Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

App crash using text embed models #83

Open
Vinayak006 opened this issue Nov 6, 2024 · 0 comments
Open

App crash using text embed models #83

Vinayak006 opened this issue Nov 6, 2024 · 0 comments
Labels
bug Something isn't working

Comments

@Vinayak006
Copy link

Description:

Our app is crashing, when calling the embedding method

Platform Details:

  • Device: OnePlus
  • Android Version: 14
  • Processor: ARM64

Logs:

Relevant log snippet:

11-06 12:42:37.766  1070  1070 E lowmemorykiller: device memory 542847 free 28756 file 520377
11-06 12:42:37.776 21178 21178 F DEBUG   : Process name is com.myproject, uid is 10590, not key_process
11-06 12:42:37.776 21178 21178 F DEBUG   : keyProcess: 0
11-06 12:42:37.776 21178 21178 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
11-06 12:42:37.776 21178 21178 F DEBUG   : Build fingerprint: 'OnePlus/CPH2585IN/OP5D35L1:14/TP1A.220905.001/U.R4T3.1a1ae71_4160-15c:user/release-keys'
11-06 12:42:37.776 21178 21178 F DEBUG   : Revision: '0'
11-06 12:42:37.776 21178 21178 F DEBUG   : ABI: 'arm64'
11-06 12:42:37.776 21178 21178 F DEBUG   : Timestamp: 2024-11-06 12:42:36.930735000+0530
11-06 12:42:37.776 21178 21178 F DEBUG   : Process uptime: 87s
11-06 12:42:37.776 21178 21178 F DEBUG   : Cmdline: com.myproject
11-06 12:42:37.776 21178 21178 F DEBUG   : pid: 21049, tid: 21137, name: AsyncTask #2  >>> com.myproject <<<
11-06 12:42:37.776 21178 21178 F DEBUG   : uid: 10590
11-06 12:42:37.776 21178 21178 F DEBUG   : tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE)
11-06 12:42:37.776 21178 21178 F DEBUG   : pac_enabled_keys: 000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY)
11-06 12:42:37.776 21178 21178 F DEBUG   : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0000000000000000
11-06 12:42:37.776 21178 21178 F DEBUG   : Cause: null pointer dereference
11-06 12:42:37.776 21178 21178 F DEBUG   :     x0  b4000073c869a000  x1  0000000000000000  x2  0000000000001000  x3  0000032c484e3bce
11-06 12:42:37.776 21178 21178 F DEBUG   :     x4  0000000000001000  x5  b4000073c869b000  x6  000000005045535b  x7  0000000000003000
11-06 12:42:37.776 21178 21178 F DEBUG   :     x8  00000000000000b4  x9  ea3ccbc6d925a1f4  x10 0000000000000003  x11 00000000ffffffff
11-06 12:42:37.776 21178 21178 F DEBUG   :     x12 0000007478d507c0  x13 000000007fffffff  x14 b4000073c869a000  x15 0000032c48500164
11-06 12:42:37.776 21178 21178 F DEBUG   :     x16 0000007333478740  x17 000000750f2e5a40  x18 0000007476296000  x19 000000747977a9b0
11-06 12:42:37.776 21178 21178 F DEBUG   :     x20 0000000000000000  x21 0000000000001000  x22 b4000073c869b000  x23 b4000073f2307a00
11-06 12:42:37.776 21178 21178 F DEBUG   :     x24 000000747977c000  x25 0000000000000003  x26 00000073802a4d00  x27 0000000000000003
11-06 12:42:37.776 21178 21178 F DEBUG   :     x28 000000747977aa80  x29 000000747977a970
11-06 12:42:37.776 21178 21178 F DEBUG   :     lr  0000007333425af0  sp  000000747977a970  pc  000000750f2e5b20  pst 00000000a0001000
11-06 12:42:37.776 21178 21178 F DEBUG   : 22 total frames
11-06 12:42:37.776 21178 21178 F DEBUG   : backtrace:
11-06 12:42:37.776 21178 21178 F DEBUG   :       #00 pc 0000000000095b20  /apex/com.android.runtime/lib64/bionic/libc.so (__memcpy_aarch64_simd+224) (BuildId: f5f7a5dceb6ab17a1a448521eb52ce18)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #01 pc 00000000001b5aec  /data/app/~~e2rieAgrbNkTfqetgoMqwA==/com.myproject-Sp-GUpT_z8Oaz4b6d8LYDw==/base.apk!librnllama_v8_4_fp16_dotprod.so (offset 0x36d8000) (BuildId: b2c38f5c1837cded18876277034f9a7947f1ec07)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #02 pc 00000000001b5814  /data/app/~~e2rieAgrbNkTfqetgoMqwA==/com.myproject-Sp-GUpT_z8Oaz4b6d8LYDw==/base.apk!librnllama_v8_4_fp16_dotprod.so (offset 0x36d8000) (Java_com_rnllama_LlamaContext_embedding+356) (BuildId: b2c38f5c1837cded18876277034f9a7947f1ec07)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #03 pc 0000000000384370  /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+144) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #04 pc 000000000036de40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #05 pc 000000000036725c  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2048) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #06 pc 000000000076e170  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #07 pc 00000000003869d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #08 pc 00000000000026bc  [anon:dalvik-classes8.dex extracted in memory from /data/app/~~e2rieAgrbNkTfqetgoMqwA==/com.myproject-Sp-GUpT_z8Oaz4b6d8LYDw==/base.apk] (com.rnllama.LlamaContext.getEmbedding+0)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #09 pc 0000000000359650  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.4560577758463694485)+428) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #10 pc 0000000000367a78  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #11 pc 000000000076e170  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #12 pc 00000000003869d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #13 pc 0000000000003c88  [anon:dalvik-classes8.dex extracted in memory from /data/app/~~e2rieAgrbNkTfqetgoMqwA==/com.myproject-Sp-GUpT_z8Oaz4b6d8LYDw==/base.apk] (com.rnllama.RNLlama$9.doInBackground+0)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #14 pc 0000000000359650  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.4560577758463694485)+428) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #15 pc 0000000000367a78  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #16 pc 000000000076e170  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #17 pc 00000000003869d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #18 pc 0000000000003cf4  [anon:dalvik-classes8.dex extracted in memory from /data/app/~~e2rieAgrbNkTfqetgoMqwA==/com.myproject-Sp-GUpT_z8Oaz4b6d8LYDw==/base.apk] (com.rnllama.RNLlama$9.doInBackground+0)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #19 pc 00000000003589dc  /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+1932) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #20 pc 0000000000384498  /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 3f7d5a016e08d528f129bdd336d81168)
11-06 12:42:37.776 21178 21178 F DEBUG   :       #21 pc 000000000226762c  /memfd:jit-cache (deleted) (offset 0x2000000)
11-06 12:42:37.777  1070  1070 E lowmemorykiller: device memory 543061 free 30302 file 519027
11-06 12:42:37.790  1070  1070 E lowmemorykiller: device memory 543130 free 30221 file 519194
11-06 12:42:37.795  1327  1327 E tombstoned: Tombstone written to: tombstone_13
11-06 12:42:37.802  1070  1070 E lowmemorykiller: device memory 548195 free 35307 file 519205
11-06 12:42:37.810  3496  4609 E UAH_JNI : uah_event_acquire ! cmdId: 0 ,strPkg: com.myproject, strIdent: com.android.server.wm, timeout: 720

Steps to Reproduce:

  1. Run the app with below code.
  2. And observe the app crash.

Code:

const embedContext = await initLlama({
  model: modelPath,
  use_mlock: true,
  n_gpu_layers: 0,
  embedding: true,
});

setEmbedContext(embedContext);

var embedRes: NativeEmbeddingResult = await embedContext.embedding('Hello World');
console.log('Embedding Result', embedRes.embedding);

I am using the snowflake-arctic-embed-l-f16.GGUF model.

Expected Behavior:

The app should not crash during normal operation.

@jhen0409 jhen0409 added the bug Something isn't working label Nov 6, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

2 participants