#01 pc 0000007909f77670 <unknown>
#02 pc 0000007909f773dc <unknown>
#03 pc 0000007909f772bc <unknown>
#04 pc 0000007909f77240 <unknown>
#05 pc 0000007909f76f00 <unknown>
#06 pc 0000000000092474 /system/lib64/libc.so (__pthread_start(void*)+36) (BuildId: 464bb288ce09d53ee1392dd8e1156940)
#07 pc 00000000000239a8 /system/lib64/libc.so (__start_thread+68) (BuildId: 464bb288ce09d53ee1392dd8e1156940)
修改官方thread demo将加载触发thread泄漏的so加载放在点击之后,稳定复现回退栈unknown的情况。 修改后代码如下: mTest10Btn.setOnClickListener { if (loadSoQuietly("native-leak-test")) { triggerLeak(10 * 1000) } } 触发后输出如下: 2022-04-27 19:09:40.186 16272-16423/com.kwai.koom.demo I/ThreadLeakTest: tid: 16994 createTime: 242760806850934 Byte startTime: 242760807118642 endTime: 242760807162132 name: test_thread_2 createCallStack:
00 pc 0000007909f7604c