Skip to content
This repository has been archived by the owner on Aug 8, 2023. It is now read-only.

Android MapBox crashes when access non-attached layer #13797

Closed
AlexanderEggers opened this issue Jan 25, 2019 · 1 comment
Closed

Android MapBox crashes when access non-attached layer #13797

AlexanderEggers opened this issue Jan 25, 2019 · 1 comment
Labels
Android Mapbox Maps SDK for Android archived Archived because of inactivity crash

Comments

@AlexanderEggers
Copy link
Contributor

AlexanderEggers commented Jan 25, 2019

I already solved this problem to avoid this crash but I still think this exception should be caught differently by mapbox. Let's assume I have an app which is using a set of layers. For some reasons I have a state within the app when the app is trying to check the visibility of layers which are not attached to mapbox anymore. This can be reproduced when you change the orientation, have your app handle config change and not the system and your code is not re-adding the any layers to mapbox. When the app is trying to access one of the old layers via getVisibility/setProperties(visibility) (triggered via onCameraMoved) the following crash happens (all layers are kept as a seperate list to simplify the access to check which one should be displayed):

2019-01-25 15:08:13.133 15443-15443/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: Build fingerprint: 'google/marlin/marlin:9/PQ1A.190105.004/5148680:user/release-keys'
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: Revision: '0'
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: ABI: 'arm64'
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: pid: 15346, tid: 15346, name: myapp.android.dev >>> myapp.android.dev <<<
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x98
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: Cause: null pointer dereference
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: x0 00000072d3bd0d20 x1 0000007fe8f9b840 x2 0000000000000000 x3 00000072e980c6f8
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: x4 0000007fe8f9b828 x5 0080000000800000 x6 02ff2f4900ff5528 x7 7f7f7f7f7f7f7f7f
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: x8 0000000000000000 x9 0000000000000000 x10 00000072d1984208 x11 00000072e98dd688
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: x12 0000000013896650 x13 0000007fe8f9e138 x14 00000072e97fb320 x15 0000000000000000
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: x16 00000072e98da3c8 x17 000000736addfa80 x18 000000000000001b x19 00000072e9ae0460
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: x20 0000000000000000 x21 00000072e9a14c00 x22 0000007fe8f9bc80 x23 00000072d42c1406
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: x24 000000736f3fe5e0 x25 000000736f3fe5e0 x26 00000072e9a14ca0 x27 0000000000000001
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: x28 0000007fe8f9b9b0 x29 0000007fe8f9b980
2019-01-25 15:08:13.134 15443-15443/? A/DEBUG: sp 0000007fe8f9b900 lr 00000072d15eb808 pc 00000072d15eb81c
2019-01-25 15:08:13.278 15443-15443/? A/DEBUG: backtrace:
2019-01-25 15:08:13.278 15443-15443/? A/DEBUG: #00 pc 000000000012481c /data/app/myapp.android.dev-jxsQCqA3GyIxMHlQWiousQ==/lib/arm64/libmapbox-gl.so
2019-01-25 15:08:13.278 15443-15443/? A/DEBUG: #1 pc 00000000005693e0 /system/lib64/libart.so (art_quick_generic_jni_trampoline+144)
2019-01-25 15:08:13.278 15443-15443/? A/DEBUG: #2 pc 0000000000560388 /system/lib64/libart.so (art_quick_invoke_stub+584)
2019-01-25 15:08:13.278 15443-15443/? A/DEBUG: #3 pc 00000000000cf6b8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2019-01-25 15:08:13.278 15443-15443/? A/DEBUG: #4 pc 0000000000282afc /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #5 pc 000000000027cbac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+960)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #6 pc 000000000052fabc /system/lib64/libart.so (MterpInvokeVirtual+576)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #7 pc 0000000000552994 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #8 pc 00000000003b228e /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/myapp.android.dev-jxsQCqA3GyIxMHlQWiousQ==/split_lib_dependencies_apk.apk (deleted) (com.mapbox.mapboxsdk.style.layers.Layer.getVisibility+14)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #9 pc 0000000000256d0c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1704664215+488)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #10 pc 000000000025c8bc /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #11 pc 000000000027cb90 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+932)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #12 pc 000000000052fabc /system/lib64/libart.so (MterpInvokeVirtual+576)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #13 pc 0000000000552994 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #14 pc 0000000000022980 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/myapp.android.dev-jxsQCqA3GyIxMHlQWiousQ==/split_lib_slice_1_apk.apk (deleted) (myapp.mapbox.MapBoxLayer.checkVisibility+84)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #15 pc 0000000000256d0c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1704664215+488)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #16 pc 000000000025c8bc /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #17 pc 000000000027cb90 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+932)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #18 pc 000000000052fabc /system/lib64/libart.so (MterpInvokeVirtual+576)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #19 pc 0000000000552994 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #20 pc 00000000000a9cc4 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/myapp.android.dev-jxsQCqA3GyIxMHlQWiousQ==/split_lib_slice_5_apk.apk (deleted) (au.gov.vic.dewlp.ffmv.moretoexplore.mapbox.view.CustomMapView.onCameraMove+180)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #21 pc 0000000000256d0c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1704664215+488)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #22 pc 000000000025c8bc /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #23 pc 000000000027cb90 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+932)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #24 pc 0000000000530a10 /system/lib64/libart.so (MterpInvokeInterface+1376)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #25 pc 0000000000552b94 /system/lib64/libart.so (ExecuteMterpImpl+14740)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #26 pc 000000000039bb84 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/myapp.android.dev-jxsQCqA3GyIxMHlQWiousQ==/split_lib_dependencies_apk.apk (deleted) (com.mapbox.mapboxsdk.maps.CameraChangeDispatcher.executeOnCameraMove+60)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #27 pc 0000000000256d0c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1704664215+488)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #28 pc 000000000025c8bc /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #29 pc 000000000027cb90 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+932)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #30 pc 0000000000530dc4 /system/lib64/libart.so (MterpInvokeDirect+284)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #31 pc 0000000000552a94 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #32 pc 000000000039ba2c /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/myapp.android.dev-jxsQCqA3GyIxMHlQWiousQ==/split_lib_dependencies_apk.apk (deleted) (com.mapbox.mapboxsdk.maps.CameraChangeDispatcher.access$100)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #33 pc 0000000000256d0c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1704664215+488)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #34 pc 000000000025c8bc /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #35 pc 000000000027cb90 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+932)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #36 pc 0000000000530f84 /system/lib64/libart.so (MterpInvokeStatic+200)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #37 pc 0000000000552b14 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #38 pc 000000000039b8d4 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/myapp.android.dev-jxsQCqA3GyIxMHlQWiousQ==/split_lib_dependencies_apk.apk (deleted) (com.mapbox.mapboxsdk.maps.CameraChangeDispatcher$CameraChangeHandler.handleMessage+48)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #39 pc 0000000000256d0c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1704664215+488)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #40 pc 000000000025c8bc /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #41 pc 000000000027cb90 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+932)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #42 pc 000000000052fabc /system/lib64/libart.so (MterpInvokeVirtual+576)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #43 pc 0000000000552994 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #44 pc 0000000000ae4c52 /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42)
2019-01-25 15:08:13.279 15443-15443/? A/DEBUG: #45 pc 0000000000256d0c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1704664215+488)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #46 pc 000000000025c8bc /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #47 pc 000000000027cb90 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+932)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #48 pc 000000000052fabc /system/lib64/libart.so (MterpInvokeVirtual+576)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #49 pc 0000000000552994 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #50 pc 0000000000aebd40 /system/framework/boot-framework.vdex (android.os.Looper.loop+404)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #51 pc 0000000000256d0c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1704664215+488)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #52 pc 000000000025c8bc /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #53 pc 000000000027cb90 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+932)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #54 pc 0000000000530f84 /system/lib64/libart.so (MterpInvokeStatic+200)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #55 pc 0000000000552b14 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #56 pc 0000000000385452 /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #57 pc 0000000000256d0c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1704664215+488)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #58 pc 0000000000520284 /system/lib64/libart.so (artQuickToInterpreterBridge+944)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #59 pc 00000000005694fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #60 pc 000000000056064c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #61 pc 00000000000cf6d8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #62 pc 00000000004661e4 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #63 pc 0000000000467d38 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #64 pc 00000000003f6728 /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #65 pc 000000000011e6d4 /system/framework/arm64/boot.oat (offset 0x114000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #66 pc 0000000000560388 /system/lib64/libart.so (art_quick_invoke_stub+584)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #67 pc 00000000000cf6b8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #68 pc 0000000000282afc /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #69 pc 000000000027cbac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+960)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #70 pc 000000000052fabc /system/lib64/libart.so (MterpInvokeVirtual+576)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #71 pc 0000000000552994 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #72 pc 0000000000c0cc3e /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #73 pc 0000000000256d0c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1704664215+488)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #74 pc 0000000000520284 /system/lib64/libart.so (artQuickToInterpreterBridge+944)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #75 pc 00000000005694fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #76 pc 0000000000beaf20 /system/framework/arm64/boot-framework.oat (offset 0x3cd000) (com.android.internal.os.ZygoteInit.main+3088)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #77 pc 000000000056064c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #78 pc 00000000000cf6d8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #79 pc 00000000004661e4 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #80 pc 0000000000465de8 /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+424)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #81 pc 0000000000368494 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+652)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #82 pc 00000000000b1cfc /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+136)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #83 pc 00000000000b4688 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+752)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #84 pc 000000000000219c /system/bin/app_process64 (main+1200)
2019-01-25 15:08:13.280 15443-15443/? A/DEBUG: #85 pc 00000000000b05d8 /system/lib64/libc.so (__libc_init+88)

Instead of this crash it might be more useful to show a warning instead.

Configuration

Android versions: 9.0.0
Device models: Pixel XL
(Verified with) Mapbox SDK versions: 7.0.x/7.x.0

@stale
Copy link

stale bot commented Jan 14, 2020

This issue has been automatically detected as stale because it has not had recent activity and will be archived. Thank you for your contributions.

@stale stale bot closed this as completed Jan 14, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Android Mapbox Maps SDK for Android archived Archived because of inactivity crash
Projects
None yet
Development

No branches or pull requests

3 participants