ListCtrl设置参数Debug状态有效,Release状态无效

文章详细解析了在Debug与Release环境下使用ListCtrl SetItem后再次获取参数无效的原因,并提供了解决方法。

最近在修复项目bug时,出现这样问题

ListCtrl中使用SetItem(LVITEM)后,再次获取参数无效问题;

现象:Debug环境下软件运行正常;

    Release环境下获取参数为上次有效值;


原因:LVITEM对象声明后未初始化,导致部分LVITEM参数类似isubItem等无效,可能导致系统容错处理,新值未成功赋值;

拓展:关于Debug与Release介绍查看http://www.cnblogs.com/JemBai/archive/2009/01/13/1374805.html


11-04 17:35:14.810650 27368 27374 F DEBUG : *** engrave_tombstone_ucontext *** 11-04 17:35:15.620708 27368 27374 F DEBUG : Process name is com.google.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:0, uid is 99001, not key_process 11-04 17:35:15.620718 27368 27374 F DEBUG : keyProcess: 0 11-04 17:35:15.620722 27368 27374 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 11-04 17:35:15.620725 27368 27374 F DEBUG : Build fingerprint: 'realme/RMX5130/RE640BL1:16/AP3A.240617.008/B.4b6f142-2ad1801-2ac7aa8:user/release-keys' 11-04 17:35:15.620727 27368 27374 F DEBUG : Revision: '0' 11-04 17:35:15.620730 27368 27374 F DEBUG : ABI: 'arm64' 11-04 17:35:15.620732 27368 27374 F DEBUG : Timestamp: 2025-11-04 17:35:14.821360125+0800 11-04 17:35:15.620735 27368 27374 F DEBUG : Process uptime: 37s 11-04 17:35:15.620740 27368 27374 F DEBUG : Cmdline: com.google.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:0 11-04 17:35:15.620744 27368 27374 F DEBUG : pid: 27368, tid: 27374, name: HeapTaskDaemon >>> com.google.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:0 <<< 11-04 17:35:15.620747 27368 27374 F DEBUG : uid: 99001 11-04 17:35:15.620752 27368 27374 F DEBUG : tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE) 11-04 17:35:15.620756 27368 27374 F DEBUG : pac_enabled_keys: 000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY) 11-04 17:35:15.620758 27368 27374 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr -------- 11-04 17:35:15.620767 27368 27374 F DEBUG : x0 0000000000000001 x1 000000773d25e998 x2 000000000000003d x3 0000000000000072 11-04 17:35:15.620771 27368 27374 F DEBUG : x4 000000773d25d2e2 x5 0000000000000031 x6 0000000000000031 x7 7f7f7f7f7f7f7f7f 11-04 17:35:15.620775 27368 27374 F DEBUG : x8 0000000000002701 x9 f53c3685f3848309 x10 000000773d25e998 x11 00000076de30c9ab 11-04 17:35:15.620779 27368 27374 F DEBUG : x12 000000000000000b x13 0000000000000001 x14 00000000ffffffff x15 00000000ffffffa5 11-04 17:35:15.620783 27368 27374 F DEBUG : x16 00000076e79060e8 x17 00000078436ddfc0 x18 00000076db788000 x19 000000773d25eb00 11-04 17:35:15.620786 27368 27374 F DEBUG : x20 000000773d25ec10 x21 0000007200ac8030 x22 000000773d25eb90 x23 000000000000006e 11-04 17:35:15.620789 27368 27374 F DEBUG : x24 000000784371df4c x25 00000000c00000b7 x26 000000000000001d x27 000000778f81c000 11-04 17:35:15.620793 27368 27374 F DEBUG : x28 000000773d260840 x29 000000773d25ead0 11-04 17:35:15.620796 27368 27374 F DEBUG : lr 00000076e52408bc sp 000000773d25ead0 pc 00000076e52408d0 pst 0000000060001000 11-04 17:35:15.620799 27368 27374 F DEBUG : 20 total frames 11-04 17:35:15.620802 27368 27374 F DEBUG : backtrace: 11-04 17:35:15.620807 27368 27374 F DEBUG : #00 pc 0000000007a0c8d0 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:15.620811 27368 27374 F DEBUG : #01 pc 0000000007a0d2f4 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:15.620814 27368 27374 F DEBUG : #02 pc 0000000000000848 [vdso] 11-04 17:35:15.620817 27368 27374 F DEBUG : #03 pc 00000000000eff48 /apex/com.android.runtime/lib64/bionic/libc.so (__ioctl+8) (BuildId: f0468d2d3a31c553a7103b6114f35dc6) 11-04 17:35:15.620820 27368 27374 F DEBUG : #04 pc 0000000000094f84 /apex/com.android.runtime/lib64/bionic/libc.so (ioctl+156) (BuildId: f0468d2d3a31c553a7103b6114f35dc6) 11-04 17:35:15.620824 27368 27374 F DEBUG : #05 pc 00000000007b78a0 /apex/com.android.art/lib64/libart.so (art::gc::SchedPriorityAssist::ctrlAppThreadUx(int, int, int)+88) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620827 27368 27374 F DEBUG : #06 pc 00000000005ccb8c /apex/com.android.art/lib64/libart.so (art::gc::ScopedRaiseThreadPriority::ScopedRaiseThreadPriority(int, bool, bool)+172) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620831 27368 27374 F DEBUG : #07 pc 00000000006ebd88 /apex/com.android.art/lib64/libart.so (art::gc::Heap::Trim(art::Thread*)+304) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620834 27368 27374 F DEBUG : #08 pc 00000000006ebc3c /apex/com.android.art/lib64/libart.so (art::gc::Heap::HeapTrimTask::Run(art::Thread*)+36) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620838 27368 27374 F DEBUG : #09 pc 00000000004785a4 /apex/com.android.art/lib64/libart.so (art::gc::TaskProcessor::RunAllTasks(art::Thread*)+308) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620841 27368 27374 F DEBUG : #10 pc 0000000000059f00 /system/framework/arm64/boot-core-libart.oat (art_jni_trampoline+112) (BuildId: beeddc2d3500962b64fef4331c807b2dc7d1a0df) 11-04 17:35:15.620844 27368 27374 F DEBUG : #11 pc 000000000002bd08 /system/framework/arm64/boot-core-libart.oat (java.lang.Daemons$HeapTaskDaemon.runInternal+184) (BuildId: beeddc2d3500962b64fef4331c807b2dc7d1a0df) 11-04 17:35:15.620848 27368 27374 F DEBUG : #12 pc 000000000002a244 /system/framework/arm64/boot-core-libart.oat (java.lang.Daemons$Daemon.run+116) (BuildId: beeddc2d3500962b64fef4331c807b2dc7d1a0df) 11-04 17:35:15.620852 27368 27374 F DEBUG : #13 pc 00000000000d6ff0 /system/framework/arm64/boot.oat (java.lang.Thread.run+128) (BuildId: be44d58d0345926eaaa238bc707d9274c5f64ba7) 11-04 17:35:15.620857 27368 27374 F DEBUG : #14 pc 00000000004bdd94 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+612) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620861 27368 27374 F DEBUG : #15 pc 000000000063b240 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+140) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620865 27368 27374 F DEBUG : #16 pc 00000000006ceaa0 /apex/com.android.art/lib64/libart.so (art::Thread::CreateCallback(void*)+1052) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620868 27368 27374 F DEBUG : #17 pc 00000000006ce670 /apex/com.android.art/lib64/libart.so (art::Thread::CreateCallbackWithUffdGc(void*)+12) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620872 27368 27374 F DEBUG : #18 pc 000000000009a22c /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+184) (BuildId: f0468d2d3a31c553a7103b6114f35dc6) 11-04 17:35:15.620876 27368 27374 F DEBUG : #19 pc 000000000008ca48 /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+68) (BuildId: f0468d2d3a31c553a7103b6114f35dc6) 11-04 17:35:15.716633 27336 27336 F libc : Fatal signal 5 (SIGTRAP), code 1 (TRAP_BRKPT), fault addr 0x76e1679128 in tid 27336 (_app_activity_0), pid 27336 (_app_activity_0) 11-04 17:35:16.343503 27973 27973 F DEBUG : Process name is com.newcall:mini_app_activity_0, uid is 10102, not key_process 11-04 17:35:16.343525 27973 27973 F DEBUG : keyProcess: 0 11-04 17:35:16.343535 27973 27973 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 11-04 17:35:16.343542 27973 27973 F DEBUG : Build fingerprint: 'realme/RMX5130/RE640BL1:16/AP3A.240617.008/B.4b6f142-2ad1801-2ac7aa8:user/release-keys' 11-04 17:35:16.343549 27973 27973 F DEBUG : Revision: '0' 11-04 17:35:16.343554 27973 27973 F DEBUG : ABI: 'arm64' 11-04 17:35:16.343559 27973 27973 F DEBUG : Timestamp: 2025-11-04 17:35:15.887628927+0800 11-04 17:35:16.343566 27973 27973 F DEBUG : Process uptime: 38s 11-04 17:35:16.343572 27973 27973 F DEBUG : Cmdline: com.newcall:mini_app_activity_0 11-04 17:35:16.343578 27973 27973 F DEBUG : pid: 27336, tid: 27336, name: _app_activity_0 >>> com.newcall:mini_app_activity_0 <<< 11-04 17:35:16.343584 27973 27973 F DEBUG : uid: 10102 11-04 17:35:16.343593 27973 27973 F DEBUG : tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE) 11-04 17:35:16.343599 27973 27973 F DEBUG : pac_enabled_keys: 000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY) 11-04 17:35:16.343610 27973 27973 F DEBUG : signal 5 (SIGTRAP), code 1 (TRAP_BRKPT), fault addr 0x00000076e1679128 11-04 17:35:16.343617 27973 27973 F DEBUG : Abort message: '[FATAL:crashpad_client_linux.cc(745)] Render process (27368)'s crash wasn't handled by all associated webviews, triggering application crash.' 11-04 17:35:16.343632 27973 27973 F DEBUG : x0 0000000000000000 x1 00000076e7a454e0 x2 00000076e7a454e0 x3 0000000000000000 11-04 17:35:16.343639 27973 27973 F DEBUG : x4 0000000000000000 x5 2762622d77746d68 x6 2762622d77746d68 x7 7f7f7f7f7f7f7f7f 11-04 17:35:16.343646 27973 27973 F DEBUG : x8 0000000000000000 x9 0000000000000000 x10 0000000000000090 x11 0000000000000090 11-04 17:35:16.343654 27973 27973 F DEBUG : x12 0000000000000090 x13 000000000000008f x14 000000000000000a x15 00000000ffffffa5 11-04 17:35:16.343660 27973 27973 F DEBUG : x16 0000000000000001 x17 00000078436c9c1c x18 000000784cf8c000 x19 0000007fe7080470 11-04 17:35:16.343667 27973 27973 F DEBUG : x20 000000000000008e x21 0000007fe70803b0 x22 00000076e7a45f58 x23 000000784c65c840 11-04 17:35:16.343674 27973 27973 F DEBUG : x24 000000000000008f x25 000000000000000b x26 000000000000008f x27 0000000000000026 11-04 17:35:16.343680 27973 27973 F DEBUG : x28 000000000000008f x29 0000007fe7080350 11-04 17:35:16.343686 27973 27973 F DEBUG : lr 00000076e1678fdc sp 0000007fe707ff20 pc 00000076e1679128 pst 0000000060001000 11-04 17:35:16.343694 27973 27973 F DEBUG : 29 total frames 11-04 17:35:16.343698 27973 27973 F DEBUG : backtrace: 11-04 17:35:16.343707 27973 27973 F DEBUG : #00 pc 0000000003e45128 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343715 27973 27973 F DEBUG : #01 pc 000000000606a694 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343722 27973 27973 F DEBUG : #02 pc 00000000070bed0c /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343728 27973 27973 F DEBUG : #03 pc 0000000004286298 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343734 27973 27973 F DEBUG : #04 pc 0000000007b2a024 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343749 27973 27973 F DEBUG : #05 pc 0000000001fe2acc /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343756 27973 27973 F DEBUG : #06 pc 0000000006b33844 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343762 27973 27973 F DEBUG : #07 pc 0000000006b3523c /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343769 27973 27973 F DEBUG : #08 pc 0000000000014df8 /system/lib64/libutils.so (android::Looper::pollOnce(int, int*, int*, void**)+1200) (BuildId: cd6fe1a2f106f83ac0868f825dfc8390) 11-04 17:35:16.343778 27973 27973 F DEBUG : #09 pc 00000000001e854c /system/lib64/libandroid_runtime.so (android::android_os_MessageQueue_nativePollOnce(_JNIEnv*, _jobject*, long, int)+48) (BuildId: 14a8ae10abcdb616b6621ca08b12b54e) 11-04 17:35:16.343786 27973 27973 F DEBUG : #10 pc 0000000000af0390 /system/framework/arm64/boot-framework.oat (art_jni_trampoline+112) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343792 27973 27973 F DEBUG : #11 pc 00000000006a2f9c /system/framework/arm64/boot-framework.oat (android.os.MessageQueue.nextLegacy+268) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343799 27973 27973 F DEBUG : #12 pc 00000000006aa21c /system/framework/arm64/boot-framework.oat (android.os.MessageQueue.next+44) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343815 27973 27973 F DEBUG : #13 pc 000000000069a998 /system/framework/arm64/boot-framework.oat (android.os.Looper.loopOnce+88) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343823 27973 27973 F DEBUG : #14 pc 000000000069a8b8 /system/framework/arm64/boot-framework.oat (android.os.Looper.loop+296) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343830 27973 27973 F DEBUG : #15 pc 00000000002f2af4 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+1748) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343853 27973 27973 F DEBUG : #16 pc 00000000004be060 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:16.343862 27973 27973 F DEBUG : #17 pc 00000000004b4ef4 /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1628) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:16.343871 27973 27973 F DEBUG : #18 pc 000000000079e900 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+36) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:16.343877 27973 27973 F DEBUG : #19 pc 00000000003acb14 /system/framework/arm64/boot.oat (art_jni_trampoline+116) (BuildId: be44d58d0345926eaaa238bc707d9274c5f64ba7) 11-04 17:35:16.343893 27973 27973 F DEBUG : #20 pc 0000000000a3a3c4 /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343900 27973 27973 F DEBUG : #21 pc 0000000000a43c34 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+5508) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343906 27973 27973 F DEBUG : #22 pc 00000000004be060 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:16.343912 27973 27973 F DEBUG : #23 pc 00000000004bcb78 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<art::ArtMethod*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+916) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:16.343919 27973 27973 F DEBUG : #24 pc 0000000000811f80 /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+180) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:16.343925 27973 27973 F DEBUG : #25 pc 000000000010cacc /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108) (BuildId: 14a8ae10abcdb616b6621ca08b12b54e) 11-04 17:35:16.343931 27973 27973 F DEBUG : #26 pc 00000000001384e0 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+1020) (BuildId: 14a8ae10abcdb616b6621ca08b12b54e) 11-04 17:35:16.343937 27973 27973 F DEBUG : #27 pc 0000000000002718 /system/bin/app_process64 (main+1624) (BuildId: 9d1c8ac843cff429ce808524242c9a73) 11-04 17:35:16.343944 27973 27973 F DEBUG : #28 pc 0000000000082d60 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+124) (BuildId: f0468d2d3a31c553a7103b6114f35dc6) 11-04 17:35:58.254363 28759 28759 F crashpad: -----BEGIN CRASHPAD MINIDUMP-----
最新发布
11-18
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值