Android:使用BitmapShader\u构造函数的本机崩溃

Android:使用BitmapShader\u构造函数的本机崩溃,android,Android,我在PlayStore得到了下面的崩溃报告,标题是abort。我怎么才能复制它或者理解它呢 #00 pc 000000000001a528 /system/lib/libc.so (abort+63) #01 pc 0000000000006641 /system/lib/liblog.so (__android_log_assert+156) #02 pc 00000000000cb83f /system/lib/libandroid_runtime.so (andro

我在PlayStore得到了下面的崩溃报告,标题是abort。我怎么才能复制它或者理解它呢

  #00  pc 000000000001a528  /system/lib/libc.so (abort+63)
  #01  pc 0000000000006641  /system/lib/liblog.so (__android_log_assert+156)
  #02  pc 00000000000cb83f  /system/lib/libandroid_runtime.so (android::bitmap::toBitmap(_JNIEnv*, _jobject*)+34)
  #03  pc 00000000000dcb23  /system/lib/libandroid_runtime.so (BitmapShader_constructor(_JNIEnv*, _jobject*, long long, _jobject*, int, int)+38)
  #04  pc 0000000000a31c23  /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.nativeCreate [DEDUPED]+146)
  #05  pc 0000000000a31d53  /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.createNativeInstance+66)
  #06  pc 0000000000a31793  /system/framework/arm/boot-framework.oat (android.graphics.Shader.getNativeInstance+98)
  #07  pc 0000000000a4cb27  /system/framework/arm/boot-framework.oat (android.graphics.Paint.getNativeInstance+70)
  #08  pc 000000000110554f  /system/framework/arm/boot-framework.oat (android.view.RecordingCanvas.drawRoundRect+78)
  #09  pc 000000000004699f  /dev/ashmem/dalvik-jit-code-cache_12384_12384 (deleted)
崩溃只发生在安卓8.1中,以下是发生崩溃的设备列表,你认为这些是真的吗

Device Name                 Count 
*************************************
Redmi 6 (cereus)            5   35.7%
Redmi 6A (cactus)           2   14.3%
GM8 Go (GM8_go_sc)          1   7.1%
Galaxy J7 (j7y17lte)        1   7.1%
Nokia 1 (FRT)               1   7.1%
ZTE BLADE A530 (P639F10)    1   7.1%
Redmi S2 (ysl)              1   7.1%
Smart 2 HD (Infinix-X609B)  1   7.1%
Galaxy J7 Neo (j7velte)     1   7.1%

我设法在我的小米/cactus_-ru/cactus:8.1.0/O11019/V9.6.14.0.OCBRUFD上复制了这个

复制步骤:

  • 公开主要活动
  • 单击“添加用户”按钮
  • 键入有效的姓名和电话号码
  • 单击完成
这会导致以下日志崩溃(在100%的情况下复制):

7.103 3115931159W位图:在循环()位图上调用getWidth()!这是未定义的行为!
01-25 13:52:07.103 3115931159 W位图:在循环()位图上调用getHeight()!这是未定义的行为!
01-25 13:52:07.103 31159 31159 F位图:错误,无法在此访问无效/空闲的位图!
---------坠机开始
01-25 13:52:07.104 3115931159 F libc:致命信号6(SIGABRT),tid 31159(com.gazman.beep)中的代码-6,pid 31159(com.gazman.beep)
01-25 13:52:07.129 29843 29952 D SyncAccountUtils:getSelectionWritableAccountTypes():只读类型:('com.google.android.apps.tachyon','com.google.android.gms.matchstick','com.whatsapp'))
01-25 13:52:07.198 31306 31306 I crash_dump32:从墓碑中获取输出fd,类型:kDebuggerdTombstone
01-25 13:52:07.199 541 541 I/system/bin/tombstoned:收到pid 31159的崩溃请求
01-25 13:52:07.200 31306 31306 I崩溃_转储32:执行进程31159的转储(目标tid=31159)
01-25 13:52:07.201 3115931159 I libc:orig_dumpable:0
01-25 13:52:07.201 31306 31306调试:*********************************************************
01-25 13:52:07.201 31306 31306 F调试:构建指纹:“小米/仙人掌/仙人掌:8.1.0/O11019/V9.6.14.0.OCBRUFD:用户/释放密钥”
01-25 13:52:07.201 31306 31306 F调试:修订版:“0”
01-25 13:52:07.202 31306 31306 F调试:ABI:“arm”

01-25 13:52:07.202 31306 31306 F调试:pid:31159,tid:31159,名称:com.gazman.beep>>>com.gazman.beep我试图在我的Redmi 6A上重现该问题,但没有成功。我正在使用带有位图着色器的自定义视图图形。android(引擎盖下)使用本地位图着色器、本地绘画和录制画布。一切都很好。如果你愿意,我可以尝试从谷歌play安装你的应用程序。是的,如果你能复制它,它将是awesomeIlya,它是什么应用程序?我在描述中没有看到任何参考资料。哦,很抱歉。这是你的电话号码
7.103 31159 31159 W Bitmap  : Called getWidth() on a recycle()'d bitmap! This is undefined behavior!
01-25 13:52:07.103 31159 31159 W Bitmap  : Called getHeight() on a recycle()'d bitmap! This is undefined behavior!
01-25 13:52:07.103 31159 31159 F Bitmap  : Error, cannot access an invalid/free'd bitmap here!
--------- beginning of crash
01-25 13:52:07.104 31159 31159 F libc    : Fatal signal 6 (SIGABRT), code -6 in tid 31159 (com.gazman.beep), pid 31159 (com.gazman.beep)
01-25 13:52:07.129 29843 29952 D SyncAccountUtils: getSelectionWritableAccountTypes(): readonly types: ('com.google.android.apps.tachyon','com.google.android.gms.matchstick','com.whatsapp')
01-25 13:52:07.198 31306 31306 I crash_dump32: obtaining output fd from tombstoned, type: kDebuggerdTombstone
01-25 13:52:07.199   541   541 I /system/bin/tombstoned: received crash request for pid 31159
01-25 13:52:07.200 31306 31306 I crash_dump32: performing dump of process 31159 (target tid = 31159)
01-25 13:52:07.201 31159 31159 I libc    : orig_dumpable: 0
01-25 13:52:07.201 31306 31306 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
01-25 13:52:07.201 31306 31306 F DEBUG   : Build fingerprint: 'xiaomi/cactus_ru/cactus:8.1.0/O11019/V9.6.14.0.OCBRUFD:user/release-keys'
01-25 13:52:07.201 31306 31306 F DEBUG   : Revision: '0'
01-25 13:52:07.202 31306 31306 F DEBUG   : ABI: 'arm'
01-25 13:52:07.202 31306 31306 F DEBUG   : pid: 31159, tid: 31159, name: com.gazman.beep  >>> com.gazman.beep <<<
01-25 13:52:07.202 31306 31306 F DEBUG   : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
01-25 13:52:07.202 31306 31306 F DEBUG   : Abort message: ''
01-25 13:52:07.203 31306 31306 F DEBUG   :     r0 00000000  r1 000079b7  r2 00000006  r3 00000008
01-25 13:52:07.203 31306 31306 F DEBUG   :     r4 000079b7  r5 000079b7  r6 bec6e474  r7 0000010c
01-25 13:52:07.203 31306 31306 F DEBUG   :     r8 00000000  r9 00000000  sl 12f0f670  fp 12f0f538
01-25 13:52:07.203 31306 31306 F DEBUG   :     ip 00000000  sp bec6e460  lr a6efb8bd  pc a6ef540e  cpsr 200f0030
01-25 13:52:07.204 31306 31306 F DEBUG   : 
01-25 13:52:07.204 31306 31306 F DEBUG   : backtrace:
01-25 13:52:07.205 31306 31306 F DEBUG   :     #00 pc 0001a40e  /system/lib/libc.so (abort+63)
01-25 13:52:07.205 31306 31306 F DEBUG   :     #01 pc 000208bb  /system/lib/libc.so (sigprocmask+46)
01-25 13:52:07.392 31306 31306 I crash_dump: socket name: android:aee_aed, sfd: 9