老项目偶尔会闪退,找日志又找不到原因,最终发现了报错的日志
2023-06-15 10:23:07.050 2687-2687/? A/libc: Fatal signal 11 (SIGSEGV), code 1, fault addr 0x4 in tid 2687 (om.iterminal.test)
2023-06-15 10:23:07.050 212-212/? W/: debuggerd: handling request: pid=2687 uid=10126 gid=10126 tid=2687
2023-06-15 10:23:07.130 3160-3160/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2023-06-15 10:23:07.130 3160-3160/? A/DEBUG: Build fingerprint: 'Android/rk3399_all/rk3399_all:7.1.2/NHG47K/ys-an707071051:userdebug/test-keys'
2023-06-15 10:23:07.130 3160-3160/? A/DEBUG: Revision: '0'
2023-06-15 10:23:07.130 3160-3160/? A/DEBUG: ABI: 'arm'
2023-06-15 10:23:07.131 3160-3160/? A/DEBUG: pid: 2687, tid: 2687, name: om.iterminal.test >>> com.iterminal.test <<<
2023-06-15 10:23:07.131 3160-3160/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x4
2023-06-15 10:23:07.131 3160-3160/? A/DEBUG: r0 00000000 r1 00000004 r2 ffa2ba10 r3 ee6ec008
2023-06-15 10:23:07.131 3160-3160/? A/DEBUG: r4 ee6ec008 r5 ee6ec008 r6 12c03be0 r7 ffffffff
2023-06-15 10:23:07.131 3160-3160/? A/DEBUG: r8 6fb5e2c4 r9 ee105400 sl c78b2000 fp ffffffff
2023-06-15 10:23:07.131 3160-3160/? A/DEBUG: ip efdd1064 sp ffa2ba08 lr efdb6997 pc f07bdd3e cpsr 000f0030
2023-06-15 10:23:07.389 439-606/system_process I/InputDispatcher: Dropping event because there is no touchable window at (889, 867).
2023-06-15 10:23:07.707 3160-3160/? A/DEBUG: backtrace:
2023-06-15 10:23:07.707 3160-3160/? A/DEBUG: #00 pc 0000bd3e /system/lib/libutils.so (_ZNK7android7RefBase9incStrongEPKv+3)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #01 pc 00051993 /system/lib/libgui.so (_ZNK7android7Surface25getIGraphicBufferProducerEv+20)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #02 pc 0008ac35 /system/lib/libandroid_runtime.so
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #03 pc 0008afef /system/lib/libandroid_runtime.so
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #04 pc 01eaa3e5 /system/framework/arm/boot-framework.oat (offset 0x15d8000) (android.view.Surface.nativeIsValid+88)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #05 pc 01eab437 /system/framework/arm/boot-framework.oat (offset 0x15d8000) (android.view.Surface.isValid+114)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #06 pc 01eb35eb /system/framework/arm/boot-framework.oat (offset 0x15d8000) (android.view.SurfaceView.updateWindow+2614)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #07 pc 01eb29e5 /system/framework/arm/boot-framework.oat (offset 0x15d8000) (android.view.SurfaceView.setVisibility+120)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #08 pc 000a99c1 /system/lib/libart.so (art_quick_invoke_stub_internal+64)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #09 pc 00405281 /system/lib/libart.so (art_quick_invoke_stub+232)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #10 pc 000b0c55 /system/lib/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+136)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #11 pc 001ed0d5 /system/lib/libart.so (_ZN3art11interpreter34ArtInterpreterToCompiledCodeBridgeEPNS_6ThreadEPNS_9ArtMethodEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameEPNS_6JValueE+200)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #12 pc 001e7685 /system/lib/libart.so (_ZN3art11interpreter6DoCallILb0ELb0EEEbPNS_9ArtMethodEPNS_6ThreadERNS_11ShadowFrameEPKNS_11InstructionEtPNS_6JValueE+492)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #13 pc 003ff6fb /system/lib/libart.so (MterpInvokeVirtualQuick+322)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #14 pc 000a0594 /system/lib/libart.so (ExecuteMterpImpl+29972)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #15 pc 001ca9af /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadEPKNS_7DexFile8CodeItemERNS_11ShadowFrameENS_6JValueEb+290)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #16 pc 001cf481 /system/lib/libart.so (_ZN3art11interpreter30EnterInterpreterFromEntryPointEPNS_6ThreadEPKNS_7DexFile8CodeItemEPNS_11ShadowFrameE+92)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #17 pc 003f4787 /system/lib/libart.so (artQuickToInterpreterBridge+706)
2023-06-15 10:23:07.708 3160-3160/? A/DEBUG: #18 pc 000ae413 /system/lib/libart.so (art_quick_to_interpreter_bridge+34)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #19 pc 0164d39d /system/framework/arm/boot-framework.oat (offset 0x15d8000) (android.os.Handler.dispatchMessage+112)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #20 pc 01c04baf /system/framework/arm/boot-framework.oat (offset 0x15d8000) (android.os.Looper.loop+714)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #21 pc 0165e737 /system/framework/arm/boot-framework.oat (offset 0x15d8000) (android.app.ActivityThread.main+426)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #22 pc 000a99c1 /system/lib/libart.so (art_quick_invoke_stub_internal+64)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #23 pc 00405389 /system/lib/libart.so (art_quick_invoke_static_stub+228)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #24 pc 000b0c7f /system/lib/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+178)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #25 pc 00315e81 /system/lib/libart.so (_ZN3artL18InvokeWithArgArrayERKNS_33ScopedObjectAccessAlreadyRunnableEPNS_9ArtMethodEPNS_8ArgArrayEPNS_6JValueEPKc+56)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #26 pc 00317213 /system/lib/libart.so (_ZN3art12InvokeMethodERKNS_33ScopedObjectAccessAlreadyRunnableEP8_jobjectS4_S4_j+766)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #27 pc 002bd4ed /system/lib/libart.so (_ZN3artL13Method_invokeEP7_JNIEnvP8_jobjectS3_S3_+40)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #28 pc 005aed49 /system/framework/arm/boot.oat (offset 0x51b000) (java.lang.reflect.Method.invoke+116)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #29 pc 020fcbf9 /system/framework/arm/boot-framework.oat (offset 0x15d8000) (com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run+100)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #30 pc 020fdbd5 /system/framework/arm/boot-framework.oat (offset 0x15d8000) (com.android.internal.os.ZygoteInit.main+1536)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #31 pc 000a99c1 /system/lib/libart.so (art_quick_invoke_stub_internal+64)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #32 pc 00405389 /system/lib/libart.so (art_quick_invoke_static_stub+228)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #33 pc 000b0c7f /system/lib/libart.so (_ZN3art9ArtMethod6InvokeEPNS_6ThreadEPjjPNS_6JValueEPKc+178)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #34 pc 00315e81 /system/lib/libart.so (_ZN3artL18InvokeWithArgArrayERKNS_33ScopedObjectAccessAlreadyRunnableEPNS_9ArtMethodEPNS_8ArgArrayEPNS_6JValueEPKc+56)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #35 pc 00315c93 /system/lib/libart.so (_ZN3art17InvokeWithVarArgsERKNS_33ScopedObjectAccessAlreadyRunnableEP8_jobjectP10_jmethodIDSt9__va_list+266)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #36 pc 00277b97 /system/lib/libart.so (_ZN3art3JNI21CallStaticVoidMethodVEP7_JNIEnvP7_jclassP10_jmethodIDSt9__va_list+426)
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #37 pc 000666ad /system/lib/libandroid_runtime.so
2023-06-15 10:23:07.709 3160-3160/? A/DEBUG: #38 pc 00067f7f /system/lib/libandroid_runtime.so (_ZN7android14AndroidRuntime5startEPKcRKNS_6VectorINS_7String8EEEb+498)
2023-06-15 10:23:07.710 3160-3160/? A/DEBUG: #39 pc 00001947 /system/bin/app_process32
2023-06-15 10:23:07.710 3160-3160/? A/DEBUG: #40 pc 00016c4d /system/lib/libc.so (__libc_init+48)
2023-06-15 10:23:07.710 3160-3160/? A/DEBUG: #41 pc 00001564 /system/bin/app_process32
各种百度,各种方式也都尝试了,把代码一点一点的排查,都解决不掉,根据报错的日志信息,一点一点扣,因为我们的是在点击按钮切换页面,然后再返回,重复循环操作,快速进页面关页面,然后就会闪退也不是每次都会闪退,但是闪退的还挺频繁的,突发奇想
观察一下activity的生命周期,发现oncreate(),onstop().ondestroy()不是成对出现的,一旦闪退的时候就是乱七八糟的,所以我给进页面的onclick()方法加了防双击判断,然后就没再测出来闪退,不知道是否彻底解决了,先记录一下
欢迎指正