Fatal signal 11 (SIGSEGV), code 1, fault addr 0x8 in tid 4101 (Thread-28)

老项目偶尔会闪退,找日志又找不到原因,最终发现了报错的日志

2023-06-15 10:23:07.050 2687-2687/? A/libc: Fatal signal 11 (SIGSEGV), code 1, fault addr 0x4 in tid 2687 (om.iterminal.test)
2023-06-15 10:23:07.050 212-212/? W/: debuggerd: handling request: pid=2687 uid=10126 gid=10126 tid=2687
2023-06-15 10:23:07.130 3160-3160/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2023-06-15 10:23:07.130 3160-3160/? A/DEBUG: Build fingerprint: 'Android/rk3399_all/rk3399_all:7.1.2/NHG47K/ys-an707071051:userdebug/test-keys'
2023-06-15 10:23:07.130 3160-3160/? A/DEBUG: Revision: '0'
2023-06-15 10:23:07.130 3160-3160/? A/DEBUG: ABI: 'arm'
2023-06-15 10:23:07.131 3160-3160/? A/DEBUG: pid: 2687, tid: 2687, name: om.iterminal.test  >>> com.iterminal.test <<<
2023-06-15 10:23:07.131 3160-3160/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x4
2023-06-15 10:23:07.131 3160-3160/? A/DEBUG:     r0 00000000  r1 00000004  r2 ffa2ba10  r3 ee6ec008
2023-06-15 10:23:07.131 3160-3160/? A/DEBUG:     r4 ee6ec008  r5 ee6ec008  r6 12c03be0  r7 ffffffff
2023-06-15 10:23:07.131 3160-3160/? A/DEBUG:     r8 6fb5e2c4  r9 ee105400  sl c78b2000  fp ffffffff
2023-06-15 10:23:07.131 3160-3160/? A/DEBUG:     ip efdd1064  sp ffa2ba08  lr efdb6997  pc f07bdd3e  cpsr 000f0030
2023-06-15 10:23:07.389 439-606/system_process I/InputDispatcher: Dropping event because there is no touchable window at (889, 867).
2023-06-15 10:23:07.707 3160-3160/? A/DEBUG: backtrace:
2023-06-15 10:23:07.707 3160-3160/? A/DEBUG:     #00 pc 0000bd3e  /system/lib/libutils.so (_ZNK7android7RefBase9incStrongEPKv+3)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #01 pc 00051993  /system/lib/libgui.so (_ZNK7android7Surface25getIGraphicBufferProducerEv+20)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #02 pc 0008ac35  /system/lib/libandroid_runtime.so
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #03 pc 0008afef  /system/lib/libandroid_runtime.so
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #04 pc 01eaa3e5  /system/framework/arm/boot-framework.oat (offset 0x15d8000) (android.view.Surface.nativeIsValid+88)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #05 pc 01eab437  /system/framework/arm/boot-framework.oat (offset 0x15d8000) (android.view.Surface.isValid+114)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #06 pc 01eb35eb  /system/framework/arm/boot-framework.oat (offset 0x15d8000) (android.view.SurfaceView.updateWindow+2614)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #07 pc 01eb29e5  /system/framework/arm/boot-framework.oat (offset 0x15d8000) (android.view.SurfaceView.setVisibility+120)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #08 pc 000a99c1  /system/lib/libart.so (art_quick_invoke_stub_internal+64)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #09 pc 00405281  /system/lib/libart.so (art_quick_invoke_stub+232)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #10 pc 000b0c55  /system/lib/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+136)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #11 pc 001ed0d5  /system/lib/libart.so (_ZN3art11interpreter34ArtInterpreterToCompiledCodeBridgeEPNS_6ThreadEPNS_9ArtMethodEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+200)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #12 pc 001e7685  /system/lib/libart.so (_ZN3art11interpreter6DoCallILb0ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+492)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #13 pc 003ff6fb  /system/lib/libart.so (MterpInvokeVirtualQuick+322)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #14 pc 000a0594  /system/lib/libart.so (ExecuteMterpImpl+29972)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #15 pc 001ca9af  /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+290)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #16 pc 001cf481  /system/lib/libart.so (_ZN3art11interpreter30EnterInterpreterFromEntryPointEPNS_6ThreadEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameE+92)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #17 pc 003f4787  /system/lib/libart.so (artQuickToInterpreterBridge+706)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG:     #18 pc 000ae413  /system/lib/libart.so (art_quick_to_interpreter_bridge+34)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #19 pc 0164d39d  /system/framework/arm/boot-framework.oat (offset 0x15d8000) (android.os.Handler.dispatchMessage+112)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #20 pc 01c04baf  /system/framework/arm/boot-framework.oat (offset 0x15d8000) (android.os.Looper.loop+714)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #21 pc 0165e737  /system/framework/arm/boot-framework.oat (offset 0x15d8000) (android.app.ActivityThread.main+426)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #22 pc 000a99c1  /system/lib/libart.so (art_quick_invoke_stub_internal+64)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #23 pc 00405389  /system/lib/libart.so (art_quick_invoke_static_stub+228)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #24 pc 000b0c7f  /system/lib/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+178)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #25 pc 00315e81  /system/lib/libart.so (_ZN3artL18InvokeWithArgArrayERKNS_33ScopedObjectAccessAlreadyRunnableEPNS_9ArtMethodEPNS_8ArgArrayEPNS_6JValueEPKc+56)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #26 pc 00317213  /system/lib/libart.so (_ZN3art12InvokeMethodERKNS_33ScopedObjectAccessAlreadyRunnableEP8_jobjectS4_S4_j+766)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #27 pc 002bd4ed  /system/lib/libart.so (_ZN3artL13Method_invokeEP7_JNIEnvP8_jobjectS3_S3_+40)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #28 pc 005aed49  /system/framework/arm/boot.oat (offset 0x51b000) (java.lang.reflect.Method.invoke+116)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #29 pc 020fcbf9  /system/framework/arm/boot-framework.oat (offset 0x15d8000) (com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run+100)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #30 pc 020fdbd5  /system/framework/arm/boot-framework.oat (offset 0x15d8000) (com.android.internal.os.ZygoteInit.main+1536)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #31 pc 000a99c1  /system/lib/libart.so (art_quick_invoke_stub_internal+64)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #32 pc 00405389  /system/lib/libart.so (art_quick_invoke_static_stub+228)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #33 pc 000b0c7f  /system/lib/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+178)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #34 pc 00315e81  /system/lib/libart.so (_ZN3artL18InvokeWithArgArrayERKNS_33ScopedObjectAccessAlreadyRunnableEPNS_9ArtMethodEPNS_8ArgArrayEPNS_6JValueEPKc+56)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #35 pc 00315c93  /system/lib/libart.so (_ZN3art17InvokeWithVarArgsERKNS_33ScopedObjectAccessAlreadyRunnableEP8_jobjectP10_jmethodIDSt9__va_list+266)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #36 pc 00277b97  /system/lib/libart.so (_ZN3art3JNI21CallStaticVoidMethodVEP7_JNIEnvP7_jclassP10_jmethodIDSt9__va_list+426)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #37 pc 000666ad  /system/lib/libandroid_runtime.so
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG:     #38 pc 00067f7f  /system/lib/libandroid_runtime.so (_ZN7android14AndroidRuntime5startEPKcRKNS_6VectorINS_7String8EEEb+498)
2023-06-15 10:23:07.710 3160-3160/? A/DEBUG:     #39 pc 00001947  /system/bin/app_process32
2023-06-15 10:23:07.710 3160-3160/? A/DEBUG:     #40 pc 00016c4d  /system/lib/libc.so (__libc_init+48)
2023-06-15 10:23:07.710 3160-3160/? A/DEBUG:     #41 pc 00001564  /system/bin/app_process32

各种百度,各种方式也都尝试了,把代码一点一点的排查,都解决不掉,根据报错的日志信息,一点一点扣,因为我们的是在点击按钮切换页面,然后再返回,重复循环操作,快速进页面关页面,然后就会闪退也不是每次都会闪退,但是闪退的还挺频繁的,突发奇想

观察一下activity的生命周期,发现oncreate(),onstop().ondestroy()不是成对出现的,一旦闪退的时候就是乱七八糟的,所以我给进页面的onclick()方法加了防双击判断,然后就没再测出来闪退,不知道是否彻底解决了,先记录一下

欢迎指正

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值