weixin_39995297
weixin_39995297
2020-11-26 07:55

Fails to call numpy fft on android

Versions

  • Python: 3.7.1
  • OS: Android 8.1.0
  • Buildozer: 0.39

Description

I am trying to use the numpy fft for real input in an android app. But when I use it I get SIGSEGV everytime. The simple program below illustrates the problem. Thanks.

import numpy as np import platform

print("platform.python_version() == ", platform.python_version()) print("np.version == ", np.version )

data = np.array([0.1, 0.2, 0.5, 0.5, 0.6, 0.1, 0.9, 0.8]) print(" Now crazy starts: ") result = np.fft.rfft(data)

print(" Result: ", result, " Finished!")

buildozer.spec

Command:

sh
buildozer android debug

Spec file:


[app]

# (str) Title of your application
title = Test App

# (str) Package name
package.name = myapp

# (str) Package domain (needed for android/ios packaging)
package.domain = org.test

# (str) Source code where the main.py live
source.dir = .

# (list) Source files to include (let empty to include all the files)
source.include_exts = py,png,jpg,kv,atlas

# (list) List of inclusions using pattern matching
#source.include_patterns = assets/*,images/*.png

# (list) Source files to exclude (let empty to not exclude anything)
#source.exclude_exts = spec

# (list) List of directory to exclude (let empty to not exclude anything)
#source.exclude_dirs = tests, bin

# (list) List of exclusions using pattern matching
#source.exclude_patterns = license,images/*/*.jpg

# (str) Application versioning (method 1)
version = 0.1

# (str) Application versioning (method 2)
# version.regex = __version__ = ['"](.*)['"]
# version.filename = %(source.dir)s/main.py

# (list) Application requirements
# comma separated e.g. requirements = sqlite3,kivy
requirements = python3,kivy,numpy

# (str) Custom source folders for requirements
# Sets custom source for any requirements with recipes
# requirements.source.kivy = ../../kivy

# (list) Garden requirements
#garden_requirements =

# (str) Presplash of the application
#presplash.filename = %(source.dir)s/data/presplash.png

# (str) Icon of the application
#icon.filename = %(source.dir)s/data/icon.png

# (str) Supported orientation (one of landscape, sensorLandscape, portrait or all)
orientation = portrait

# (list) List of service to declare
#services = NAME:ENTRYPOINT_TO_PY,NAME2:ENTRYPOINT2_TO_PY

#
# OSX Specific
#

#
# author = © Copyright Info

# change the major version of python used by the app
osx.python_version = 3

# Kivy version to use
osx.kivy_version = 1.10.1

#
# Android specific
#

# (bool) Indicate if the application should be fullscreen or not
fullscreen = 0

# (string) Presplash background color (for new android toolchain)
# Supported formats are: #RRGGBB #AARRGGBB or one of the following names:
# red, blue, green, black, white, gray, cyan, magenta, yellow, lightgray,
# darkgray, grey, lightgrey, darkgrey, aqua, fuchsia, lime, maroon, navy,
# olive, purple, silver, teal.
#android.presplash_color = #FFFFFF

# (list) Permissions
#android.permissions = INTERNET
android.permissions = RECORD_AUDIO

# (int) Target Android API, should be as high as possible.
android.api = 27

# (int) Minimum API your APK will support.
android.minapi = 26

# (int) Android SDK version to use
#android.sdk = 20

# (str) Android NDK version to use
#android.ndk = 17c

# (int) Android NDK API to use. This is the minimum API your app will support, it should usually match android.minapi.
android.ndk_api = 26

# (bool) Use --private data storage (True) or --dir public storage (False)
#android.private_storage = True

# (str) Android NDK directory (if empty, it will be automatically downloaded.)
#android.ndk_path =

# (str) Android SDK directory (if empty, it will be automatically downloaded.)
#android.sdk_path =

# (str) ANT directory (if empty, it will be automatically downloaded.)
#android.ant_path =

# (bool) If True, then skip trying to update the Android sdk
# This can be useful to avoid excess Internet downloads or save time
# when an update is due and you just want to test/build your package
# android.skip_update = False

# (bool) If True, then automatically accept SDK license
# agreements. This is intended for automation only. If set to False,
# the default, you will be shown the license when first running
# buildozer.
# android.accept_sdk_license = False

# (str) Android entry point, default is ok for Kivy-based app
#android.entrypoint = org.renpy.android.PythonActivity

# (list) Pattern to whitelist for the whole project
#android.whitelist =

# (str) Path to a custom whitelist file
#android.whitelist_src =

# (str) Path to a custom blacklist file
#android.blacklist_src =

# (list) List of Java .jar files to add to the libs so that pyjnius can access
# their classes. Don't add jars that you do not need, since extra jars can slow
# down the build process. Allows wildcards matching, for example:
# OUYA-ODK/libs/*.jar
#android.add_jars = foo.jar,bar.jar,path/to/more/*.jar

# (list) List of Java files to add to the android project (can be java or a
# directory containing the files)
android.add_src = %(source.dir)s/java_classes

# (list) Android AAR archives to add (currently works only with sdl2_gradle
# bootstrap)
#android.add_aars =

# (list) Gradle dependencies to add (currently works only with sdl2_gradle
# bootstrap)
#android.gradle_dependencies =

# (list) Java classes to add as activities to the manifest.
#android.add_activites = com.example.ExampleActivity

# (str) python-for-android branch to use, defaults to master
#p4a.branch = master

# (str) OUYA Console category. Should be one of GAME or APP
# If you leave this blank, OUYA support will not be enabled
#android.ouya.category = GAME

# (str) Filename of OUYA Console icon. It must be a 732x412 png image.
#android.ouya.icon.filename = %(source.dir)s/data/ouya_icon.png

# (str) XML file to include as an intent filters in <activity> tag
#android.manifest.intent_filters =

# (str) launchMode to set for the main activity
#android.manifest.launch_mode = standard

# (list) Android additional libraries to copy into libs/armeabi
#android.add_libs_armeabi = libs/android/*.so
#android.add_libs_armeabi_v7a = libs/android-v7/*.so
#android.add_libs_x86 = libs/android-x86/*.so
#android.add_libs_mips = libs/android-mips/*.so

# (bool) Indicate whether the screen should stay on
# Don't forget to add the WAKE_LOCK permission if you set this to True
#android.wakelock = False

# (list) Android application meta-data to set (key=value format)
#android.meta_data =

# (list) Android library project to add (will be added in the
# project.properties automatically.)
#android.library_references =

# (str) Android logcat filters to use
#android.logcat_filters = *:S python:D

# (bool) Copy library instead of making a libpymodules.so
#android.copy_libs = 1

# (str) The Android arch to build for, choices: armeabi-v7a, arm64-v8a, x86, x86_64
android.arch = armeabi-v7a

#
# Python for android (p4a) specific
#

# (str) python-for-android git clone directory (if empty, it will be automatically cloned from github)
#p4a.source_dir =

# (str) The directory in which python-for-android should look for your own build recipes (if any)
#p4a.local_recipes =

# (str) Filename to the hook for p4a
#p4a.hook =

# (str) Bootstrap to use for android builds
# p4a.bootstrap = sdl2

# (int) port number to specify an explicit --port= p4a argument (eg for bootstrap flask)
#p4a.port =


#
# iOS specific
#

# (str) Path to a custom kivy-ios folder
#ios.kivy_ios_dir = ../kivy-ios
# Alternately, specify the URL and branch of a git checkout:
ios.kivy_ios_url = https://github.com/kivy/kivy-ios
ios.kivy_ios_branch = master

# Another platform dependency: ios-deploy
# Uncomment to use a custom checkout
#ios.ios_deploy_dir = ../ios_deploy
# Or specify URL and branch
ios.ios_deploy_url = https://github.com/phonegap/ios-deploy
ios.ios_deploy_branch = 1.7.0

# (str) Name of the certificate to use for signing the debug version
# Get a list of available identities: buildozer ios list_identities
#ios.codesign.debug = "iPhone Developer: <lastname> <firstname> (<hexstring>)"

# (str) Name of the certificate to use for signing the release version
#ios.codesign.release = %(ios.codesign.debug)s


[buildozer]

# (int) Log level (0 = error only, 1 = info, 2 = debug (with command output))
log_level = 2

# (int) Display warning if buildozer is run as root (0 = False, 1 = True)
warn_on_root = 1

# (str) Path to build artifact storage, absolute or relative to spec file
# build_dir = ./.buildozer

# (str) Path to build output (i.e. .apk, .ipa) storage
# bin_dir = ./bin

#    -----------------------------------------------------------------------------
#    List as sections
#
#    You can define all the "list" as [section:key].
#    Each line will be considered as a option to the list.
#    Let's take [app] / source.exclude_patterns.
#    Instead of doing:
#
#[app]
#source.exclude_patterns = license,data/audio/*.wav,data/images/original/*
#
#    This can be translated into:
#
#[app:source.exclude_patterns]
#license
#data/audio/*.wav
#data/images/original/*
#


#    -----------------------------------------------------------------------------
#    Profiles
#
#    You can extend section / key with a profile
#    For example, you want to deploy a demo version of your application without
#    HD content. You could first change the title to add "(demo)" in the name
#    and extend the excluded directories to remove the HD content.
#
#[app]
#title = My Application (demo)
#
#[app:source.exclude_patterns]
#images/hd/*
#
</hexstring></firstname></lastname></activity>

Logs


05-17 15:08:10.662 22511 22557 I python  : Android kivy bootstrap done. __name__ is __main__
05-17 15:08:10.662 22511 22557 I python  : AND: Ran string
05-17 15:08:10.662 22511 22557 I python  : Run user program, change dir and execute entrypoint
05-17 15:08:10.868  1139  1441 D WifiTrafficPoller: TrafficStats TxPkts=494654 RxPkts=1371983 TxBytes=59343577 RxBytes=743996844 , Foreground uid=10214 pkgName=org.test.myapp txBytes=1480 rxBytes=12656
05-17 15:08:11.087 22511 22557 I python  : platform.python_version() ==  3.7.1
05-17 15:08:11.087 22511 22557 I python  : np.__version__ ==  1.15.1
05-17 15:08:11.087 22511 22557 I python  :     Now crazy starts: 
--------- beginning of crash
05-17 15:08:11.089 22511 22557 F libc    : Fatal signal 11 (SIGSEGV), code 1, fault addr 0x0 in tid 22557 (SDLThread), pid 22511 (org.test.myapp)
05-17 15:08:11.128 22562 22562 E propClient: PropClient failed to load
05-17 15:08:11.137   743   743 E audit   : type=1400 audit(1558102091.127:5463): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.138   743   743 E audit   : type=1300 audit(1558102091.127:5463): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942000 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.138   743   743 E audit   : type=1327 audit(1558102091.127:5463): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.138   743   743 E audit   : type=1400 audit(1558102091.127:5464): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.138   743   743 E audit   : type=1300 audit(1558102091.127:5464): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942120 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.138   743   743 E audit   : type=1327 audit(1558102091.127:5464): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.138   743   743 E audit   : type=1400 audit(1558102091.127:5465): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.138   743   743 E audit   : type=1300 audit(1558102091.127:5465): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0973000 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.138   743   743 E audit   : type=1327 audit(1558102091.127:5465): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.138   743   743 E audit   : type=1400 audit(1558102091.127:5466): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.138   743   743 E audit   : type=1300 audit(1558102091.127:5466): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942240 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.138   743   743 E audit   : type=1327 audit(1558102091.127:5466): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.138   743   743 E audit   : type=1400 audit(1558102091.127:5467): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.138   743   743 E audit   : type=1300 audit(1558102091.127:5467): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f093d370 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.138   743   743 E audit   : type=1327 audit(1558102091.127:5467): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.138   743   743 E audit   : type=1400 audit(1558102091.137:5468): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.138   743   743 E audit   : type=1300 audit(1558102091.137:5468): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942360 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.138   743   743 E audit   : type=1327 audit(1558102091.137:5468): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.138   743   743 E audit   : type=1400 audit(1558102091.137:5469): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.138   743   743 E audit   : type=1300 audit(1558102091.137:5469): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942480 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.138   743   743 E audit   : type=1327 audit(1558102091.137:5469): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.139   743   743 E audit   : type=1400 audit(1558102091.137:5470): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.139   743   743 E audit   : type=1300 audit(1558102091.137:5470): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f09425a0 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.139   743   743 E audit   : type=1327 audit(1558102091.137:5470): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.139   743   743 E audit   : type=1400 audit(1558102091.137:5471): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.139   743   743 E audit   : type=1300 audit(1558102091.137:5471): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f09426c0 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.139   743   743 E audit   : type=1327 audit(1558102091.137:5471): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.139   743   743 E audit   : type=1400 audit(1558102091.137:5472): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.139   743   743 E audit   : type=1300 audit(1558102091.137:5472): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f09427e0 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.139   743   743 E audit   : type=1327 audit(1558102091.137:5472): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.139   743   743 E audit   : type=1400 audit(1558102091.137:5473): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.139   743   743 E audit   : type=1300 audit(1558102091.137:5473): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942900 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.139   743   743 E audit   : type=1327 audit(1558102091.137:5473): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.139   743   743 E audit   : type=1400 audit(1558102091.137:5474): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.139   743   743 E audit   : type=1300 audit(1558102091.137:5474): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942a20 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.139   743   743 E audit   : type=1327 audit(1558102091.137:5474): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.139   743   743 E audit   : type=1400 audit(1558102091.137:5475): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.139   743   743 E audit   : type=1300 audit(1558102091.137:5475): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942b40 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.139   743   743 E audit   : type=1327 audit(1558102091.137:5475): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.139   743   743 E audit   : type=1400 audit(1558102091.137:5476): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.139   743   743 E audit   : type=1300 audit(1558102091.137:5476): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942c60 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.140   743   743 E audit   : type=1327 audit(1558102091.137:5476): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.140   743   743 E audit   : type=1400 audit(1558102091.137:5477): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.140   743   743 E audit   : type=1300 audit(1558102091.137:5477): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f093d460 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.140   743   743 E audit   : type=1327 audit(1558102091.137:5477): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.140   743   743 E audit   : type=1400 audit(1558102091.137:5478): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.140   743   743 E audit   : type=1300 audit(1558102091.137:5478): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f093d550 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.140   743   743 E audit   : type=1327 audit(1558102091.137:5478): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.141   743   743 E audit   : type=1400 audit(1558102091.137:5479): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.141   743   743 E audit   : type=1300 audit(1558102091.137:5479): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942d80 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.141   743   743 E audit   : type=1327 audit(1558102091.137:5479): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.141   743   743 E audit   : type=1400 audit(1558102091.137:5480): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.141   743   743 E audit   : type=1300 audit(1558102091.137:5480): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942ea0 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.141   743   743 E audit   : type=1327 audit(1558102091.137:5480): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.162   743   743 E audit   : type=1400 audit(1558102091.157:5481): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="app" dev="dm-3" ino=131071 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.162   743   743 E audit   : type=1300 audit(1558102091.157:5481): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0922f50 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.162   743   743 E audit   : type=1327 audit(1558102091.157:5481): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.168 22563 22563 I crash_dump32: obtaining output fd from tombstoned, type: kDebuggerdTombstone
05-17 15:08:11.169   858   858 I /system/bin/tombstoned: received crash request for pid 22511
05-17 15:08:11.171 22563 22563 I crash_dump32: performing dump of process 22511 (target tid = 22557)
05-17 15:08:11.171 22563 22563 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
05-17 15:08:11.171 22563 22563 F DEBUG   : Build fingerprint: 'samsung/gta2xlwifixx/gta2xlwifi:8.1.0/M1AJQ/T590XXU2ASC1:user/release-keys'
05-17 15:08:11.171 22563 22563 F DEBUG   : Revision: '5'
05-17 15:08:11.172 22563 22563 F DEBUG   : ABI: 'arm'
05-17 15:08:11.172 22563 22563 F DEBUG   : pid: 22511, tid: 22557, name: SDLThread  >>> org.test.myapp <<<
05-17 15:08:11.172 22563 22563 F DEBUG   : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0
05-17 15:08:11.172 22563 22563 F DEBUG   : Cause: null pointer dereference
05-17 15:08:11.172 22563 22563 F DEBUG   :     r0 00000000  r1 c88a4378  r2 00000001  r3 c8116de0
05-17 15:08:11.172 22563 22563 F DEBUG   :     r4 c804ab59  r5 c76f1110  r6 c8117048  r7 dfa9862c
05-17 15:08:11.172 22563 22563 F DEBUG   :     r8 00000000  r9 00000001  sl d59fedb0  fp c86b7458
05-17 15:08:11.172 22563 22563 F DEBUG   :     ip c811a884  sp c86b73e8  lr c80a8b57  pc c80a8b5c  cpsr 00010030
05-17 15:08:11.173   743   743 E audit   : type=1400 audit(1558102091.167:5482): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.173   743   743 E audit   : type=1300 audit(1558102091.167:5482): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942c60 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.173   743   743 E audit   : type=1327 audit(1558102091.167:5482): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.173 22563 22563 F DEBUG   : 
05-17 15:08:11.173 22563 22563 F DEBUG   : backtrace:
05-17 15:08:11.173 22563 22563 F DEBUG   :     #00 pc 000a5b5c  /data/data/org.test.myapp/files/app/_python_bundle/site-packages/numpy/core/multiarray.so
05-17 15:08:11.173 22563 22563 F DEBUG   :     #01 pc 000a5b53  /data/data/org.test.myapp/files/app/_python_bundle/site-packages/numpy/core/multiarray.so
05-17 15:08:11.175   743   743 E audit   : type=1400 audit(1558102091.167:5483): avc:  denied  { search } for  pid=22563 comm="crash_dump32" name="org.test.myapp" dev="dm-3" ino=131583 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=dir permissive=0 SEPF_SM-T590_8.1.0_0008 audit_filtered
05-17 15:08:11.175   743   743 E audit   : type=1300 audit(1558102091.167:5483): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=f0942120 a2=20000 a3=0 items=0 ppid=1 pid=22563 auid=4294967295 uid=10214 gid=10214 euid=10214 suid=10214 fsuid=10214 egid=10214 sgid=10214 fsgid=10214 tty=(none) ses=4294967295 comm="crash_dump32" exe="/system/bin/crash_dump32" subj=u:r:crash_dump:s0:c512,c768 key=(null)
05-17 15:08:11.175   743   743 E audit   : type=1327 audit(1558102091.167:5483): proctitle=63726173685F64756D7033320032323535370032323536300031
05-17 15:08:11.538  2238  2238 D io_stats: !@ 179,0 r 302322 13424470 w 1803533 39973992 d 259713 40645368 f 2008439 2008393 iot 3203460 3236119 th 51200 0 0 pt 0 inp 0 0 403133.609
05-17 15:08:11.880  1139  1441 D WifiTrafficPoller: TrafficStats TxPkts=494654 RxPkts=1371983 TxBytes=59343577 RxBytes=743996844 , Foreground uid=10214 pkgName=org.test.myapp txBytes=1480 rxBytes=12656
05-17 15:08:12.118   764 31950 V APM_AudioPolicyManager: getAudioPolicyConfig: audioParam;outDevice
05-17 15:08:12.118   764 31950 V APM_AudioPolicyManager: getNewOutputDevice() selected device 0
05-17 15:08:12.119   764 31950 V APM_AudioPolicyManager: ### curdevice : 2
05-17 15:08:12.119  1139  3772 D SSRM:i  : AudioType = 2, Vol = 0
05-17 15:08:12.177  1139  3772 D SSRM:w  : SIOP:: AP:222(290,40) BAT:265(265,0) CHG:283(283,0) USB:0(0,0) PA:620(685,50) ATC:0(0,0) BLK:283(283,0) 
05-17 15:08:12.215  1139  1742 E Watchdog: ! 13432 [2019-05-17 15:08:12.215]
05-17 15:08:12.379   858   858 E /system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_04
05-17 15:08:12.381  1139 22564 W ActivityManager: crash : org.test.myapp,0
05-17 15:08:12.383  1139 22564 W ActivityManager:   Force finishing activity org.test.myapp/org.kivy.android.PythonActivity
05-17 15:08:12.384  1139 22564 W MultiScreenManagerService: moveTaskBackToDisplayIfNeeded(): root activity or app is null, task=TaskRecord{abfefe2 #232 A=org.test.myapp U=0 StackId=1 sz=1}, rootActivity=null
05-17 15:08:12.385  1139  1139 D CodecSolution: MultiWindowEventListener::onMultiWindowFocusChanged(0)
05-17 15:08:12.385  1139  1139 D CS_HdrController: MultiWindowEventListener::onFocusStackChanged(0)
05-17 15:08:12.385  1139  1163 I BootReceiver: Copying /data/tombstones/tombstone_04 to DropBox (SYSTEM_TOMBSTONE)
05-17 15:08:12.389   743   743 E audit   : type=1701 audit(1558102092.387:5484): auid=4294967295 uid=10214 gid=10214 ses=4294967295 subj=u:r:untrusted_app:s0:c512,c768 pid=22511 comm="SDLThread" exe="/system/bin/app_process32" sig=11
05-17 15:08:12.393  1139  1356 W Choreographer: Frame time is 2.54226 ms in the future!  Check that graphics HAL is generating vsync timestamps using the correct timebase.
05-17 15:08:12.395  1139  1155 D CustomFrequencyManagerService: acquireDVFSLockLocked : type : DVFS_MIN_LIMIT  frequency : 1804800  uid : 1000  pid : 1139  pkgName : AMS_APP_HOME
05-17 15:08:12.395  1139  1155 D ActivityManagerPerformance: AMP_acquire() HOME
05-17 15:08:12.396   571   571 E lowmemorykiller: Error writing /proc/22511/oom_score_adj; errno=22
05-17 15:08:12.402  1139  1139 D CS_HdrController: updateMultiWindowState : 0
05-17 15:08:12.402  1139  1139 D MdnieScenarioControlService: Listener Real Multi Window State : true
05-17 15:08:12.403 21875 21875 I DMT-SMReceiver: Received : com.samsung.android.sm.ACTION_ERROR
05-17 15:08:12.404 21875 21875 W ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.startService:1545 android.content.ContextWrapper.startService:669 android.content.ContextWrapper.startService:669 com.samsung.android.sm.common.SmartManagerReceiver.a:240 com.samsung.android.sm.common.SmartManagerReceiver.onReceive:119 
05-17 15:08:12.404  1139  1156 I ActivityManager: Showing crash dialog for package org.test.myapp u0
05-17 15:08:12.411  1139  1379 W ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:1033 com.samsung.android.hqm.BigDataModule.sendDQLog:1212 com.samsung.android.hqm.BigDataModule.sendHWParamDQServer:882 com.samsung.android.hqm.BigDataModule.sendHWParamServerLocked:778 com.samsung.android.hqm.BigDataModule.SendHQMInfoParam:535 
05-17 15:08:12.414  1139  1156 D ScrollView: initGoToTop
05-17 15:08:12.418  1139  1948 W BroadcastQueue: Background execution not allowed: receiving Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } to com.google.android.gms/.stats.service.DropBoxEntryAddedReceiver
05-17 15:08:12.419  1139  1155 W BroadcastQueue: Background execution not allowed: receiving Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } to com.google.android.gms/.chimera.GmsIntentOperationService$PersistentTrustedReceiver
05-17 15:08:12.419  1139  1150 D InputTransport: Input channel destroyed: fd=428
05-17 15:08:12.419  1139  1947 I WindowManager: WIN DEATH: Window{6d1ce3d u0 org.test.myapp/org.kivy.android.PythonActivity}
05-17 15:08:12.419   572   572 I SurfaceFlinger: removeLayer is called from message
05-17 15:08:12.419   572   572 I SurfaceFlinger: id=1399 Removed SurfaceView - org.test.myapp/org.kivy.android.PythonActivity[22511]#0 (1/6)
05-17 15:08:12.419   572   572 I SurfaceFlinger: removeLayer is called from message
05-17 15:08:12.419   572   572 I SurfaceFlinger: id=1400 Removed Background for - SurfaceView - org.test.myapp/org.kivy.android.PythonActivity[22511]#0 (0/6)
05-17 15:08:12.419  1631  1631 D InputEventReceiver: channel 'ClientState{2945f83 uid 10214 pid 22511} (client)' ~ Disposing input event receiver.
05-17 15:08:12.420  1631  1631 D InputEventReceiver: channel 'ClientState{2945f83 uid 10214 pid 22511} (client)' ~NativeInputEventReceiver.

该提问来源于开源项目:kivy/buildozer

  • 点赞
  • 写回答
  • 关注问题
  • 收藏
  • 复制链接分享
  • 邀请回答

5条回答

  • weixin_39594103 weixin_39594103 5月前

    Thanks for the log, but I'm not sure what's wrong here, and I've used numpy.fft.fft before without issues. I'll try to test it again.

    点赞 评论 复制链接分享
  • weixin_39995297 weixin_39995297 5月前

    Thanks for the response. Have you been able to repeat the error? I have tried this on two different devices with exactly the same results. Any suggestions/info would be gratefully received, as I am totally stuck on this issue.

    点赞 评论 复制链接分享
  • weixin_39995297 weixin_39995297 5月前

    This issue has been resolved with the latest Numpy release (7 Sept 2019).

    点赞 评论 复制链接分享
  • weixin_39811386 weixin_39811386 5月前

    could you share your spec file that resolved the issue for you?

    点赞 评论 复制链接分享
  • weixin_39995297 weixin_39995297 5月前

    Herewith spec file that worked for me... buildozer.txt

    点赞 评论 复制链接分享

相关推荐