BudHook icon indicating copy to clipboard operation
BudHook copied to clipboard

jni error

Open PMMKing opened this issue 4 years ago • 0 comments

2019-11-23 11:44:36.358 24062-24062/com.bmax.budhook A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x5de188d8 in tid 24062 (om.bmax.budhook), pid 24062 (om.bmax.budhook) 2019-11-23 11:44:36.385 24115-24115/? I/crash_dump32: obtaining output fd from tombstoned, type: kDebuggerdTombstone 2019-11-23 11:44:36.386 1068-1068/? I//system/bin/tombstoned: received crash request for pid 24062 2019-11-23 11:44:36.387 24115-24115/? I/crash_dump32: performing dump of process 24062 (target tid = 24062) 2019-11-23 11:44:36.394 24115-24115/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 2019-11-23 11:44:36.394 24115-24115/? A/DEBUG: Build fingerprint: 'samsung/beyond2qltezc/beyond2q:9/PPR1.180610.011/G9750ZCU2ASH2:user/release-keys' 2019-11-23 11:44:36.394 24115-24115/? A/DEBUG: Revision: '17' 2019-11-23 11:44:36.394 24115-24115/? A/DEBUG: ABI: 'arm' 2019-11-23 11:44:36.394 24115-24115/? A/DEBUG: pid: 24062, tid: 24062, name: om.bmax.budhook >>> com.bmax.budhook <<< 2019-11-23 11:44:36.394 24115-24115/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x5de188d8 2019-11-23 11:44:36.394 24115-24115/? A/DEBUG: r0 12c6b4f8 r1 4b1ad3e0 r2 00000000 r3 00000074 2019-11-23 11:44:36.394 24115-24115/? A/DEBUG: r4 70420da0 r5 e6e71244 r6 e6e71228 r7 ffa6bd28 2019-11-23 11:44:36.394 24115-24115/? A/DEBUG: r8 00000000 r9 e621ec00 r10 ffa6bd60 r11 e621ec00 2019-11-23 11:44:36.394 24115-24115/? A/DEBUG: ip e961dd68 sp ffa6bd00 lr cadd6b55 pc cadd6b7a 2019-11-23 11:44:36.506 24115-24115/? A/DEBUG: backtrace: 2019-11-23 11:44:36.506 24115-24115/? A/DEBUG: #00 pc 00000b7a /data/app/com.bmax.budhook-GZ6GktdgkegOJcAy1Ybssw==/lib/arm/libyahfa.so (Java_bmax_budhook_BudBridge_yahfaHook+210) 2019-11-23 11:44:36.506 24115-24115/? A/DEBUG: #01 pc 0041e279 /system/lib/libart.so (art_quick_generic_jni_trampoline+40) 2019-11-23 11:44:36.506 24115-24115/? A/DEBUG: #02 pc 00419d75 /system/lib/libart.so (art_quick_invoke_stub_internal+68) 2019-11-23 11:44:36.506 24115-24115/? A/DEBUG: #03 pc 003f3503 /system/lib/libart.so (art_quick_invoke_static_stub+222) 2019-11-23 11:44:36.506 24115-24115/? A/DEBUG: #04 pc 000a1443 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154) 2019-11-23 11:44:36.506 24115-24115/? A/DEBUG: #05 pc 001e96b5 /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+232) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #06 pc 001e4391 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+776) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #07 pc 003ef003 /system/lib/libart.so (MterpInvokeStatic+130) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #08 pc 0040cc94 /system/lib/libart.so (ExecuteMterpImpl+14612) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #09 pc 00144930 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.bmax.budhook-GZ6GktdgkegOJcAy1Ybssw==/base.apk_24062_24062 (deleted) (bmax.budhook.BudBridge.hookMethod+436) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #10 pc 001c8d09 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3847032926+352) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #11 pc 001cd5d7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #12 pc 001e437b /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #13 pc 003ef003 /system/lib/libart.so (MterpInvokeStatic+130) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #14 pc 0040cc94 /system/lib/libart.so (ExecuteMterpImpl+14612) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #15 pc 00144d2a /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.bmax.budhook-GZ6GktdgkegOJcAy1Ybssw==/base.apk_24062_24062 (deleted) (bmax.budhook.BudHelpers.findAndHookMethod+154) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #16 pc 001c8d09 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3847032926+352) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #17 pc 001cd5d7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #18 pc 001e437b /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #19 pc 003ef003 /system/lib/libart.so (MterpInvokeStatic+130) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #20 pc 0040cc94 /system/lib/libart.so (ExecuteMterpImpl+14612) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #21 pc 00144d96 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.bmax.budhook-GZ6GktdgkegOJcAy1Ybssw==/base.apk_24062_24062 (deleted) (bmax.budhook.BudHelpers.findAndHookMethod+54) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #22 pc 001c8d09 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3847032926+352) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #23 pc 001cd5d7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #24 pc 001e437b /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #25 pc 003ef003 /system/lib/libart.so (MterpInvokeStatic+130) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #26 pc 0040cc94 /system/lib/libart.so (ExecuteMterpImpl+14612) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #27 pc 001475d6 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.bmax.budhook-GZ6GktdgkegOJcAy1Ybssw==/base.apk_24062_24062 (deleted) (com.bmax.budhook.MainActivity$1.onClick+42) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #28 pc 001c8d09 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3847032926+352) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #29 pc 001cd5d7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #30 pc 001e437b /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #31 pc 003eebf5 /system/lib/libart.so (MterpInvokeInterface+1020) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #32 pc 0040cd14 /system/lib/libart.so (ExecuteMterpImpl+14740) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #33 pc 00d0a772 /system/framework/boot-framework.vdex (android.view.View.performClick+74) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #34 pc 001c8d09 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3847032926+352) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #35 pc 001cd5d7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #36 pc 001e437b /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #37 pc 003ee53d /system/lib/libart.so (MterpInvokeSuper+1096) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #38 pc 0040cb94 /system/lib/libart.so (ExecuteMterpImpl+14356) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #39 pc 0149389c /system/framework/boot-framework.vdex (android.widget.TextView.performClick) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #40 pc 001c8d09 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3847032926+352) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #41 pc 001cd5d7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #42 pc 001e437b /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #43 pc 003f046b /system/lib/libart.so (MterpInvokeVirtualQuick+422) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #44 pc 00410894 /system/lib/libart.so (ExecuteMterpImpl+29972) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #45 pc 00eed032 /system/framework/boot-framework.vdex (android.view.View.performClickInternal+6) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #46 pc 001c8d09 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3847032926+352) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #47 pc 001cd5d7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #48 pc 001e437b /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #49 pc 003eeeb9 /system/lib/libart.so (MterpInvokeDirect+196) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #50 pc 0040cc14 /system/lib/libart.so (ExecuteMterpImpl+14484) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #51 pc 00eebcdc /system/framework/boot-framework.vdex (android.view.View.access$3200) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #52 pc 001c8d09 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3847032926+352) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #53 pc 001cd5d7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #54 pc 001e437b /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #55 pc 003ef003 /system/lib/libart.so (MterpInvokeStatic+130) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #56 pc 0040cc94 /system/lib/libart.so (ExecuteMterpImpl+14612) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #57 pc 00cf7702 /system/framework/boot-framework.vdex (android.view.View$PerformClick.run+4) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #58 pc 001c8d09 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3847032926+352) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #59 pc 001cd5d7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #60 pc 001e437b /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #61 pc 003eebf5 /system/lib/libart.so (MterpInvokeInterface+1020) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #62 pc 0040cd14 /system/lib/libart.so (ExecuteMterpImpl+14740) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #63 pc 00db87c8 /system/framework/boot-framework.vdex (android.os.Handler.handleCallback+4) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #64 pc 001c8d09 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3847032926+352) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #65 pc 001cd5d7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #66 pc 001e437b /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #67 pc 003ef003 /system/lib/libart.so (MterpInvokeStatic+130) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #68 pc 0040cc94 /system/lib/libart.so (ExecuteMterpImpl+14612) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #69 pc 00c61ca0 /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+8) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #70 pc 001c8d09 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3847032926+352) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #71 pc 001cd5d7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #72 pc 001e437b /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #73 pc 003ee027 /system/lib/libart.so (MterpInvokeVirtual+442) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #74 pc 0040cb14 /system/lib/libart.so (ExecuteMterpImpl+14228) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #75 pc 00c6a886 /system/framework/boot-framework.vdex (android.os.Looper.loop+406) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #76 pc 001c8d09 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3847032926+352) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #77 pc 001cd5d7 /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #78 pc 001e437b /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #79 pc 003ef003 /system/lib/libart.so (MterpInvokeStatic+130) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #80 pc 0040cc94 /system/lib/libart.so (ExecuteMterpImpl+14612) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #81 pc 004c2478 /system/framework/boot-framework.vdex (android.app.ActivityThread.main+220) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #82 pc 001c8d09 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3847032926+352) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #83 pc 001cd523 /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #84 pc 003e186b /system/lib/libart.so (artQuickToInterpreterBridge+890) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #85 pc 0041e2ff /system/lib/libart.so (art_quick_to_interpreter_bridge+30) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #86 pc 00419d75 /system/lib/libart.so (art_quick_invoke_stub_internal+68) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #87 pc 003f3503 /system/lib/libart.so (art_quick_invoke_static_stub+222) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #88 pc 000a1443 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #89 pc 00351fdd /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #90 pc 00353425 /system/lib/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned int)+960) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #91 pc 00303b71 /system/lib/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+40) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #92 pc 00114297 /system/framework/arm/boot.oat (offset 0x10e000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+110) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #93 pc 00419d75 /system/lib/libart.so (art_quick_invoke_stub_internal+68) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #94 pc 003f33ff /system/lib/libart.so (art_quick_invoke_stub+226) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #95 pc 000a1431 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #96 pc 001e96b5 /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+232) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #97 pc 001e4391 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+776) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #98 pc 003ee027 /system/lib/libart.so (MterpInvokeVirtual+442) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #99 pc 0040cb14 /system/lib/libart.so (ExecuteMterpImpl+14228) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #100 pc 013ce6f2 /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #101 pc 001c8d09 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3847032926+352) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #102 pc 001cd523 /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #103 pc 003e186b /system/lib/libart.so (artQuickToInterpreterBridge+890) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #104 pc 0041e2ff /system/lib/libart.so (art_quick_to_interpreter_bridge+30) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #105 pc 00be174d /system/framework/arm/boot-framework.oat (offset 0x3fd000) (com.android.internal.os.ZygoteInit.main+1916) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #106 pc 00419d75 /system/lib/libart.so (art_quick_invoke_stub_internal+68) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #107 pc 003f3503 /system/lib/libart.so (art_quick_invoke_static_stub+222) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #108 pc 000a1443 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #109 pc 00351fdd /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #110 pc 00351df9 /system/lib/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+304) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #111 pc 002958b5 /system/lib/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+476) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #112 pc 00071d41 /system/lib/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+28) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #113 pc 00074089 /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+484) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #114 pc 00002eff /system/bin/app_process32 (main+714) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #115 pc 000a345d /system/lib/libc.so (__libc_init+48) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #116 pc 00002bf3 /system/bin/app_process32 (_start_main+46) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #117 pc 0001bca3 /system/bin/linker (_dl__ZNSt3__112__hash_tableINS_17__hash_value_typeIjP6soinfoEENS_22__unordered_map_hasherIjS4_NS_4hashIjEELb1EEENS_21__unordered_map_equalIjS4_NS_8equal_toIjEELb1EEENS_9allocatorIS4_EEE14__erase_uniqueIjEEjRKT+102) 2019-11-23 11:44:36.507 24115-24115/? A/DEBUG: #118 pc 007fe883 [stack:ff272000] 2019-11-23 11:44:36.617 1068-1068/? E//system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_02

PMMKing avatar Nov 23 '19 03:11 PMMKing