Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fire-app-builder crashes on Fire TV stick 4k(2nd gen) #88

Open
jmhunter240 opened this issue Jun 10, 2024 · 3 comments
Open

fire-app-builder crashes on Fire TV stick 4k(2nd gen) #88

jmhunter240 opened this issue Jun 10, 2024 · 3 comments

Comments

@jmhunter240
Copy link

I am trying to port my fire-app-builder based application to Fire TV Stick 4k(2nd gen). The app crashes and returns to the main screen of the app. I also downloaded the base fire-app-builder from github and did not modify any code except to change the app name. When I installed it on the Fire TV stick 4k(2nd gen) the app crashes and goes back to the splash screen. Other applications I have built using fire-app-builder as the base behave similarly on the 4k 2nd gen stick. Please note the same apps work with no issues on previous versions of fire TV stick 4k.

Looking in the logs it is throwing this error. Please advise.

2024-06-09 19:37:43.816 24293-24393 AndroidRuntime com...ilder.android.nnn E FATAL EXCEPTION: Thread-3
Process: com.fireappbuilder.android.nnn, PID: 24293
java.lang.IllegalAccessError: Method 'void java.lang.System.arraycopy(byte[], int, byte[], int, int)' is inaccessible to class 'com.amazon.mediaplayer.MimeSniffer.DefaultSniffSource' (declaration of 'com.amazon.mediaplayer.MimeSniffer.DefaultSniffSource' appears in /data/app/~~A9jMmUOSymyg4_fc3NwTMg==/com.fireappbuilder.android.nnn-vcAYKJSH_AIHb0OuO8cbiw==/base.apk)
at com.amazon.mediaplayer.MimeSniffer.DefaultSniffSource.read(DefaultSniffSource.java:217)
at com.google.android.exoplayer.extractor.DefaultExtractorInput.readFromDataSource(DefaultExtractorInput.java:240)
at com.google.android.exoplayer.extractor.DefaultExtractorInput.advancePeekPosition(DefaultExtractorInput.java:130)
at com.google.android.exoplayer.extractor.DefaultExtractorInput.peekFully(DefaultExtractorInput.java:110)
at com.google.android.exoplayer.extractor.DefaultExtractorInput.peekFully(DefaultExtractorInput.java:120)
at com.google.android.exoplayer.extractor.mp4.Sniffer.sniffInternal(Sniffer.java:95)
at com.google.android.exoplayer.extractor.mp4.Sniffer.sniffFragmented(Sniffer.java:65)
at com.google.android.exoplayer.extractor.mp4.FragmentedMp4Extractor.sniff(FragmentedMp4Extractor.java:150)
at com.amazon.mediaplayer.MimeSniffer.MimeSnifferExtractorBased.sniff(MimeSnifferExtractorBased.java:105)
at com.amazon.mediaplayer.MimeSniffer.MimeSniffer.getMimeType(MimeSniffer.java:79)
at com.amazon.mediaplayer.MimeSniffer.MimeSniffRunnable.run(MimeSniffRunnable.java:27)
at java.lang.Thread.run(Thread.java:923)
2024-06-09 19:37:43.820 24293-24393 ModularApplication com...ilder.android.nnn E Uncaught Exception in thread Thread[Thread-3,5,main]
java.lang.IllegalAccessError: Method 'void java.lang.System.arraycopy(byte[], int, byte[], int, int)' is inaccessible to class 'com.amazon.mediaplayer.MimeSniffer.DefaultSniffSource' (declaration of 'com.amazon.mediaplayer.MimeSniffer.DefaultSniffSource' appears in /data/app/~~A9jMmUOSymyg4_fc3NwTMg==/com.fireappbuilder.android.nnn-vcAYKJSH_AIHb0OuO8cbiw==/base.apk)
at com.amazon.mediaplayer.MimeSniffer.DefaultSniffSource.read(DefaultSniffSource.java:217)
at com.google.android.exoplayer.extractor.DefaultExtractorInput.readFromDataSource(DefaultExtractorInput.java:240)
at com.google.android.exoplayer.extractor.DefaultExtractorInput.advancePeekPosition(DefaultExtractorInput.java:130)
at com.google.android.exoplayer.extractor.DefaultExtractorInput.peekFully(DefaultExtractorInput.java:110)
at com.google.android.exoplayer.extractor.DefaultExtractorInput.peekFully(DefaultExtractorInput.java:120)
at com.google.android.exoplayer.extractor.mp4.Sniffer.sniffInternal(Sniffer.java:95)
at com.google.android.exoplayer.extractor.mp4.Sniffer.sniffFragmented(Sniffer.java:65)
at com.google.android.exoplayer.extractor.mp4.FragmentedMp4Extractor.sniff(FragmentedMp4Extractor.java:150)
at com.amazon.mediaplayer.MimeSniffer.MimeSnifferExtractorBased.sniff(MimeSnifferExtractorBased.java:105)
at com.amazon.mediaplayer.MimeSniffer.MimeSniffer.getMimeType(MimeSniffer.java:79)
at com.amazon.mediaplayer.MimeSniffer.MimeSniffRunnable.run(MimeSniffRunnable.java:27)
at java.lang.Thread.run(Thread.java:923)

@mbenedict26
Copy link

Have you, by chance, solved this issue? I got a 2nd Gen and I'm now running in to the exact same issue.

@dorsamet
Copy link

I have the same issue. Can anyone from the team help out?

@dorsamet
Copy link

dorsamet commented Sep 1, 2024

There seems to be a connection to the new version which is FireOS version 8.1.1.6.
I tried checking if it was an SSL issue, or otherwise, and tested on other devices (Android TV + emulator) and it seems to work.
I think this may be OS specific, and we need to update the exoplayer library..

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants