69 votes

L'application continue de se planter lorsque le profileur Android est utilisé

Mon application effectue un suivi de l'emplacement et met à jour la base de données lorsque cela est nécessaire, l'application fonctionne depuis 2 jours sans aucun problème. Maintenant, j'essaie d'utiliser Android Profiler (Android Studio 3.01), mais dès que je l'active, il fonctionne pendant quelques secondes, puis il commence à planter l'application. Quelqu'un a une idée ?

10-22 21:31:01.236 16471-16471/myproject.myfirstapp A/libc: Fatal signal 6 (SIGABRT), code -6 (SI_TKILL) in tid 16471 (ampaigns.myfirstapp), pid 16471 (ampaigns.myfirstapp)
10-22 21:31:01.358 16585-16585/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
10-22 21:31:01.358 16585-16585/? A/DEBUG: Build fingerprint: 'google/taimen/taimen:9/PPR2.181005.003/4984323:user/release-keys'
10-22 21:31:01.358 16585-16585/? A/DEBUG: Revision: 'rev_10'
10-22 21:31:01.358 16585-16585/? A/DEBUG: ABI: 'arm64'
10-22 21:31:01.358 16585-16585/? A/DEBUG: pid: 16471, tid: 16471, name: ampaigns.myfirstapp  >>> myproject.myfirstapp <<<
10-22 21:31:01.358 16585-16585/? A/DEBUG: signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
10-22 21:31:01.358 16585-16585/? A/DEBUG:     x0  0000000000000000  x1  0000000000004057  x2  0000000000000006  x3  0000000000000008
10-22 21:31:01.358 16585-16585/? A/DEBUG:     x4  000000000000000a  x5  000000000000000a  x6  000000000000000a  x7  000000000000000a
10-22 21:31:01.359 16585-16585/? A/DEBUG:     x8  0000000000000083  x9  00000077c95b99d8  x10 fffffff87ffffbdf  x11 0000000000000001
10-22 21:31:01.359 16585-16585/? A/DEBUG:     x12 0000000000000064  x13 0000000000000000  x14 00000000ffffffff  x15 0000007fdd2337b8
10-22 21:31:01.359 16585-16585/? A/DEBUG:     x16 00000077c95f22c8  x17 00000077c95302d8  x18 0000007fdd23313a  x19 0000000000004057
10-22 21:31:01.359 16585-16585/? A/DEBUG:     x20 0000000000004057  x21 0000000000000083  x22 0000000004000000  x23 0000000000000000
10-22 21:31:01.359 16585-16585/? A/DEBUG:     x24 000000773f7f1640  x25 0000007fdd233b38  x26 0000000000000000  x27 000000773f7f1640
10-22 21:31:01.359 16585-16585/? A/DEBUG:     x28 0000007747a6d460  x29 0000007fdd233800
10-22 21:31:01.359 16585-16585/? A/DEBUG:     sp  0000007fdd2337c0  lr  00000077c9524a90  pc  00000077c9524abc
10-22 21:31:01.606 16585-16585/? A/DEBUG: backtrace:
10-22 21:31:01.606 16585-16585/? A/DEBUG:     #00 pc 0000000000021abc  /system/lib64/libc.so (abort+124)
10-22 21:31:01.606 16585-16585/? A/DEBUG:     #01 pc 0000000000066ad4  /data/data/myproject.myfirstapp/libperfa_arm64.so
10-22 21:31:01.606 16585-16585/? A/DEBUG:     #02 pc 0000000000072c48  /data/data/myproject.myfirstapp/libperfa_arm64.so
10-22 21:31:01.606 16585-16585/? A/DEBUG:     #03 pc 0000000000072890  /data/data/myproject.myfirstapp/libperfa_arm64.so
10-22 21:31:01.606 16585-16585/? A/DEBUG:     #04 pc 0000000000052058  /data/data/myproject.myfirstapp/libperfa_arm64.so
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #05 pc 00000000000910b0  /system/lib64/libopenjdkjvmti.so (_ZN12openjdkjvmti11Transformer26TransformSingleClassDirectILNS_13ArtJvmtiEventE85EEEvPNS_12EventHandlerEPN3art6ThreadEPNS_18ArtClassDefinitionE+1864)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #06 pc 0000000000091c48  /system/lib64/libopenjdkjvmti.so (openjdkjvmti::Transformer::RetransformClasses(openjdkjvmti::ArtJvmTiEnv*, openjdkjvmti::EventHandler*, art::Runtime*, art::Thread*, int, _jclass* const*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>*)+768)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #07 pc 0000000000039f90  /system/lib64/libopenjdkjvmti.so (openjdkjvmti::JvmtiFunctions::RetransformClasses(_jvmtiEnv*, int, _jclass* const*)+192)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #08 pc 0000000000053e40  /data/data/myproject.myfirstapp/libperfa_arm64.so
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #09 pc 00000000004b2828  /system/lib64/libart.so (art::ti::AgentSpec::DoLoadHelper(_JNIEnv*, bool, _jobject*, int*, art::ti::LoadError*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>*)+832)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #10 pc 00000000004b2e78  /system/lib64/libart.so (art::ti::AgentSpec::Attach(_JNIEnv*, _jobject*, int*, art::ti::LoadError*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>*)+120)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #11 pc 0000000000476c30  /system/lib64/libart.so (art::Runtime::AttachAgent(_JNIEnv*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>> const&, _jobject*)+1312)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #12 pc 00000000003d325c  /system/lib64/libart.so (art::VMDebug_nativeAttachAgent(_JNIEnv*, _jclass*, _jstring*, _jobject*)+1908)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #13 pc 0000000000079a48  /system/framework/arm64/boot-core-libart.oat (offset 0x78000) (dalvik.system.VMDebug.nativeAttachAgent [DEDUPED]+200)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #14 pc 000000000055cc4c  /system/lib64/libart.so (art_quick_invoke_static_stub+604)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #15 pc 00000000000cf760  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #16 pc 00000000002823b0  /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #17 pc 000000000027c36c  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #18 pc 000000000052d8dc  /system/lib64/libart.so (MterpInvokeStatic+204)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #19 pc 000000000054f214  /system/lib64/libart.so (ExecuteMterpImpl+14612)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #20 pc 000000000018fa0c  /system/framework/boot-core-libart.vdex (dalvik.system.VMDebug.attachAgent)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #21 pc 0000000000255e68  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2146680767+496)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #22 pc 000000000025b9e8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #23 pc 000000000027c350  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #24 pc 000000000052d8dc  /system/lib64/libart.so (MterpInvokeStatic+204)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #25 pc 000000000054f214  /system/lib64/libart.so (ExecuteMterpImpl+14612)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #26 pc 00000000004b5f4a  /system/framework/boot-framework.vdex (android.app.ActivityThread.attemptAttachAgent)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #27 pc 0000000000255e68  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2146680767+496)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #28 pc 000000000025b9e8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #29 pc 000000000027c350  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #30 pc 000000000052d8dc  /system/lib64/libart.so (MterpInvokeStatic+204)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #31 pc 000000000054f214  /system/lib64/libart.so (ExecuteMterpImpl+14612)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #32 pc 00000000004b7eca  /system/framework/boot-framework.vdex (android.app.ActivityThread.handleAttachAgent+18)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #33 pc 0000000000255e68  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2146680767+496)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #34 pc 000000000025b9e8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #35 pc 000000000027c350  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #36 pc 000000000052d8dc  /system/lib64/libart.so (MterpInvokeStatic+204)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #37 pc 000000000054f214  /system/lib64/libart.so (ExecuteMterpImpl+14612)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #38 pc 000000000037f02e  /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+222)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #39 pc 0000000000255e68  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2146680767+496)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #40 pc 000000000025b9e8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #41 pc 000000000027c350  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #42 pc 000000000052c3d8  /system/lib64/libart.so (MterpInvokeVirtual+584)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #43 pc 000000000054f094  /system/lib64/libart.so (ExecuteMterpImpl+14228)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #44 pc 0000000000ae3442  /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #45 pc 0000000000255e68  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2146680767+496)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #46 pc 000000000025b9e8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #47 pc 000000000027c350  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
10-22 21:31:01.607 16585-16585/? A/DEBUG:     #48 pc 000000000052c3d8  /system/lib64/libart.so (MterpInvokeVirtual+584)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #49 pc 000000000054f094  /system/lib64/libart.so (ExecuteMterpImpl+14228)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #50 pc 0000000000aea530  /system/framework/boot-framework.vdex (android.os.Looper.loop+404)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #51 pc 0000000000255e68  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2146680767+496)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #52 pc 000000000025b9e8  /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #53 pc 000000000027c350  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #54 pc 000000000052d8dc  /system/lib64/libart.so (MterpInvokeStatic+204)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #55 pc 000000000054f214  /system/lib64/libart.so (ExecuteMterpImpl+14612)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #56 pc 0000000000384a52  /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #57 pc 0000000000255e68  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2146680767+496)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #58 pc 000000000051cb18  /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #59 pc 0000000000565afc  /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #60 pc 000000000055cc4c  /system/lib64/libart.so (art_quick_invoke_static_stub+604)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #61 pc 00000000000cf760  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #62 pc 00000000004633b8  /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #63 pc 0000000000464e10  /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #64 pc 00000000003f43b0  /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+48)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #65 pc 000000000011e6d4  /system/framework/arm64/boot.oat (offset 0x114000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #66 pc 000000000055c988  /system/lib64/libart.so (art_quick_invoke_stub+584)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #67 pc 00000000000cf740  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #68 pc 00000000002823b0  /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #69 pc 000000000027c36c  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #70 pc 000000000052c3d8  /system/lib64/libart.so (MterpInvokeVirtual+584)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #71 pc 000000000054f094  /system/lib64/libart.so (ExecuteMterpImpl+14228)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #72 pc 0000000000c0b2f6  /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #73 pc 0000000000255e68  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2146680767+496)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #74 pc 000000000051cb18  /system/lib64/libart.so (artQuickToInterpreterBridge+1032)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #75 pc 0000000000565afc  /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #76 pc 0000000000bea920  /system/framework/arm64/boot-framework.oat (offset 0x3cd000) (com.android.internal.os.ZygoteInit.main+3088)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #77 pc 000000000055cc4c  /system/lib64/libart.so (art_quick_invoke_static_stub+604)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #78 pc 00000000000cf760  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #79 pc 00000000004633b8  /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #80 pc 0000000000463010  /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+416)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #81 pc 0000000000366854  /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+644)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #82 pc 00000000000b1bf8  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #83 pc 00000000000b4578  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+760)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #84 pc 00000000000021a0  /system/bin/app_process64 (main+1200)
10-22 21:31:01.608 16585-16585/? A/DEBUG:     #85 pc 00000000000ae760  /system/lib64/libc.so (__libc_init+88)

9voto

user14297898 Points 41

C'est peut-être un bug du profil Android studio. Supprimez tout le répertoire codecache dans le chemin racine du paquet de données de votre application (data/data/pacakge_name/codecache) et réessayez le profil à nouveau.

4voto

Pablo Alfonso Points 267

Dans Android Studio 4.0 (ou supérieur), la navigation suivante permet d'éviter les plantages lors de l'exécution avec le profileur :

1. From menu click on "Run"
2. Profile 'app'

0voto

syslogic Points 749

signal 6 (SIGABRT), code -6 (SI_TKILL) signifie que abort était délibérée.

Ce problème semble être lié : Le profileur se bloque dans libperfa_arm64.so

0voto

Krish Points 21

Votre application est-elle un projet assez important avec un grand nombre de classes, avec potentiellement une logique de chargeur de classe personnalisée ?

Une fois que vous avez les étapes pour reproduire le crash, vous pouvez utiliser un outil comme logcat pour obtenir plus d'informations.

https://developer.Android.com/studio/command-line/logcat.html

-7voto

Utiliser ce code

button2 = (Button) findViewById(R.id.button2) ;

Prograide.com

Prograide est une communauté de développeurs qui cherche à élargir la connaissance de la programmation au-delà de l'anglais.
Pour cela nous avons les plus grands doutes résolus en français et vous pouvez aussi poser vos propres questions ou résoudre celles des autres.

Powered by:

X