-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[audiopolicy] No longer make re-assigning legacy audio groups fatal. … #1
Closed
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
make function virtual or protected so that they can be extended in custom audio policy. Change-Id: Ida7992f6b327491fab1f4ea376e85e8eb34b89ca audiopolicy: update APM to use custom audio policy configuration Change-Id: I3161ff4fa41d37d0b761202f0b3a490d9c7e418e audiopolicy: allow dp device selection for voice usecases Change-Id: I13f1ddd0fd3655376d28a0ebe028d495fa2c6e5f audiopolicy: follow-up change to support extended feature Change-Id: Iddc14a3e2e61bc57f8637eae71e36cc21ce2d3e8 [dianlujitao: Port to R] Change-Id: Ida7992f6b327491fab1f4ea376e85e8eb34b89ca
This is a squashed commit of the changes added to support extended feature in audiopolicymanager and related error. Only some parts of the fixes have been ported as the custom audio policy has the other required changes. audiopolicy: support extended feature in audiopolicymanager audiopolicy: additional change for extended feature audiopolicy: Add voip flag to output flag list Change-Id: I7738d4b0ac11ee6d93bfd67e2553eae8518ff719 audiopolicy: follow-up change to support extended feature Change-Id: Iddc14a3e2e61bc57f8637eae71e36cc21ce2d3e8 [dianlujitao: Port to R] CRs-Fixed: 2208307 Change-Id: Icc12395480cfe5e26bf935fb643d080990d8a4e9
This change includes the following gerrits: # This is a combination of 4 commits. # The first commit's message is: Camera: Enable Histogram feature. Link the histogram enable/disable commands from application to the HAL layer. Change-Id: I510c4e1798285ed1315bfb0d234fa76090659ba2 # This is the 2nd commit message: Camera: Add support for ZSL burst mode. Added ability to set number of snapshots in burst mode. Change-Id: Ie0e7c8c0117b7adc985cfc92df79747ee6a5ea51 # This is the 3rd commit message: CameraService: Adds support for longshot mode - This change introduces additional functionality inside CameraClient for supporting continuous compressed data callbacks. This is needed for 'Burst/Long shot' mode where we could have indefinite number of callbacks after capture is triggered. (cherrypicked from commit e4f502aa7cbe8875e8a1589024cdcf227c228a2b) Change-Id: Ia18ca9bdda7736c679db557e510870115089537a # This is the 4th commit message: CameraClient: Enables meta data notifications. Adds the needed functionality for enabling/disabling metadata messages depending on the camera client commands. Change-Id: I39d632b4742e83df5db5f86b12742aefc2480dfc Cherrypicked from 25bd97f5ec30e7942c3b1fdc96115da6028736f0 Change-Id: Ie930d20c962593e40a0767f9cf7d4385df8e2561
-Add support for receiving dataCallback with fd/buffer as frame buffer CRs-fixed: 654901 Change-Id: I5c16e560f1e209a6ab4afa4f3437602b02992b9b
Currently, when media profile declares something unsupported / broken / missing, MediaProfile will crash. This patch will change the behavior to gracefully degradation instead. b/147701370 is an example IRL. If vendor declares profile unsupported in AOSP, GSI image will crash instead of having a non-working or suboptimally working camera. Test: Compiles Bug: 166673022 Signed-off-by: Alex Zhang <difan@google.com> Change-Id: Icc0f85fe0aac748be4d4f7dd94814f615d528a03
Added QDataCallback definition to pass the extended QCameraFrameMetadata fields from HIDL to framework. Change-Id: Idece64f22dd6ee3713c7db658b8583854086a1d8
This is a squash of following changes: Change-ID Subject ------------------------------------------------------------------------------ 1) I6fc5fa6e01c002bc46be058fcd977be14cae0270 CameraService: Fix deadlock in binder death cleanup 2) I7239f6eb6a9dec67393e11b83d0ef6c986215940 Camera: CameraHardwareInterface: Releasing mHIDLMemoryMapLock in QdataCallback 3) I3fbe4ad836c2abbd512e3728cf49f9424b726ba0 Camera:CameraService: Added lock on mHIDLMemPoolId in QDataCallback CRs-Fixed: 2246547 CameraService: Fix deadlock in binder death cleanup Issue: In the event of a binder death, there is a chance of deadlock due to recursive lock acquisition in the death handling sequence. Fix: Clear evicted client list before acquiring service lock. Change-Id: I6fc5fa6e01c002bc46be058fcd977be14cae0270 Camera: CameraHardwareInterface: Releasing mHIDLMemoryMapLock in QdataCallback Issue: Camera is getting stuck due to mHIDLMemoryMapLock when called for QDataCallback then unregister memory from HAL. Solution: Releasing mHIDLMemoryMapLock after reading mHIDLMemoryMap variable Change-Id: I7239f6eb6a9dec67393e11b83d0ef6c986215940 Camera:CameraService: Added lock on mHIDLMemPoolId in QDataCallback.. securing mHIDLMemPoolId (unordered_map variable) from multithreading. Change-Id: I3fbe4ad836c2abbd512e3728cf49f9424b726ba0
Set TARGET_USES_QTI_CAMERA_DEVICE to link and use Change-Id: I3a82412190b8918248bdd7a1d823777debd67173
…Mi9 declares AUDIO_STREAM_PATCH and AUDIO_STREAM_REROUTING which is defined by framework too Change-Id: I794fe22d63a8af705be4f5f09b9879ecaab3eae5
merged |
NurKeinNeid
pushed a commit
that referenced
this pull request
Sep 5, 2021
Fix crashes like this: 05-03 20:55:09.029 6254 6254 F DEBUG : #00 pc 00000000 <unknown> 05-03 20:55:09.029 6254 6254 F DEBUG : #1 pc 000ec8ab /system/lib/libcameraservice.so (android::CameraHardwareInterface::notifyCallback(android::hardware::camera::device::V1_0::NotifyCallbackMsg, int, int)+18) (BuildId: 078b8118f1d0503988dc8f86045848d8) 05-03 20:55:09.030 6254 6254 F DEBUG : #2 pc 0002e6cd /system/lib/android.hardware.camera.device@1.0.so (android::hardware::camera::device::V1_0::BsCameraDeviceCallback::notifyCallback(android::hardware::camera::device::V1_0::NotifyCallbackMsg, int, int)+96) (BuildId: a964b5ab287096bfb4e9fb1357483757) 05-03 20:55:09.030 6254 6254 F DEBUG : #3 pc 00013783 /system/vendor/lib/camera.device@1.0-impl-htc_msm8960.so (android::hardware::camera::device::V1_0::implementation::CameraDevice::sNotifyCb(int, int, int, void*)+46) (BuildId: 183c013753a49cdceaf880f00b6083b7) 05-03 20:55:09.030 6254 6254 F DEBUG : #4 pc 00038b99 /system/vendor/lib/hw/camera.vendor.msm8960.so (android::QCameraStream_preview::processPreviewFrameWithDisplay(mm_camera_ch_data_buf_t*)+128) 05-03 20:55:09.030 6254 6254 F DEBUG : #5 pc 000086ff /system/lib/libmmcamera_interface2.so 05-03 20:55:09.030 6254 6254 F DEBUG : #6 pc 00008855 /system/lib/libmmcamera_interface2.so (mm_camera_msm_data_notify+248) 05-03 20:55:09.030 6254 6254 F DEBUG : #7 pc 0000736f /system/lib/libmmcamera_interface2.so 05-03 20:55:09.030 6254 6254 F DEBUG : #8 pc 000a6b67 /apex/com.android.runtime/lib/bionic/libc.so (__pthread_start(void*)+20) (BuildId: 1c34385a63ae9f807822c87c6b4126d2) 05-03 20:55:09.030 6254 6254 F DEBUG : #9 pc 00060101 /apex/com.android.runtime/lib/bionic/libc.so (__start_thread+30) (BuildId: 1c34385a63ae9f807822c87c6b4126d2) In case of HTC One M7, the nullptr appears because of this call: https://github.com/AICP/frameworks_av/blob/q10.0/services/camera/libcameraservice/CameraFlashlight.cpp#L528 And while we're on it, lets fix some more possible nullptr's too. Change-Id: I2f67756d576d62560a2e65af55ab868bfc3e36ba Signed-off-by: Julian Veit <claymore1298@gmail.com>
NurKeinNeid
pushed a commit
that referenced
this pull request
Mar 19, 2023
Do not hold lock when IPC call is expected from HAL. C2SurfaceSyncObj is shared lock between framework and HAL. HAL process can have only one thread to handle IPC from HAL to framework. Therefore Holding C2SurfaceSyncObj from HAL during IPC call could trigger deadlock. The exact scenario is as follows. Thread #1:(HAL -> framework IPC) HIDL call onInputBuffersReleased() calls to feedInputBufferIfAvailable(). Since this is using HAL IPC thread, this will block Thread #3. This is waiting for mOuput mutex which is held by Thread #2. Thread #2:(framework) discardBuffer() holds mOutput mutex which blocks Thread #1. But this is waiting for C2SurfaceSyncObj which is held by Thread #3. Thread #3:(HAL) Dtor of C2BufferQueueBlockPoolData is holding C2SurfaceSyncObj, therefore this will block #2. This thread is waiting for HIDL IPC thread to be free in order for 'igbp->cancel()', but HIDL IPC thread is already occupied by Thread #1. Bug: 246707566 Test: atest android.media.decoder.cts.AdaptivePlaybackTest Test: atest android.media.decoder.cts.DecoderTest Change-Id: I6a9540d3b4d03806cd40bb4f89a234a6b77758a9 Merged-In: I6a9540d3b4d03806cd40bb4f89a234a6b77758a9
Klozz
pushed a commit
to Derp-Garden/frameworks_av
that referenced
this pull request
Feb 3, 2024
Log: --------- beginning of crash 09-08 18:41:01.397 1119 1119 F libc : Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 1119 (vendor.qti.medi), pid 1119 (vendor.qti.medi) 09-08 18:41:01.502 1183 1183 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 09-08 18:41:01.502 1183 1183 F DEBUG : Build fingerprint: 'Redmi/sweet_eea/sweet:13/RKQ1.210614.002/V14.0.5.0.TKFEUXM:user/release-keys' 09-08 18:41:01.502 1183 1183 F DEBUG : Revision: '0' 09-08 18:41:01.502 1183 1183 F DEBUG : ABI: 'arm64' 09-08 18:41:01.502 1183 1183 F DEBUG : Timestamp: 1972-09-08 22:41:01.460993955+0000 09-08 18:41:01.502 1183 1183 F DEBUG : Process uptime: 2s 09-08 18:41:01.502 1183 1183 F DEBUG : Cmdline: /vendor/bin/hw/vendor.qti.media.c2@1.0-service 09-08 18:41:01.502 1183 1183 F DEBUG : pid: 1119, tid: 1119, name: vendor.qti.medi >>> /vendor/bin/hw/vendor.qti.media.c2@1.0-service <<< 09-08 18:41:01.502 1183 1183 F DEBUG : uid: 1046 09-08 18:41:01.502 1183 1183 F DEBUG : signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr -------- 09-08 18:41:01.502 1183 1183 F DEBUG : Abort message: 'Could not read base policy file '/vendor/etc/seccomp_policy/codec2.vendor.base-arm64.policy'' 09-08 18:41:01.502 1183 1183 F DEBUG : x0 0000000000000000 x1 000000000000045f x2 0000000000000006 x3 0000007feb8eb770 09-08 18:41:01.502 1183 1183 F DEBUG : x4 1f646b68651f7862 x5 1f646b68651f7862 x6 1f646b68651f7862 x7 7f7f7f7f7f7f7f7f 09-08 18:41:01.502 1183 1183 F DEBUG : x8 00000000000000f0 x9 000000000000045f x10 ffffff80ffffffdf x11 fffffffffffffffd 09-08 18:41:01.502 1183 1183 F DEBUG : x12 0000007feb8eb6e0 x13 000000000000005d x14 b400007b592708d0 x15 0000000000001556 09-08 18:41:01.502 1183 1183 F DEBUG : x16 0000007c44d34d30 x17 0000007c44d0ed80 x18 0000007c4c334000 x19 000000000000045f 09-08 18:41:01.502 1183 1183 F DEBUG : x20 000000000000045f x21 00000000ffffffff x22 0000007c4b94e000 x23 0000000000000000 09-08 18:41:01.502 1183 1183 F DEBUG : x24 0000007c4b94e000 x25 0000000000000000 x26 0000000000000000 x27 0000000000000000 09-08 18:41:01.502 1183 1183 F DEBUG : x28 0000000000000000 x29 0000007feb8eb7f0 09-08 18:41:01.502 1183 1183 F DEBUG : lr 0000007c44cb3af8 sp 0000007feb8eb750 pc 0000007c44cb3b28 pst 0000000000000000 09-08 18:41:01.502 1183 1183 F DEBUG : 7 total frames 09-08 18:41:01.502 1183 1183 F DEBUG : backtrace: 09-08 18:41:01.502 1183 1183 F DEBUG : #00 pc 000000000005cb28 /apex/com.android.runtime/lib64/bionic/libc.so (abort+168) (BuildId: c93d1a140ae4309e1fe245f371b65776) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#1 pc 000000000000650c /system/lib64/liblog.so (__android_log_default_aborter+12) (BuildId: 4fedcd06dc017905f90f4867f88f7fb1) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#2 pc 00000000000b5560 /apex/com.android.vndk.v34/lib64/libbinder.so (android::base::LogMessage::~LogMessage()+352) (BuildId: ecaf8d435fefbfb6b8ead7955216105b) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#3 pc 0000000000002b38 /vendor/lib64/libavservices_minijail.so (android::SetUpMinijailList(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&) (.cfi)+968) (BuildId: 8e383a241e9281b774145759dc5cf604) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#4 pc 0000000000002718 /vendor/lib64/libavservices_minijail.so (android::SetUpMinijail(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&) (.cfi)+88) (BuildId: 8e383a241e9281b774145759dc5cf604) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#5 pc 0000000000002120 /vendor/bin/hw/vendor.qti.media.c2@1.0-service (main+204) (BuildId: 0657e5d9e535ccf550dc5e12ef6974a1) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#6 pc 0000000000054f08 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104) (BuildId: c93d1a140ae4309e1fe245f371b65776) 09-08 18:41:02.294 1399 1399 F linker : CANNOT LINK EXECUTABLE "/vendor/bin/hw/android.hardware.media.omx@1.0-service": cannot locate symbol "_ZN7android19GraphicBufferSource9configureERKNS_2spINS_16ComponentWrapperEEEiijjj" referenced by "/vendor/lib/vndk/libstagefright_omx.so"... Change-Id: Iee237e289867cfec2863eafbbc5f76de09ccc61c
Klozz
pushed a commit
to Derp-Garden/frameworks_av
that referenced
this pull request
Feb 6, 2024
Log: --------- beginning of crash 09-08 18:41:01.397 1119 1119 F libc : Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 1119 (vendor.qti.medi), pid 1119 (vendor.qti.medi) 09-08 18:41:01.502 1183 1183 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 09-08 18:41:01.502 1183 1183 F DEBUG : Build fingerprint: 'Redmi/sweet_eea/sweet:13/RKQ1.210614.002/V14.0.5.0.TKFEUXM:user/release-keys' 09-08 18:41:01.502 1183 1183 F DEBUG : Revision: '0' 09-08 18:41:01.502 1183 1183 F DEBUG : ABI: 'arm64' 09-08 18:41:01.502 1183 1183 F DEBUG : Timestamp: 1972-09-08 22:41:01.460993955+0000 09-08 18:41:01.502 1183 1183 F DEBUG : Process uptime: 2s 09-08 18:41:01.502 1183 1183 F DEBUG : Cmdline: /vendor/bin/hw/vendor.qti.media.c2@1.0-service 09-08 18:41:01.502 1183 1183 F DEBUG : pid: 1119, tid: 1119, name: vendor.qti.medi >>> /vendor/bin/hw/vendor.qti.media.c2@1.0-service <<< 09-08 18:41:01.502 1183 1183 F DEBUG : uid: 1046 09-08 18:41:01.502 1183 1183 F DEBUG : signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr -------- 09-08 18:41:01.502 1183 1183 F DEBUG : Abort message: 'Could not read base policy file '/vendor/etc/seccomp_policy/codec2.vendor.base-arm64.policy'' 09-08 18:41:01.502 1183 1183 F DEBUG : x0 0000000000000000 x1 000000000000045f x2 0000000000000006 x3 0000007feb8eb770 09-08 18:41:01.502 1183 1183 F DEBUG : x4 1f646b68651f7862 x5 1f646b68651f7862 x6 1f646b68651f7862 x7 7f7f7f7f7f7f7f7f 09-08 18:41:01.502 1183 1183 F DEBUG : x8 00000000000000f0 x9 000000000000045f x10 ffffff80ffffffdf x11 fffffffffffffffd 09-08 18:41:01.502 1183 1183 F DEBUG : x12 0000007feb8eb6e0 x13 000000000000005d x14 b400007b592708d0 x15 0000000000001556 09-08 18:41:01.502 1183 1183 F DEBUG : x16 0000007c44d34d30 x17 0000007c44d0ed80 x18 0000007c4c334000 x19 000000000000045f 09-08 18:41:01.502 1183 1183 F DEBUG : x20 000000000000045f x21 00000000ffffffff x22 0000007c4b94e000 x23 0000000000000000 09-08 18:41:01.502 1183 1183 F DEBUG : x24 0000007c4b94e000 x25 0000000000000000 x26 0000000000000000 x27 0000000000000000 09-08 18:41:01.502 1183 1183 F DEBUG : x28 0000000000000000 x29 0000007feb8eb7f0 09-08 18:41:01.502 1183 1183 F DEBUG : lr 0000007c44cb3af8 sp 0000007feb8eb750 pc 0000007c44cb3b28 pst 0000000000000000 09-08 18:41:01.502 1183 1183 F DEBUG : 7 total frames 09-08 18:41:01.502 1183 1183 F DEBUG : backtrace: 09-08 18:41:01.502 1183 1183 F DEBUG : #00 pc 000000000005cb28 /apex/com.android.runtime/lib64/bionic/libc.so (abort+168) (BuildId: c93d1a140ae4309e1fe245f371b65776) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#1 pc 000000000000650c /system/lib64/liblog.so (__android_log_default_aborter+12) (BuildId: 4fedcd06dc017905f90f4867f88f7fb1) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#2 pc 00000000000b5560 /apex/com.android.vndk.v34/lib64/libbinder.so (android::base::LogMessage::~LogMessage()+352) (BuildId: ecaf8d435fefbfb6b8ead7955216105b) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#3 pc 0000000000002b38 /vendor/lib64/libavservices_minijail.so (android::SetUpMinijailList(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&) (.cfi)+968) (BuildId: 8e383a241e9281b774145759dc5cf604) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#4 pc 0000000000002718 /vendor/lib64/libavservices_minijail.so (android::SetUpMinijail(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&) (.cfi)+88) (BuildId: 8e383a241e9281b774145759dc5cf604) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#5 pc 0000000000002120 /vendor/bin/hw/vendor.qti.media.c2@1.0-service (main+204) (BuildId: 0657e5d9e535ccf550dc5e12ef6974a1) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#6 pc 0000000000054f08 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104) (BuildId: c93d1a140ae4309e1fe245f371b65776) 09-08 18:41:02.294 1399 1399 F linker : CANNOT LINK EXECUTABLE "/vendor/bin/hw/android.hardware.media.omx@1.0-service": cannot locate symbol "_ZN7android19GraphicBufferSource9configureERKNS_2spINS_16ComponentWrapperEEEiijjj" referenced by "/vendor/lib/vndk/libstagefright_omx.so"... Change-Id: Iee237e289867cfec2863eafbbc5f76de09ccc61c
Klozz
pushed a commit
to Derp-Garden/frameworks_av
that referenced
this pull request
Feb 19, 2024
Log: --------- beginning of crash 09-08 18:41:01.397 1119 1119 F libc : Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 1119 (vendor.qti.medi), pid 1119 (vendor.qti.medi) 09-08 18:41:01.502 1183 1183 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 09-08 18:41:01.502 1183 1183 F DEBUG : Build fingerprint: 'Redmi/sweet_eea/sweet:13/RKQ1.210614.002/V14.0.5.0.TKFEUXM:user/release-keys' 09-08 18:41:01.502 1183 1183 F DEBUG : Revision: '0' 09-08 18:41:01.502 1183 1183 F DEBUG : ABI: 'arm64' 09-08 18:41:01.502 1183 1183 F DEBUG : Timestamp: 1972-09-08 22:41:01.460993955+0000 09-08 18:41:01.502 1183 1183 F DEBUG : Process uptime: 2s 09-08 18:41:01.502 1183 1183 F DEBUG : Cmdline: /vendor/bin/hw/vendor.qti.media.c2@1.0-service 09-08 18:41:01.502 1183 1183 F DEBUG : pid: 1119, tid: 1119, name: vendor.qti.medi >>> /vendor/bin/hw/vendor.qti.media.c2@1.0-service <<< 09-08 18:41:01.502 1183 1183 F DEBUG : uid: 1046 09-08 18:41:01.502 1183 1183 F DEBUG : signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr -------- 09-08 18:41:01.502 1183 1183 F DEBUG : Abort message: 'Could not read base policy file '/vendor/etc/seccomp_policy/codec2.vendor.base-arm64.policy'' 09-08 18:41:01.502 1183 1183 F DEBUG : x0 0000000000000000 x1 000000000000045f x2 0000000000000006 x3 0000007feb8eb770 09-08 18:41:01.502 1183 1183 F DEBUG : x4 1f646b68651f7862 x5 1f646b68651f7862 x6 1f646b68651f7862 x7 7f7f7f7f7f7f7f7f 09-08 18:41:01.502 1183 1183 F DEBUG : x8 00000000000000f0 x9 000000000000045f x10 ffffff80ffffffdf x11 fffffffffffffffd 09-08 18:41:01.502 1183 1183 F DEBUG : x12 0000007feb8eb6e0 x13 000000000000005d x14 b400007b592708d0 x15 0000000000001556 09-08 18:41:01.502 1183 1183 F DEBUG : x16 0000007c44d34d30 x17 0000007c44d0ed80 x18 0000007c4c334000 x19 000000000000045f 09-08 18:41:01.502 1183 1183 F DEBUG : x20 000000000000045f x21 00000000ffffffff x22 0000007c4b94e000 x23 0000000000000000 09-08 18:41:01.502 1183 1183 F DEBUG : x24 0000007c4b94e000 x25 0000000000000000 x26 0000000000000000 x27 0000000000000000 09-08 18:41:01.502 1183 1183 F DEBUG : x28 0000000000000000 x29 0000007feb8eb7f0 09-08 18:41:01.502 1183 1183 F DEBUG : lr 0000007c44cb3af8 sp 0000007feb8eb750 pc 0000007c44cb3b28 pst 0000000000000000 09-08 18:41:01.502 1183 1183 F DEBUG : 7 total frames 09-08 18:41:01.502 1183 1183 F DEBUG : backtrace: 09-08 18:41:01.502 1183 1183 F DEBUG : #00 pc 000000000005cb28 /apex/com.android.runtime/lib64/bionic/libc.so (abort+168) (BuildId: c93d1a140ae4309e1fe245f371b65776) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#1 pc 000000000000650c /system/lib64/liblog.so (__android_log_default_aborter+12) (BuildId: 4fedcd06dc017905f90f4867f88f7fb1) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#2 pc 00000000000b5560 /apex/com.android.vndk.v34/lib64/libbinder.so (android::base::LogMessage::~LogMessage()+352) (BuildId: ecaf8d435fefbfb6b8ead7955216105b) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#3 pc 0000000000002b38 /vendor/lib64/libavservices_minijail.so (android::SetUpMinijailList(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&) (.cfi)+968) (BuildId: 8e383a241e9281b774145759dc5cf604) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#4 pc 0000000000002718 /vendor/lib64/libavservices_minijail.so (android::SetUpMinijail(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&) (.cfi)+88) (BuildId: 8e383a241e9281b774145759dc5cf604) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#5 pc 0000000000002120 /vendor/bin/hw/vendor.qti.media.c2@1.0-service (main+204) (BuildId: 0657e5d9e535ccf550dc5e12ef6974a1) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#6 pc 0000000000054f08 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104) (BuildId: c93d1a140ae4309e1fe245f371b65776) 09-08 18:41:02.294 1399 1399 F linker : CANNOT LINK EXECUTABLE "/vendor/bin/hw/android.hardware.media.omx@1.0-service": cannot locate symbol "_ZN7android19GraphicBufferSource9configureERKNS_2spINS_16ComponentWrapperEEEiijjj" referenced by "/vendor/lib/vndk/libstagefright_omx.so"... Change-Id: Iee237e289867cfec2863eafbbc5f76de09ccc61c
Klozz
pushed a commit
to Derp-Garden/frameworks_av
that referenced
this pull request
Mar 9, 2024
Log: --------- beginning of crash 09-08 18:41:01.397 1119 1119 F libc : Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 1119 (vendor.qti.medi), pid 1119 (vendor.qti.medi) 09-08 18:41:01.502 1183 1183 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 09-08 18:41:01.502 1183 1183 F DEBUG : Build fingerprint: 'Redmi/sweet_eea/sweet:13/RKQ1.210614.002/V14.0.5.0.TKFEUXM:user/release-keys' 09-08 18:41:01.502 1183 1183 F DEBUG : Revision: '0' 09-08 18:41:01.502 1183 1183 F DEBUG : ABI: 'arm64' 09-08 18:41:01.502 1183 1183 F DEBUG : Timestamp: 1972-09-08 22:41:01.460993955+0000 09-08 18:41:01.502 1183 1183 F DEBUG : Process uptime: 2s 09-08 18:41:01.502 1183 1183 F DEBUG : Cmdline: /vendor/bin/hw/vendor.qti.media.c2@1.0-service 09-08 18:41:01.502 1183 1183 F DEBUG : pid: 1119, tid: 1119, name: vendor.qti.medi >>> /vendor/bin/hw/vendor.qti.media.c2@1.0-service <<< 09-08 18:41:01.502 1183 1183 F DEBUG : uid: 1046 09-08 18:41:01.502 1183 1183 F DEBUG : signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr -------- 09-08 18:41:01.502 1183 1183 F DEBUG : Abort message: 'Could not read base policy file '/vendor/etc/seccomp_policy/codec2.vendor.base-arm64.policy'' 09-08 18:41:01.502 1183 1183 F DEBUG : x0 0000000000000000 x1 000000000000045f x2 0000000000000006 x3 0000007feb8eb770 09-08 18:41:01.502 1183 1183 F DEBUG : x4 1f646b68651f7862 x5 1f646b68651f7862 x6 1f646b68651f7862 x7 7f7f7f7f7f7f7f7f 09-08 18:41:01.502 1183 1183 F DEBUG : x8 00000000000000f0 x9 000000000000045f x10 ffffff80ffffffdf x11 fffffffffffffffd 09-08 18:41:01.502 1183 1183 F DEBUG : x12 0000007feb8eb6e0 x13 000000000000005d x14 b400007b592708d0 x15 0000000000001556 09-08 18:41:01.502 1183 1183 F DEBUG : x16 0000007c44d34d30 x17 0000007c44d0ed80 x18 0000007c4c334000 x19 000000000000045f 09-08 18:41:01.502 1183 1183 F DEBUG : x20 000000000000045f x21 00000000ffffffff x22 0000007c4b94e000 x23 0000000000000000 09-08 18:41:01.502 1183 1183 F DEBUG : x24 0000007c4b94e000 x25 0000000000000000 x26 0000000000000000 x27 0000000000000000 09-08 18:41:01.502 1183 1183 F DEBUG : x28 0000000000000000 x29 0000007feb8eb7f0 09-08 18:41:01.502 1183 1183 F DEBUG : lr 0000007c44cb3af8 sp 0000007feb8eb750 pc 0000007c44cb3b28 pst 0000000000000000 09-08 18:41:01.502 1183 1183 F DEBUG : 7 total frames 09-08 18:41:01.502 1183 1183 F DEBUG : backtrace: 09-08 18:41:01.502 1183 1183 F DEBUG : #00 pc 000000000005cb28 /apex/com.android.runtime/lib64/bionic/libc.so (abort+168) (BuildId: c93d1a140ae4309e1fe245f371b65776) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#1 pc 000000000000650c /system/lib64/liblog.so (__android_log_default_aborter+12) (BuildId: 4fedcd06dc017905f90f4867f88f7fb1) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#2 pc 00000000000b5560 /apex/com.android.vndk.v34/lib64/libbinder.so (android::base::LogMessage::~LogMessage()+352) (BuildId: ecaf8d435fefbfb6b8ead7955216105b) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#3 pc 0000000000002b38 /vendor/lib64/libavservices_minijail.so (android::SetUpMinijailList(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&) (.cfi)+968) (BuildId: 8e383a241e9281b774145759dc5cf604) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#4 pc 0000000000002718 /vendor/lib64/libavservices_minijail.so (android::SetUpMinijail(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&) (.cfi)+88) (BuildId: 8e383a241e9281b774145759dc5cf604) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#5 pc 0000000000002120 /vendor/bin/hw/vendor.qti.media.c2@1.0-service (main+204) (BuildId: 0657e5d9e535ccf550dc5e12ef6974a1) 09-08 18:41:01.502 1183 1183 F DEBUG : DerpFest-AOSP#6 pc 0000000000054f08 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104) (BuildId: c93d1a140ae4309e1fe245f371b65776) 09-08 18:41:02.294 1399 1399 F linker : CANNOT LINK EXECUTABLE "/vendor/bin/hw/android.hardware.media.omx@1.0-service": cannot locate symbol "_ZN7android19GraphicBufferSource9configureERKNS_2spINS_16ComponentWrapperEEEiijjj" referenced by "/vendor/lib/vndk/libstagefright_omx.so"... Change-Id: Iee237e289867cfec2863eafbbc5f76de09ccc61c
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
…Mi9 declares AUDIO_STREAM_PATCH and AUDIO_STREAM_REROUTING which is defined by framework too
Change-Id: I794fe22d63a8af705be4f5f09b9879ecaab3eae5