YAHFA icon indicating copy to clipboard operation
YAHFA copied to clipboard

魅族flyme_9(基于安卓11系统) 会崩溃

Open shuajinanhai opened this issue 2 years ago • 0 comments

这是没调用backup函数的崩溃 ------ beginning of crash 06-27 16:20:06.802 19205 19205 F libc : Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 19205 (test.Hook), pid 19205 (test.Hook) 06-27 16:20:06.802 19205 19205 I libc : debuggerd_dispatch_pseudothread is called 06-27 16:20:06.808 30998 30998 I libc : debuggerd_dispatch_pseudothread execle crash dumpis called 06-27 16:20:06.815 30998 30998 W crash_dump64: pseudothread start... 06-27 16:20:06.828 30999 30999 W crash_dump64: reportToEms processname len = 99 06-27 16:20:06.828 30999 30999 W crash_dump64: reportToEms processname = test.Hook 06-27 16:20:06.828 30999 30999 D ExceptionManager: getExceptionConfig[5, ] 06-27 16:20:06.829 30999 30999 W crash_dump64: reportToEms configprocess = system_server len = 13 06-27 16:20:06.829 30999 30999 W crash_dump64: reportToEms configprocess = /system/bin/surfaceflinger len = 26 06-27 16:20:06.829 30999 30999 W crash_dump64: reportToEms find = 0 06-27 16:20:06.829 30999 30999 W crash_dump64: reportToEms finished 06-27 16:20:06.829 30998 30998 W crash_dump64: pseudothread exit... 06-27 16:20:06.829 30999 30999 I crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone 06-27 16:20:06.829 710 710 I tombstoned: received crash request for pid 19205 06-27 16:20:06.830 30999 30999 I crash_dump64: performing dump of process 19205 (target tid = 19205) 06-27 16:20:06.832 30999 30999 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 06-27 16:20:06.832 30999 30999 F DEBUG : Build fingerprint: 'meizu/meizu_18s_CN/meizu18s:11/RKQ1.210408.001/1646967465:user/release-keys' 06-27 16:20:06.832 30999 30999 F DEBUG : Revision: '0' 06-27 16:20:06.832 30999 30999 F DEBUG : ABI: 'arm64' 06-27 16:20:06.833 30999 30999 F DEBUG : Timestamp: 2022-06-27 16:20:06+0800 06-27 16:20:06.833 30999 30999 F DEBUG : pid: 19205, tid: 19205, name: test.Hook >>> test.Hook <<< 06-27 16:20:06.833 30999 30999 F DEBUG : uid: 10280 06-27 16:20:06.833 30999 30999 F DEBUG : signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr -------- 06-27 16:20:06.833 30999 30999 F DEBUG : Abort message: 'Check failed: exception != nullptr ' 06-27 16:20:06.833 30999 30999 F DEBUG : x0 0000000000000000 x1 0000000000004b05 x2 0000000000000006 x3 0000007ffeb1d3c0 06-27 16:20:06.833 30999 30999 F DEBUG : x4 00000077ece91030 x5 00000077ece91030 x6 00000077ece91030 x7 00000077ece91030 06-27 16:20:06.833 30999 30999 F DEBUG : x8 00000000000000f0 x9 f62cf173825e7fb5 x10 0000000000000000 x11 ffffffc0fffffbdf 06-27 16:20:06.833 30999 30999 F DEBUG : x12 0000000000000001 x13 0000003a0db4c98a x14 0020558a9c9e5d70 x15 0000000034155555 06-27 16:20:06.833 30999 30999 F DEBUG : x16 00000078e0c88c80 x17 00000078e0c6abc0 x18 00000078e3766000 x19 0000000000004b05 06-27 16:20:06.833 30999 30999 F DEBUG : x20 0000000000004b05 x21 00000000ffffffff x22 b40000775ce6bbe0 x23 0000000000000000 06-27 16:20:06.833 30999 30999 F DEBUG : x24 00000075eccf4000 x25 00000078e2838000 x26 00000078e217486c x27 00000075eccf6000 06-27 16:20:06.833 30999 30999 F DEBUG : x28 00000075eccf7000 x29 0000007ffeb1d440 06-27 16:20:06.833 30999 30999 F DEBUG : lr 00000078e0c1e3e0 sp 0000007ffeb1d3a0 pc 00000078e0c1e40c pst 0000000000001000 06-27 16:20:06.914 936 1178 E minksocket: MinkIPC_QRTR_Service: client with node 1 port 4071 went down 06-27 16:20:06.914 936 1178 E minksocket: MinkIPC_QRTR_Service: client with node 1 port 4075 went down 06-27 16:20:06.947 30999 30999 F DEBUG : backtrace: 06-27 16:20:06.947 30999 30999 F DEBUG : #00 pc 000000000004e40c /apex/com.android.runtime/lib64/bionic/libc.so (abort+164) (BuildId: 42f51cbcf4f10456861abd8187c16ed2) 06-27 16:20:06.947 30999 30999 F DEBUG : #01 pc 000000000055ee2c /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (art::Runtime::Abort(char const)+2308) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #02 pc 0000000000013978 /system/lib64/libbase.so (android::base::SetAborter(std::__1::function<void (char const*)>&&)::$_3::__invoke(char const*)+76) (BuildId: 01a12dd5224373edcc3a74506f64a9c9) 06-27 16:20:06.947 30999 30999 F DEBUG : #03 pc 0000000000012fa4 /system/lib64/libbase.so (android::base::LogMessage::~LogMessage()+320) (BuildId: 01a12dd5224373edcc3a74506f64a9c9) 06-27 16:20:06.947 30999 30999 F DEBUG : #04 pc 00000000005ba6e0 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (art::Thread::QuickDeliverException()+124) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #05 pc 000000000066c368 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (artDeliverPendingExceptionFromCode+8) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #06 pc 000000000013cf88 /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+328) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #07 pc 000000000013cea0 /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+96) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #08 pc 00000000001337e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #09 pc 00000000001a8a94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+228) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #10 pc 0000000000319cd4 /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+376) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #11 pc 0000000000310000 /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+996) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #12 pc 0000000000681340 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (MterpInvokeStatic+548) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #13 pc 000000000012d994 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #14 pc 000000000000a708 /data/app/~~5QB2YfTq6WQOHWIMWfjlSQ==/test.Hook-8A7ehWnc99c_pMOwocqOlg==/oat/arm64/base.vdex (test.Hook.b.a.hook+44) 06-27 16:20:06.947 30999 30999 F DEBUG : #15 pc 00000000003075fc /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.llvm.137971606012508500)+268) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #16 pc 000000000066d0f0 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (artQuickToInterpreterBridge+780) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #17 pc 000000000013cff8 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #18 pc 00000000001337e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #19 pc 00000000001a8a94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+228) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #20 pc 0000000000319cd4 /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+376) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #21 pc 0000000000310000 /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+996) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #22 pc 0000000000681340 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (MterpInvokeStatic+548) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #23 pc 000000000012d994 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #24 pc 000000000000e744 /data/app/~~5QB2YfTq6WQOHWIMWfjlSQ==/test.Hook-8A7ehWnc99c_pMOwocqOlg==/oat/arm64/base.vdex (inapp.testActivity.onCreate+20) 06-27 16:20:06.947 30999 30999 F DEBUG : #25 pc 00000000003075fc /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.llvm.137971606012508500)+268) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #26 pc 000000000066d0f0 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (artQuickToInterpreterBridge+780) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #27 pc 000000000013cff8 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.947 30999 30999 F DEBUG : #28 pc 00000000005ce00c /system/framework/arm64/boot-framework.oat (android.app.Activity.performCreate+508) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 16:20:06.947 30999 30999 F DEBUG : #29 pc 0000000000328a80 /system/framework/arm64/boot-framework.oat (android.app.Instrumentation.callActivityOnCreate+80) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 16:20:06.947 30999 30999 F DEBUG : #30 pc 00000000004087bc /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.performLaunchActivity+3388) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 16:20:06.947 30999 30999 F DEBUG : #31 pc 000000000040feb0 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.handleLaunchActivity+752) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 16:20:06.947 30999 30999 F DEBUG : #32 pc 00000000005db264 /system/framework/arm64/boot-framework.oat (android.app.servertransaction.LaunchActivityItem.execute+404) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 16:20:06.948 30999 30999 F DEBUG : #33 pc 00000000003548b0 /system/framework/arm64/boot-framework.oat (android.app.servertransaction.TransactionExecutor.executeCallbacks+560) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 16:20:06.948 30999 30999 F DEBUG : #34 pc 0000000000354600 /system/framework/arm64/boot-framework.oat (android.app.servertransaction.TransactionExecutor.execute+752) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 16:20:06.948 30999 30999 F DEBUG : #35 pc 00000000003f2e8c /system/framework/arm64/boot-framework.oat (android.app.ActivityThread$H.handleMessage+972) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 16:20:06.948 30999 30999 F DEBUG : #36 pc 000000000064b804 /system/framework/arm64/boot-framework.oat (android.os.Handler.dispatchMessage+180) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 16:20:06.948 30999 30999 F DEBUG : #37 pc 000000000064ecfc /system/framework/arm64/boot-framework.oat (android.os.Looper.loop+1516) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 16:20:06.948 30999 30999 F DEBUG : #38 pc 00000000004077a0 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+752) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 16:20:06.948 30999 30999 F DEBUG : #39 pc 00000000001337e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.948 30999 30999 F DEBUG : #40 pc 00000000001a8a94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+228) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.948 30999 30999 F DEBUG : #41 pc 00000000005574f8 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1364) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.948 30999 30999 F DEBUG : #42 pc 00000000004d6acc /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.948 30999 30999 F DEBUG : #43 pc 00000000000896f4 /apex/com.android.art/javalib/arm64/boot.oat (art_jni_trampoline+180) (BuildId: b4379829a96be0c056bcb0e233ba2554ea273828) 06-27 16:20:06.948 30999 30999 F DEBUG : #44 pc 0000000000893bd8 /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 16:20:06.948 30999 30999 F DEBUG : #45 pc 000000000089c358 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+2280) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 16:20:06.948 30999 30999 F DEBUG : #46 pc 00000000001337e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.948 30999 30999 F DEBUG : #47 pc 00000000001a8a94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+228) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.948 30999 30999 F DEBUG : #48 pc 0000000000555f34 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (art::JValue art::InvokeWithVarArgsart::ArtMethod*(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+448) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.948 30999 30999 F DEBUG : #49 pc 00000000005563e8 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+92) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.948 30999 30999 F DEBUG : #50 pc 000000000043a4c0 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+656) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 16:20:06.948 30999 30999 F DEBUG : #51 pc 000000000009a424 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+124) (BuildId: 4cebdbe10ff604c1a9fbe9e53c3393a3) 06-27 16:20:06.948 30999 30999 F DEBUG : #52 pc 00000000000a22fc /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+836) (BuildId: 4cebdbe10ff604c1a9fbe9e53c3393a3) 06-27 16:20:06.948 30999 30999 F DEBUG : #53 pc 0000000000003674 /system/bin/app_process64 (main+1580) (BuildId: 4af0f204466281fbbb012da1f888a327) 06-27 16:20:06.948 30999 30999 F DEBUG : #54 pc 00000000000499e4 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: 42f51cbcf4f10456861abd8187c16ed2) 06-27 16:20:06.981 580 580 E SELinux : avc: denied { find } for pid=10461 uid=10184 name=tethering scontext=u:r:permissioncontroller_app:s0:c184,c256,c512,c768 tcontext=u:object_r:tethering_service:s0 tclass=service_manager permissive=0 06-27 16:20:06.985 22401 22664 D GuardManager: prestart 0, 1656318006985, 1656318006353, 720000, true, true, 1656318006353

这个是调用backup函数崩溃 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] Aborting thread: 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] "main" prio=10 tid=1 Runnable 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] | group="" sCount=0 dsCount=0 flags=0 obj=0x7295fcf8 self=0xb40000775ce6bbe0 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] | sysTid=6979 nice=-10 cgrp=top-app sched=0/0 handle=0x78e3a934f8 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] | state=R schedstat=( 157658202 2295935 158 ) utm=12 stm=3 core=7 HZ=100 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] | stack=0x7ffe323000-0x7ffe325000 stackSize=8192KB 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] | held mutexes= "abort lock" "mutator lock"(shared held) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #00 pc 00000000004a07f4 /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (art::DumpNativeStack(std::__1::basic_ostream<char, std::__1::char_traits >&, int, BacktraceMap*, char const*, art::ArtMethod*, void*, bool)+140) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #01 pc 00000000005ade9c /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (art::Thread::DumpStack(std::__1::basic_ostream<char, std::__1::char_traits >&, bool, BacktraceMap*, bool) const+376) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #02 pc 0000000000573570 /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (art::AbortState::DumpThread(std::__1::basic_ostream<char, std::__1::char_traits >&, art::Thread*) const+60) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #03 pc 000000000055ee90 /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (art::Runtime::Abort(char const*)+2408) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #04 pc 0000000000013978 /system/lib64/libbase.so (android::base::SetAborter(std::__1::function<void (char const*)>&&)::$_3::__invoke(char const*)+76) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #05 pc 0000000000012fa4 /system/lib64/libbase.so (android::base::LogMessage::~LogMessage()+320) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #06 pc 00000000005ba6e0 /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (art::Thread::QuickDeliverException()+124) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #07 pc 000000000066c368 /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (artDeliverPendingExceptionFromCode+8) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #08 pc 000000000013cf88 /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+328) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #09 pc 000000000013cea0 /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+96) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #10 pc 00000000001337e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #11 pc 00000000001a8a94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+228) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #12 pc 0000000000319cd4 /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+376) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #13 pc 0000000000310000 /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+996) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #14 pc 0000000000681340 /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (MterpInvokeStatic+548) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #15 pc 000000000012d994 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_static+20) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #16 pc 000000000000a708 /data/app/~~J3HxoudxOrJFRREhUSRU4w==/test.Hook-8gB3uvOGd0eQwU4cwrZFaw==/oat/arm64/base.vdex (test.Hook.b.a.hook+44) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #17 pc 00000000003075fc /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.llvm.137971606012508500)+268) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #18 pc 000000000066d0f0 /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (artQuickToInterpreterBridge+780) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #19 pc 000000000013cff8 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #20 pc 00000000001337e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #21 pc 00000000001a8a94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+228) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #22 pc 0000000000319cd4 /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+376) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #23 pc 0000000000310000 /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+996) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #24 pc 0000000000681340 /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (MterpInvokeStatic+548) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #25 pc 000000000012d994 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_static+20) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #26 pc 000000000000e744 /data/app/~~J3HxoudxOrJFRREhUSRU4w==/test.Hook-8gB3uvOGd0eQwU4cwrZFaw==/oat/arm64/base.vdex (inapp.testActivity.onCreate+20) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #27 pc 00000000003075fc /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.llvm.137971606012508500)+268) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #28 pc 000000000066d0f0 /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (artQuickToInterpreterBridge+780) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #29 pc 000000000013cff8 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #30 pc 00000000005ce00c /system/framework/arm64/boot-framework.oat (android.app.Activity.performCreate+508) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #31 pc 0000000000328a80 /system/framework/arm64/boot-framework.oat (android.app.Instrumentation.callActivityOnCreate+80) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #32 pc 00000000004087bc /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.performLaunchActivity+3388) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #33 pc 000000000040feb0 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.handleLaunchActivity+752) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #34 pc 00000000005db264 /system/framework/arm64/boot-framework.oat (android.app.servertransaction.LaunchActivityItem.execute+404) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #35 pc 00000000003548b0 /system/framework/arm64/boot-framework.oat (android.app.servertransaction.TransactionExecutor.executeCallbacks+560) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #36 pc 0000000000354600 /system/framework/arm64/boot-framework.oat (android.app.servertransaction.TransactionExecutor.execute+752) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #37 pc 00000000003f2e8c /system/framework/arm64/boot-framework.oat (android.app.ActivityThread$H.handleMessage+972) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #38 pc 000000000064b804 /system/framework/arm64/boot-framework.oat (android.os.Handler.dispatchMessage+180) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #39 pc 000000000064ecfc /system/framework/arm64/boot-framework.oat (android.os.Looper.loop+1516) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #40 pc 00000000004077a0 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+752) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #41 pc 00000000001337e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #42 pc 00000000001a8a94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+228) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #43 pc 00000000005574f8 /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1364) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #44 pc 00000000004d6acc /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #45 pc 00000000000896f4 /apex/com.android.art/javalib/arm64/boot.oat (art_jni_trampoline+180) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #46 pc 0000000000893bd8 /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #47 pc 000000000089c358 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+2280) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #48 pc 00000000001337e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #49 pc 00000000001a8a94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+228) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #50 pc 0000000000555f34 /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (art::JValue art::InvokeWithVarArgsart::ArtMethod*(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+448) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #51 pc 00000000005563e8 /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+92) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #52 pc 000000000043a4c0 /apex/com.android.art/lib64/libart.so!libart.so (offset 395000) (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+656) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #53 pc 000000000009a424 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+124) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #54 pc 00000000000a22fc /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+836) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #55 pc 0000000000003674 /system/bin/app_process64 (main+1580) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] native: #56 pc 00000000000499e4 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at test.Hook.b.a.backup(Native method) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at test.Hook.b.a.hook(:-1) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at inapp.testActivity.onCreate(:-1) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at android.app.Activity.performCreate(Activity.java:8006) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at android.app.Activity.performCreate(Activity.java:7990) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at android.app.Instrumentation.callActivityOnCreate(Instrumentation.java:1317) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at android.app.ActivityThread.performLaunchActivity(ActivityThread.java:3463) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at android.app.ActivityThread.handleLaunchActivity(ActivityThread.java:3654) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at android.app.servertransaction.LaunchActivityItem.execute(LaunchActivityItem.java:85) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at android.app.servertransaction.TransactionExecutor.executeCallbacks(TransactionExecutor.java:135) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at android.app.servertransaction.TransactionExecutor.execute(TransactionExecutor.java:95) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at android.app.ActivityThread$H.handleMessage(ActivityThread.java:2109) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at android.os.Handler.dispatchMessage(Handler.java:106) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at android.os.Looper.loop(Looper.java:223) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at android.app.ActivityThread.main(ActivityThread.java:7822) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at java.lang.reflect.Method.invoke(Native method) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:592) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:952) 06-27 17:01:31.216 6979 6979 F test.Hook: runtime.cc:655] 06-27 17:01:31.216 6979 6979 I libc : debuggerd_signal_handler is called

06-27 17:01:31.245 11287 11287 I crash_dump64: performing dump of process 6979 (target tid = 6979) 06-27 17:01:31.248 11287 11287 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 06-27 17:01:31.248 11287 11287 F DEBUG : Build fingerprint: 'meizu/meizu_18s_CN/meizu18s:11/RKQ1.210408.001/1646967465:user/release-keys' 06-27 17:01:31.248 11287 11287 F DEBUG : Revision: '0' 06-27 17:01:31.248 11287 11287 F DEBUG : ABI: 'arm64' 06-27 17:01:31.248 11287 11287 F DEBUG : Timestamp: 2022-06-27 17:01:31+0800 06-27 17:01:31.248 11287 11287 F DEBUG : pid: 6979, tid: 6979, name: test.Hook >>> test.Hook <<< 06-27 17:01:31.248 11287 11287 F DEBUG : uid: 10284 06-27 17:01:31.248 11287 11287 F DEBUG : signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr -------- 06-27 17:01:31.248 11287 11287 F DEBUG : Abort message: 'Check failed: exception != nullptr ' 06-27 17:01:31.248 11287 11287 F DEBUG : x0 0000000000000000 x1 0000000000001b43 x2 0000000000000006 x3 0000007ffeb1d3c0 06-27 17:01:31.248 11287 11287 F DEBUG : x4 00000077ece91030 x5 00000077ece91030 x6 00000077ece91030 x7 00000077ece91030 06-27 17:01:31.248 11287 11287 F DEBUG : x8 00000000000000f0 x9 f62cf173825e7fb5 x10 0000000000000000 x11 ffffffc0fffffbdf 06-27 17:01:31.248 11287 11287 F DEBUG : x12 0000000000000001 x13 0000004528e4800a x14 0038e425e8e40170 x15 0000000034155555 06-27 17:01:31.248 11287 11287 F DEBUG : x16 00000078e0c88c80 x17 00000078e0c6abc0 x18 00000078e3766000 x19 0000000000001b43 06-27 17:01:31.248 11287 11287 F DEBUG : x20 0000000000001b43 x21 00000000ffffffff x22 b40000775ce6bbe0 x23 0000000000000000 06-27 17:01:31.248 11287 11287 F DEBUG : x24 00000075eccf4000 x25 00000078e2838000 x26 00000078e217486c x27 00000075eccf6000 06-27 17:01:31.248 11287 11287 F DEBUG : x28 00000075eccf7000 x29 0000007ffeb1d440 06-27 17:01:31.248 11287 11287 F DEBUG : lr 00000078e0c1e3e0 sp 0000007ffeb1d3a0 pc 00000078e0c1e40c pst 0000000000001000 06-27 17:01:31.267 580 580 E SELinux : avc: denied { find } for pid=10461 uid=10184 name=tethering scontext=u:r:permissioncontroller_app:s0:c184,c256,c512,c768 tcontext=u:object_r:tethering_service:s0 tclass=service_manager permissive=0 06-27 17:01:31.300 1736 1855 D ActivityManager: Check for Foreground Freeze Policy, Changed: from 6 to 10. UidRecord{2d1f6d6 u0a184 SVC bg:+40m9s538ms change:active|uncached procs:1 seq(0,0,0)} 06-27 17:01:31.302 1736 4372 D ActivityManager: Check for Foreground Freeze Policy, Changed: from 10 to 19. UidRecord{2d1f6d6 u0a184 CEM bg:+40m9s539ms procs:1 seq(0,0,0)} 06-27 17:01:31.364 11287 11287 F DEBUG : backtrace: 06-27 17:01:31.364 11287 11287 F DEBUG : #00 pc 000000000004e40c /apex/com.android.runtime/lib64/bionic/libc.so (abort+164) (BuildId: 42f51cbcf4f10456861abd8187c16ed2) 06-27 17:01:31.364 11287 11287 F DEBUG : #01 pc 000000000055ee2c /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (art::Runtime::Abort(char const*)+2308) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #02 pc 0000000000013978 /system/lib64/libbase.so (android::base::SetAborter(std::__1::function<void (char const*)>&&)::$_3::__invoke(char const*)+76) (BuildId: 01a12dd5224373edcc3a74506f64a9c9) 06-27 17:01:31.364 11287 11287 F DEBUG : #03 pc 0000000000012fa4 /system/lib64/libbase.so (android::base::LogMessage::~LogMessage()+320) (BuildId: 01a12dd5224373edcc3a74506f64a9c9) 06-27 17:01:31.364 11287 11287 F DEBUG : #04 pc 00000000005ba6e0 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (art::Thread::QuickDeliverException()+124) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #05 pc 000000000066c368 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (artDeliverPendingExceptionFromCode+8) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #06 pc 000000000013cf88 /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+328) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #07 pc 000000000013cea0 /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+96) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #08 pc 00000000001337e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #09 pc 00000000001a8a94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+228) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #10 pc 0000000000319cd4 /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+376) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #11 pc 0000000000310000 /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+996) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #12 pc 0000000000681340 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (MterpInvokeStatic+548) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #13 pc 000000000012d994 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #14 pc 000000000000a708 /data/app/~~J3HxoudxOrJFRREhUSRU4w==/test.Hook-8gB3uvOGd0eQwU4cwrZFaw==/oat/arm64/base.vdex (test.Hook.b.a.hook+44) 06-27 17:01:31.364 11287 11287 F DEBUG : #15 pc 00000000003075fc /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.llvm.137971606012508500)+268) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #16 pc 000000000066d0f0 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (artQuickToInterpreterBridge+780) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #17 pc 000000000013cff8 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #18 pc 00000000001337e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #19 pc 00000000001a8a94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+228) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #20 pc 0000000000319cd4 /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+376) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #21 pc 0000000000310000 /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+996) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #22 pc 0000000000681340 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (MterpInvokeStatic+548) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #23 pc 000000000012d994 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #24 pc 000000000000e744 /data/app/~~J3HxoudxOrJFRREhUSRU4w==/test.Hook-8gB3uvOGd0eQwU4cwrZFaw==/oat/arm64/base.vdex (inapp.testActivity.onCreate+20) 06-27 17:01:31.364 11287 11287 F DEBUG : #25 pc 00000000003075fc /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.llvm.137971606012508500)+268) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #26 pc 000000000066d0f0 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (artQuickToInterpreterBridge+780) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #27 pc 000000000013cff8 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #28 pc 00000000005ce00c /system/framework/arm64/boot-framework.oat (android.app.Activity.performCreate+508) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 17:01:31.364 11287 11287 F DEBUG : #29 pc 0000000000328a80 /system/framework/arm64/boot-framework.oat (android.app.Instrumentation.callActivityOnCreate+80) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 17:01:31.364 11287 11287 F DEBUG : #30 pc 00000000004087bc /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.performLaunchActivity+3388) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 17:01:31.364 11287 11287 F DEBUG : #31 pc 000000000040feb0 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.handleLaunchActivity+752) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 17:01:31.364 11287 11287 F DEBUG : #32 pc 00000000005db264 /system/framework/arm64/boot-framework.oat (android.app.servertransaction.LaunchActivityItem.execute+404) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 17:01:31.364 11287 11287 F DEBUG : #33 pc 00000000003548b0 /system/framework/arm64/boot-framework.oat (android.app.servertransaction.TransactionExecutor.executeCallbacks+560) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 17:01:31.364 11287 11287 F DEBUG : #34 pc 0000000000354600 /system/framework/arm64/boot-framework.oat (android.app.servertransaction.TransactionExecutor.execute+752) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 17:01:31.364 11287 11287 F DEBUG : #35 pc 00000000003f2e8c /system/framework/arm64/boot-framework.oat (android.app.ActivityThread$H.handleMessage+972) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 17:01:31.364 11287 11287 F DEBUG : #36 pc 000000000064b804 /system/framework/arm64/boot-framework.oat (android.os.Handler.dispatchMessage+180) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 17:01:31.364 11287 11287 F DEBUG : #37 pc 000000000064ecfc /system/framework/arm64/boot-framework.oat (android.os.Looper.loop+1516) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 17:01:31.364 11287 11287 F DEBUG : #38 pc 00000000004077a0 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+752) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 17:01:31.364 11287 11287 F DEBUG : #39 pc 00000000001337e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #40 pc 00000000001a8a94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+228) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #41 pc 00000000005574f8 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1364) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #42 pc 00000000004d6acc /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #43 pc 00000000000896f4 /apex/com.android.art/javalib/arm64/boot.oat (art_jni_trampoline+180) (BuildId: b4379829a96be0c056bcb0e233ba2554ea273828) 06-27 17:01:31.364 11287 11287 F DEBUG : #44 pc 0000000000893bd8 /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 17:01:31.364 11287 11287 F DEBUG : #45 pc 000000000089c358 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+2280) (BuildId: e35db7f91400d3f54f73e3627c93ccbf9cc5695d) 06-27 17:01:31.364 11287 11287 F DEBUG : #46 pc 00000000001337e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #47 pc 00000000001a8a94 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+228) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #48 pc 0000000000555f34 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (art::JValue art::InvokeWithVarArgsart::ArtMethod*(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+448) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #49 pc 00000000005563e8 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+92) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #50 pc 000000000043a4c0 /apex/com.android.art/lib64/libart.so!libart.so (offset 0x395000) (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+656) (BuildId: 4e8d405901667480ff410ffbbc910b14) 06-27 17:01:31.364 11287 11287 F DEBUG : #51 pc 000000000009a424 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+124) (BuildId: 4cebdbe10ff604c1a9fbe9e53c3393a3) 06-27 17:01:31.364 11287 11287 F DEBUG : #52 pc 00000000000a22fc /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+836) (BuildId: 4cebdbe10ff604c1a9fbe9e53c3393a3) 06-27 17:01:31.364 11287 11287 F DEBUG : #53 pc 0000000000003674 /system/bin/app_process64 (main+1580) (BuildId: 4af0f204466281fbbb012da1f888a327) 06-27 17:01:31.364 11287 11287 F DEBUG : #54 pc 00000000000499e4 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: 42f51cbcf4f10456861abd8187c16ed2) 06-27 17:01:31.427 11287 11287 E crash_dump64: notify tombstoned of completion

shuajinanhai avatar Jun 27 '22 09:06 shuajinanhai