activitywatch icon indicating copy to clipboard operation
activitywatch copied to clipboard

Android app crashes instantly in GrapheneOS

Open jvmap opened this issue 1 year ago • 3 comments

  • [x] I am on the latest ActivityWatch version.
  • [x] I have searched the issues of this repo and believe that this is not a duplicate.
  • OS version: GrapheneOS (Android 14)
  • ActivityWatch version: 0.12.1b5 (33)

Describe the bug

When opening the ActivityWatch, a white screen shows. After some time, I get the message 'ActivityWatch is not responding', leading to the error message below.

To Reproduce

1. Open ActivityWatch app
2. Wait
3. See error

Expected behavior

I'm new to ActivityWatch, but obviously just crashing is not the desired behavior.

Documentation

This is the error message I got:

type: crash
osVersion: google/bluejay/bluejay:14/UQ1A.231205.015/2023123100:user/release-keys
package: net.activitywatch.android:33
process: net.activitywatch.android
processUptime: 0 + 0 ms
installer: com.aurora.store

signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------

backtrace:
      #00 pc 0000000000062ea4  /apex/com.android.runtime/lib64/bionic/libc.so (abort+164) (BuildId: 683448b69f8aa065d6038085038e8da0)
      #01 pc 00000000018ee0b8  /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/split_config.arm64_v8a.apk (offset 0x1000)
      #02 pc 00000000018ebd14  /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/split_config.arm64_v8a.apk (offset 0x1000)
      #03 pc 00000000018ebacc  /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/split_config.arm64_v8a.apk (offset 0x1000)
      #04 pc 00000000018eb7f8  /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/split_config.arm64_v8a.apk (offset 0x1000)
      #05 pc 00000000018ea5a8  /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/split_config.arm64_v8a.apk (offset 0x1000)
      #06 pc 00000000018eb544  /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/split_config.arm64_v8a.apk (offset 0x1000)
      #07 pc 000000000190c800  /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/split_config.arm64_v8a.apk (offset 0x1000)
      #08 pc 000000000190cba0  /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/split_config.arm64_v8a.apk (offset 0x1000)
      #09 pc 00000000013f6088  /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/split_config.arm64_v8a.apk (offset 0x1000)
      #10 pc 00000000013e91f4  /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/split_config.arm64_v8a.apk (offset 0x1000)
      #11 pc 00000000014af230  /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/split_config.arm64_v8a.apk (offset 0x1000)
      #12 pc 00000000013ebaac  /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/split_config.arm64_v8a.apk (offset 0x1000)
      #13 pc 0000000001491284  /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/split_config.arm64_v8a.apk (offset 0x1000)
      #14 pc 0000000001481114  /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/split_config.arm64_v8a.apk (offset 0x1000) (Java_net_activitywatch_android_RustInterface_startServer+132)
      #15 pc 0000000000227430  /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+144) (BuildId: fddb1d9077c752c3861f69e7578f5207)
      #16 pc 000000000020a330  /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: fddb1d9077c752c3861f69e7578f5207)
      #17 pc 000000000045ed66  [anon:dalvik-classes.dex extracted in memory from /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/base.apk] (net.activitywatch.android.RustInterface.startServerTask$lambda$1+34)
      #18 pc 00000000002093b4  /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: fddb1d9077c752c3861f69e7578f5207)
      #19 pc 000000000045ea44  [anon:dalvik-classes.dex extracted in memory from /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/base.apk] (net.activitywatch.android.RustInterface.$r8$lambda$7UKuSJpnUWjEEDmYgE6qViZF4Ro+0)
      #20 pc 00000000002093b4  /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: fddb1d9077c752c3861f69e7578f5207)
      #21 pc 000000000045e894  [anon:dalvik-classes.dex extracted in memory from /data/app/~~5jo0BI6JhJ0oVDaDqP39Dw==/net.activitywatch.android-poNyfcyEWAb2aYw2QuzcTA==/base.apk] (net.activitywatch.android.RustInterface$$ExternalSyntheticLambda1.run+8)
      #22 pc 00000000002b3d3c  /system/framework/arm64/boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+796) (BuildId: 1348f1c03b740c7d44cc624fe7a2affb180c42a1)
      #23 pc 00000000002b0e60  /system/framework/arm64/boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+64) (BuildId: 1348f1c03b740c7d44cc624fe7a2affb180c42a1)
      #24 pc 000000000015f828  /system/framework/arm64/boot.oat (java.lang.Thread.run+72) (BuildId: 1348f1c03b740c7d44cc624fe7a2affb180c42a1)
      #25 pc 00000000002109a4  /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+612) (BuildId: fddb1d9077c752c3861f69e7578f5207)
      #26 pc 0000000000253b3c  /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+172) (BuildId: fddb1d9077c752c3861f69e7578f5207)
      #27 pc 000000000069abc8  /apex/com.android.art/lib64/libart.so (art::Thread::CreateCallback(void*)+1416) (BuildId: fddb1d9077c752c3861f69e7578f5207)
      #28 pc 00000000000cfa2c  /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+204) (BuildId: 683448b69f8aa065d6038085038e8da0)
      #29 pc 0000000000064770  /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64) (BuildId: 683448b69f8aa065d6038085038e8da0)


Additional context

  • I'm using GrapheneOS, which is a hardenend versioned of AOSP.
  • I don't have Google Play Services installed, or any other Google stuff.
  • This is not a one-time occurrence: the app won't start at all.
  • I'm a developer (mostly .NET, though) and may be able to assist with solving this issue, although I don't know where to start.

jvmap avatar Jan 02 '24 14:01 jvmap

Hi there! As you're new to this repo, please make sure you've used an appropriate issue template and searched for duplicates (it helps us focus on actual development!). We'd also like to suggest that you read our contribution guidelines and our code of conduct. Thanks a bunch for opening your first issue! 🙏

github-actions[bot] avatar Jan 02 '24 14:01 github-actions[bot]

I have the same issue.

Hris2023 avatar Jan 19 '24 16:01 Hris2023

I can confirm the apk from GitHub doesn't start on GrapheneOS

Details

type: crash
osVersion: google/sunfish/sunfish:13/TQ3A.230805.001.S1/2024070401:user/release-keys
package: net.activitywatch.android:34
process: net.activitywatch.android
processUptime: 0 + 0 ms
installer: com.android.packageinstaller

signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------

backtrace:
      #00 pc 000000000005b004  /apex/com.android.runtime/lib64/bionic/libc.so (abort+164) (BuildId: 61deb31c5b39d5f735b66f2155a38a77)
      #01 pc 00000000018ee0b8  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/base.apk (offset 0x32a000)
      #02 pc 00000000018ebd14  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/base.apk (offset 0x32a000)
      #03 pc 00000000018ebacc  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/base.apk (offset 0x32a000)
      #04 pc 00000000018eb7f8  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/base.apk (offset 0x32a000)
      #05 pc 00000000018ea5a8  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/base.apk (offset 0x32a000)
      #06 pc 00000000018eb544  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/base.apk (offset 0x32a000)
      #07 pc 000000000190c800  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/base.apk (offset 0x32a000)
      #08 pc 000000000190cba0  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/base.apk (offset 0x32a000)
      #09 pc 00000000013f6088  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/base.apk (offset 0x32a000)
      #10 pc 00000000013e91f4  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/base.apk (offset 0x32a000)
      #11 pc 00000000014af230  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/base.apk (offset 0x32a000)
      #12 pc 00000000013ebaac  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/base.apk (offset 0x32a000)
      #13 pc 0000000001491284  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/base.apk (offset 0x32a000)
      #14 pc 0000000001481114  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/base.apk (offset 0x32a000) (Java_net_activitywatch_android_RustInterface_startServer+132)
      #15 pc 00000000008a3b04  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/oat/arm64/base.odex (art_jni_trampoline+116)
      #16 pc 00000000008a2c10  /data/app/~~sa0b8eRxhbdJwSsy4neVZQ==/net.activitywatch.android-biazY6fdkwRcuvbmSn-cng==/oat/arm64/base.odex (net.activitywatch.android.RustInterface$$ExternalSyntheticLambda1.run+320)
      #17 pc 000000000030939c  /system/framework/arm64/boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+1068) (BuildId: e21fbf2d987523fce41cc38674b638abd51ea184)
      #18 pc 00000000003062b8  /system/framework/arm64/boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+72) (BuildId: e21fbf2d987523fce41cc38674b638abd51ea184)
      #19 pc 000000000017ff10  /system/framework/arm64/boot.oat (java.lang.Thread.run+80) (BuildId: e21fbf2d987523fce41cc38674b638abd51ea184)
      #20 pc 000000000021096c  /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+556) (BuildId: b3370dc9af1d9c95768ec7560877c4bf)
      #21 pc 0000000000279df8  /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+184) (BuildId: b3370dc9af1d9c95768ec7560877c4bf)
      #22 pc 0000000000621e1c  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeVirtualOrInterfaceWithJValues<art::ArtMethod*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, jvalue const*)+460) (BuildId: b3370dc9af1d9c95768ec7560877c4bf)
      #23 pc 000000000066a6e0  /apex/com.andro

derkrasseleo avatar Jul 21 '24 18:07 derkrasseleo