Closed 1000283 closed 3 years ago
I see there's a whole section about this in the readme, the reason for me asking is that the previous version of this app works without black screen problems (and this repo's code changes remained in someone else's computer who is now gone).
This is a C+ program that uses this repo as a SDL 1.2 wrapper for Android 4.0 (or later as of now).
While looking into missing SDL events in the code I added . It's SDL_APPACTIVE
but won't compile because its value is 4, just like SDL_MOUSEMOTION
SDL_ACTIVEEVENT
, but the result is still a black screen.
I no longer know which version of the Branch sdl_android
branch I am using at the moment (at one point I tried modules and merging and forking and whatever it all became the same repo)SDL-1.2
from a few months ago is working, minus the black screen issue. I tried using the latest version commit c470f34 from june 10th of sdl_android
branch, but it causes a crash on startup.
2021-08-06 14:45:16.778 27247-27302/com.my.app W/com.my.app: 0xebadde09 skipped times: 0
--------- beginning of crash
2021-08-06 14:45:16.778 27247-27302/com.my.app A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x48 in tid 27302 (SDLVideoThread), pid 27247 (com.my.app)
2021-08-06 14:45:16.852 27309-27309/? E/crash_dump64: unknown process state: t
2021-08-06 14:45:16.885 27309-27309/? I/crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone
2021-08-06 14:45:16.887 3884-3884/? I//system/bin/tombstoned: received crash request for pid 27302
2021-08-06 14:45:16.888 27309-27309/? I/crash_dump64: performing dump of process 27247 (target tid = 27302)
2021-08-06 14:45:16.914 27309-27309/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2021-08-06 14:45:16.915 27309-27309/? A/DEBUG: Build fingerprint: 'samsung/a20eeea/a20e:10/QP1A.190711.020/A202FXXS3BUC1:user/release-keys'
2021-08-06 14:45:16.915 27309-27309/? A/DEBUG: Revision: '3'
2021-08-06 14:45:16.915 27309-27309/? A/DEBUG: ABI: 'arm64'
2021-08-06 14:45:16.917 27309-27309/? A/DEBUG: Timestamp: 2021-08-06 14:45:16+0100
2021-08-06 14:45:16.917 27309-27309/? A/DEBUG: pid: 27247, tid: 27302, name: SDLVideoThread >>> com.my.app <<<
2021-08-06 14:45:16.917 27309-27309/? A/DEBUG: uid: 10226
2021-08-06 14:45:16.917 27309-27309/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x48
2021-08-06 14:45:16.917 27309-27309/? A/DEBUG: Cause: null pointer dereference
2021-08-06 14:45:16.917 27309-27309/? A/DEBUG: x0 0000000000000000 x1 00000076a761e1e0 x2 0000000000000001 x3 000000000000006d
2021-08-06 14:45:16.917 27309-27309/? A/DEBUG: x4 0000000000000021 x5 4c4f505362696cff x6 0000000000000080 x7 8000000000000000
2021-08-06 14:45:16.918 27309-27309/? A/DEBUG: x8 0000000000000000 x9 0000000000000001 x10 00000076a785f670 x11 0101010101010101
2021-08-06 14:45:16.918 27309-27309/? A/DEBUG: x12 0101010101010101 x13 0000000000000003 x14 0000000000000000 x15 00000e16853ae86a
2021-08-06 14:45:16.918 27309-27309/? A/DEBUG: x16 00000076a782f978 x17 00000076a70aa7c0 x18 00000076b99f2000 x19 0000000000000000
2021-08-06 14:45:16.918 27309-27309/? A/DEBUG: x20 00000076a78664d8 x21 00000076a786666c x22 00000076a7860f78 x23 00000076a7862b58
2021-08-06 14:45:16.918 27309-27309/? A/DEBUG: x24 00000076a7863cb8 x25 00000076a784c9e0 x26 00000076a785f670 x27 00000076a7860d7b
2021-08-06 14:45:16.918 27309-27309/? A/DEBUG: x28 00000076a7860d69 x29 00000076cfdf9da0
2021-08-06 14:45:16.918 27309-27309/? A/DEBUG: sp 00000076cfdf6d30 lr 00000076a6f9dee8 pc 00000076a70aa7cc
2021-08-06 14:45:17.016 3730-3730/? E/audit: type=1400 audit(1628257517.013:12733): avc: denied { search } for pid=27309 comm="crash_dump64" name="files" dev="sdcardfs" ino=590544 scontext=u:r:crash_dump:s0:c226,c256,c512,c768 tcontext=u:object_r:sdcardfs:s0 tclass=dir permissive=0 SEPF_SM-A202F_10_0025 audit_filtered
2021-08-06 14:45:17.016 3730-3730/? E/audit: type=1300 audit(1628257517.013:12733): arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=7a2a00bee0 a2=80000 a3=0 items=0 ppid=1 pid=27309 auid=4294967295 uid=10226 gid=10226 euid=10226 suid=10226 fsuid=10226 egid=10226 sgid=10226 fsgid=10226 tty=(none) ses=4294967295 comm="crash_dump64" exe="/system/bin/crash_dump64" subj=u:r:crash_dump:s0:c226,c256,c512,c768 key=(null)
2021-08-06 14:45:17.016 3730-3730/? E/audit: type=1327 audit(1628257517.013:12733): proctitle=63726173685F64756D7036340032373330320032373330360031
2021-08-06 14:45:17.029 27309-27309/? A/DEBUG: backtrace:
2021-08-06 14:45:17.029 27309-27309/? A/DEBUG: #00 pc 00000000005187cc /data/app/com.my.app-KpjaEPrzwh68o419MxTs1Q==/lib/arm64/libapplication.so (SalesTerminal::GetCashDroID()+12) (BuildId: a71f87a81cfb9f0950c85f2d56ba0f93c9fd35eb)
2021-08-06 14:45:17.029 27309-27309/? A/DEBUG: #01 pc 000000000040bee4 /data/app/com.my.app-KpjaEPrzwh68o419MxTs1Q==/lib/arm64/libapplication.so (SDL_main+13088) (BuildId: a71f87a81cfb9f0950c85f2d56ba0f93c9fd35eb)
2021-08-06 14:45:17.029 27309-27309/? A/DEBUG: #02 pc 000000000000139c /data/app/com.my.app-KpjaEPrzwh68o419MxTs1Q==/lib/arm64/libsdl_main.so (Java_com_my_app_DemoRenderer_nativeInit+1476) (BuildId: 09b44de05b9bbc672bd171ec5af144b428dd75cd)
2021-08-06 14:45:17.029 27309-27309/? A/DEBUG: #03 pc 0000000000140350 /apex/com.android.runtime/lib64/libart.so (art_quick_generic_jni_trampoline+144) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.029 27309-27309/? A/DEBUG: #04 pc 0000000000137334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #05 pc 000000000014606c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+244) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #06 pc 00000000002e0b00 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #07 pc 00000000002dbde0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+912) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #08 pc 000000000059caf8 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+400) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #09 pc 0000000000131914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #10 pc 000000000013eeaa [anon:dalvik-classes.dex extracted in memory from /data/app/com.my.app-KpjaEPrzwh68o419MxTs1Q==/base.apk] (com.my.app.DemoRenderer.onDrawFrame+438)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #11 pc 000000000059aa68 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #12 pc 0000000000131814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #13 pc 0000000000141dc0 [anon:dalvik-classes.dex extracted in memory from /data/app/com.my.app-KpjaEPrzwh68o419MxTs1Q==/base.apk] (com.my.app.GLSurfaceView_SDL$GLThread.run+64)
2021-08-06 14:45:17.030 3730-3730/? E/audit: type=1400 audit(1628257517.029:12734): avc: denied { search } for pid=27309 comm="crash_dump64" name="files" dev="sdcardfs" ino=590544 scontext=u:r:crash_dump:s0:c226,c256,c512,c768 tcontext=u:object_r:sdcardfs:s0 tclass=dir permissive=0 SEPF_SM-A202F_10_0025 audit_filtered
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #14 pc 00000000002b174c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7142318256121416140+240) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #15 pc 000000000058bd60 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #16 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #17 pc 0000000000137334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #18 pc 000000000014606c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+244) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #19 pc 00000000004abd50 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #20 pc 00000000004acde4 /apex/com.android.runtime/lib64/libart.so (art::InvokeVirtualOrInterfaceWithJValues(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, jvalue const*)+416) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.030 27309-27309/? A/DEBUG: #21 pc 00000000004ed178 /apex/com.android.runtime/lib64/libart.so (art::Thread::CreateCallback(void*)+1176) (BuildId: 7b0658dc01b87bd6827d9d45c9d1cea4)
2021-08-06 14:45:17.031 27309-27309/? A/DEBUG: #22 pc 00000000000e28c0 /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+36) (BuildId: ecce0f8f6d05a6808531d834fd5e2b07)
2021-08-06 14:45:17.031 27309-27309/? A/DEBUG: #23 pc 000000000008503c /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64) (BuildId: ecce0f8f6d05a6808531d834fd5e2b07)
2021-08-06 14:45:17.591 3884-3884/? E//system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_09
I can't even see the stack trace all the way to my app and have no permissions to snatch toombstones.
Solved it with CompatibilityHacksForceScreenUpdate=y
.
Greetings,
Thank you for your work!
This is a somewhat known issue with SDL on Android and the title sums it up: I open the app, then click away from it (home screen, change to another app, whatever), then change back to my app and now all it shows is a black screen. I must kill and restart it.
Is this related to #24 ? From what I've been searching, it seems to be related with older versions of GLES.
The previous incarnation of this app does not display this behavior (and I don't have access to it). I intend to migrate to SDL2 but need this app to be stable first and supporting devices as far as KitKat.
This is my current configuration:
And this is my log: