Status Update
Comments
mc...@ebay.com <mc...@ebay.com> #2
* GC ROOT android.support.v4.media.session.MediaSessionCompat$MediaSessionImplApi21$ExtraSession.this$0
* references android.support.v4.media.session.MediaSessionCompat$MediaSessionImplApi21.mSessionObj
* references android.media.session.MediaSession.mController
* references android.media.session.MediaController.mContext
* leaks com.bubenheimer.rucksack.d.q instance
cm...@google.com <cm...@google.com> #3
mc...@ebay.com <mc...@ebay.com> #4
cm...@google.com <cm...@google.com> #5
Can you please confirm whether this is still reproducible on API 33?
And if you happen to have access, also on the Developer Preview of API 34?
cm...@google.com <cm...@google.com> #6
mc...@ebay.com <mc...@ebay.com> #7
Final thing, is this a dup of
xa...@google.com <xa...@google.com> #8
Thanks, I believe it's a dup at this point.
The other issue was marked as fixed a year ago, but is still as reproducible as ever, I had just tested it on API 33 and UpsideDownCake DP2.
mc...@ebay.com <mc...@ebay.com> #9
I suppose I cannot say for sure that the two issues have the same root cause, there may be more than one cause for MediaBrowserService(Compat) leaks.
I just tested this issue here once more on my production app, on API 33 (emulator), and got a leak trace (with current LeakCanary) that closely resembles the original one I posted years ago. I let the app sit idle for another half hour, occasionally forcing a garbage collection via Android Studio Profiler, but my destroyed MediaBrowserServiceCompat (CW) instance just would not release. (I validated non-release by logging from finalize()
method, which looks very reliable.)
====================================
HEAP ANALYSIS RESULT
====================================
1 APPLICATION LEAKS
References underlined with "~~~" are likely causes.
Learn more at https://squ.re/leaks.
Signature: 881c4404fc048402f456764f134ed07390863849
┬───
│ GC Root: Global variable in native code
│
├─ android.os.Handler$MessengerImpl instance
│ Leaking: UNKNOWN
│ ↓ Handler$MessengerImpl.this$0
│ ~~~~~~
├─ androidx.media.MediaBrowserServiceCompat$ServiceHandler instance
│ Leaking: UNKNOWN
│ this$0 instance of com.bubenheimer.rucksack.d.CW
│ ↓ MediaBrowserServiceCompat$ServiceHandler.this$0
│ ~~~~~~
╰→ com.bubenheimer.rucksack.d.CW instance
Leaking: YES (ObjectWatcher was watching this because com.bubenheimer.rucksack.d.CW received Service#onDestroy()
callback and Service not held by ActivityThread)
key = 0cda35fa-fa79-4035-89ca-6ab496bd1ddc
watchDurationMillis = 5400
retainedDurationMillis = 392
mApplication instance of com.bubenheimer.rucksack.d.D
mBase instance of android.app.ContextImpl
====================================
0 LIBRARY LEAKS
A Library Leak is a leak caused by a known bug in 3rd party code that you do not have control over.
See https://square.github.io/leakcanary/fundamentals-how-leakcanary-works/#4-categorizing-leaks
====================================
0 UNREACHABLE OBJECTS
An unreachable object is still in memory but LeakCanary could not find a strong reference path
from GC roots.
====================================
METADATA
Please include this in bug reports and Stack Overflow questions.
Build.VERSION.SDK_INT: 33
Build.MANUFACTURER: Google
LeakCanary version: 2.10
App process name: com.bubenheimer.rucksack
Class count: 28324
Instance count: 179717
Primitive array count: 132390
Object array count: 25025
Thread count: 39
Heap total bytes: 27055417
Bitmap count: 0
Bitmap total bytes: 0
Large bitmap count: 0
Large bitmap total bytes: 0
Db 1: open /data/user/0/com.bubenheimer.rucksack/databases/com.google.android.datatransport.events
Db 2: open /data/user/0/com.bubenheimer.rucksack/databases/rucksack-5031356898991293088.db
Stats: LruCache[maxSize=3000,hits=32348,misses=41728,hitRate=43%]
RandomAccess[bytes=1991236,reads=41728,travel=35597905162,range=32212305,size=40115227]
Heap dump reason: 1 retained objects, app is visible
Analysis duration: 16991 ms
Heap dump file path: /storage/emulated/0/Download/leakcanary-com.bubenheimer.rucksack/2023-04-25_11-53-35_598.hprof
Heap dump timestamp: 1682438042701
Heap dump duration: 4546 ms
====================================
mc...@ebay.com <mc...@ebay.com> #10
I ended up letting the app sit idle for an hour, but the service still would not finalize.
mc...@ebay.com <mc...@ebay.com> #11
I also tried this, but still no finalization:
adb shell am send-trim-memory com.bubenheimer.rucksack:appexternal RUNNING_CRITICAL
xa...@google.com <xa...@google.com> #12
I've dug into this further, and identified a leak in AndroidX code that I was using (
Eliminating this leak lets the MediaBrowserService(Compat) call its finalizer eventually. I assume that the leak-related fixes in API 33 are also essential for reaching this stage.
However, there is still some unidentified holdup between onDestroy() and finalize() in my production app triggering various LeakCanary traces, before finalization after about 30 seconds. (LeakCanary triggers garbage collections, but those do not force finalization in this case.)
I assume the holdup is related to more general problems with service/binder/messenger cleanup. It's an issue, because it makes it very difficult to spot more real problems.
Can anything be done to eliminate these delays?
I am attaching the various leak traces I got from excluding each, one at a time (this is how I eventually found the AndroidX leak).
mc...@ebay.com <mc...@ebay.com> #13
I think the issue can be closed, I am no longer able to reproduce the delayed finalization issue, and I am hoping to switch to media3 MediaSessionService anyway. I have not tried the minimal repro again, though. Ultimately I think the API 33 fixes took care of what was broken here, in addition to avoiding the referenced AndroidX leak.
Thank you for your effort to reopen this.
je...@google.com <je...@google.com>
mc...@ebay.com <mc...@ebay.com> #14
PY Ricau, the guy behind LeakCanary, suggested that there is more to this, and that there are several actual leaks here. I will update this issue with more info as soon as I find some time, I'm in a bit of a crunch right now.
je...@google.com <je...@google.com> #15
The 3 LeakCanary leak reports that I attached above point at 2 distinct leaks that are still real, according to PY's analysis from the Github issue here:
Can these leaks be addressed, please?
MediaBrowserServiceCompat$ServiceHandler is an inner class of MediaBrowserServiceCompat (super class of CW) and it's there so that your service can respond to IPC callbacks. It extends Handler and is passed to a Messenger instance created by MediaBrowserServiceCompat in onCreate(), and that Messenger essentially pulls a Binder out of the Handler and passes that binder back to anything calling your service. In other words, every time something binds to your service, the thing that binds to your service is getting an indirect reference to the ServiceHandler which allows it to post messages to that handler which the service will eventually process. However, for this to work, the native framework code keeps a strong native reference locally to the binder until the calling service finalizes the ownership of the binder on its side.
This is actually a common leak pattern in the Android framework: binders are held until the other side runs garbage collection and finalizes the binder on its end, no matter what we're doing with service lifecycle (that's because binders are used beyond services, the only way to be certain the other side won't call is when it doesn't have that pointer). The proper way to handler this is for the service code to finish its handler in onDestroy, or set the reference from the handler to the service to null in onDestroy.
The first and second leak traces are identical, the problem is that MediaBrowserServiceCompat$ServiceHandler has several direct and indirect references to the service.
The last leak is the exact same issue elsewhere, ExtraSession is a stub that won't be GCed until the other side has run its own GC
https://github.com/aosp-mirror/platform_frameworks_support/blob/a9ac247af2afd4115c3eb6d16c05bc92737d6305/media/src/main/java/android/support/v4/media/session/MediaSessionCompat.java#L3413
So these 2 leaks are binder related leaks, and the leaks stay in place until a GC runs in the calling process, and you have no control over that. They really should be fixed.
je...@google.com <je...@google.com> #16
I've not been able to reproduce the leak on a device running Android 14 (UDC / API 34).
For unimportant reasons I had to build my own toy app from scratch (using
al...@google.com <al...@google.com>
je...@google.com <je...@google.com> #17
In conclusion, I was able to reproduce on S (Android 12), but unable to reproduce the issue on T (Android 13) or U (Android 14). I'm attaching the project I used for testing in case you find anything wrong.
Can you use that project to reproduce the issue? If yes, we need to figure out what we are doing differently. Also please kindly include a bugreport (running adb bugreport
shortly after the leak is detected) if you are able to repro.
Please assign back to me once you've replied (if you are not able to, ignore).
xa...@google.com <xa...@google.com> #18
I've beefed up your example to make it repro the leaks that I attached in #12. I'll attach the updated example. The relevant changes were:
- Run service & receiver in separate process from Activity.
- Customize LeakCanary to support multiple processes.
- Add some additional media-related code to trigger a leak.
Even when not running the service in a separate process there is a leak in the Activity. I'll attach that one, too. May be a similar root cause. I have not investigated this one.
I am attaching the bugreport, too. I took it right after LeakCanary GC'ed and detected a leak. (About 5 seconds after onDestroy().) But it looks easy to reproduce now.
xa...@google.com <xa...@google.com> #19
(I did the repro on API 33)
ag...@gmail.com <ag...@gmail.com> #20
Also, I don't think non-Googlers are able to reassign an issue, so please take it from here.
ww...@gmail.com <ww...@gmail.com> #21
Thanks. Will provide an update in the next few days.
xa...@google.com <xa...@google.com> #22
Correct me if I'm wrong but the only issue we are aware that still exists is in MediaBrowserServiceCompat, right? (not in the platform MediaBrowserService)
I've sent
Once merged, you should just need to update your androidx.media dependency to pick up the fix.
mc...@ebay.com <mc...@ebay.com> #23
Thanks for the fix.
I'd think that MediaSessionCompat needs a similar fix, based on the leak traces (MediaBrowserServiceCompatLeak4.txt & MediaBrowserActivityLeak.txt) and PY's comments. You can repro MediaBrowserActivityLeak.txt by running the service in the same process as the Activity.
I'll ping PY about possibly chiming in on the code review.
op...@gmail.com <op...@gmail.com> #24
The change has now been merged. I'll now look into the media session compat issue, which seems to persist.
dr...@gmail.com <dr...@gmail.com> #25
Sorry for the late review. Not sure if you get notifications there, I left a comment:
TL;DR is that using weak refs isn't ideal, you could stick to a strong ref set to null from Service.onDestroy()
dr...@gmail.com <dr...@gmail.com> #26
Ack. Will implement the proposed fix.
he...@amazon.com <he...@amazon.com> #27
Есть ли утечка информации?
je...@google.com <je...@google.com> #28
Есть ли утечка информации?
According to translate: Is there any information leak?
No. This is a resources leak, no security issues here.
he...@amazon.com <he...@amazon.com> #29
Another fix for MediaSessionCompat...ExtraSession here:
Only one pending fix after this change is MediaSessionCompat...MediaSessionStub, after which I plan to mark this as fixed. Still, people should migrate to media3, but at least you can upgrade your MediaSessionCompat dep to get a quick fix of the leaks. Feel free to leave any comments here or in the patch.
xa...@google.com <xa...@google.com> #30
If there are more leaks to fix in androidx, please kindly file a fresh issue.
he...@amazon.com <he...@amazon.com> #31
The following release(s) address this bug.It is possible this bug has only been partially addressed:
androidx.media:media:1.7.0-beta01
je...@google.com <je...@google.com> #32
Hi im wondering if the leak happening in this issue on media3's issue tracker
is related to this.
By taking UAMP and having the MusicServiceConnection
be a Dagger @Singleton
, the MusicService
is leaked with a very similar stack trace that is exposed here, which contains only stacktraces from androidx.media
(until the MusicService
, that is):
====================================
HEAP ANALYSIS RESULT
====================================
1 APPLICATION LEAKS
References underlined with "~~~" are likely causes.
Learn more at https://squ.re/leaks.
43381 bytes retained by leaking objects
Signature: 80f093d135adc2b278b02ca2f66fbd46aaa36bea
┬───
│ GC Root: Global variable in native code
│
├─ android.support.v4.media.session.MediaSessionCompat$MediaSessionImplApi21$ExtraSession instance
│ Leaking: UNKNOWN
│ Retaining 6,7 MB in 1826 objects
│ ↓ MediaSessionCompat$MediaSessionImplApi21$ExtraSession.this$0
│ ~~~~~~
├─ android.support.v4.media.session.MediaSessionCompat$MediaSessionImplApi29 instance
│ Leaking: UNKNOWN
│ Retaining 6,7 MB in 1825 objects
│ ↓ MediaSessionCompat$MediaSessionImplApi21.mSessionFwk
│ ~~~~~~~~~~~
├─ android.media.session.MediaSession instance
│ Leaking: UNKNOWN
│ Retaining 1,8 kB in 12 objects
│ mContext instance of com.example.android.uamp.media.MusicService
│ ↓ MediaSession.mContext
│ ~~~~~~~~
╰→ com.example.android.uamp.media.MusicService instance
Leaking: YES (ObjectWatcher was watching this because com.example.android.uamp.media.MusicService received
Service#onDestroy() callback and Service not held by ActivityThread)
Retaining 43,4 kB in 896 objects
key = 11c50fab-5b0c-4267-8c51-ad235a51d861
watchDurationMillis = 5391
retainedDurationMillis = 390
mApplication instance of com.example.android.uamp.UampApplication
mBase instance of android.app.ContextImpl
====================================
`
I really dont see how using @Singleton
is any different from the default:
companion object {
// For Singleton instantiation.
@Volatile
private var instance: MusicServiceConnection? = null
fun getInstance(context: Context, serviceComponent: ComponentName) =
instance ?: synchronized(this) {
instance ?: MusicServiceConnection(context, serviceComponent)
.also { instance = it }
}
}
The issue can be reproduced on this branch of my fork of UAMP:
Which uses Dagger Hilt and removes Cast for simplification.
To reproduce:
- Open UAMP
- Play something
- Swipe the app away in the task manager
- Music Service is leaked.
From this point restarting UAMP also reveals the issue because nothing is loaded as there will be two MusicService instances.
he...@amazon.com <he...@amazon.com> #33
Also note that the example uses media 1.7.0 so fixes above should be included already.
je...@google.com <je...@google.com> #34
@ke...@gmail.com might be an issue with MediaSessionCompat, but we'll need a fresh ticket to look into this.
he...@amazon.com <he...@amazon.com> #35
Should I create that one then?
da...@gmail.com <da...@gmail.com> #36
Hi,
I wrote a plugin that generates a wrapper around string resources, so I had a mockable class while still being able to use string resources in viewModels etc.
The way I did this before was to add a dependency on the process<...>Resources task, find the R.jar file, unzip and use a class visitor to extract the string/plural names. Then use codegen to create the wrapper with this data. Then I had to add my task as a dependency on compile<...>Kotlin.
It's taken me a while to get to grips with the new system, just trying to slot my task to run at the correct time, but I've ended up with something like the following:
project.plugins.withType(AppPlugin::class.java) {
val androidComponents = project.extensions.getByType(AndroidComponentsExtension::class.java)
androidComponents.onVariants { variant ->
variant.sources.java?.let { sources ->
val generateStringsTask = project.tasks.register(
"generate${variant.name}Strings",
GenerateVariantStringsTask::class.java,
) {
it.variantPackageName.set(variant.namespace)
it.outputDir.set(project.layout.buildDirectory.dir("generated/source/stringrepository/${variant.name}"))
}
variant.artifacts
.use(generateStringsTask)
.wiredWith(GenerateVariantStringsTask::symbolsFile)
.toListenTo(SingleArtifact.RUNTIME_SYMBOL_LIST)
sources.addGeneratedSourceDirectory(
generateStringsTask,
GenerateVariantStringsTask::outputDir
)
}
}
}
I'll admit, this new way is a hell of a lot easier to get the data I need, The problem is that the amount of exposed artifacts is pretty limited (at least compared to what I've seen for InternalArtifactType).
RUNTIME_SYMBOL_LIST includes transitive dependencies, breaking my generated code as the module's R class can no longer 'see' those transitive resources (with the default APG 8+ non transitive R class setting).
Ideally having a non-transitive version of that artifact (to the local_only_symbol_list file?) would be perfect, but considering my confusing on picking up these new APIs there's a good chance i'm wrong on approach for this.
Any guidance would be very much appreciated.
Thanks
je...@google.com <je...@google.com> #37
#36, I filed
mu...@gmail.com <mu...@gmail.com> #38
Thank you for the great work you do keep it up please.
mu...@gmail.com <mu...@gmail.com> #39
dr...@gmail.com <dr...@gmail.com> #40
dr...@gmail.com <dr...@gmail.com> #41
Specifically, only two types of APIs need to be encapsulated. If the plugin needs to scan all classes, the first read-only API will pass the ByteArray of each class of the previous Transform run result before the transform. The second API will pass the ByteArray of the previous plugin run result during the transform, and the plugin will tell the framework whether the class has been modified. Even if the class has actually been modified, if the plugin returns that it has not been modified, the modification should be discarded. Of course, when actually writing the plugin code, you also need to register some additional API callbacks, such as before class scanning, after class scanning, before transform, and after transform. They only pass the ByteArray of the class without the plugin developer having to consider how to read in and write out the jar file. Scan-related APIs are all read-only. The API calls in the scan phase and the transform phase are parallel, but the transform phase cannot start until the scan phase ends. It is only necessary to ensure that the calls are made in the registration order of the plug-ins on the same class. Such API design can provide AGP plug-in developers with a familiar plug-in development experience and cover most of the Transform advanced use cases.
Description
As part of the Android Gradle plugin team's plan to help developers more easily upgrade to newer versions of the Android Gradle plugin, we need to migrate plugins and build scripts off using internal implementation details of the plugin. See the Gradle plugin roadmap for more details about our planned timeline.
This issue aims to capture use cases that are not currently supported by the APIs of the Android Gradle Plugin.
If you have a use case for extending your Android app or library build that is not covered by the APIs that are available in the com.android.tools.build:gradle-api maven artifact, such as directly reading or modifying the tasks registered by the Android Gradle plugin, please comment here, explaining what you're trying to achieve.
For example, explaining "I have a custom static analysis tool to run locally and on CI that that needs all the shrinking configuration, and the final APK as an input, and at the moment I'm maintaining a custom task that consumes these intermediate files as inputs" is more helpful than just stating the intermediate files without the bigger picture about what you want to use them for.
Even if your use case is similar, but not identical, to one already posted, please include it here, to make sure we're aware of your specific use case.
We're planning to remove the old APIs in Android Gradle plugin 9.0 (Mid 2023), and we want to minimise the disruption caused by that as much as we can.
Thanks for your help in improving the build experience for all developers!