Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fails to call numpy fft on android #899

Closed
llamawright opened this issue May 17, 2019 · 5 comments
Closed

Fails to call numpy fft on android #899

llamawright opened this issue May 17, 2019 · 5 comments

Comments

@llamawright
Copy link

Versions

  • Python: 3.7.1
  • OS: Android 8.1.0
  • Buildozer: 0.39

Description

I am trying to use the numpy fft for real input in an android app. But when I use it I get SIGSEGV everytime. The simple program below illustrates the problem. Thanks.

import numpy as np
import platform

print("platform.python_version() == ", platform.python_version())
print("np.version == ", np.version )

data = np.array([0.1, 0.2, 0.5, 0.5, 0.6, 0.1, 0.9, 0.8])
print(" Now crazy starts: ")
result = np.fft.rfft(data)

print(" Result: ", result, " Finished!")

buildozer.spec

Command:

buildozer android debug

Spec file:

[app]

# (str) Title of your application
title = Test App

# (str) Package name
package.name = myapp

# (str) Package domain (needed for android/ios packaging)
package.domain = org.test

# (str) Source code where the main.py live
source.dir = .

# (list) Source files to include (let empty to include all the files)
source.include_exts = py,png,jpg,kv,atlas

# (list) List of inclusions using pattern matching
#source.include_patterns = assets/*,images/*.png

# (list) Source files to exclude (let empty to not exclude anything)
#source.exclude_exts = spec

# (list) List of directory to exclude (let empty to not exclude anything)
#source.exclude_dirs = tests, bin

# (list) List of exclusions using pattern matching
#source.exclude_patterns = license,images/*/*.jpg

# (str) Application versioning (method 1)
version = 0.1

# (str) Application versioning (method 2)
# version.regex = __version__ = ['"](.*)['"]
# version.filename = %(source.dir)s/main.py

# (list) Application requirements
# comma separated e.g. requirements = sqlite3,kivy
requirements = python3,kivy,numpy

# (str) Custom source folders for requirements
# Sets custom source for any requirements with recipes
# requirements.source.kivy = ../../kivy

# (list) Garden requirements
#garden_requirements =

# (str) Presplash of the application
#presplash.filename = %(source.dir)s/data/presplash.png

# (str) Icon of the application
#icon.filename = %(source.dir)s/data/icon.png

# (str) Supported orientation (one of landscape, sensorLandscape, portrait or all)
orientation = portrait

# (list) List of service to declare
#services = NAME:ENTRYPOINT_TO_PY,NAME2:ENTRYPOINT2_TO_PY

#
# OSX Specific
#

#
# author = © Copyright Info

# change the major version of python used by the app
osx.python_version = 3

# Kivy version to use
osx.kivy_version = 1.10.1

#
# Android specific
#

# (bool) Indicate if the application should be fullscreen or not
fullscreen = 0

# (string) Presplash background color (for new android toolchain)
# Supported formats are: #RRGGBB #AARRGGBB or one of the following names:
# red, blue, green, black, white, gray, cyan, magenta, yellow, lightgray,
# darkgray, grey, lightgrey, darkgrey, aqua, fuchsia, lime, maroon, navy,
# olive, purple, silver, teal.
#android.presplash_color = #FFFFFF

# (list) Permissions
#android.permissions = INTERNET
android.permissions = RECORD_AUDIO

# (int) Target Android API, should be as high as possible.
android.api = 27

# (int) Minimum API your APK will support.
android.minapi = 26

# (int) Android SDK version to use
#android.sdk = 20

# (str) Android NDK version to use
#android.ndk = 17c

# (int) Android NDK API to use. This is the minimum API your app will support, it should usually match android.minapi.
android.ndk_api = 26

# (bool) Use --private data storage (True) or --dir public storage (False)
#android.private_storage = True

# (str) Android NDK directory (if empty, it will be automatically downloaded.)
#android.ndk_path =

# (str) Android SDK directory (if empty, it will be automatically downloaded.)
#android.sdk_path =

# (str) ANT directory (if empty, it will be automatically downloaded.)
#android.ant_path =

# (bool) If True, then skip trying to update the Android sdk
# This can be useful to avoid excess Internet downloads or save time
# when an update is due and you just want to test/build your package
# android.skip_update = False

# (bool) If True, then automatically accept SDK license
# agreements. This is intended for automation only. If set to False,
# the default, you will be shown the license when first running
# buildozer.
# android.accept_sdk_license = False

# (str) Android entry point, default is ok for Kivy-based app
#android.entrypoint = org.renpy.android.PythonActivity

# (list) Pattern to whitelist for the whole project
#android.whitelist =

# (str) Path to a custom whitelist file
#android.whitelist_src =

# (str) Path to a custom blacklist file
#android.blacklist_src =

# (list) List of Java .jar files to add to the libs so that pyjnius can access
# their classes. Don't add jars that you do not need, since extra jars can slow
# down the build process. Allows wildcards matching, for example:
# OUYA-ODK/libs/*.jar
#android.add_jars = foo.jar,bar.jar,path/to/more/*.jar

# (list) List of Java files to add to the android project (can be java or a
# directory containing the files)
android.add_src = %(source.dir)s/java_classes

# (list) Android AAR archives to add (currently works only with sdl2_gradle
# bootstrap)
#android.add_aars =

# (list) Gradle dependencies to add (currently works only with sdl2_gradle
# bootstrap)
#android.gradle_dependencies =

# (list) Java classes to add as activities to the manifest.
#android.add_activites = com.example.ExampleActivity

# (str) python-for-android branch to use, defaults to master
#p4a.branch = master

# (str) OUYA Console category. Should be one of GAME or APP
# If you leave this blank, OUYA support will not be enabled
#android.ouya.category = GAME

# (str) Filename of OUYA Console icon. It must be a 732x412 png image.
#android.ouya.icon.filename = %(source.dir)s/data/ouya_icon.png

# (str) XML file to include as an intent filters in <activity> tag
#android.manifest.intent_filters =

# (str) launchMode to set for the main activity
#android.manifest.launch_mode = standard

# (list) Android additional libraries to copy into libs/armeabi
#android.add_libs_armeabi = libs/android/*.so
#android.add_libs_armeabi_v7a = libs/android-v7/*.so
#android.add_libs_x86 = libs/android-x86/*.so
#android.add_libs_mips = libs/android-mips/*.so

# (bool) Indicate whether the screen should stay on
# Don't forget to add the WAKE_LOCK permission if you set this to True
#android.wakelock = False

# (list) Android application meta-data to set (key=value format)
#android.meta_data =

# (list) Android library project to add (will be added in the
# project.properties automatically.)
#android.library_references =

# (str) Android logcat filters to use
#android.logcat_filters = *:S python:D

# (bool) Copy library instead of making a libpymodules.so
#android.copy_libs = 1

# (str) The Android arch to build for, choices: armeabi-v7a, arm64-v8a, x86, x86_64
android.arch = armeabi-v7a

#
# Python for android (p4a) specific
#

# (str) python-for-android git clone directory (if empty, it will be automatically cloned from github)
#p4a.source_dir =

# (str) The directory in which python-for-android should look for your own build recipes (if any)
#p4a.local_recipes =

# (str) Filename to the hook for p4a
#p4a.hook =

# (str) Bootstrap to use for android builds
# p4a.bootstrap = sdl2

# (int) port number to specify an explicit --port= p4a argument (eg for bootstrap flask)
#p4a.port =


#
# iOS specific
#

# (str) Path to a custom kivy-ios folder
#ios.kivy_ios_dir = ../kivy-ios
# Alternately, specify the URL and branch of a git checkout:
ios.kivy_ios_url = https://github.com/kivy/kivy-ios
ios.kivy_ios_branch = master

# Another platform dependency: ios-deploy
# Uncomment to use a custom checkout
#ios.ios_deploy_dir = ../ios_deploy
# Or specify URL and branch
ios.ios_deploy_url = https://github.com/phonegap/ios-deploy
ios.ios_deploy_branch = 1.7.0

# (str) Name of the certificate to use for signing the debug version
# Get a list of available identities: buildozer ios list_identities
#ios.codesign.debug = "iPhone Developer: <lastname> <firstname> (<hexstring>)"

# (str) Name of the certificate to use for signing the release version
#ios.codesign.release = %(ios.codesign.debug)s


[buildozer]

# (int) Log level (0 = error only, 1 = info, 2 = debug (with command output))
log_level = 2

# (int) Display warning if buildozer is run as root (0 = False, 1 = True)
warn_on_root = 1

# (str) Path to build artifact storage, absolute or relative to spec file
# build_dir = ./.buildozer

# (str) Path to build output (i.e. .apk, .ipa) storage
# bin_dir = ./bin

#    -----------------------------------------------------------------------------
#    List as sections
#
#    You can define all the "list" as [section:key].
#    Each line will be considered as a option to the list.
#    Let's take [app] / source.exclude_patterns.
#    Instead of doing:
#
#[app]
#source.exclude_patterns = license,data/audio/*.wav,data/images/original/*
#
#    This can be translated into:
#
#[app:source.exclude_patterns]
#license
#data/audio/*.wav
#data/images/original/*
#


#    -----------------------------------------------------------------------------
#    Profiles
#
#    You can extend section / key with a profile
#    For example, you want to deploy a demo version of your application without
#    HD content. You could first change the title to add "(demo)" in the name
#    and extend the excluded directories to remove the HD content.
#
#[app@demo]
#title = My Application (demo)
#
#[app:source.exclude_patterns@demo]
#images/hd/*
#

Logs

05-17 15:08:10.662 22511 22557 I python  : Android kivy bootstrap done. __name__ is __main__
05-17 15:08:10.662 22511 22557 I python  : AND: Ran string
05-17 15:08:10.662 22511 22557 I python  : Run user program, change dir and execute entrypoint
05-17 15:08:10.868  1139  1441 D WifiTrafficPoller: TrafficStats TxPkts=494654 RxPkts=1371983 TxBytes=59343577 RxBytes=743996844 , Foreground uid=10214 pkgName=org.test.myapp txBytes=1480 rxBytes=12656
05-17 15:08:11.087 22511 22557 I python  : platform.python_version() ==  3.7.1
05-17 15:08:11.087 22511 22557 I python  : np.__version__ ==  1.15.1
05-17 15:08:11.087 22511 22557 I python  :     Now crazy starts: 
--------- beginning of crash
05-17 15:08:11.089 22511 22557 F libc    : Fatal signal 11 (SIGSEGV), code 1, fault addr 0x0 in tid 22557 (SDLThread), pid 22511 (org.test.myapp)
05-17 15:08:11.128 22562 22562 E propClient: PropClient failed to load
05-17 15:08:11.137   743   743 E audit   : type=1400 audit(1558102091.127:5463): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.138   743   743 E audit   : type=1300 audit(1558102091.127:5463): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942000 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.138   743   743 E audit   : type=1327 audit(1558102091.127:5463): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.138   743   743 E audit   : type=1400 audit(1558102091.127:5464): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.138   743   743 E audit   : type=1300 audit(1558102091.127:5464): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942120 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.138   743   743 E audit   : type=1327 audit(1558102091.127:5464): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.138   743   743 E audit   : type=1400 audit(1558102091.127:5465): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.138   743   743 E audit   : type=1300 audit(1558102091.127:5465): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0973000 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.138   743   743 E audit   : type=1327 audit(1558102091.127:5465): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.138   743   743 E audit   : type=1400 audit(1558102091.127:5466): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.138   743   743 E audit   : type=1300 audit(1558102091.127:5466): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942240 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.138   743   743 E audit   : type=1327 audit(1558102091.127:5466): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.138   743   743 E audit   : type=1400 audit(1558102091.127:5467): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.138   743   743 E audit   : type=1300 audit(1558102091.127:5467): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f093d370 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.138   743   743 E audit   : type=1327 audit(1558102091.127:5467): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.138   743   743 E audit   : type=1400 audit(1558102091.137:5468): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.138   743   743 E audit   : type=1300 audit(1558102091.137:5468): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942360 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.138   743   743 E audit   : type=1327 audit(1558102091.137:5468): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.138   743   743 E audit   : type=1400 audit(1558102091.137:5469): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.138   743   743 E audit   : type=1300 audit(1558102091.137:5469): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942480 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.138   743   743 E audit   : type=1327 audit(1558102091.137:5469): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.139   743   743 E audit   : type=1400 audit(1558102091.137:5470): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.139   743   743 E audit   : type=1300 audit(1558102091.137:5470): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f09425a0 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.139   743   743 E audit   : type=1327 audit(1558102091.137:5470): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.139   743   743 E audit   : type=1400 audit(1558102091.137:5471): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.139   743   743 E audit   : type=1300 audit(1558102091.137:5471): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f09426c0 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.139   743   743 E audit   : type=1327 audit(1558102091.137:5471): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.139   743   743 E audit   : type=1400 audit(1558102091.137:5472): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.139   743   743 E audit   : type=1300 audit(1558102091.137:5472): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f09427e0 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.139   743   743 E audit   : type=1327 audit(1558102091.137:5472): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.139   743   743 E audit   : type=1400 audit(1558102091.137:5473): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.139   743   743 E audit   : type=1300 audit(1558102091.137:5473): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942900 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.139   743   743 E audit   : type=1327 audit(1558102091.137:5473): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.139   743   743 E audit   : type=1400 audit(1558102091.137:5474): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.139   743   743 E audit   : type=1300 audit(1558102091.137:5474): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942a20 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.139   743   743 E audit   : type=1327 audit(1558102091.137:5474): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.139   743   743 E audit   : type=1400 audit(1558102091.137:5475): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.139   743   743 E audit   : type=1300 audit(1558102091.137:5475): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942b40 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.139   743   743 E audit   : type=1327 audit(1558102091.137:5475): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.139   743   743 E audit   : type=1400 audit(1558102091.137:5476): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.139   743   743 E audit   : type=1300 audit(1558102091.137:5476): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942c60 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.140   743   743 E audit   : type=1327 audit(1558102091.137:5476): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.140   743   743 E audit   : type=1400 audit(1558102091.137:5477): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.140   743   743 E audit   : type=1300 audit(1558102091.137:5477): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f093d460 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.140   743   743 E audit   : type=1327 audit(1558102091.137:5477): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.140   743   743 E audit   : type=1400 audit(1558102091.137:5478): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.140   743   743 E audit   : type=1300 audit(1558102091.137:5478): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f093d550 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.140   743   743 E audit   : type=1327 audit(1558102091.137:5478): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.141   743   743 E audit   : type=1400 audit(1558102091.137:5479): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.141   743   743 E audit   : type=1300 audit(1558102091.137:5479): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942d80 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.141   743   743 E audit   : type=1327 audit(1558102091.137:5479): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.141   743   743 E audit   : type=1400 audit(1558102091.137:5480): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.141   743   743 E audit   : type=1300 audit(1558102091.137:5480): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942ea0 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.141   743   743 E audit   : type=1327 audit(1558102091.137:5480): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.162   743   743 E audit   : type=1400 audit(1558102091.157:5481): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="app" dev="dm-3" ino=131071 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.162   743   743 E audit   : type=1300 audit(1558102091.157:5481): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0922f50 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.162   743   743 E audit   : type=1327 audit(1558102091.157:5481): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.168 22563 22563 I crash_dump32: obtaining output fd from tombstoned, type: kDebuggerdTombstone
05-17 15:08:11.169   858   858 I /system/bin/tombstoned: received crash request for pid 22511
05-17 15:08:11.171 22563 22563 I crash_dump32: performing dump of process 22511 (target tid = 22557)
05-17 15:08:11.171 22563 22563 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
05-17 15:08:11.171 22563 22563 F DEBUG   : Build fingerprint: 'samsung/gta2xlwifixx/gta2xlwifi:8.1.0/M1AJQ/T590XXU2ASC1:user/release-keys'
05-17 15:08:11.171 22563 22563 F DEBUG   : Revision: '5'
05-17 15:08:11.172 22563 22563 F DEBUG   : ABI: 'arm'
05-17 15:08:11.172 22563 22563 F DEBUG   : pid: 22511, tid: 22557, name: SDLThread  >>> org.test.myapp <<<
05-17 15:08:11.172 22563 22563 F DEBUG   : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0
05-17 15:08:11.172 22563 22563 F DEBUG   : Cause: null pointer dereference
05-17 15:08:11.172 22563 22563 F DEBUG   :     r0 00000000  r1 c88a4378  r2 00000001  r3 c8116de0
05-17 15:08:11.172 22563 22563 F DEBUG   :     r4 c804ab59  r5 c76f1110  r6 c8117048  r7 dfa9862c
05-17 15:08:11.172 22563 22563 F DEBUG   :     r8 00000000  r9 00000001  sl d59fedb0  fp c86b7458
05-17 15:08:11.172 22563 22563 F DEBUG   :     ip c811a884  sp c86b73e8  lr c80a8b57  pc c80a8b5c  cpsr 00010030
05-17 15:08:11.173   743   743 E audit   : type=1400 audit(1558102091.167:5482): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.173   743   743 E audit   : type=1300 audit(1558102091.167:5482): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942c60 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.173   743   743 E audit   : type=1327 audit(1558102091.167:5482): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.173 22563 22563 F DEBUG   : 
05-17 15:08:11.173 22563 22563 F DEBUG   : backtrace:
05-17 15:08:11.173 22563 22563 F DEBUG   :     #00 pc 000a5b5c  /data/data/org.test.myapp/files/app/_python_bundle/site-packages/numpy/core/multiarray.so
05-17 15:08:11.173 22563 22563 F DEBUG   :     #01 pc 000a5b53  /data/data/org.test.myapp/files/app/_python_bundle/site-packages/numpy/core/multiarray.so
05-17 15:08:11.175   743   743 E audit   : type=1400 audit(1558102091.167:5483): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.175   743   743 E audit   : type=1300 audit(1558102091.167:5483): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942120 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.175   743   743 E audit   : type=1327 audit(1558102091.167:5483): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.538  2238  2238 D io_stats: !@ 179,0 r 302322 13424470 w 1803533 39973992 d 259713 40645368 f 2008439 2008393 iot 3203460 3236119 th 51200 0 0 pt 0 inp 0 0 403133.609
05-17 15:08:11.880  1139  1441 D WifiTrafficPoller: TrafficStats TxPkts=494654 RxPkts=1371983 TxBytes=59343577 RxBytes=743996844 , Foreground uid=10214 pkgName=org.test.myapp txBytes=1480 rxBytes=12656
05-17 15:08:12.118   764 31950 V APM_AudioPolicyManager: getAudioPolicyConfig: audioParam;outDevice
05-17 15:08:12.118   764 31950 V APM_AudioPolicyManager: getNewOutputDevice() selected device 0
05-17 15:08:12.119   764 31950 V APM_AudioPolicyManager: ### curdevice : 2
05-17 15:08:12.119  1139  3772 D SSRM:i  : AudioType = 2, Vol = 0
05-17 15:08:12.177  1139  3772 D SSRM:w  : SIOP:: AP:222(290,40) BAT:265(265,0) CHG:283(283,0) USB:0(0,0) PA:620(685,50) ATC:0(0,0) BLK:283(283,0) 
05-17 15:08:12.215  1139  1742 E Watchdog: !@Sync 13432 [2019-05-17 15:08:12.215]
05-17 15:08:12.379   858   858 E /system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_04
05-17 15:08:12.381  1139 22564 W ActivityManager: crash : org.test.myapp,0
05-17 15:08:12.383  1139 22564 W ActivityManager:   Force finishing activity org.test.myapp/org.kivy.android.PythonActivity
05-17 15:08:12.384  1139 22564 W MultiScreenManagerService: moveTaskBackToDisplayIfNeeded(): root activity or app is null, task=TaskRecord{abfefe2 #232 A=org.test.myapp U=0 StackId=1 sz=1}, rootActivity=null
05-17 15:08:12.385  1139  1139 D CodecSolution: MultiWindowEventListener::onMultiWindowFocusChanged(0)
05-17 15:08:12.385  1139  1139 D CS_HdrController: MultiWindowEventListener::onFocusStackChanged(0)
05-17 15:08:12.385  1139  1163 I BootReceiver: Copying /data/tombstones/tombstone_04 to DropBox (SYSTEM_TOMBSTONE)
05-17 15:08:12.389   743   743 E audit   : type=1701 audit(1558102092.387:5484): auid=4294967295 uid=10214 gid=10214 ses=4294967295 subj=u:r:untrusted_app:s0:c512,c768 pid=22511 comm="SDLThread" exe="/system/bin/app_process32" sig=11
05-17 15:08:12.393  1139  1356 W Choreographer: Frame time is 2.54226 ms in the future!  Check that graphics HAL is generating vsync timestamps using the correct timebase.
05-17 15:08:12.395  1139  1155 D CustomFrequencyManagerService: acquireDVFSLockLocked : type : DVFS_MIN_LIMIT  frequency : 1804800  uid : 1000  pid : 1139  pkgName : AMS_APP_HOME@CPU_MIN@17
05-17 15:08:12.395  1139  1155 D ActivityManagerPerformance: AMP_acquire() HOME
05-17 15:08:12.396   571   571 E lowmemorykiller: Error writing /proc/22511/oom_score_adj; errno=22
05-17 15:08:12.402  1139  1139 D CS_HdrController: updateMultiWindowState : 0
05-17 15:08:12.402  1139  1139 D MdnieScenarioControlService: Listener Real Multi Window State : true
05-17 15:08:12.403 21875 21875 I DMT-SMReceiver: Received : com.samsung.android.sm.ACTION_ERROR
05-17 15:08:12.404 21875 21875 W ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.startService:1545 android.content.ContextWrapper.startService:669 android.content.ContextWrapper.startService:669 com.samsung.android.sm.common.SmartManagerReceiver.a:240 com.samsung.android.sm.common.SmartManagerReceiver.onReceive:119 
05-17 15:08:12.404  1139  1156 I ActivityManager: Showing crash dialog for package org.test.myapp u0
05-17 15:08:12.411  1139  1379 W ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:1033 com.samsung.android.hqm.BigDataModule.sendDQLog:1212 com.samsung.android.hqm.BigDataModule.sendHWParamDQServer:882 com.samsung.android.hqm.BigDataModule.sendHWParamServerLocked:778 com.samsung.android.hqm.BigDataModule.SendHQMInfoParam:535 
05-17 15:08:12.414  1139  1156 D ScrollView: initGoToTop
05-17 15:08:12.418  1139  1948 W BroadcastQueue: Background execution not allowed: receiving Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } to com.google.android.gms/.stats.service.DropBoxEntryAddedReceiver
05-17 15:08:12.419  1139  1155 W BroadcastQueue: Background execution not allowed: receiving Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } to com.google.android.gms/.chimera.GmsIntentOperationService$PersistentTrustedReceiver
05-17 15:08:12.419  1139  1150 D InputTransport: Input channel destroyed: fd=428
05-17 15:08:12.419  1139  1947 I WindowManager: WIN DEATH: Window{6d1ce3d u0 org.test.myapp/org.kivy.android.PythonActivity}
05-17 15:08:12.419   572   572 I SurfaceFlinger: removeLayer is called from message
05-17 15:08:12.419   572   572 I SurfaceFlinger: id=1399 Removed SurfaceView - org.test.myapp/org.kivy.android.PythonActivity@cee1c4c@0[22511]#0 (1/6)
05-17 15:08:12.419   572   572 I SurfaceFlinger: removeLayer is called from message
05-17 15:08:12.419   572   572 I SurfaceFlinger: id=1400 Removed Background for - SurfaceView - org.test.myapp/org.kivy.android.PythonActivity@cee1c4c@0[22511]#0 (0/6)
05-17 15:08:12.419  1631  1631 D InputEventReceiver: channel 'ClientState{2945f83 uid 10214 pid 22511} (client)' ~ Disposing input event receiver.
05-17 15:08:12.420  1631  1631 D InputEventReceiver: channel 'ClientState{2945f83 uid 10214 pid 22511} (client)' ~NativeInputEventReceiver.

@inclement
Copy link
Member

Thanks for the log, but I'm not sure what's wrong here, and I've used numpy.fft.fft before without issues. I'll try to test it again.

@llamawright
Copy link
Author

Thanks for the response. Have you been able to repeat the error? I have tried this on two different devices with exactly the same results. Any suggestions/info would be gratefully received, as I am totally stuck on this issue.

@llamawright
Copy link
Author

This issue has been resolved with the latest Numpy release (7 Sept 2019).

@jgavris
Copy link

jgavris commented Nov 20, 2019

@llamawright could you share your spec file that resolved the issue for you?

@llamawright
Copy link
Author

@jgavris Herewith spec file that worked for me...
buildozer.txt

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants