fijkplayer icon indicating copy to clipboard operation
fijkplayer copied to clipboard

[BUG] Fatal signal 11 (SIGSEGV), code 0 (SI_USER) in tid 25504

Open bladeofgod opened this issue 3 years ago • 3 comments

Describe the bug A clear and concise description of what the bug is. 播放个别视频,在播放结束后崩溃,报上面这个错误。

Build fingerprint: 'OPPO/PEAM00/OP4E6B:10/QP1A.190711.020/1613974636:user/release-keys' Revision: '0' ABI: 'arm64' Timestamp: 2021-04-09 10:36:09+0800 pid: 25504, tid: 25504, name: banjia.rikiuser >>> com.xxx.xxx <<< uid: 10345 signal 11 (SIGSEGV), code 0 (SI_USER), fault addr -------- x0 fffffffffffffffc x1 0000007fc4a8a2a0 x2 0000000000000010 x3 00000000ffffffff x4 0000000000000000 x5 0000000000000008 x6 00000075263fd000 x7 0000000001866d7a x8 0000000000000016 x9 11891999fee90a5c x10 00000000000001bf x11 000000749fc0d880 x12 0000007fc4a8a3c0 x13 00000000606fbd98 x14 003b8f61dedaae50 x15 00002a3549d8a858 x16 00000075203b9d70 x17 000000752150a8dc x18 0000000000000020 x19 000000749fce40e0 x20 000000749fce4188 x21 00000000ffffffff x22 00000000ffffffff x23 000000749fce40e0 x24 000000007fffffff x25 000000752515e020 x26 0000007493440100 x27 0000000013080060 x28 00000000701e1288 x29 0000007fc4a8a400 sp 0000007fc4a8a260 lr 00000075203b5a78 pc 0000007521548d98 backtrace: #00 pc 00000000000bad98 /apex/com.android.runtime/lib64/bionic/libc.so (__epoll_pwait+8) (BuildId: 9c41c09172a8ba4eebe97515edbc971b) #01 pc 0000000000017a74 /system/lib64/libutils.so (android::Looper::pollInner(int)+144) (BuildId: 0078fd1c8df942e7fdcbecf10d53f66f) #02 pc 0000000000017944 /system/lib64/libutils.so (android::Looper::pollOnce(int, int*, int*, void**)+56) (BuildId: 0078fd1c8df942e7fdcbecf10d53f66f) #03 pc 000000000013a0f4 /system/lib64/libandroid_runtime.so (android::android_os_MessageQueue_nativePollOnce(_JNIEnv*, _jobject*, long, int)+44) (BuildId: c77046b9b948c04592bb347354fd2d5f) #04 pc 00000000002fcafc /system/framework/arm64/boot-framework.oat (art_jni_trampoline+140) (BuildId: 798786fa560fcf306e296afd82968eb39bdb036c) #05 pc 00000000020147dc /memfd:/jit-cache (deleted) (android.os.MessageQueue.next+204) #06 pc 000000000204a394 /memfd:/jit-cache (deleted) (android.os.Looper.loop+596) #07 pc 000000000013663c /apex/com.android.runtime/lib64/libart.so (art_quick_osr_stub+60) (BuildId: dd2af54151aed391de185c1301586c6e) #08 pc 0000000000331698 /apex/com.android.runtime/lib64/libart.so (art::jit::Jit::MaybeDoOnStackReplacement(art::Thread*, art::ArtMethod*, unsigned int, int, art::JValue*)+1652) (BuildId: dd2af54151aed391de185c1301586c6e) #09 pc 0000000000599fe0 /apex/com.android.runtime/lib64/libart.so (MterpMaybeDoOnStackReplacement+212) (BuildId: dd2af54151aed391de185c1301586c6e) #10 pc 0000000000135350 /apex/com.android.runtime/lib64/libart.so (MterpHelpers+240) (BuildId: dd2af54151aed391de185c1301586c6e) #11 pc 0000000000350b9a /system/framework/framework.jar (android.os.Looper.loop+1298) #12 pc 0000000000591f7c /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1136) (BuildId: dd2af54151aed391de185c1301586c6e) #13 pc 0000000000130994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: dd2af54151aed391de185c1301586c6e) #14 pc 00000000000587f0 [anon:dalvik-classes2.dex extracted in memory from /data/app/com.xxx.xxx-zoPPjwIuhnV_9nYtwGHWkQ==/base.apk!classes2.dex] (com.example.riki.protecter.zone.UIThreadProtect$1.run) #15 pc 0000000000590bd4 /apex/com.android.runtime/lib64/libart.so (MterpInvokeInterface+1740) (BuildId: dd2af54151aed391de185c1301586c6e) #16 pc 0000000000130a14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_interface+20) (BuildId: dd2af54151aed391de185c1301586c6e) #17 pc 000000000031ba40 /system/framework/framework.jar (android.os.Handler.handleCallback+4) #18 pc 0000000000591f7c /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1136) (BuildId: dd2af54151aed391de185c1301586c6e) #19 pc 0000000000130994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: dd2af54151aed391de185c1301586c6e) #20 pc 000000000031b8ac /system/framework/framework.jar (android.os.Handler.dispatchMessage+8) #21 pc 000000000058f3e0 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: dd2af54151aed391de185c1301586c6e) #22 pc 0000000000130814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: dd2af54151aed391de185c1301586c6e) #23 pc 00000000003508de /system/framework/framework.jar (android.os.Looper.loop+598) #24 pc 0000000000591f7c /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1136) (BuildId: dd2af54151aed391de185c1301586c6e) #25 pc 0000000000130994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: dd2af54151aed391de185c1301586c6e) #26 pc 00000000001af788 /system/framework/framework.jar (android.app.ActivityThread.main+256) #27 pc 00000000002ae410 /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.2400192248591013488+240) (BuildId: dd2af54151aed391de185c1301586c6e) #28 pc 00000000005808cc /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1024) (BuildId: dd2af54151aed391de185c1301586c6e) #29 pc 000000000013f468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: dd2af54151aed391de185c1301586c6e) #30 pc 00000000001365b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: dd2af54151aed391de185c1301586c6e) #31 pc 0000000000145080 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: dd2af54151aed391de185c1301586c6e) #32 pc 00000000004a2548 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: dd2af54151aed391de185c1301586c6e) #33 pc 00000000004a3f84 /apex/com.android.runtime/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1476) (BuildId: dd2af54151aed391de185c1301586c6e) #34 pc 00000000004323e4 /apex/com.android.runtime/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: dd2af54151aed391de185c1301586c6e) #35 pc 00000000000c2c34 /system/framework/arm64/boot.oat (art_jni_trampoline+180) (BuildId: 57b5ca3bd905a15cc02d58e5734586837ca4755b) #36 pc 0000000000136334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: dd2af54151aed391de185c1301586c6e) #37 pc 0000000000145060 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+244) (BuildId: dd2af54151aed391de185c1301586c6e) #38 pc 00000000002ddbec /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: dd2af54151aed391de185c1301586c6e) #39 pc 00000000002d894c /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+900) (BuildId: dd2af54151aed391de185c1301586c6e) #40 pc 000000000058f18c /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+836) (BuildId: dd2af54151aed391de185c1301586c6e) #41 pc 0000000000130814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: dd2af54151aed391de185c1301586c6e) #42 pc 00000000003f7242 /system/framework/framework.jar (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22) #43 pc 00000000002ae410 /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.2400192248591013488+240) (BuildId: dd2af54151aed391de185c1301586c6e) #44 pc 00000000005808cc /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1024) (BuildId: dd2af54151aed391de185c1301586c6e) #45 pc 000000000013f468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: dd2af54151aed391de185c1301586c6e) #46 pc 0000000000b1657c /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+2284) (BuildId: 798786fa560fcf306e296afd82968eb39bdb036c) #47 pc 00000000001365b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: dd2af54151aed391de185c1301586c6e) #48 pc 0000000000145080 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: dd2af54151aed391de185c1301586c6e) #49 pc 00000000004a2548 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: dd2af54151aed391de185c1301586c6e) #50 pc 00000000004a21ac /apex/com.android.runtime/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: dd2af54151aed391de185c1301586c6e) #51 pc 00000000003b2af4 /apex/com.android.runtime/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+764) (BuildId: dd2af54151aed391de185c1301586c6e) #52 pc 00000000000c1560 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: c77046b9b948c04592bb347354fd2d5f) #53 pc 00000000000c4480 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+920) (BuildId: c77046b9b948c04592bb347354fd2d5f) #54 pc 00000000000034e0 /system/bin/app_process64 (main+1168) (BuildId: 03ce9f042223b554fd0f18e2429e390a) #55 pc 000000000006a180 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: 9c41c09172a8ba4eebe97515edbc971b)

bladeofgod avatar Apr 09 '21 02:04 bladeofgod