Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Vanilla example app] White screen on Android with new architecture enabled when Proguard is enabled #84

Open
opayen opened this issue Jul 4, 2022 · 1 comment

Comments

@opayen
Copy link
Contributor

opayen commented Jul 4, 2022

Repro steps:

  • Enable enableProguardInReleaseBuilds in the app's build.gradle file of the vanilla example app
  • Make sure that new architecture is enabled (newArchEnabled=true in gradle.properties, enabled by default)
  • Build the release variant
  • Start the app

Result:

Probably related to Proguard, because it works fine without it.

@opayen
Copy link
Contributor Author

opayen commented Jul 4, 2022

Logcat output:

2022-07-04 13:50:47.786 11160-11186/? A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0 in tid 11186 (mqt_native_modu), pid 11160 (com.example)
2022-07-04 13:50:47.816 11191-11191/? I/crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone
2022-07-04 13:50:47.818 284-284/? I/tombstoned: received crash request for pid 11186
2022-07-04 13:50:47.820 11191-11191/? I/crash_dump64: performing dump of process 11160 (target tid = 11186)
2022-07-04 13:50:47.824 11191-11191/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2022-07-04 13:50:47.824 11191-11191/? A/DEBUG: Build fingerprint: 'google/sdk_gphone_arm64/emulator_arm64:11/RSR1.210722.003/7604015:user/release-keys'
2022-07-04 13:50:47.824 11191-11191/? A/DEBUG: Revision: '0'
2022-07-04 13:50:47.824 11191-11191/? A/DEBUG: ABI: 'arm64'
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: Timestamp: 2022-07-04 13:50:47+0200
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: pid: 11160, tid: 11186, name: mqt_native_modu  >>> com.example <<<
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: uid: 10179
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: Cause: null pointer dereference
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG:     x0  00000074ca1338a0  x1  00000074ca132bc8  x2  0000000000000001  x3  b4000075c5344b70
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG:     x4  00000074ca1338a0  x5  00000074cf009e98  x6  fefefeff72549b0a  x7  7f7f7f7f7f7fff7f
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG:     x8  0000000000000000  x9  0000000000000003  x10 0000000000004001  x11 0000000000000000
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG:     x12 0000000000000000  x13 0000000000000001  x14 0000000000000002  x15 00000077c5b4c030
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG:     x16 0000007521db8960  x17 00000077c8f1f6b0  x18 00000074ca002000  x19 00000074ca132bc8
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG:     x20 b4000075c5344b70  x21 0000000000000001  x22 0000000000000002  x23 00000074ca1338a0
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG:     x24 0000000000000000  x25 b4000075f53789d0  x26 b4000075a538e520  x27 b4000076a5387e40
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG:     x28 00000074ca13a000  x29 00000074ca132ba0
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG:     lr  00000074cf00e3f8  sp  00000074ca132ba0  pc  0000000000000000  pst 0000000000001000
2022-07-04 13:50:47.829 11191-11191/? A/DEBUG: backtrace:
2022-07-04 13:50:47.829 11191-11191/? A/DEBUG:       #00 pc 0000000000000000  <unknown>
2022-07-04 13:50:47.829 11191-11191/? A/DEBUG:       #01 pc 00000000000ea3f4  /data/app/~~r7hExp79Qe_XURjXATtrDg==/com.example-mNFfvzxYw2P9j2aGCzIbJQ==/lib/arm64/libc++_shared.so (BuildId: 98cfeb2d0d7d7a1c10770e4af2df8cf0af2c2c8c)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant