Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vivo手机运行崩溃 #44

Open
121880399 opened this issue Mar 7, 2023 · 1 comment
Open

Vivo手机运行崩溃 #44

121880399 opened this issue Mar 7, 2023 · 1 comment

Comments

@121880399
Copy link

Softversion: PD2011C_A_5.9.10
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A Time: 2023-03-07 20:16:45
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A Build fingerprint: 'vivo/PD2011/PD2011:10/QP1A.190711.020/compiler12281609:user/release-keys'
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A Revision: '0'
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A ABI: 'arm64'
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A Timestamp: 2023-03-07 20:16:45+0800
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A pid: 4143, tid: 4143, name: ce.raphael.demo >>> com.bytedance.raphael.demo <<<
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A uid: 10756
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x7674d3f344
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A Cause: execute-only (no-read) memory access error; likely due to data in .text.
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A x0 0000007fddb64218 x1 0000007fddb64210 x2 0000007fddb64220 x3 0000007fddb64500
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A x4 0000007fddb64578 x5 0000000000000004 x6 fefeff7489894bbe x7 7f7f7f7fffff7fff
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A x8 0000007674d3f344 x9 0000000000000005 x10 0000000000000000 x11 0000000000000000
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A x12 0000000000000000 x13 0000000000000000 x14 0000000000000004 x15 ffffffffffffffff
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A x16 00000075893d6d30 x17 0000007674d70550 x18 00000076799a6000 x19 00000075f2c10800
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A x20 0000000000000000 x21 00000075f2c10800 x22 0000007fddb64a80 x23 000000758a8a4cbf
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A x24 000000000000000c x25 0000007678863020 x26 00000075f2c108b0 x27 0000000000000003
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A x28 0000007fddb64800 x29 0000007fddb64190
2023-03-07 20:16:45.998 4252-4252 DEBUG pid-4252 A sp 0000007fddb640c0 lr 000000758939a41c pc 000000758939a79c

backtrace:
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #00 pc 000000000001479c /data/app/com.bytedance.raphael.demo-QPcNJVTwurgEOvXVmZALJA==/lib/arm64/libraphael.so (BuildId: d1f295ecb37e7ee375b5407d5e7d681a8a6ccd32)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #1 pc 0000000000014418 /data/app/com.bytedance.raphael.demo-QPcNJVTwurgEOvXVmZALJA==/lib/arm64/libraphael.so (BuildId: d1f295ecb37e7ee375b5407d5e7d681a8a6ccd32)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #2 pc 0000000000014070 /data/app/com.bytedance.raphael.demo-QPcNJVTwurgEOvXVmZALJA==/lib/arm64/libraphael.so (A64HookFunctionV+224) (BuildId: d1f295ecb37e7ee375b5407d5e7d681a8a6ccd32)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #3 pc 000000000001465c /data/app/com.bytedance.raphael.demo-QPcNJVTwurgEOvXVmZALJA==/lib/arm64/libraphael.so (A64HookFunction+108) (BuildId: d1f295ecb37e7ee375b5407d5e7d681a8a6ccd32)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #4 pc 0000000000025760 /data/app/com.bytedance.raphael.demo-QPcNJVTwurgEOvXVmZALJA==/lib/arm64/libraphael.so (registerInlineProxy(_JNIEnv*)+128) (BuildId: d1f295ecb37e7ee375b5407d5e7d681a8a6ccd32)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #5 pc 0000000000026848 /data/app/com.bytedance.raphael.demo-QPcNJVTwurgEOvXVmZALJA==/lib/arm64/libraphael.so (Raphael::start(_JNIEnv*, _jobject*, int, _jstring*, _jstring*)+612) (BuildId: d1f295ecb37e7ee375b5407d5e7d681a8a6ccd32)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #6 pc 0000000000027e00 /data/app/com.bytedance.raphael.demo-QPcNJVTwurgEOvXVmZALJA==/lib/arm64/libraphael.so (start(_JNIEnv*, _jobject*, int, _jstring*, _jstring*)+64) (BuildId: d1f295ecb37e7ee375b5407d5e7d681a8a6ccd32)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #7 pc 0000000000140350 /apex/com.android.runtime/lib64/libart.so (art_quick_generic_jni_trampoline+144) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #8 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #9 pc 0000000000169ecc /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #10 pc 00000000003089d8 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #11 pc 0000000000303c38 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #12 pc 00000000005a63d8 /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+372) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #13 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #14 pc 0000000000103c1c [anon:dalvik-classes.dex extracted in memory from /data/app/com.bytedance.raphael.demo-QPcNJVTwurgEOvXVmZALJA==/base.apk] (com.bytedance.raphael.Raphael.start+20)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #15 pc 00000000005a6674 /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1040) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #16 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #17 pc 0000000000103982 [anon:dalvik-classes.dex extracted in memory from /data/app/com.bytedance.raphael.demo-QPcNJVTwurgEOvXVmZALJA==/base.apk] (com.bytedance.demo.DemoApp.onCreate+58)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #18 pc 00000000005a3bc4 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1352) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #19 pc 0000000000131814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #20 pc 000000000020c7e8 /system/framework/framework.jar (android.app.Instrumentation.callApplicationOnCreate)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #21 pc 00000000005a3bc4 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1352) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #22 pc 0000000000131814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #23 pc 0000000000196406 /system/framework/framework.jar (android.app.ActivityThread.handleBindApplication+2418)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #24 pc 00000000005a5ed0 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1100) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #25 pc 0000000000131914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #26 pc 00000000001930c8 /system/framework/framework.jar (android.app.ActivityThread.access$1600)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #27 pc 00000000005a6674 /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1040) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #28 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #29 pc 000000000018f21a /system/framework/framework.jar (android.app.ActivityThread$H.handleMessage+1622)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #30 pc 00000000005a3bc4 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1352) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #31 pc 0000000000131814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #32 pc 0000000000320722 /system/framework/framework.jar (android.os.Handler.dispatchMessage+38)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #33 pc 00000000005a3bc4 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1352) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #34 pc 0000000000131814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #35 pc 0000000000347fae /system/framework/framework.jar (android.os.Looper.loop+550)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #36 pc 00000000005a6674 /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1040) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #37 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #38 pc 000000000019a300 /system/framework/framework.jar (android.app.ActivityThread.main+196)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #39 pc 00000000002d9cec /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.3084269041190911232+240) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #40 pc 0000000000594fd0 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1032) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #41 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #42 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #43 pc 0000000000169ecc /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #44 pc 00000000004b3998 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #45 pc 00000000004b553c /apex/com.android.runtime/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1480) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #46 pc 000000000044080c /apex/com.android.runtime/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #47 pc 00000000000c2b54 /system/framework/arm64/boot.oat (art_jni_trampoline+180) (BuildId: 51b531eaeedd3854c07937602def32199f719aab)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #48 pc 0000000000137334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #49 pc 0000000000169eac /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+244) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #50 pc 00000000003089d8 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #51 pc 0000000000303c38 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #52 pc 00000000005a3904 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #53 pc 0000000000131814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #54 pc 00000000003b22be /system/framework/framework.jar (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #55 pc 00000000002d9cec /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.3084269041190911232+240) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #56 pc 0000000000594fd0 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1032) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #57 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #58 pc 00000000009f8bec /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+2460) (BuildId: 3a0c7efedabdc59e784bdec335be079298d9c32e)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #59 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #60 pc 0000000000169ecc /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #61 pc 00000000004b3998 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #62 pc 00000000004b3588 /apex/com.android.runtime/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #63 pc 00000000003bd8c0 /apex/com.android.runtime/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+624) (BuildId: 80258bb34139165e1c13d1a8291b6f61)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #64 pc 00000000000c0564 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: fb614280b8d14b27138a857ecc556532)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #65 pc 00000000000c342c /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+776) (BuildId: fb614280b8d14b27138a857ecc556532)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #66 pc 00000000000034f8 /system/bin/app_process64 (main+1192) (BuildId: dcb784be77e5b6eb5d380391d1a38fe9)
2023-03-07 20:16:46.337 4252-4252 DEBUG pid-4252 A #67 pc 000000000006ebc4 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: e9cd5624601680ababdd7ad7eeeb4032)

@shentianzhou
Copy link
Collaborator

shentianzhou commented Jul 13, 2023

这个崩溃是合入了这个PR 吗?
#42

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants