[Vanilla example app] White screen on Android with new architecture enabled when Proguard is enabled
opayen opened this issue · comments
Repro steps:
- Enable
enableProguardInReleaseBuilds
in the app'sbuild.gradle
file of the vanilla example app - Make sure that new architecture is enabled (
newArchEnabled=true
ingradle.properties
, enabled by default) - Build the release variant
- Start the app
Probably related to Proguard, because it works fine without it.
Logcat output:
2022-07-04 13:50:47.786 11160-11186/? A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0 in tid 11186 (mqt_native_modu), pid 11160 (com.example)
2022-07-04 13:50:47.816 11191-11191/? I/crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone
2022-07-04 13:50:47.818 284-284/? I/tombstoned: received crash request for pid 11186
2022-07-04 13:50:47.820 11191-11191/? I/crash_dump64: performing dump of process 11160 (target tid = 11186)
2022-07-04 13:50:47.824 11191-11191/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2022-07-04 13:50:47.824 11191-11191/? A/DEBUG: Build fingerprint: 'google/sdk_gphone_arm64/emulator_arm64:11/RSR1.210722.003/7604015:user/release-keys'
2022-07-04 13:50:47.824 11191-11191/? A/DEBUG: Revision: '0'
2022-07-04 13:50:47.824 11191-11191/? A/DEBUG: ABI: 'arm64'
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: Timestamp: 2022-07-04 13:50:47+0200
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: pid: 11160, tid: 11186, name: mqt_native_modu >>> com.example <<<
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: uid: 10179
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: Cause: null pointer dereference
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: x0 00000074ca1338a0 x1 00000074ca132bc8 x2 0000000000000001 x3 b4000075c5344b70
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: x4 00000074ca1338a0 x5 00000074cf009e98 x6 fefefeff72549b0a x7 7f7f7f7f7f7fff7f
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: x8 0000000000000000 x9 0000000000000003 x10 0000000000004001 x11 0000000000000000
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: x12 0000000000000000 x13 0000000000000001 x14 0000000000000002 x15 00000077c5b4c030
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: x16 0000007521db8960 x17 00000077c8f1f6b0 x18 00000074ca002000 x19 00000074ca132bc8
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: x20 b4000075c5344b70 x21 0000000000000001 x22 0000000000000002 x23 00000074ca1338a0
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: x24 0000000000000000 x25 b4000075f53789d0 x26 b4000075a538e520 x27 b4000076a5387e40
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: x28 00000074ca13a000 x29 00000074ca132ba0
2022-07-04 13:50:47.828 11191-11191/? A/DEBUG: lr 00000074cf00e3f8 sp 00000074ca132ba0 pc 0000000000000000 pst 0000000000001000
2022-07-04 13:50:47.829 11191-11191/? A/DEBUG: backtrace:
2022-07-04 13:50:47.829 11191-11191/? A/DEBUG: #00 pc 0000000000000000 <unknown>
2022-07-04 13:50:47.829 11191-11191/? A/DEBUG: #01 pc 00000000000ea3f4 /data/app/~~r7hExp79Qe_XURjXATtrDg==/com.example-mNFfvzxYw2P9j2aGCzIbJQ==/lib/arm64/libc++_shared.so (BuildId: 98cfeb2d0d7d7a1c10770e4af2df8cf0af2c2c8c)