Change theme
Help
Press space for more information.
Show links for this issue (Shortcut: i, l)
Copy issue ID
Previous Issue (Shortcut: k)
Next Issue (Shortcut: j)
Sign in to use full features.
Vote: I am impacted
Notification menu
Refresh (Shortcut: Shift+r)
Go home (Shortcut: u)
Pending code changes (auto-populated)
[ID: 558956]
View issue level access limits(Press Alt + Right arrow for more information)
Unintended behavior
View staffing
Description
Emulator Version (Emulator--> Extended Controls--> Emulator Version): 26.1.3-4205252
HAXM Version: 6.2.0
Android SDK Tools: 26.0.2
Host Operating System: Windows 10
CPU Manufacturer: Intel
Steps to Reproduce Bug:
1. Start the app.
2. Show an alert dialog.
Note: I can't reproduce this in a sample project. It only happens in our app, and I unfortunately can't share the code.
Expected Behavior: App displays dialog.
Observed Behavior: App crashes.
The crash seems to happen in WindowManagerImpl#addView (possibly WindowManagerGlobal#addView; I couldn't properly step through because the incorrect Android sources were apparently selected by Android Studio).
Here is part of the stack trace (PS: a way to copy/paste the entire trace instead instead of individual stack frames would be good!):
android::GraphicBufferMapper::registerBuffer(native_handle const*)
android::GraphicBuffer::unflatten(void const*&, unsigned int&, int const*&, unsigned int&)
android::Parcel::FlattenableHelper<android::GraphicBuffer>::unflatten(void const*, unsigned int, int const*, unsigned int)
android::Parcel::read(android::Parcel::FlattenableHelperInterface&) const
___lldb_unnamed_symbol1417$$libandroid_runtime.so
nReadGraphicBufferFromParcel
art_quick_invoke_static_stub
art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)
art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::DexFile::CodeItem const*, art::ShadowFrame*, art::JValue*)
bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)
bool art::interpreter::DoInvoke<(art::InvokeType)0, false, false>(art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)
art::JValue art::interpreter::ExecuteSwitchImpl<false, false>(art::Thread*, art::DexFile::CodeItem const*, art::ShadowFrame&, art::JValue, bool)
art::interpreter::Execute(art::Thread*, art::DexFile::CodeItem const*, art::ShadowFrame&, art::JValue, bool)
art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::DexFile::CodeItem const*, art::ShadowFrame*, art::JValue*)
bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)
bool art::interpreter::DoInvoke<(art::InvokeType)0, false, false>(art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)
art::JValue art::interpreter::ExecuteSwitchImpl<false, false>(art::Thread*, art::DexFile::CodeItem const*, art::ShadowFrame&, art::JValue, bool)
art::interpreter::Execute(art::Thread*, art::DexFile::CodeItem const*, art::ShadowFrame&, art::JValue, bool)
art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::DexFile::CodeItem const*, art::ShadowFrame*, art::JValue*)
bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)
bool art::interpreter::DoInvoke<(art::InvokeType)2, false, false>(art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)
art::JValue art::interpreter::ExecuteSwitchImpl<false, false>(art::Thread*, art::DexFile::CodeItem const*, art::ShadowFrame&, art::JValue, bool)art::interpreter::Execute(art::Thread*, art::DexFile::CodeItem const*, art::ShadowFrame&, art::JValue, bool)
art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::DexFile::CodeItem const*, art::ShadowFrame*, art::JValue*)
bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)
bool art::interpreter::DoInvoke<(art::InvokeType)4, false, false>(art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)
art::JValue art::interpreter::ExecuteSwitchImpl<false, false>(art::Thread*, art::DexFile::CodeItem const*, art::ShadowFrame&, art::JValue, bool)
art::interpreter::Execute(art::Thread*, art::DexFile::CodeItem const*, art::ShadowFrame&, art::JValue, bool)
art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::DexFile::CodeItem const*, art::ShadowFrame*, art::JValue*)
...
Issuing any command to lldb (latest 3.0) once it hit the exception crashed the debugger, so I can't get more info that way.
Here's the crash dump printed to logcat:
08-11 09:55:08.219 3740-3740/? A/libc: Fatal signal 11 (SIGSEGV), code 1, fault addr 0x80 in tid 3740
[ 08-11 09:55:08.219 1289: 1289 W/ ]
debuggerd: handling request: pid=3740 uid=10086 gid=10086 tid=3740
08-11 09:55:08.275 4133-4133/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
08-11 09:55:08.275 4133-4133/? A/DEBUG: Build fingerprint: 'google/sdk_google_phone_x86/generic_x86:7.0/NYC/4088244:userdebug/dev-keys'
08-11 09:55:08.275 4133-4133/? A/DEBUG: Revision: '0'
08-11 09:55:08.275 4133-4133/? A/DEBUG: ABI: 'x86'
08-11 09:55:08.275 4133-4133/? A/DEBUG: pid: 3740, tid: 3740, name: >>> <<<
08-11 09:55:08.275 4133-4133/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x80
08-11 09:55:08.276 4133-4133/? A/DEBUG: Abort message: 'SANDBOX: Adjust is running in Sandbox mode. Use this setting for testing. Don't forget to set the environment to `production` before publishing!'
08-11 09:55:08.276 4133-4133/? A/DEBUG: eax 00000000 ebx af3eee14 ecx a152e0c0 edx a152e020
08-11 09:55:08.276 4133-4133/? A/DEBUG: esi 895ea110 edi af5db030
08-11 09:55:08.276 4133-4133/? A/DEBUG: xcs 00000073 xds 0000007b xes 0000007b xfs 0000003b xss 0000007b
08-11 09:55:08.276 4133-4133/? A/DEBUG: eip af3e68ac ebp bfc86788 esp bfc86740 flags 00010246
08-11 09:55:08.512 4133-4133/? A/DEBUG: backtrace:
08-11 09:55:08.512 4133-4133/? A/DEBUG: #00 pc 000088ac /system/lib/libui.so (_ZN7android19GraphicBufferMapper14registerBufferEPK13native_handle+76)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #01 pc 0000780b /system/lib/libui.so (_ZN7android13GraphicBuffer9unflattenERPKvRjRPKiS4_+555)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #02 pc 000b4f7f /system/lib/libandroid_runtime.so (_ZN7android6Parcel17FlattenableHelperINS_13GraphicBufferEE9unflattenEPKvjPKij+61)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #03 pc 00059041 /system/lib/libbinder.so (_ZNK7android6Parcel4readERNS0_26FlattenableHelperInterfaceE+561)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #04 pc 000b4ed5 /system/lib/libandroid_runtime.so
08-11 09:55:08.512 4133-4133/? A/DEBUG: #05 pc 01fac556 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.view.GraphicBuffer.nReadGraphicBufferFromParcel+130)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #06 pc 01fabf42 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.view.GraphicBuffer.-wrap0+46)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #07 pc 01fabd03 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.view.GraphicBuffer$1.createFromParcel+127)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #08 pc 01fabe10 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.view.GraphicBuffer$1.createFromParcel+44)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #09 pc 01fafa55 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.view.IAssetAtlas$Stub$Proxy.getBuffer+257)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #10 pc 02022dcb /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.view.ThreadedRenderer$ProcessInitializer.initAssetAtlas+199)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #11 pc 02023137 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.view.ThreadedRenderer$ProcessInitializer.init+115)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #12 pc 020234ed /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.view.ThreadedRenderer.<init>+553)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #13 pc 0202363b /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.view.ThreadedRenderer.create+119)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #14 pc 02046c36 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.view.ViewRootImpl.enableHardwareAcceleration+418)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #15 pc 02055960 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.view.ViewRootImpl.setView+908)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #16 pc 02066144 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.view.WindowManagerGlobal.addView+1584)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #17 pc 02068f76 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.view.WindowManagerImpl.addView+114)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #18 pc 015f3275 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.app.Dialog.show+481)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #19 pc 015f006d /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.app.AlertDialog$Builder.show+57)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #20 pc 001083e2 /system/lib/libart.so (art_quick_invoke_stub+338)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #21 pc 00111f1d /system/lib/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+237)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #22 pc 00319a16 /system/lib/libart.so (_ZN3art11interpreter34ArtInterpreterToCompiledCodeBridgeEPNS_6ThreadEPNS_9ArtMethodEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+294)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #23 pc 003118b7 /system/lib/libart.so (_ZN3art11interpreter6DoCallILb0ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+615)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #24 pc 006796c7 /system/lib/libart.so (MterpInvokeVirtualQuick+535)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #25 pc 000fe421 /system/lib/libart.so (artMterpAsmInstructionStart+29857)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #26 pc 002e3578 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+488)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #27 pc 002eadc0 /system/lib/libart.so (_ZN3art11interpreter33ArtInterpreterToInterpreterBridgeEPNS_6ThreadEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+192)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #28 pc 0031189b /system/lib/libart.so (_ZN3art11interpreter6DoCallILb0ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+587)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #29 pc 006796c7 /system/lib/libart.so (MterpInvokeVirtualQuick+535)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #30 pc 000fe421 /system/lib/libart.so (artMterpAsmInstructionStart+29857)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #31 pc 002e3578 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+488)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #32 pc 002eacd0 /system/lib/libart.so (_ZN3art11interpreter30EnterInterpreterFromEntryPointEPNS_6ThreadEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameE+176)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #33 pc 006678f9 /system/lib/libart.so (artQuickToInterpreterBridge+1049)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #34 pc 0010e51d /system/lib/libart.so (art_quick_to_interpreter_bridge+77)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #35 pc 0166bd32 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.app.Instrumentation.callActivityOnStart+46)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #36 pc 01553337 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.app.Activity.performStart+131)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #37 pc 015ddbb7 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.app.ActivityThread.performLaunchActivity+2387)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #38 pc 015d77d5 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.app.ActivityThread.handleLaunchActivity+193)
08-11 09:55:08.512 4133-4133/? A/DEBUG: #39 pc 015ccc63 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.app.ActivityThread.-wrap12+63)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #40 pc 015ca330 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.app.ActivityThread$H.handleMessage+6844)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #41 pc 015c6d10 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.os.Handler.dispatchMessage+140)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #42 pc 01cc7e84 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.os.Looper.loop+736)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #43 pc 015dc1f5 /system/framework/x86/boot-framework.oat (offset 0x1538000) (android.app.ActivityThread.main+401)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #44 pc 001085b2 /system/lib/libart.so (art_quick_invoke_static_stub+418)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #45 pc 00111f69 /system/lib/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+313)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #46 pc 0050b6a5 /system/lib/libart.so (_ZN3artL18InvokeWithArgArrayERKNS_33ScopedObjectAccessAlreadyRunnableEPNS_9ArtMethodEPNS_8ArgArrayEPNS_6JValueEPKc+101)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #47 pc 0050d5e4 /system/lib/libart.so (_ZN3art12InvokeMethodERKNS_33ScopedObjectAccessAlreadyRunnableEP8_jobjectS4_S4_j+1540)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #48 pc 00465190 /system/lib/libart.so (_ZN3artL13Method_invokeEP7_JNIEnvP8_jobjectS3_S3_+96)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #49 pc 00635cbc /system/framework/x86/boot.oat (offset 0x573000) (java.lang.reflect.Method.invoke+168)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #50 pc 02304550 /system/framework/x86/boot-framework.oat (offset 0x1538000) (com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run+124)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #51 pc 0230559e /system/framework/x86/boot-framework.oat (offset 0x1538000) (com.android.internal.os.ZygoteInit.main+1274)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #52 pc 001085b2 /system/lib/libart.so (art_quick_invoke_static_stub+418)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #53 pc 00111f69 /system/lib/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+313)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #54 pc 0050b6a5 /system/lib/libart.so (_ZN3artL18InvokeWithArgArrayERKNS_33ScopedObjectAccessAlreadyRunnableEPNS_9ArtMethodEPNS_8ArgArrayEPNS_6JValueEPKc+101)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #55 pc 0050b369 /system/lib/libart.so (_ZN3art17InvokeWithVarArgsERKNS_33ScopedObjectAccessAlreadyRunnableEP8_jobjectP10_jmethodIDPc+393)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #56 pc 003f415e /system/lib/libart.so (_ZN3art3JNI21CallStaticVoidMethodVEP7_JNIEnvP7_jclassP10_jmethodIDPc+958)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #57 pc 00140791 /system/lib/libart.so (_ZN3art8CheckJNI11CallMethodVEPKcP7_JNIEnvP8_jobjectP7_jclassP10_jmethodIDPcNS_9Primitive4TypeENS_10InvokeTypeE+4513)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #58 pc 00131f4c /system/lib/libart.so (_ZN3art8CheckJNI21CallStaticVoidMethodVEP7_JNIEnvP7_jclassP10_jmethodIDPc+108)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #59 pc 0006f751 /system/lib/libandroid_runtime.so (_ZN7_JNIEnv20CallStaticVoidMethodEP7_jclassP10_jmethodIDz+41)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #60 pc 0007300e /system/lib/libandroid_runtime.so (_ZN7android14AndroidRuntime5startEPKcRKNS_6VectorINS_7String8EEEb+782)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #61 pc 00001b55 /system/bin/app_process32
08-11 09:55:08.513 4133-4133/? A/DEBUG: #62 pc 000152fc /system/lib/libc.so (__libc_init+108)
08-11 09:55:08.513 4133-4133/? A/DEBUG: #63 pc 0000144c /system/bin/app_process32