I updated my pixel to Oreo, and now my daydream app crashes on launch.
I don’t quite know where to start when it comes to debugging this problem.
Any tips on where to get started?
Here is the relevant section of my adb logcat file:
--------- beginning of crash
09-14 08:31:35.289 4226 4226 F libc : Fatal signal 11 (SIGSEGV), code 2, fault addr 0x731bad4900 in tid 4226 (main)
09-14 08:31:35.342 4334 4334 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
09-14 08:31:35.342 4334 4334 F DEBUG : Build fingerprint: ‘google/sailfish/sailfish:8.0.0/OPR1.170623.026/4286349:user/release-keys’
09-14 08:31:35.342 4334 4334 F DEBUG : Revision: ‘0’
09-14 08:31:35.342 4334 4334 F DEBUG : ABI: ‘arm64’
09-14 08:31:35.342 4334 4334 F DEBUG : pid: 4226, tid: 4226, name: main >>> com.hollowhead.cub3r <<<
09-14 08:31:35.343 4334 4334 F DEBUG : signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x731bad4900
09-14 08:31:35.343 4334 4334 F DEBUG : x0 0000007316dcce90 x1 000000731bad0000 x2 0000000000000001 x3 0000000000000000
09-14 08:31:35.343 4334 4334 F DEBUG : x4 0000007316dccee8 x5 0000007fca60a468 x6 64626d6e6cff656d x7 7f7f7f7f7f7f7f7f
09-14 08:31:35.343 4334 4334 F DEBUG : x8 0000000000000000 x9 0000000000000001 x10 0000000000004001 x11 0000000000000000
09-14 08:31:35.343 4334 4334 F DEBUG : x12 000000732f40d808 x13 000000000000294b x14 0000000000000007 x15 0000000000000000
09-14 08:31:35.343 4334 4334 F DEBUG : x16 00000073158a9738 x17 00000073317bed1c x18 0000000000000000 x19 0000007316dcce90
09-14 08:31:35.343 4334 4334 F DEBUG : x20 0000007333be81d3 x21 00000073153053a0 x22 00000000000001bd x23 0000007333be53f4
09-14 08:31:35.343 4334 4334 F DEBUG : x24 0000007333be83b3 x25 0000007333c19000 x26 0000007333c19428 x27 0000000000000235
09-14 08:31:35.343 4334 4334 F DEBUG : x28 00000073107b56c4 x29 0000007fca60a6b0 x30 00000073138c4928
09-14 08:31:35.343 4334 4334 F DEBUG : sp 0000007fca60a650 pc 00000073138c4870 pstate 0000000080000000
09-14 08:31:35.819 4334 4334 F DEBUG :
09-14 08:31:35.819 4334 4334 F DEBUG : backtrace:
09-14 08:31:35.819 4334 4334 F DEBUG : #00 pc 00000000058c1870 /data/app/com.hollowhead.cub3r-1/lib/arm64/libUE4.so
09-14 08:31:35.819 4334 4334 F DEBUG : #01 pc 00000000058c1924 /data/app/com.hollowhead.cub3r-1/lib/arm64/libUE4.so
09-14 08:31:35.819 4334 4334 F DEBUG : #02 pc 000000000001f0f8 /system/bin/linker64 (_dl__ZL10call_arrayIPFviPPcS1_EEvPKcPT_mbS5+276)
09-14 08:31:35.819 4334 4334 F DEBUG : #03 pc 000000000001f328 /system/bin/linker64 (__dl__ZN6soinfo17call_constructorsEv+396)
09-14 08:31:35.819 4334 4334 F DEBUG : #04 pc 000000000000bd0c /system/bin/linker64 (__dl__Z9do_dlopenPKciPK17android_dlextinfoPKv+1460)
09-14 08:31:35.819 4334 4334 F DEBUG : #05 pc 0000000000008b40 /system/bin/linker64 (__dl__Z20__android_dlopen_extPKciPK17android_dlextinfoPKv+72)
09-14 08:31:35.819 4334 4334 F DEBUG : #06 pc 000000000000118c /system/lib64/libdl.so (android_dlopen_ext+12)
09-14 08:31:35.819 4334 4334 F DEBUG : #07 pc 000000000000257c /system/lib64/libnativeloader.so (_ZN7android17OpenNativeLibraryEP7_JNIEnviPKcP8_jobjectP8_jstringPbPNSt3__112basic_stringIcNS9_11char_traitsIcEENS9_9allocatorIcEEEE+384)
09-14 08:31:35.819 4334 4334 F DEBUG : #08 pc 00000000002d7b64 /system/lib64/libart.so (ZN3art9JavaVMExt17LoadNativeLibraryEP7_JNIEnvRKNSt3__112basic_stringIcNS3_11char_traitsIcEENS3_9allocatorIcEEEEP8_jobjectP8_jstringPS9+1680)
09-14 08:31:35.819 4334 4334 F DEBUG : #09 pc 00000000000041b4 /system/lib64/libopenjdkjvm.so (JVM_NativeLoad+276)
09-14 08:31:35.819 4334 4334 F DEBUG : #10 pc 00000000002874d4 /system/framework/arm64/boot.oat (offset 0x1db000) (java.lang.Runtime.nativeLoad+228)
09-14 08:31:35.819 4334 4334 F DEBUG : #11 pc 0000000000286c94 /system/framework/arm64/boot.oat (offset 0x1db000) (java.lang.Runtime.doLoad+228)
09-14 08:31:35.820 4334 4334 F DEBUG : #12 pc 0000000000289178 /system/framework/arm64/boot.oat (offset 0x1db000) (java.lang.Runtime.loadLibrary0+952)
09-14 08:31:35.820 4334 4334 F DEBUG : #13 pc 00000000002ab124 /system/framework/arm64/boot.oat (offset 0x1db000) (java.lang.System.loadLibrary+100)
09-14 08:31:35.820 4334 4334 F DEBUG : #14 pc 0000000000506c38 /system/lib64/libart.so (art_quick_invoke_static_stub+600)
09-14 08:31:35.820 4334 4334 F DEBUG : #15 pc 00000000000d804c /system/lib64/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+260)
09-14 08:31:35.820 4334 4334 F DEBUG : #16 pc 0000000000281b88 /system/lib64/libart.so (_ZN3art11interpreter34ArtInterpreterToCompiledCodeBridgeEPNS_6ThreadEPNS_9ArtMethodEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+352)
09-14 08:31:35.820 4334 4334 F DEBUG : #17 pc 000000000027c250 /system/lib64/libart.so (_ZN3art11interpreter6DoCallILb0ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+672)
09-14 08:31:35.820 4334 4334 F DEBUG : #18 pc 00000000004ef834 /system/lib64/libart.so (MterpInvokeStatic+468)
09-14 08:31:35.820 4334 4334 F DEBUG : #19 pc 00000000004f8594 /system/lib64/libart.so (ExecuteMterpImpl+14612)
09-14 08:31:35.820 4334 4334 F DEBUG : #20 pc 000000000025cfcc /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+444)
09-14 08:31:35.820 4334 4334 F DEBUG : #21 pc 00000000004e2190 /system/lib64/libart.so (artQuickToInterpreterBridge+1468)
09-14 08:31:35.820 4334 4334 F DEBUG : #22 pc 000000000050fe1c /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
09-14 08:31:35.820 4334 4334 F DEBUG : #23 pc 0000000000506c38 /system/lib64/libart.so (art_quick_invoke_static_stub+600)
09-14 08:31:35.820 4334 4334 F DEBUG : #24 pc 00000000000d804c /system/lib64/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+260)
09-14 08:31:35.820 4334 4334 F DEBUG : #25 pc 0000000000134734 /system/lib64/libart.so (_ZN3art11ClassLinker15InitializeClassEPNS_6ThreadENS_6HandleINS_6mirror5ClassEEEbb+3392)
09-14 08:31:35.820 4334 4334 F DEBUG : #26 pc 000000000011e3cc /system/lib64/libart.so (_ZN3art11ClassLinker17EnsureInitializedEPNS_6ThreadENS_6HandleINS_6mirror5ClassEEEbb+172)
09-14 08:31:35.820 4334 4334 F DEBUG : #27 pc 00000000003a889c /system/lib64/libart.so (_ZN3artL17Class_newInstanceEP7_JNIEnvP8_jobject+1188)
09-14 08:31:35.820 4334 4334 F DEBUG : #28 pc 00000000001db2ac /system/framework/arm64/boot.oat (offset 0x1db000) (java.lang.Object.internalClone [DEDUPED]+124)
09-14 08:31:35.820 4334 4334 F DEBUG : #29 pc 00000000007b75bc /system/framework/arm64/boot-framework.oat (offset 0x5ea000) (android.app.Instrumentation.newActivity+92)
09-14 08:31:35.820 4334 4334 F DEBUG : #30 pc 00000000006b3148 /system/framework/arm64/boot-framework.oat (offset 0x5ea000) (android.app.ActivityThread.performLaunchActivity+776)
09-14 08:31:35.820 4334 4334 F DEBUG : #31 pc 00000000006ab1dc /system/framework/arm64/boot-framework.oat (offset 0x5ea000) (android.app.ActivityThread.handleLaunchActivity+476)
09-14 08:31:35.820 4334 4334 F DEBUG : #32 pc 000000000069bc5c /system/framework/arm64/boot-framework.oat (offset 0x5ea000) (android.app.ActivityThread$H.handleMessage+9308)
09-14 08:31:35.820 4334 4334 F DEBUG : #33 pc 000000000069745c /system/framework/arm64/boot-framework.oat (offset 0x5ea000) (android.os.Handler.dispatchMessage+188)
09-14 08:31:35.820 4334 4334 F DEBUG : #34 pc 0000000000f69fb0 /system/framework/arm64/boot-framework.oat (offset 0x5ea000) (android.os.Looper.loop+1184)
09-14 08:31:35.820 4334 4334 F DEBUG : #35 pc 00000000006b1868 /system/framework/arm64/boot-framework.oat (offset 0x5ea000) (android.app.ActivityThread.main+904)
09-14 08:31:35.820 4334 4334 F DEBUG : #36 pc 0000000000506c38 /system/lib64/libart.so (art_quick_invoke_static_stub+600)
09-14 08:31:35.820 4334 4334 F DEBUG : #37 pc 00000000000d804c /system/lib64/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+260)
09-14 08:31:35.820 4334 4334 F DEBUG : #38 pc 000000000042f8d8 /system/lib64/libart.so (_ZN3artL18InvokeWithArgArrayERKNS_33ScopedObjectAccessAlreadyRunnableEPNS_9ArtMethodEPNS_8ArgArrayEPNS_6JValueEPKc+104)
09-14 08:31:35.820 4334 4334 F DEBUG : #39 pc 0000000000431430 /system/lib64/libart.so (_ZN3art12InvokeMethodERKNS_33ScopedObjectAccessAlreadyRunnableEP8_jobjectS4_S4_m+1460)
09-14 08:31:35.821 4334 4334 F DEBUG : #40 pc 00000000003bb2e4 /system/lib64/libart.so (ZN3artL13Method_invokeEP7_JNIEnvP8_jobjectS3_S3+52)
09-14 08:31:35.821 4334 4334 F DEBUG : #41 pc 0000000000266f74 /system/framework/arm64/boot.oat (offset 0x1db000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
09-14 08:31:35.821 4334 4334 F DEBUG : #42 pc 0000000001693ac8 /system/framework/arm64/boot-framework.oat (offset 0x5ea000) (com.android.internal.os.Zygote$MethodAndArgsCaller.run+136)
09-14 08:31:35.821 4334 4334 F DEBUG : #43 pc 00000000016978d4 /system/framework/arm64/boot-framework.oat (offset 0x5ea000) (com.android.internal.os.ZygoteInit.main+2884)
09-14 08:31:35.821 4334 4334 F DEBUG : #44 pc 0000000000506c38 /system/lib64/libart.so (art_quick_invoke_static_stub+600)
09-14 08:31:35.821 4334 4334 F DEBUG : #45 pc 00000000000d804c /system/lib64/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+260)
09-14 08:31:35.821 4334 4334 F DEBUG : #46 pc 000000000042f8d8 /system/lib64/libart.so (_ZN3artL18InvokeWithArgArrayERKNS_33ScopedObjectAccessAlreadyRunnableEPNS_9ArtMethodEPNS_8ArgArrayEPNS_6JValueEPKc+104)
09-14 08:31:35.821 4334 4334 F DEBUG : #47 pc 000000000042f534 /system/lib64/libart.so (_ZN3art17InvokeWithVarArgsERKNS_33ScopedObjectAccessAlreadyRunnableEP8_jobjectP10_jmethodIDSt9__va_list+424)
09-14 08:31:35.821 4334 4334 F DEBUG : #48 pc 000000000034612c /system/lib64/libart.so (_ZN3art3JNI21CallStaticVoidMethodVEP7_JNIEnvP7_jclassP10_jmethodIDSt9__va_list+624)
09-14 08:31:35.821 4334 4334 F DEBUG : #49 pc 00000000000b4104 /system/lib64/libandroid_runtime.so (_ZN7_JNIEnv20CallStaticVoidMethodEP7_jclassP10_jmethodIDz+120)
09-14 08:31:35.821 4334 4334 F DEBUG : #50 pc 00000000000b61a0 /system/lib64/libandroid_runtime.so (_ZN7android14AndroidRuntime5startEPKcRKNS_6VectorINS_7String8EEEb+816)
09-14 08:31:35.821 4334 4334 F DEBUG : #51 pc 0000000000002454 /system/bin/app_process64 (main+1348)
09-14 08:31:35.821 4334 4334 F DEBUG : #52 pc 000000000001b66c /system/lib64/libc.so (__libc_init+88)
09-14 08:31:35.821 4334 4334 F DEBUG : #53 pc 0000000000001e70 /system/bin/app_process64 (do_arm64_start+80)