hms-scan-demo icon indicating copy to clipboard operation
hms-scan-demo copied to clipboard

在Android8.0上使用LeakCanary检测到内存泄漏

Open qiyangsh opened this issue 3 years ago • 1 comments

使用Customized View自定义界面,进入扫码Activity, 退出就会出现内存泄漏,如下:

┬─── │ GC Root: Java local variable │ ├─ java.util.TimerThread thread │ Leaking: UNKNOWN │ Retaining 97.3 kB in 1340 objects │ Thread name: 'Timer-1' │ ↓ TimerThread.<Java Local> │ ~~~~~~~~~~~~ ├─ com.huawei.hms.scankit.p.Ua instance │ Leaking: UNKNOWN │ Retaining 97.0 kB in 1331 objects │ ↓ Ua.a │ ~ ├─ com.huawei.hms.scankit.p.Ta$b instance │ Leaking: UNKNOWN │ Retaining 97.0 kB in 1330 objects │ ↓ Ta$b.f │ ~ ├─ com.huawei.hms.scankit.p.Ta instance │ Leaking: UNKNOWN │ Retaining 96.6 kB in 1320 objects │ e instance of io.taucoin.torrent.publishing.ui.qrcode.ScanQRCodeActivity │ with mDestroyed = true │ ↓ Za.e │ ~ ╰→ io.taucoin.torrent.publishing.ui.qrcode.ScanQRCodeActivity instance ​ Leaking: YES (ObjectWatcher was watching this because io.taucoin.torrent. ​ publishing.ui.qrcode.ScanQRCodeActivity received Activity#onDestroy() ​ callback and Activity#mDestroyed is true) ​ Retaining 95.8 kB in 1296 objects ​ key = 1c2eea66-bb30-483a-8ba8-0a3d4576165a ​ watchDurationMillis = 70604 ​ retainedDurationMillis = 65594 ​ mApplication instance of io.taucoin.torrent.publishing.MainApplication ​ mBase instance of android.app.ContextImpl

METADATA

Build.VERSION.SDK_INT: 26 Build.MANUFACTURER: Xiaomi LeakCanary version: 2.7 App process name: io.taucoin.torrent.publishing Stats: LruCache[maxSize=3000,hits=2659,misses=50866,hitRate=4%] RandomAccess[bytes=2582021,reads=50866,travel=13439696890,range=12088936,size=16 611398] Heap dump reason: user request Analysis duration: 48294 ms

qiyangsh avatar May 29 '21 02:05 qiyangsh

就是有内存泄露。

Dboy233 avatar Sep 01 '21 02:09 Dboy233