Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

signal 11 (SIGSEGV), code 1 (SEGV_MAPERR) #328

Closed
TonyAnine opened this issue Sep 10, 2019 · 8 comments
Closed

signal 11 (SIGSEGV), code 1 (SEGV_MAPERR) #328

TonyAnine opened this issue Sep 10, 2019 · 8 comments
Labels
question Further information is requested

Comments

@TonyAnine
Copy link

The language of MMKV

Java

The version of MMKV

e.g. v1.0.23

The platform of MMKV

Android

The installation of MMKV

Maven

What's the issue?

signal 11 (SIGSEGV), code 1 (SEGV_MAPERR)
libmmkv.so


pid: 0, tid: 0 >>> com.xx.xxx <<<

backtrace:
#00 pc 000000000000db14 /data/app/com.xx.xxx-2/lib/arm/libmmkv.so
#1 pc 000000000000a293 /data/app/com.xx.xxx-2/lib/arm/libmmkv.so
#2 pc 0000000000007e29 /data/app/com.xx.xxx-2/lib/arm/libmmkv.so
#3 pc 0000000000b740cb /data/dalvik-cache/arm/data@app@com.xx.xxx-2@base.apk@classes.dex

Android version
Android 5.1 53
Android 5.0 7
Android 5.1 53 88.3%
Android 5.0 7 11.7%

@lingol
Copy link
Collaborator

lingol commented Sep 10, 2019

Please provide de-symbolized crash stack.

@lingol lingol added the question Further information is requested label Sep 10, 2019
@lingol
Copy link
Collaborator

lingol commented Sep 10, 2019

Also, logs of MMKV will be very helpful.

@TonyAnine
Copy link
Author

TonyAnine commented Sep 16, 2019

backtrace:
#00 pc 000000000000db14 /data/app/com.xx.xxx-rnON9davN96fVRwV78oO3w==/split_config.armeabi_v7a.apk
#1 pc 000000000000a293 /data/app/com..xx.xxx-rnON9davN96fVRwV78oO3w==/split_config.armeabi_v7a.apk
#2 pc 0000000000007e29 /data/app/com..xx.xxx-rnON9davN96fVRwV78oO3w==/split_config.armeabi_v7a.apk
#3 pc 00000000000341a5 /data/app/com..xx.xxx-rnON9davN96fVRwV78oO3w==/oat/arm/base.odex (com.tencent.mmkv.MMKV.getMMKVWithID+172)
#4 pc 0000000000410575 /system/lib/libart.so (art_quick_invoke_stub_internal+68)
#5 pc 00000000003e9c2b /system/lib/libart.so (art_quick_invoke_static_stub+222)
#6 pc 00000000000a1827 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
#7 pc 00000000001e6db5 /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+236)
#8 pc 00000000001e18a3 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+814)
#9 pc 00000000003e575f /system/lib/libart.so (MterpInvokeStatic+130)
#10 pc 0000000000403414 /system/lib/libart.so (ExecuteMterpImpl+14612)
#11 pc 00000000004a88ae /data/app/com..xx.xxx-rnON9davN96fVRwV78oO3w==/oat/arm/base.vdex (com.tencent.mmkv.MMKV.c+10)
#12 pc 00000000001c5f73 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3874618095+378)
#13 pc 00000000001ca659 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
#14 pc 00000000001e188b /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
#15 pc 00000000003e575f /system/lib/libart.so (MterpInvokeStatic+130)
#16 pc 0000000000403414 /system/lib/libart.so (ExecuteMterpImpl+14612)
#17 pc 000000000026aee0 /data/app/com..xx.xxx-rnON9davN96fVRwV78oO3w==/oat/arm/base.vdex (.xx.xxx.j.h.c+32)
#18 pc 00000000001c5f73 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3874618095+378)
#19 pc 00000000001ca59f /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
#20 pc 00000000003d8269 /system/lib/libart.so (artQuickToInterpreterBridge+880)
#21 pc 0000000000414aff /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
#22 pc 0000000000410575 /system/lib/libart.so (art_quick_invoke_stub_internal+68)
#23 pc 00000000003e9c2b /system/lib/libart.so (art_quick_invoke_static_stub+222)
#24 pc 00000000000a1827 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
#25 pc 00000000001e6db5 /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+236)
#26 pc 00000000001e18a3 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+814)
#27 pc 00000000003e575f /system/lib/libart.so (MterpInvokeStatic+130)
#28 pc 0000000000403414 /system/lib/libart.so (ExecuteMterpImpl+14612)
#29 pc 000000000025b8dc /data/app/.xx.xxx-rnON9davN96fVRwV78oO3w==/oat/arm/base.vdex (.xx.xxx.sms.i$a.doInBackground+52)
#30 pc 00000000001c5f73 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3874618095+378)
#31 pc 00000000001ca659 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+152)
#32 pc 00000000001e188b /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+790)
#33 pc 00000000003e6bcd /system/lib/libart.so (MterpInvokeVirtualQuick+428)
#34 pc 0000000000407014 /system/lib/libart.so (ExecuteMterpImpl+29972)
#35 pc 000000000025b88c /data/app/.xx.xxx-rnON9davN96fVRwV78oO3w==/oat/arm/base.vdex (.xx.xxx.sms.i$a.doInBackground)
#36 pc 00000000001c5f73 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3874618095+378)
#37 pc 00000000001ca59f /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
#38 pc 00000000003d8269 /system/lib/libart.so (artQuickToInterpreterBridge+880)
#39 pc 0000000000414aff /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
#40 pc 0000000000a7877f /system/framework/arm/boot-framework.oat (android.os.AsyncTask$2.call+158)
#41 pc 00000000002ff629 /system/framework/arm/boot.oat (java.util.concurrent.FutureTask.run+208)
#42 pc 0000000000356579 /system/framework/arm/boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+1048)
#43 pc 0000000000353b37 /system/framework/arm/boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+54)
#44 pc 00000000002197a1 /system/framework/arm/boot.oat (java.lang.Thread.run+64)
#45 pc 0000000000410575 /system/lib/libart.so (art_quick_invoke_stub_internal+68)
#46 pc 00000000003e9b29 /system/lib/libart.so (art_quick_invoke_stub+224)
#47 pc 00000000000a1815 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
#48 pc 0000000000349515 /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
#49 pc 000000000034a26d /system/lib/libart.so (art::InvokeVirtualOrInterfaceWithJValues(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, jvalue*)+320)
#50 pc 000000000036b653 /system/lib/libart.so (art::Thread::CreateCallback(void*)+866)
#51 pc 0000000000072461 /system/lib/libc.so (__pthread_start(void*)+22)
#52 pc 000000000001e1cd /system/lib/libc.so (__start_thread+24)

@lingol
Copy link
Collaborator

lingol commented Sep 16, 2019

PLEASE PROVIDE SYMBOLIZED CRASH STACK. And logs of MMKV.

#00 pc 000000000000db14 /data/app/com.xx.xxx-rnON9davN96fVRwV78oO3w==/split_config.armeabi_v7a.apk
#1 pc 000000000000a293 /data/app/com..xx.xxx-rnON9davN96fVRwV78oO3w==/split_config.armeabi_v7a.apk
#2 pc 0000000000007e29 /data/app/com..xx.xxx-rnON9davN96fVRwV78oO3w==/split_config.armeabi_v7a.apk
#3 pc 00000000000341a5 /data/app/com..xx.xxx-rnON9davN96fVRwV78oO3w==/oat/arm/base.odex (com.tencent.mmkv.MMKV.getMMKVWithID+172)

@TonyAnine
Copy link
Author

This is the error of google play vitals. I use the app bundle, is it related to the app bundle?

@lingol
Copy link
Collaborator

lingol commented Sep 16, 2019

@lingol
Copy link
Collaborator

lingol commented Sep 25, 2019

Check your logs for disk full messages.

@lingol
Copy link
Collaborator

lingol commented Sep 27, 2019

Close due to failing to provide symbolized stack traces.

@lingol lingol closed this as completed Sep 27, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
question Further information is requested
Projects
None yet
Development

No branches or pull requests

2 participants