_freelist+0x1258/0x16b0
<4>[42432.654545]  __alloc_pages_nodemask+0xe0/0x1d0
<4>[42432.654549]  __do_page_cache_readahead+0x120/0x320
<4>[42432.654551]  filemap_fault+0x500/0xa30
<4>[42432.654554]  ext4_filemap_fault+0x34/0x50
<4>[42432.654557]  handle_pte_fault+0xaa4/0x1060
<4>[42432.654560]  handle_mm_fault+0x22c/0x280
<4>[42432.654562]  do_page_fault+0x3ac/0x590
<4>[42432.654566]  do_translation_fault+0x44/0xb0
<4>[42432.654569]  do_el0_ia_bp_hardening+0x84/0x170
<4>[42432.654571]  el0_ia+0x18/0x1c
<6>[42432.659889] binder: 2977:2980 ioctl c0306201 72d0ffee18 returned -14
<6>[42432.696619] gf_spi: [info] goodix_fb_state_chg_callback go to the goodix_fb_state_chg_callback value = 1
<4>[42432.696626] thermal_notifier_callback 3707
<6>[42432.696628] thermal_notifier lct_backlight_off:1
<6>[42432.696661] smblib_set_prop_system_temp_level val=0, chg->system_temp_level=0, LctThermal=1, lct_backlight_off= 1, IsInCall=0 
<6>[42432.696661]  
<6>[42432.699659] gf_spi: [info] goodix_fb_state_chg_callback go to the goodix_fb_state_chg_callback value = 2
<4>[42432.699666] thermal_notifier_callback 3707
<6>[42432.699667] thermal_notifier lct_backlight_off:0
<6>[42432.699720] dsi-ctrl:[_dsi_ctrl_setup_isr] [DSI_0] IRQ 224 registered
<6>[42432.699751] smblib_set_prop_system_temp_level val=0, chg->system_temp_level=0, LctThermal=1, lct_backlight_off= 0, IsInCall=0 
<6>[42432.699751]  
<1>[42432.752052] BUG: Bad page state in process bootanimation  pfn:1082d5
<0>[42432.752064] page:ffffffbf2e20b540 count:0 mapcount:0 mapping:          (null) index:0x1
<0>[42432.752070] flags: 0x4000000000000004(uptodate)
<1>[42432.752075] raw: 4000000000000004 0000000000000000 0000000000000001 00000000ffffffff
<1>[42432.752080] raw: dead000000000100 dead000000000200 0000000000000000 0000000000000000
<1>[42432.752083] page dumped because: PAGE_FLAGS_CHECK_AT_PREP flag set
<1>[42432.752086] bad because of flags: 0x4(uptodate)
<4>[42432.752089] Modules linked in:
<4>[42432.752094] CPU: 6 PID: 19366 Comm: bootanimation Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.752096] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.752097] Call trace:
<4>[42432.752104]  dump_backtrace+0x0/0x390
<4>[42432.752108]  dump_stack+0xcc/0x110
<4>[42432.752112]  bad_page+0x10c/0x160
<4>[42432.752113]  get_populated_pcp_list+0x1388/0x1880
<4>[42432.752115]  get_page_from_freelist+0x1258/0x16b0
<4>[42432.752117]  __alloc_pages_nodemask+0xe0/0x1d0
<4>[42432.752119]  __do_page_cache_readahead+0x120/0x320
<4>[42432.752122]  ondemand_readahead.llvm.945972331127896361+0x2e4/0x330
<4>[42432.752124]  page_cache_async_readahead+0x100/0x130
<4>[42432.752125]  filemap_fault+0x244/0xa30
<4>[42432.752128]  ext4_filemap_fault+0x34/0x50
<4>[42432.752131]  handle_pte_fault+0xaa4/0x1060
<4>[42432.752133]  handle_mm_fault+0x22c/0x280
<4>[42432.752135]  do_page_fault+0x3ac/0x590
<4>[42432.752137]  do_translation_fault+0x44/0xb0
<4>[42432.752138]  do_mem_abort+0x4c/0x110
<4>[42432.752140]  el0_da+0x1c/0x20
<6>[42432.756285] gf_spi: [info] goodix_fb_state_chg_callback go to the goodix_fb_state_chg_callback value = 1
<3>[42432.756318] [NVT-ts] nvt_drm_notifier_callback 2401: event=1, *blank=0
<4>[42432.756344] thermal_notifier_callback 3707
<3>[42432.756435] [NVT-ts] nvt_ts_resume 2335: start
<3>[42432.756448] [NVT-ts] update_firmware_request 318: filename is novatek_ts_tianma_fw.bin
<14>[42432.759109] ueventd: firmware: loading 'novatek_ts_tianma_fw.bin' for '/devices/platform/soc/4a88000.spi/spi_master/spi1/spi1.0/firmware/novatek_ts_tianma_fw.bin'
<14>[42432.763656] ueventd: loading /devices/platform/soc/4a88000.spi/spi_master/spi1/spi1.0/firmware/novatek_ts_tianma_fw.bin took 4ms
<3>[42432.764699] [NVT-ts] nvt_get_fw_need_write_size 69: fw_need_write_size = 110592(0x1b000), NVT end flag
<3>[42432.764719] [NVT-ts] nvt_bin_header_parser 176: ovly_info = 0, ilm_dlm_num = 2, ovly_sec_num = 0, info_sec_num = 13, partition = 15
<1>[42432.858832] BUG: Bad page map in process audioserver  pte:60000109327fcf pmd:100ae4003
<0>[42432.858851] page:ffffffbf2e24c9c0 count:4 mapcount:-126 mapping:ffffffcb9a6ee278 index:0x0
<0>[42432.858859] flags: 0x4000000000020014(uptodate|lru|mappedtodisk)
<1>[42432.858867] raw: 4000000000020014 ffffffcb9a6ee278 0000000000000000 00000004ffffff81
<1>[42432.858873] raw: ffffffbf2e171a20 ffffffbf2e8ad360 0000000000000000 0000000000000000
<1>[42432.858877] page dumped because: bad pte
<1>[42432.858884] addr:00000000d56ff763 vm_flags:00000071 anon_vma:          (null) mapping:0000000089bbdefa index:0
<1>[42432.858904] file:android.hardware.audio.core.sounddose-V2-ndk.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.858911] CPU: 1 PID: 19374 Comm: audioserver Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.858913] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.858915] Call trace:
<4>[42432.858921]  dump_backtrace+0x0/0x390
<4>[42432.858926]  dump_stack+0xcc/0x110
<4>[42432.858931]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.858934]  unmap_page_range+0x5b0/0xb80
<4>[42432.858937]  unmap_region+0x174/0x1f0
<4>[42432.858940]  __do_munmap+0x1e0/0x2b0
<4>[42432.858942]  SyS_munmap+0xd4/0x130
<4>[42432.858946]  el0_svc_naked+0x34/0x38
<1>[42432.860566] BUG: Bad page map in process android.hardwar  pte:6000012bee2fcf pmd:11d690003
<0>[42432.860585] page:ffffffbf2eafb880 count:5 mapcount:-125 mapping:ffffffcb9a469b48 index:0x0
<0>[42432.860594] flags: 0x4000000000020014(uptodate|lru|mappedtodisk)
<1>[42432.860603] raw: 4000000000020014 ffffffcb9a469b48 0000000000000000 00000005ffffff82
<1>[42432.860609] raw: ffffffbf2eae64a0 ffffffbf2eb288e0 0000000000000000 0000000000000000
<1>[42432.860614] page dumped because: bad pte
<1>[42432.860622] addr:00000000553bf394 vm_flags:00000071 anon_vma:          (null) mapping:0000000072f0f383 index:0
<1>[42432.860642] file:libvndksupport.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.860651] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.860653] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.860655] Call trace:
<4>[42432.860661]  dump_backtrace+0x0/0x390
<4>[42432.860667]  dump_stack+0xcc/0x110
<4>[42432.860671]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.860674]  unmap_page_range+0x5b0/0xb80
<4>[42432.860678]  unmap_region+0x174/0x1f0
<4>[42432.860680]  __do_munmap+0x1e0/0x2b0
<4>[42432.860683]  SyS_munmap+0xd4/0x130
<4>[42432.860687]  el0_svc_naked+0x34/0x38
<3>[42432.862567] [NVT-ts] nvt_update_firmware 937: Update firmware success! <97829 us>
<3>[42432.862754] [NVT-ts] nvt_get_fw_info 766: FW type is 0x01
<3>[42432.862961] [NVT-ts] nvt_read_pid 708: PID=591F
<1>[42432.866495] BUG: Bad page map in process audioserver  pte:6000012a41ffcf pmd:101f07003
<0>[42432.866513] page:ffffffbf2ea907c0 count:4 mapcount:-126 mapping:ffffffcb85108278 index:0x0
<0>[42432.866523] flags: 0x4000000000020014(uptodate|lru|mappedtodisk)
<1>[42432.866530] raw: 4000000000020014 ffffffcb85108278 0000000000000000 00000004ffffff81
<1>[42432.866536] raw: ffffffbf2e8c02e0 ffffffbf2ec7d2a0 0000000000000000 0000000000000000
<1>[42432.866540] page dumped because: bad pte
<1>[42432.866548] addr:00000000c0598bb9 vm_flags:00000071 anon_vma:          (null) mapping:000000008cff6698 index:0
<1>[42432.866573] file:libheadtracking-binding.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.866582] CPU: 3 PID: 19374 Comm: audioserver Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.866584] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.866586] Call trace:
<4>[42432.866592]  dump_backtrace+0x0/0x390
<4>[42432.866597]  dump_stack+0xcc/0x110
<4>[42432.866602]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.866605]  unmap_page_range+0x5b0/0xb80
<4>[42432.866608]  unmap_region+0x174/0x1f0
<4>[42432.866611]  __do_munmap+0x1e0/0x2b0
<4>[42432.866613]  SyS_munmap+0xd4/0x130
<4>[42432.866617]  el0_svc_naked+0x34/0x38
<1>[42432.879025] BUG: Bad page map in process android.hardwar  pte:6000012bee2fcf pmd:11d690003
<0>[42432.879045] page:ffffffbf2eafb880 count:6 mapcount:-123 mapping:ffffffcb9a469b48 index:0x0
<0>[42432.879054] flags: 0x4000000000020036(referenced|uptodate|lru|active|mappedtodisk)
<1>[42432.879062] raw: 4000000000020036 ffffffcb9a469b48 0000000000000000 00000006ffffff84
<1>[42432.879069] raw: ffffffbf2e1663a0 ffffffbf2ea2e420 0000000000000000 0000000000000000
<1>[42432.879073] page dumped because: bad pte
<1>[42432.879080] addr:00000000d1163819 vm_flags:00000071 anon_vma:          (null) mapping:0000000072f0f383 index:0
<1>[42432.879100] file:libvndksupport.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.879108] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.879111] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.879113] Call trace:
<4>[42432.879119]  dump_backtrace+0x0/0x390
<4>[42432.879126]  dump_stack+0xcc/0x110
<4>[42432.879131]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.879134]  unmap_page_range+0x5b0/0xb80
<4>[42432.879138]  unmap_region+0x174/0x1f0
<4>[42432.879140]  __do_munmap+0x1e0/0x2b0
<4>[42432.879143]  SyS_munmap+0xd4/0x130
<4>[42432.879146]  el0_svc_naked+0x34/0x38
<1>[42432.879157] BUG: Bad page map in process android.hardwar  pte:6000012bee2fcf pmd:11d690003
<0>[42432.879164] page:ffffffbf2eafb880 count:5 mapcount:-124 mapping:ffffffcb9a469b48 index:0x0
<0>[42432.879169] flags: 0x4000000000020036(referenced|uptodate|lru|active|mappedtodisk)
<1>[42432.879175] raw: 4000000000020036 ffffffcb9a469b48 0000000000000000 00000005ffffff83
<1>[42432.879181] raw: ffffffbf2e1663a0 ffffffbf2ea2e420 0000000000000000 0000000000000000
<1>[42432.879185] page dumped because: bad pte
<1>[42432.879191] addr:0000000087286fe1 vm_flags:00000071 anon_vma:          (null) mapping:0000000072f0f383 index:0
<1>[42432.879201] file:libvndksupport.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.879206] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.879208] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.879209] Call trace:
<4>[42432.879213]  dump_backtrace+0x0/0x390
<4>[42432.879216]  dump_stack+0xcc/0x110
<4>[42432.879218]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.879221]  unmap_page_range+0x5b0/0xb80
<4>[42432.879223]  unmap_region+0x174/0x1f0
<4>[42432.879227]  __do_munmap+0x1e0/0x2b0
<4>[42432.879230]  SyS_munmap+0xd4/0x130
<4>[42432.879232]  el0_svc_naked+0x34/0x38
<1>[42432.879235] BUG: Bad page map in process android.hardwar  pte:6000012ca23bcf pmd:11d690003
<0>[42432.879240] page:ffffffbf2eb288c0 count:3 mapcount:-126 mapping:ffffffcb9a469b48 index:0x1
<0>[42432.879246] flags: 0x4000000000020014(uptodate|lru|mappedtodisk)
<1>[42432.879252] raw: 4000000000020014 ffffffcb9a469b48 0000000000000001 00000003ffffff81
<1>[42432.879257] raw: ffffffbf2eae64a0 ffffffbf2e552ee0 0000000000000000 0000000000000000
<1>[42432.879261] page dumped because: bad pte
<1>[42432.879266] addr:00000000199cb4b2 vm_flags:00000071 anon_vma:          (null) mapping:0000000072f0f383 index:1
<1>[42432.879276] file:libvndksupport.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.879282] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.879284] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.879285] Call trace:
<4>[42432.879288]  dump_backtrace+0x0/0x390
<4>[42432.879291]  dump_stack+0xcc/0x110
<4>[42432.879295]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.879297]  unmap_page_range+0x5b0/0xb80
<4>[42432.879300]  unmap_region+0x174/0x1f0
<4>[42432.879303]  __do_munmap+0x1e0/0x2b0
<4>[42432.879306]  SyS_munmap+0xd4/0x130
<4>[42432.879308]  el0_svc_naked+0x34/0x38
<1>[42432.879317] BUG: Bad page map in process android.hardwar  pte:6000012bee2fcf pmd:11d690003
<0>[42432.879323] page:ffffffbf2eafb880 count:4 mapcount:-125 mapping:ffffffcb9a469b48 index:0x0
<0>[42432.879329] flags: 0x4000000000020036(referenced|uptodate|lru|active|mappedtodisk)
<1>[42432.879335] raw: 4000000000020036 ffffffcb9a469b48 0000000000000000 00000004ffffff82
<1>[42432.879341] raw: ffffffbf2e1663a0 ffffffbf2ea2e420 0000000000000000 0000000000000000
<1>[42432.879345] page dumped because: bad pte
<1>[42432.879350] addr:00000000c98d83e6 vm_flags:00000071 anon_vma:          (null) mapping:0000000072f0f383 index:0
<1>[42432.879359] file:libvndksupport.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.879365] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.879367] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.879368] Call trace:
<4>[42432.879371]  dump_backtrace+0x0/0x390
<4>[42432.879374]  dump_stack+0xcc/0x110
<4>[42432.879377]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.879380]  unmap_page_range+0x5b0/0xb80
<4>[42432.879383]  unmap_region+0x174/0x1f0
<4>[42432.879385]  __do_munmap+0x1e0/0x2b0
<4>[42432.879388]  SyS_munmap+0xd4/0x130
<4>[42432.879390]  el0_svc_naked+0x34/0x38
<1>[42432.879394] BUG: Bad page map in process android.hardwar  pte:6000012ca23fcf pmd:11d690003
<0>[42432.879400] page:ffffffbf2eb288c0 count:2 mapcount:-127 mapping:ffffffcb9a469b48 index:0x1
<0>[42432.879406] flags: 0x4000000000020016(referenced|uptodate|lru|mappedtodisk)
<1>[42432.879411] raw: 4000000000020016 ffffffcb9a469b48 0000000000000001 00000002ffffff80
<1>[42432.879417] raw: ffffffbf2eae64a0 ffffffbf2e552ee0 0000000000000000 0000000000000000
<1>[42432.879421] page dumped because: bad pte
<1>[42432.879426] addr:0000000035bf9aa5 vm_flags:00000071 anon_vma:          (null) mapping:0000000072f0f383 index:1
<1>[42432.879435] file:libvndksupport.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.879441] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.879442] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.879444] Call trace:
<4>[42432.879446]  dump_backtrace+0x0/0x390
<4>[42432.879449]  dump_stack+0xcc/0x110
<4>[42432.879452]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.879455]  unmap_page_range+0x5b0/0xb80
<4>[42432.879457]  unmap_region+0x174/0x1f0
<4>[42432.879460]  __do_munmap+0x1e0/0x2b0
<4>[42432.879463]  SyS_munmap+0xd4/0x130
<4>[42432.879465]  el0_svc_naked+0x34/0x38
<1>[42432.879475] BUG: Bad page map in process android.hardwar  pte:6000012bee2fcf pmd:11d690003
<0>[42432.879481] page:ffffffbf2eafb880 count:3 mapcount:-126 mapping:ffffffcb9a469b48 index:0x0
<0>[42432.879487] flags: 0x4000000000020036(referenced|uptodate|lru|active|mappedtodisk)
<1>[42432.879493] raw: 4000000000020036 ffffffcb9a469b48 0000000000000000 00000003ffffff81
<1>[42432.879499] raw: ffffffbf2e1663a0 ffffffbf2ea2e420 0000000000000000 0000000000000000
<1>[42432.879503] page dumped because: bad pte
<1>[42432.879508] addr:00000000e592c4e2 vm_flags:00000071 anon_vma:          (null) mapping:0000000072f0f383 index:0
<1>[42432.879518] file:libvndksupport.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.879524] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.879526] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.879527] Call trace:
<4>[42432.879531]  dump_backtrace+0x0/0x390
<4>[42432.879534]  dump_stack+0xcc/0x110
<4>[42432.879537]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.879541]  unmap_page_range+0x5b0/0xb80
<4>[42432.879543]  unmap_region+0x174/0x1f0
<4>[42432.879546]  __do_munmap+0x1e0/0x2b0
<4>[42432.879549]  SyS_munmap+0xd4/0x130
<4>[42432.879551]  el0_svc_naked+0x34/0x38
<1>[42432.879693] BUG: Bad page map in process android.hardwar  pte:6000012f0e2fcf pmd:11d690003
<0>[42432.879701] page:ffffffbf2ebc3880 count:3 mapcount:-126 mapping:ffffffcba4369b48 index:0x4
<0>[42432.879707] flags: 0x4000000000020016(referenced|uptodate|lru|mappedtodisk)
<1>[42432.879714] raw: 4000000000020016 ffffffcba4369b48 0000000000000004 00000003ffffff81
<1>[42432.879720] raw: ffffffbf2e72fe60 ffffffbf2eb16260 0000000000000000 0000000000000000
<1>[42432.879723] page dumped because: bad pte
<1>[42432.879729] addr:000000000c9be5de vm_flags:00000071 anon_vma:          (null) mapping:0000000033fc3c5d index:4
<1>[42432.879740] file:libapexsupport.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.879746] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.879748] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.879749] Call trace:
<4>[42432.879752]  dump_backtrace+0x0/0x390
<4>[42432.879756]  dump_stack+0xcc/0x110
<4>[42432.879759]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.879762]  unmap_page_range+0x5b0/0xb80
<4>[42432.879765]  unmap_region+0x174/0x1f0
<4>[42432.879768]  __do_munmap+0x1e0/0x2b0
<4>[42432.879771]  SyS_munmap+0xd4/0x130
<4>[42432.879773]  el0_svc_naked+0x34/0x38
<1>[42432.879777] BUG: Bad page map in process android.hardwar  pte:6000012c589bcf pmd:11d690003
<0>[42432.879782] page:ffffffbf2eb16240 count:3 mapcount:-126 mapping:ffffffcba4369b48 index:0x5
<0>[42432.879787] flags: 0x4000000000020014(uptodate|lru|mappedtodisk)
<1>[42432.879793] raw: 4000000000020014 ffffffcba4369b48 0000000000000005 00000003ffffff81
<1>[42432.879798] raw: ffffffbf2ebc38a0 ffffffbf2e51eee0 0000000000000000 0000000000000000
<1>[42432.879802] page dumped because: bad pte
<1>[42432.879807] addr:000000004caa98d8 vm_flags:00000071 anon_vma:          (null) mapping:0000000033fc3c5d index:5
<1>[42432.879816] file:libapexsupport.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.879821] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.879823] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.879824] Call trace:
<4>[42432.879827]  dump_backtrace+0x0/0x390
<4>[42432.879830]  dump_stack+0xcc/0x110
<4>[42432.879833]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.879835]  unmap_page_range+0x5b0/0xb80
<4>[42432.879838]  unmap_region+0x174/0x1f0
<4>[42432.879840]  __do_munmap+0x1e0/0x2b0
<4>[42432.879843]  SyS_munmap+0xd4/0x130
<4>[42432.879846]  el0_svc_naked+0x34/0x38
<1>[42432.879856] BUG: Bad page map in process android.hardwar  pte:6000012116ffcf pmd:11d690003
<0>[42432.879861] page:ffffffbf2e845bc0 count:2 mapcount:-127 mapping:ffffffcba4369b48 index:0x21
<0>[42432.879867] flags: 0x4000000000020016(referenced|uptodate|lru|mappedtodisk)
<1>[42432.879873] raw: 4000000000020016 ffffffcba4369b48 0000000000000021 00000002ffffff80
<1>[42432.879879] raw: ffffffbf2ea238e0 ffffffbf2ec8a460 0000000000000000 0000000000000000
<1>[42432.879883] page dumped because: bad pte
<1>[42432.879888] addr:0000000044309625 vm_flags:00000071 anon_vma:          (null) mapping:0000000033fc3c5d index:21
<1>[42432.879897] file:libapexsupport.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.879903] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.879905] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.879906] Call trace:
<4>[42432.879909]  dump_backtrace+0x0/0x390
<4>[42432.879912]  dump_stack+0xcc/0x110
<4>[42432.879915]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.879917]  unmap_page_range+0x5b0/0xb80
<4>[42432.879920]  unmap_region+0x174/0x1f0
<4>[42432.879922]  __do_munmap+0x1e0/0x2b0
<4>[42432.879925]  SyS_munmap+0xd4/0x130
<4>[42432.879928]  el0_svc_naked+0x34/0x38
<1>[42432.879930] BUG: Bad page map in process android.hardwar  pte:60000132291bcf pmd:11d690003
<0>[42432.879936] page:ffffffbf2ec8a440 count:2 mapcount:-127 mapping:ffffffcba4369b48 index:0x22
<0>[42432.879942] flags: 0x4000000000020014(uptodate|lru|mappedtodisk)
<1>[42432.879948] raw: 4000000000020014 ffffffcba4369b48 0000000000000022 00000002ffffff80
<1>[42432.879954] raw: ffffffbf2e845be0 ffffffbf2e85f660 0000000000000000 0000000000000000
<1>[42432.879957] page dumped because: bad pte
<1>[42432.879963] addr:00000000d431e97d vm_flags:00000071 anon_vma:          (null) mapping:0000000033fc3c5d index:22
<1>[42432.879971] file:libapexsupport.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.879978] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.879980] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.879981] Call trace:
<4>[42432.879984]  dump_backtrace+0x0/0x390
<4>[42432.879987]  dump_stack+0xcc/0x110
<4>[42432.879990]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.879993]  unmap_page_range+0x5b0/0xb80
<4>[42432.879995]  unmap_region+0x174/0x1f0
<4>[42432.879998]  __do_munmap+0x1e0/0x2b0
<4>[42432.880001]  SyS_munmap+0xd4/0x130
<4>[42432.880003]  el0_svc_naked+0x34/0x38
<1>[42432.880012] BUG: Bad page map in process android.hardwar  pte:6000013faeffcf pmd:11d690003
<0>[42432.880019] page:ffffffbf2efebbc0 count:2 mapcount:-127 mapping:ffffffcba4369b48 index:0x24
<0>[42432.880025] flags: 0x4000000000020016(referenced|uptodate|lru|mappedtodisk)
<1>[42432.880031] raw: 4000000000020016 ffffffcba4369b48 0000000000000024 00000002ffffff80
<1>[42432.880037] raw: ffffffbf2e85f660 ffffffbf2eae50a0 0000000000000000 0000000000000000
<1>[42432.880041] page dumped because: bad pte
<1>[42432.880046] addr:00000000c470236e vm_flags:00000071 anon_vma:          (null) mapping:0000000033fc3c5d index:24
<1>[42432.880057] file:libapexsupport.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.880063] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.880065] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.880066] Call trace:
<4>[42432.880070]  dump_backtrace+0x0/0x390
<4>[42432.880073]  dump_stack+0xcc/0x110
<4>[42432.880076]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.880078]  unmap_page_range+0x5b0/0xb80
<4>[42432.880081]  unmap_region+0x174/0x1f0
<4>[42432.880083]  __do_munmap+0x1e0/0x2b0
<4>[42432.880086]  SyS_munmap+0xd4/0x130
<4>[42432.880088]  el0_svc_naked+0x34/0x38
<1>[42432.880133] BUG: Bad page map in process android.hardwar  pte:6000012f198fcf pmd:101f4e003
<0>[42432.880141] page:ffffffbf2ebc6600 count:2 mapcount:-127 mapping:ffffffcb9a5976e0 index:0xd
<0>[42432.880147] flags: 0x4000000000020016(referenced|uptodate|lru|mappedtodisk)
<1>[42432.880153] raw: 4000000000020016 ffffffcb9a5976e0 000000000000000d 00000002ffffff80
<1>[42432.880160] raw: ffffffbf2e0ec7a0 ffffffbf2eaab460 0000000000000000 0000000000000000
<1>[42432.880164] page dumped because: bad pte
<1>[42432.880170] addr:00000000b9f42b06 vm_flags:00000071 anon_vma:          (null) mapping:00000000e013a216 index:d
<1>[42432.880182] file:libcutils.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.880188] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.880190] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.880191] Call trace:
<4>[42432.880194]  dump_backtrace+0x0/0x390
<4>[42432.880198]  dump_stack+0xcc/0x110
<4>[42432.880201]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.880203]  unmap_page_range+0x5b0/0xb80
<4>[42432.880206]  unmap_region+0x174/0x1f0
<4>[42432.880209]  __do_munmap+0x1e0/0x2b0
<4>[42432.880212]  SyS_munmap+0xd4/0x130
<4>[42432.880214]  el0_svc_naked+0x34/0x38
<1>[42432.880218] BUG: Bad page map in process android.hardwar  pte:6000012aad1bcf pmd:101f4e003
<0>[42432.880223] page:ffffffbf2eaab440 count:3 mapcount:-126 mapping:ffffffcb9a5976e0 index:0xe
<0>[42432.880229] flags: 0x4000000000020014(uptodate|lru|mappedtodisk)
<1>[42432.880235] raw: 4000000000020014 ffffffcb9a5976e0 000000000000000e 00000003ffffff81
<1>[42432.880241] raw: ffffffbf2ebc6620 ffffffbf2e44dd20 0000000000000000 0000000000000000
<1>[42432.880244] page dumped because: bad pte
<1>[42432.880250] addr:00000000c3f81f33 vm_flags:00000071 anon_vma:          (null) mapping:00000000e013a216 index:e
<1>[42432.880259] file:libcutils.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.880264] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.880266] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.880267] Call trace:
<4>[42432.880270]  dump_backtrace+0x0/0x390
<4>[42432.880273]  dump_stack+0xcc/0x110
<4>[42432.880276]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.880279]  unmap_page_range+0x5b0/0xb80
<4>[42432.880282]  unmap_region+0x174/0x1f0
<4>[42432.880284]  __do_munmap+0x1e0/0x2b0
<4>[42432.880287]  SyS_munmap+0xd4/0x130
<4>[42432.880290]  el0_svc_naked+0x34/0x38
<1>[42432.880297] BUG: Bad page map in process android.hardwar  pte:6000012aad1fcf pmd:101f4e003
<0>[42432.880303] page:ffffffbf2eaab440 count:2 mapcount:-127 mapping:ffffffcb9a5976e0 index:0xe
<0>[42432.880310] flags: 0x4000000000020016(referenced|uptodate|lru|mappedtodisk)
<1>[42432.880316] raw: 4000000000020016 ffffffcb9a5976e0 000000000000000e 00000002ffffff80
<1>[42432.880321] raw: ffffffbf2ebc6620 ffffffbf2e44dd20 0000000000000000 0000000000000000
<1>[42432.880325] page dumped because: bad pte
<1>[42432.880331] addr:00000000ada26a54 vm_flags:00000071 anon_vma:          (null) mapping:00000000e013a216 index:e
<1>[42432.880340] file:libcutils.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.880345] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.880347] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.880348] Call trace:
<4>[42432.880351]  dump_backtrace+0x0/0x390
<4>[42432.880354]  dump_stack+0xcc/0x110
<4>[42432.880357]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.880359]  unmap_page_range+0x5b0/0xb80
<4>[42432.880362]  unmap_region+0x174/0x1f0
<4>[42432.880365]  __do_munmap+0x1e0/0x2b0
<4>[42432.880367]  SyS_munmap+0xd4/0x130
<4>[42432.880370]  el0_svc_naked+0x34/0x38
<1>[42432.880419] BUG: Bad page map in process android.hardwar  pte:60000111374fcf pmd:101f4e003
<0>[42432.880430] page:ffffffbf2e44dd00 count:2 mapcount:-127 mapping:ffffffcb9a5976e0 index:0xf
<0>[42432.880437] flags: 0x4000000000020016(referenced|uptodate|lru|mappedtodisk)
<1>[42432.880443] raw: 4000000000020016 ffffffcb9a5976e0 000000000000000f 00000002ffffff80
<1>[42432.880449] raw: ffffffbf2eaab460 ffffffbf2e128460 0000000000000000 0000000000000000
<1>[42432.880453] page dumped because: bad pte
<1>[42432.880458] addr:000000000105e6a2 vm_flags:00000071 anon_vma:          (null) mapping:00000000e013a216 index:f
<1>[42432.880468] file:libcutils.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.880474] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.880476] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.880477] Call trace:
<4>[42432.880480]  dump_backtrace+0x0/0x390
<4>[42432.880484]  dump_stack+0xcc/0x110
<4>[42432.880486]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.880489]  unmap_page_range+0x5b0/0xb80
<4>[42432.880492]  unmap_region+0x174/0x1f0
<4>[42432.880495]  __do_munmap+0x1e0/0x2b0
<4>[42432.880497]  SyS_munmap+0xd4/0x130
<4>[42432.880500]  el0_svc_naked+0x34/0x38
<3>[42432.883619] [NVT-ts] nvt_irq_enable 267: enable=1, desc->depth=0
<3>[42432.883638] [NVT-ts] nvt_ts_resume 2370: end
<1>[42432.884478] BUG: Bad page map in process android.hardwar  pte:60000131a35fcf pmd:101f4e003
<0>[42432.884496] page:ffffffbf2ec68d40 count:3 mapcount:-126 mapping:ffffffcbb224bb48 index:0x0
<0>[42432.884505] flags: 0x4000000000020036(referenced|uptodate|lru|active|mappedtodisk)
<1>[42432.884513] raw: 4000000000020036 ffffffcbb224bb48 0000000000000000 00000003ffffff81
<1>[42432.884519] raw: ffffffbf2e47df60 ffffffbf2e7d6620 0000000000000000 0000000000000000
<1>[42432.884523] page dumped because: bad pte
<1>[42432.884530] addr:000000004d5667ff vm_flags:00000071 anon_vma:          (null) mapping:00000000a7356bc1 index:0
<1>[42432.884553] file:libnetd_client.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.884561] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.884564] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.884566] Call trace:
<4>[42432.884573]  dump_backtrace+0x0/0x390
<4>[42432.884579]  dump_stack+0xcc/0x110
<4>[42432.884584]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.884587]  unmap_page_range+0x5b0/0xb80
<4>[42432.884591]  unmap_region+0x174/0x1f0
<4>[42432.884593]  __do_munmap+0x1e0/0x2b0
<4>[42432.884596]  SyS_munmap+0xd4/0x130
<4>[42432.884600]  el0_svc_naked+0x34/0x38
<1>[42432.885347] BUG: Bad page map in process android.hardwar  pte:60000131a35fcf pmd:101f4e003
<0>[42432.885364] page:ffffffbf2ec68d40 count:4 mapcount:-125 mapping:ffffffcbb224bb48 index:0x0
<0>[42432.885373] flags: 0x4000000000020036(referenced|uptodate|lru|active|mappedtodisk)
<1>[42432.885380] raw: 4000000000020036 ffffffcbb224bb48 0000000000000000 00000004ffffff82
<1>[42432.885387] raw: ffffffbf2e47df60 ffffffbf2e7d6620 0000000000000000 0000000000000000
<1>[42432.885391] page dumped because: bad pte
<1>[42432.885400] addr:00000000df66829a vm_flags:00000071 anon_vma:          (null) mapping:00000000a7356bc1 index:0
<1>[42432.885425] file:libnetd_client.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.885435] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.885438] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.885440] Call trace:
<4>[42432.885445]  dump_backtrace+0x0/0x390
<4>[42432.885451]  dump_stack+0xcc/0x110
<4>[42432.885456]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.885459]  unmap_page_range+0x5b0/0xb80
<4>[42432.885463]  unmap_region+0x174/0x1f0
<4>[42432.885466]  __do_munmap+0x1e0/0x2b0
<4>[42432.885468]  SyS_munmap+0xd4/0x130
<4>[42432.885473]  el0_svc_naked+0x34/0x38
<1>[42432.885488] BUG: Bad page map in process android.hardwar  pte:60000118e62fcf pmd:101f4e003
<0>[42432.885494] page:ffffffbf2e639880 count:2 mapcount:-127 mapping:ffffffcbb224bb48 index:0x6
<0>[42432.885501] flags: 0x4000000000020036(referenced|uptodate|lru|active|mappedtodisk)
<1>[42432.885508] raw: 4000000000020036 ffffffcbb224bb48 0000000000000006 00000002ffffff80
<1>[42432.885514] raw: ffffffbf2e220f20 ffffff822042a6f8 0000000000000000 0000000000000000
<1>[42432.885517] page dumped because: bad pte
<1>[42432.885522] addr:000000001f498170 vm_flags:00000071 anon_vma:          (null) mapping:00000000a7356bc1 index:6
<1>[42432.885532] file:libnetd_client.so fault:ext4_filemap_fault mmap:ext4_file_mmap.llvm.10958784981153231927 readpage:ext4_readpage.llvm.9939702173333501567
<4>[42432.885539] CPU: 1 PID: 19371 Comm: android.hardwar Tainted: G S  B   W       4.14.256-QuicksilveR-ginkgo-v2.5/fb61b32e #1
<4>[42432.885540] Hardware name: Qualcomm Technologies, Inc. trinket pm6125 + pmi632 IDP (DT)
<4>[42432.885541] Call trace:
<4>[42432.885544]  dump_backtrace+0x0/0x390
<4>[42432.885547]  dump_stack+0xcc/0x110
<4>[42432.885551]  print_bad_pte.llvm.15846557611052977072+0x190/0x1e0
<4>[42432.885553]  unmap_page_range+0x5b0/0xb80
<4>[42432.885556]  unmap_region+0x174/0x1f0
<4>[42432.885559]  __do_munmap+0x1e0/0x2b0
<4>[42432.885561]  SyS_munmap+0xd4/0x130
<4>[42432.885564]  el0_svc_naked+0x34/0x38

Screenshots or videos

No response

Solution

No response

Additional context

There were no tombstones in /data/tombstones/

Acknowledgements

gwolf2u commented 1 month ago

please run adb logcat connect phone to pc adb logcat > log.txt reproduce issue attach log.txt file

iozho commented 1 month ago

Hi gwolf2u:

Unfortunately it is not easy to reproduce - the log above is from the /sys/fs/pstore/dmesg-ramoops-0 .

iozho commented 1 month ago

Actually was able to extract the issue (system_server is crashing which leads to reboot - apologies for bad format):

@To enable debug logging run: adb shell setprop log.tag.FA VERBOSE^@l ^@ç(3K^@<90>K<90>z§f&nÑ^F^DFA^@To enable faster debug mode event logging run: adb shell setprop debug.firebase.analytics.app com.microsoft.windowsintune.companyportal^@l¢^@ä(|z^@ù6<90>z§f<87>ôú^G^Dsync15::client::storage_client^@Successful request to "/1.5/160451878/storage/clients", incoming x-last-modified=ServerTimestamp(1722246084560)^@lg^@ä(|z^@ù6<90>z§fdê^N^H^Dsync15::clients_engine::engine^@Upload success (0 records success, 0 records failed)^@lK^@ä(|z^@ù6<90>z§f^?<83>^T^H^Dsync15::clients_engine::engine^@Finished syncing clients^@lG^@ä(|z^@ù6<90>z§fL6^Y^H^Dsync15::client::sync_multiple^@Synchronizing engines^@lF^@ä(|z^@ù6<90>z§f^W±^^^H^Dsync15::client::syncmultiple^@Syncing tabs engine!^@l@^@ä(|z^@ù6<90>z§fÎô"^H^Dsync15::client::sync^@Syncing collection tabs^@lQ^@ä(|z^@ù6<90>z§fé<9c>Y^H^Dsync15::client::sync^@skipping incoming for tabs - not needed.^@l9^@ä(|z^@ù6<90>z§ff<93>^H^Dsync15::client::sync^@Applying changes^@l}^@r(8!^@8!<90>z§f"v<92>^H^CBoundBrokerSvc^@onBind: Intent { act=com.google.android.gms.measurement.START pkg=com.google.android.gms }^@l97>^@r(8!^@8!<90z§fïc<97>^H^CBoundBrokerSvc^@Loading bound service for intent: Intent { act=com.google.android.gms.measurement.START pkg=com.google.android.gms }^@lE^@ä(|z^@ù6<90>z§f<9b>T<9f>^H^Dsync15::client::sync^@Uploading 1 outgoing changes^@lK^@ä(|z^@ù6<90>z§fú´§^H^Dsync15::client::request^@Posting 1 records of 1358 bytes^@l²^@o(CG^@]G<90>z§f<9f><9a>X ^DFinsky^@[34] nee.run(509): Stats for Executor: BlockingExecutor pxh@6f04e50[Running, pool size = 3, active threads = 0, queued tasks = 0, completed tasks = 21]^@l¶^@o(CG^@]G<90>z§fì±] ^DFinsky^@[34] nee.run(509): Stats for Executor: LightweightExecutor pxh@e0de849[Running, pool size = 4, active threads = 0, queued tasks = 0, completed tasks = 139]^@lZ^@è^C·J^D·J<90>z§f<91>^@² ^GDEBUG^@ ^@l2^@è^C·J^D·J<90>z§faW³ ^GDEBUG^@crDroid Version: '10.6' ^@ll^@è^C·J^D·J<90>z§f¨³ ^GDEBUG^@Build fingerprint: 'Xiaomi/ginkgo/ginkgo:14/AP2A.240705.005/97:user/release-keys' ^@l(^@è^C·J^D·J<90>z§fcå³ ^GDEBUG^@Revision: '0' ^@l'^@è^C·J^D·J<90>z§fÏ^U´ ^GDEBUG^@ABI: 'arm64' ^@lH^@è^C·J^D·J<90>z§fÊC´ ^GDEBUG^@Timestamp: 2024-07-29 14:18:37.880514195+0300 ^@l2^@è^C·J^D·J<90>z§f¢u´ ^GDEBUG^@Process uptime: 151570s ^@l1^@è^C·J^D·J<90>z§f^Kì´ ^GDEBUG^@Cmdline: system_server ^@lY^@è^C·J^D·J<90>z§f<96>#µ ^GDEBUG^@pid: 3063, tid: 3225, name: InputReader >>> system_server <<< ^@l$^@è^C·J^D·J<90>z§fãXµ ^GDEBUG^@uid: 1000 ^@lV^@è^C·J^D·J<90>z§fY<97>µ ^GDEBUG^@signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr -------- ^@l96>^@è^C·J^D·J<90z§f§Ìµ ^GDEBUG^@Abort message: 'trackInputEvent: device 'trinket-idp-snd-card Headset Jack' received invalid EV_SW event code: 19 value: 1' ^@lu^@è^C·J^D·J<90>z§f%<¶ ^GDEBUG^@ x0 0000000000000000 x1 0000000000000c99 x2 0000000000000006 x3 0000007b3b4aeaf0 ^@lu^@è^C·J^D·J<90>z§fÎz¶ ^GDEBUG^@ x4 0000000000000000 x5 0000000000000000 x6 0000000000000000 x7 0000007b3b4ae928 ^@lu^@è^C·J^D·J<90>z§fLê¶ ^GDEBUG^@ x8 00000000000000f0 x9 0000007cc2ccdbd8 x10 0000000000000001 x11 0000007cc2d6c930 ^@lu^@è^C·J^D·J<90>z§f!'· ^GDEBUG^@ x12 0000007b57a72350 x13 0000007c016b3b80 x14 0000000000000000 x15 0000000000000000 ^@lu^@è^C·J^D·J<90>z§f^X`· ^GDEBUG^@ x16 0000007cc2ddc730 x17 0000007cc2dc0200 x18 0000007b3b238000 x19 00000000000000ac ^@lu^@è^C·J^D·J<90>z§f;<97>· ^GDEBUG^@ x20 00000000000000b2 x21 0000000000000bf7 x22 0000000000000c99 x23 00000000ffffffff ^@lu^@è^C·J^D·J<90>z§f<91>η ^GDEBUG^@ x24 ffffffffffffe800 x25 0000000000000048 x26 0000000000000002 x27 b400007c014e6880 ^@lI^@è^C·J^D·J<90>z§fP^F¸ ^GDEBUG^@ x28 0000007b3b4af278 x29 0000007b3b4aeb70 ^@lu^@è^C·J^D·J<90>z§fs=¸ ^GDEBUG^@ lr 0000007cc2d55d74 sp 0000007b3b4aead0 pc 0000007cc2d55da4 pst 0000000000000000 ^@l^@è^C·J^D·J<90>z§f<<8f>¸ ^GDEBUG^@12 total frames ^@l%^@è^C·J^D·J<90>z§f3¼¸ ^GDEBUG^@backtrace: ^@l ^@è^C·J^D·J<90>z§fêý¸ ^GDEBUG^@ #00 pc 00000000000b2da4 /apex/com.android.runtime/lib64/bionic/libc.so (abort+180) (BuildId: 05348914b7edf6304cc21cba8f428e36) ^@l²^@è^C·J^D·J<90>z§f+<¹ ^GDEBUG^@ #01 pc 00000000006aaa98 /apex/com.android.art/lib64/libart.so (art::Runtime::Abort(char const)+488) (BuildId: 60d31b2b112998bb90ce429fba0d5a62) ^@lñ^@è^C·J^D·J<90>z§f<83>^?¹ ^GDEBUG^@ #02 pc 0000000000017da0 /apex/com.android.art/lib64/libbase.so (android::base::SetAborter(std::1::function<void (char const)>&&)::$_0::__invoke(char const)+80) (BuildId: ed473aca9ea13ed822f3e509c3166a9c) ^@l98>^@è^C·J^D·J<90z§fɾ¹ ^GDEBUG^@ #03 pc 00000000000076c4 /system/lib64/liblog.so (__android_log_assert+292) (BuildId: 61522c0df3ef5f1d989088003c9efeaa) ^@lÊ^@è^C·J^D·J<90>z§f ý¹ ^GDEBUG^@ #04 pc 000000000006d664 /system/lib64/libinputreader.so (android::EventHub::Device::trackInputEvent(input_event const&)+356) (BuildId: b5ab297541d0e9edc8a1976744f10463) ^@l®^@è^C·J^D·J<90>z§f<89>=º ^GDEBUG^@ #05 pc 00000000000769c8 /system/lib64/libinputreader.so (android::EventHub::getEvents(int)+2088) (BuildId: b5ab297541d0e9edc8a1976744f10463) ^@l¬^@è^C·J^D·J<90>z§fCtº ^GDEBUG^@ #06 pc 0000000000095b38 /system/lib64/libinputreader.so (android::InputReader::loopOnce()+200) (BuildId: b5ab297541d0e9edc8a1976744f10463) ^@lÎ^@è^C·J^D·J<90>z§f.<96>» ^GDEBUG^@ #07 pc 000000000000b2b8 /system/lib64/libinputflinger_base.so (android::(anonymous namespace)::InputThreadImpl::threadLoop()+24) (BuildId: b581bc40f45890149e5a5f7be226d6a3) ^@l©^@è^C·J^D·J<90>z§f^Dë» ^GDEBUG^@ #08 pc 0000000000015740 /system/lib64/libutils.so (android::Thread::_threadLoop(void)+368) (BuildId: 369fd6561dda205367974da6a750f67d) ^@l¿^@è^C·J^D·J<90>z§f^E&¼ ^GDEBUG^@ #09 pc 00000000000ed60c /system/lib64/libandroid_runtime.so (android::AndroidRuntime::javaThreadShell(void)+140) (BuildId: f005548a4793865ce02cd5ed26b31e7e) ^@l±^@è^C·J^D·J<90>z§f0_¼ ^GDEBUG^@ #10 pc 00000000000c42b0 /apex/com.android.runtime/lib64/bionic/libc.so (pthread_start(void*)+208) (BuildId: 05348914b7edf6304cc21cba8f428e36) ^@l¨^@è^C·J^D·J<90>z§f¶<95>¼ ^GDEBUG^@ #11 pc 00000000000b5fa0 /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64) (BuildId: 05348914b7edf6304cc21cba8f428e36) ^@lL^@r(8!^@ÙH<90>z§f^½^A

gwolf2u commented 1 month ago

unfortunately this doesn't state the reason of crash logcat would be best

iozho commented 1 month ago

If not wrong here is the issue: message: 'trackInputEvent: device 'trinket-idp-snd-card Headset Jack' received invalid EV_SW event code: 19 value: 1'

You could see the code here https://github.com/crdroidandroid/android_frameworks_native/blob/51a1d00125a3a636e8284540486c3a36728f7522/services/inputflinger/reader/EventHub.cpp#L789

I did have earplugs in the phone but I do not think I have pushed any buttons. I did try all of the 3 buttons and they work properly (do not cause any crash).

gwolf2u commented 1 month ago

If not wrong here is the issue: message: 'trackInputEvent: device 'trinket-idp-snd-card Headset Jack' received invalid EV_SW event code: 19 value: 1'

You could see the code here https://github.com/crdroidandroid/android_frameworks_native/blob/51a1d00125a3a636e8284540486c3a36728f7522/services/inputflinger/reader/EventHub.cpp#L789

I did have earplugs in the phone but I do not think I have pushed any buttons. I did try all of the 3 buttons and they work properly (do not cause any crash).

that should not cause a crash

gwolf2u commented 2 weeks ago

can you sill provide full logcat? https://github.com/crdroidandroid/issue_tracker/issues/475#issuecomment-2256303466

synchronizing commented 5 days ago

@iozho Please make sure to use ``` when pasting logs & code into Github (see docs here). Myself and (I am sure) a lot of people were subscribed to this Github issue due to your reply on Jul 29.