Android:使用BitmapShader\u构造函数的本机崩溃
我在PlayStore得到了下面的崩溃报告,标题是abort。我怎么才能复制它或者理解它呢Android:使用BitmapShader\u构造函数的本机崩溃,android,Android,我在PlayStore得到了下面的崩溃报告,标题是abort。我怎么才能复制它或者理解它呢 #00 pc 000000000001a528 /system/lib/libc.so (abort+63) #01 pc 0000000000006641 /system/lib/liblog.so (__android_log_assert+156) #02 pc 00000000000cb83f /system/lib/libandroid_runtime.so (andro
#00 pc 000000000001a528 /system/lib/libc.so (abort+63)
#01 pc 0000000000006641 /system/lib/liblog.so (__android_log_assert+156)
#02 pc 00000000000cb83f /system/lib/libandroid_runtime.so (android::bitmap::toBitmap(_JNIEnv*, _jobject*)+34)
#03 pc 00000000000dcb23 /system/lib/libandroid_runtime.so (BitmapShader_constructor(_JNIEnv*, _jobject*, long long, _jobject*, int, int)+38)
#04 pc 0000000000a31c23 /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.nativeCreate [DEDUPED]+146)
#05 pc 0000000000a31d53 /system/framework/arm/boot-framework.oat (android.graphics.BitmapShader.createNativeInstance+66)
#06 pc 0000000000a31793 /system/framework/arm/boot-framework.oat (android.graphics.Shader.getNativeInstance+98)
#07 pc 0000000000a4cb27 /system/framework/arm/boot-framework.oat (android.graphics.Paint.getNativeInstance+70)
#08 pc 000000000110554f /system/framework/arm/boot-framework.oat (android.view.RecordingCanvas.drawRoundRect+78)
#09 pc 000000000004699f /dev/ashmem/dalvik-jit-code-cache_12384_12384 (deleted)
崩溃只发生在安卓8.1中,以下是发生崩溃的设备列表,你认为这些是真的吗
Device Name Count
*************************************
Redmi 6 (cereus) 5 35.7%
Redmi 6A (cactus) 2 14.3%
GM8 Go (GM8_go_sc) 1 7.1%
Galaxy J7 (j7y17lte) 1 7.1%
Nokia 1 (FRT) 1 7.1%
ZTE BLADE A530 (P639F10) 1 7.1%
Redmi S2 (ysl) 1 7.1%
Smart 2 HD (Infinix-X609B) 1 7.1%
Galaxy J7 Neo (j7velte) 1 7.1%
我设法在我的小米/cactus_-ru/cactus:8.1.0/O11019/V9.6.14.0.OCBRUFD上复制了这个 复制步骤:
- 公开主要活动
- 单击“添加用户”按钮
- 键入有效的姓名和电话号码
- 单击完成
7.103 3115931159W位图:在循环()位图上调用getWidth()!这是未定义的行为!
01-25 13:52:07.103 3115931159 W位图:在循环()位图上调用getHeight()!这是未定义的行为!
01-25 13:52:07.103 31159 31159 F位图:错误,无法在此访问无效/空闲的位图!
---------坠机开始
01-25 13:52:07.104 3115931159 F libc:致命信号6(SIGABRT),tid 31159(com.gazman.beep)中的代码-6,pid 31159(com.gazman.beep)
01-25 13:52:07.129 29843 29952 D SyncAccountUtils:getSelectionWritableAccountTypes():只读类型:('com.google.android.apps.tachyon','com.google.android.gms.matchstick','com.whatsapp'))
01-25 13:52:07.198 31306 31306 I crash_dump32:从墓碑中获取输出fd,类型:kDebuggerdTombstone
01-25 13:52:07.199 541 541 I/system/bin/tombstoned:收到pid 31159的崩溃请求
01-25 13:52:07.200 31306 31306 I崩溃_转储32:执行进程31159的转储(目标tid=31159)
01-25 13:52:07.201 3115931159 I libc:orig_dumpable:0
01-25 13:52:07.201 31306 31306调试:*********************************************************
01-25 13:52:07.201 31306 31306 F调试:构建指纹:“小米/仙人掌/仙人掌:8.1.0/O11019/V9.6.14.0.OCBRUFD:用户/释放密钥”
01-25 13:52:07.201 31306 31306 F调试:修订版:“0”
01-25 13:52:07.202 31306 31306 F调试:ABI:“arm”
01-25 13:52:07.202 31306 31306 F调试:pid:31159,tid:31159,名称:com.gazman.beep>>>com.gazman.beep我试图在我的Redmi 6A上重现该问题,但没有成功。我正在使用带有位图着色器的自定义视图图形。android(引擎盖下)使用本地位图着色器、本地绘画和录制画布。一切都很好。如果你愿意,我可以尝试从谷歌play安装你的应用程序。是的,如果你能复制它,它将是awesomeIlya,它是什么应用程序?我在描述中没有看到任何参考资料。哦,很抱歉。这是你的电话号码
7.103 31159 31159 W Bitmap : Called getWidth() on a recycle()'d bitmap! This is undefined behavior!
01-25 13:52:07.103 31159 31159 W Bitmap : Called getHeight() on a recycle()'d bitmap! This is undefined behavior!
01-25 13:52:07.103 31159 31159 F Bitmap : Error, cannot access an invalid/free'd bitmap here!
--------- beginning of crash
01-25 13:52:07.104 31159 31159 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 31159 (com.gazman.beep), pid 31159 (com.gazman.beep)
01-25 13:52:07.129 29843 29952 D SyncAccountUtils: getSelectionWritableAccountTypes(): readonly types: ('com.google.android.apps.tachyon','com.google.android.gms.matchstick','com.whatsapp')
01-25 13:52:07.198 31306 31306 I crash_dump32: obtaining output fd from tombstoned, type: kDebuggerdTombstone
01-25 13:52:07.199 541 541 I /system/bin/tombstoned: received crash request for pid 31159
01-25 13:52:07.200 31306 31306 I crash_dump32: performing dump of process 31159 (target tid = 31159)
01-25 13:52:07.201 31159 31159 I libc : orig_dumpable: 0
01-25 13:52:07.201 31306 31306 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
01-25 13:52:07.201 31306 31306 F DEBUG : Build fingerprint: 'xiaomi/cactus_ru/cactus:8.1.0/O11019/V9.6.14.0.OCBRUFD:user/release-keys'
01-25 13:52:07.201 31306 31306 F DEBUG : Revision: '0'
01-25 13:52:07.202 31306 31306 F DEBUG : ABI: 'arm'
01-25 13:52:07.202 31306 31306 F DEBUG : pid: 31159, tid: 31159, name: com.gazman.beep >>> com.gazman.beep <<<
01-25 13:52:07.202 31306 31306 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
01-25 13:52:07.202 31306 31306 F DEBUG : Abort message: ''
01-25 13:52:07.203 31306 31306 F DEBUG : r0 00000000 r1 000079b7 r2 00000006 r3 00000008
01-25 13:52:07.203 31306 31306 F DEBUG : r4 000079b7 r5 000079b7 r6 bec6e474 r7 0000010c
01-25 13:52:07.203 31306 31306 F DEBUG : r8 00000000 r9 00000000 sl 12f0f670 fp 12f0f538
01-25 13:52:07.203 31306 31306 F DEBUG : ip 00000000 sp bec6e460 lr a6efb8bd pc a6ef540e cpsr 200f0030
01-25 13:52:07.204 31306 31306 F DEBUG :
01-25 13:52:07.204 31306 31306 F DEBUG : backtrace:
01-25 13:52:07.205 31306 31306 F DEBUG : #00 pc 0001a40e /system/lib/libc.so (abort+63)
01-25 13:52:07.205 31306 31306 F DEBUG : #01 pc 000208bb /system/lib/libc.so (sigprocmask+46)
01-25 13:52:07.392 31306 31306 I crash_dump: socket name: android:aee_aed, sfd: 9