We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
反馈BUG之前,先issue里面搜看看有没有别人已经反馈过,重复的不予处理!!
编译生成Release版本出现以下报错,安装应用后启动不了。如果把debuggable开关设置为true,则可以正常启动,请问是什么原因?
09-07 00:13:07.918 15516 15516 F DEBUG : Process name is com.uwzbxmtske.yhlarp, not key_process 09-07 00:13:07.918 15516 15516 F DEBUG : keyProcess: 0 09-07 00:13:07.918 15516 15516 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 09-07 00:13:07.918 15516 15516 F DEBUG : Build fingerprint: 'OnePlus/OnePlus9Pro_CH/OnePlus9Pro:12/RKQ1.211119.001/R.202208261700:user/release-keys' 09-07 00:13:07.918 15516 15516 F DEBUG : Revision: '0' 09-07 00:13:07.918 15516 15516 F DEBUG : ABI: 'arm64' 09-07 00:13:07.918 15516 15516 F DEBUG : Timestamp: 2022-09-07 00:13:07.366759834+0800 09-07 00:13:07.918 15516 15516 F DEBUG : Process uptime: 0s 09-07 00:13:07.918 15516 15516 F DEBUG : Cmdline: com.uwzbxmtske.yhlarp 09-07 00:13:07.918 15516 15516 F DEBUG : pid: 15258, tid: 15258, name: zbxmtske.yhlarp >>> com.uwzbxmtske.yhlarp <<< 09-07 00:13:07.918 15516 15516 F DEBUG : uid: 11796 09-07 00:13:07.918 15516 15516 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x3b9a 09-07 00:13:07.918 15516 15516 F DEBUG : x0 b40000744baae500 x1 0000007febe8db30 x2 0000000000010006 x3 0000000000000000 09-07 00:13:07.918 15516 15516 F DEBUG : x4 0000000070147ae8 x5 0000007441e56bde x6 0000000000000dd8 x7 0000000000000010 09-07 00:13:07.918 15516 15516 F DEBUG : x8 f2c35c1a49c567a5 x9 f2c35c1a49c567a5 x10 000000000000002b x11 0000000000000001 09-07 00:13:07.918 15516 15516 F DEBUG : x12 00000074456ca654 x13 00000074456ca69c x14 00000074456ca6fc x15 0000000070d8cf50 09-07 00:13:07.918 15516 15516 F DEBUG : x16 00000073c87e9120 x17 00000073c87561e0 x18 00000074eb862000 x19 0000000000003b9a 09-07 00:13:07.918 15516 15516 F DEBUG : x20 00000074e185b990 x21 0000000012d788e0 x22 00000000132168a8 x23 0000000000000000 09-07 00:13:07.918 15516 15516 F DEBUG : x24 0000000070d8cf50 x25 000000001323eb38 x26 00000000700ab2f8 x27 000000001323e0c0 09-07 00:13:07.918 15516 15516 F DEBUG : x28 0000000000003b9a x29 0000007febe8db90 09-07 00:13:07.918 15516 15516 F DEBUG : lr 00000073c8750ca0 sp 0000007febe8db80 pc 00000073c8750ca0 pst 0000000060001000 09-07 00:13:07.918 15516 15516 F DEBUG : backtrace: 09-07 00:13:07.918 15516 15516 F DEBUG : #00 pc 000000000004eca0 /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/lib/arm64/libva++.so (getCallingUid(facebook::jni::alias_ref<_jclass*>)+40) (BuildId: a6a6e090c3e9d731a55644b43ad0d903bf373df6) 09-07 00:13:07.918 15516 15516 F DEBUG : #1 pc 000000000036c31c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.ContextImpl.createAppContext+412) 09-07 00:13:07.918 15516 15516 F DEBUG : #2 pc 0000000000262f60 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.LoadedApk.makeApplication+768) 09-07 00:13:07.918 15516 15516 F DEBUG : #3 pc 00000000002ca764 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #4 pc 000000000035b658 /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+744) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #5 pc 000000000035b348 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #6 pc 00000000000b2f74 /apex/com.android.art/javalib/arm64/boot.oat (art_jni_trampoline+132) (BuildId: ad9ee401645a5135206a62ff86fc2ef5cdc29120) 09-07 00:13:07.918 15516 15516 F DEBUG : #7 pc 0000000000184804 /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.odex (mirror.RefMethod.call+84) 09-07 00:13:07.918 15516 15516 F DEBUG : #8 pc 000000000020a0a0 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #9 pc 000000000035ec6a /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.vdex (com.lody.virtual.client.VClientImpl.bindApplicationNoCheck+1148) 09-07 00:13:07.918 8495 8621 E loros.gallery3: Invalid ID 0x00000000. 09-07 00:13:07.918 15516 15516 F DEBUG : #10 pc 000000000020a044 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #11 pc 000000000035e79e /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.vdex (com.lody.virtual.client.VClientImpl.bindApplication+30) 09-07 00:13:07.918 15516 15516 F DEBUG : #12 pc 000000000020a044 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #13 pc 000000000035e7e0 /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.vdex (com.lody.virtual.client.VClientImpl.bindApplicationForActivity+12) 09-07 00:13:07.918 15516 15516 F DEBUG : #14 pc 00000000002ca764 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #15 pc 00000000002ee6b0 /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+312) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #16 pc 00000000002ed4fc /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false, true>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1480) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #17 pc 00000000002c0fbc /apex/com.android.art/lib64/libart.so (MterpInvokeVirtual+5660) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #18 pc 00000000002c4e94 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #19 pc 00000000001df75a /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.vdex (android.app.TransactionHandlerProxy.handleLaunchActivity+226) 09-07 00:13:07.918 15516 15516 F DEBUG : #20 pc 000000000027d840 /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.llvm.3351068054637636664)+644) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #21 pc 000000000027c9e8 /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+1176) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #22 pc 00000000002d4178 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #23 pc 0000000000521c28 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.servertransaction.LaunchActivityItem.execute+168) 09-07 00:13:07.918 15516 15516 F DEBUG : #24 pc 0000000000284264 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.servertransaction.TransactionExecutor.executeCallbacks+1972) 09-07 00:13:07.918 15516 15516 F DEBUG : #25 pc 00000000002839fc /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.servertransaction.TransactionExecutor.execute+988) 09-07 00:13:07.918 15516 15516 F DEBUG : #26 pc 0000000000338d04 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.ActivityThread$H.handleMessage+1428) 09-07 00:13:07.918 15516 15516 F DEBUG : #27 pc 000000000058598c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.os.Handler.dispatchMessage+188) 09-07 00:13:07.918 15516 15516 F DEBUG : #28 pc 00000000005889b8 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.os.Looper.loopOnce+1384) 09-07 00:13:07.918 15516 15516 F DEBUG : #29 pc 000000000058839c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.os.Looper.loop+604) 09-07 00:13:07.918 15516 15516 F DEBUG : #30 pc 000000000034ea10 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.ActivityThread.main+928) 09-07 00:13:07.918 15516 15516 F DEBUG : #31 pc 00000000002ca9e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #32 pc 000000000035b5d0 /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+608) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #33 pc 000000000035b348 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #34 pc 00000000000b2f74 /apex/com.android.art/javalib/arm64/boot.oat (art_jni_trampoline+132) (BuildId: ad9ee401645a5135206a62ff86fc2ef5cdc29120) 09-07 00:13:07.918 15516 15516 F DEBUG : #35 pc 00000000008cd51c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+140) 09-07 00:13:07.918 15516 15516 F DEBUG : #36 pc 00000000008d5ec0 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+2800) 09-07 00:13:07.918 15516 15516 F DEBUG : #37 pc 00000000002ca9e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #38 pc 000000000044ca04 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+464) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #39 pc 000000000062cf30 /apex/com.android.art/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+268) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #40 pc 00000000000b2bf8 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+124) (BuildId: 160cc0219f19ffc9217dc99af81a87d5) 09-07 00:13:07.918 15516 15516 F DEBUG : #41 pc 00000000000bf0fc /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+840) (BuildId: 160cc0219f19ffc9217dc99af81a87d5) 09-07 00:13:07.918 15516 15516 F DEBUG : #42 pc 0000000000002684 /system/bin/app_process64 (main+1580) (BuildId: b66800b6ac5d87b7c521c256d6340555) 09-07 00:13:07.918 15516 15516 F DEBUG : #43 pc 00000000000720c4 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+100) (BuildId: bbbdeb7c87c74f1491f92c6e605095b0)
(请分步骤描述如何复现这个BUG,非毕现BUG请给出如何能大概率复现的步骤)
机型: 系统版本:Android 12 ROM版本:(请区分内测版和开发版稳定版,除稳定版本外不予修复) Xposed 插件以及插件版本: VirtualXposed版本:0.22.0
(别的需要描述的内容)
写完之后,请自己再读一遍自己写的,如果你自己都读不懂,就不用说修复了
The text was updated successfully, but these errors were encountered:
No branches or pull requests
反馈BUG之前,先issue里面搜看看有没有别人已经反馈过,重复的不予处理!!
问题描述
编译生成Release版本出现以下报错,安装应用后启动不了。如果把debuggable开关设置为true,则可以正常启动,请问是什么原因?
09-07 00:13:07.918 15516 15516 F DEBUG : Process name is com.uwzbxmtske.yhlarp, not key_process
09-07 00:13:07.918 15516 15516 F DEBUG : keyProcess: 0
09-07 00:13:07.918 15516 15516 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
09-07 00:13:07.918 15516 15516 F DEBUG : Build fingerprint: 'OnePlus/OnePlus9Pro_CH/OnePlus9Pro:12/RKQ1.211119.001/R.202208261700:user/release-keys'
09-07 00:13:07.918 15516 15516 F DEBUG : Revision: '0'
09-07 00:13:07.918 15516 15516 F DEBUG : ABI: 'arm64'
09-07 00:13:07.918 15516 15516 F DEBUG : Timestamp: 2022-09-07 00:13:07.366759834+0800
09-07 00:13:07.918 15516 15516 F DEBUG : Process uptime: 0s
09-07 00:13:07.918 15516 15516 F DEBUG : Cmdline: com.uwzbxmtske.yhlarp
09-07 00:13:07.918 15516 15516 F DEBUG : pid: 15258, tid: 15258, name: zbxmtske.yhlarp >>> com.uwzbxmtske.yhlarp <<<
09-07 00:13:07.918 15516 15516 F DEBUG : uid: 11796
09-07 00:13:07.918 15516 15516 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x3b9a
09-07 00:13:07.918 15516 15516 F DEBUG : x0 b40000744baae500 x1 0000007febe8db30 x2 0000000000010006 x3 0000000000000000
09-07 00:13:07.918 15516 15516 F DEBUG : x4 0000000070147ae8 x5 0000007441e56bde x6 0000000000000dd8 x7 0000000000000010
09-07 00:13:07.918 15516 15516 F DEBUG : x8 f2c35c1a49c567a5 x9 f2c35c1a49c567a5 x10 000000000000002b x11 0000000000000001
09-07 00:13:07.918 15516 15516 F DEBUG : x12 00000074456ca654 x13 00000074456ca69c x14 00000074456ca6fc x15 0000000070d8cf50
09-07 00:13:07.918 15516 15516 F DEBUG : x16 00000073c87e9120 x17 00000073c87561e0 x18 00000074eb862000 x19 0000000000003b9a
09-07 00:13:07.918 15516 15516 F DEBUG : x20 00000074e185b990 x21 0000000012d788e0 x22 00000000132168a8 x23 0000000000000000
09-07 00:13:07.918 15516 15516 F DEBUG : x24 0000000070d8cf50 x25 000000001323eb38 x26 00000000700ab2f8 x27 000000001323e0c0
09-07 00:13:07.918 15516 15516 F DEBUG : x28 0000000000003b9a x29 0000007febe8db90
09-07 00:13:07.918 15516 15516 F DEBUG : lr 00000073c8750ca0 sp 0000007febe8db80 pc 00000073c8750ca0 pst 0000000060001000
09-07 00:13:07.918 15516 15516 F DEBUG : backtrace:
09-07 00:13:07.918 15516 15516 F DEBUG : #00 pc 000000000004eca0 /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/lib/arm64/libva++.so (getCallingUid(facebook::jni::alias_ref<_jclass*>)+40) (BuildId: a6a6e090c3e9d731a55644b43ad0d903bf373df6)
09-07 00:13:07.918 15516 15516 F DEBUG : #1 pc 000000000036c31c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.ContextImpl.createAppContext+412)
09-07 00:13:07.918 15516 15516 F DEBUG : #2 pc 0000000000262f60 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.LoadedApk.makeApplication+768)
09-07 00:13:07.918 15516 15516 F DEBUG : #3 pc 00000000002ca764 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #4 pc 000000000035b658 /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+744) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #5 pc 000000000035b348 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #6 pc 00000000000b2f74 /apex/com.android.art/javalib/arm64/boot.oat (art_jni_trampoline+132) (BuildId: ad9ee401645a5135206a62ff86fc2ef5cdc29120)
09-07 00:13:07.918 15516 15516 F DEBUG : #7 pc 0000000000184804 /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.odex (mirror.RefMethod.call+84)
09-07 00:13:07.918 15516 15516 F DEBUG : #8 pc 000000000020a0a0 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #9 pc 000000000035ec6a /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.vdex (com.lody.virtual.client.VClientImpl.bindApplicationNoCheck+1148)
09-07 00:13:07.918 8495 8621 E loros.gallery3: Invalid ID 0x00000000.
09-07 00:13:07.918 15516 15516 F DEBUG : #10 pc 000000000020a044 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #11 pc 000000000035e79e /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.vdex (com.lody.virtual.client.VClientImpl.bindApplication+30)
09-07 00:13:07.918 15516 15516 F DEBUG : #12 pc 000000000020a044 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #13 pc 000000000035e7e0 /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.vdex (com.lody.virtual.client.VClientImpl.bindApplicationForActivity+12)
09-07 00:13:07.918 15516 15516 F DEBUG : #14 pc 00000000002ca764 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #15 pc 00000000002ee6b0 /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+312) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #16 pc 00000000002ed4fc /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false, true>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+1480) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #17 pc 00000000002c0fbc /apex/com.android.art/lib64/libart.so (MterpInvokeVirtual+5660) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #18 pc 00000000002c4e94 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #19 pc 00000000001df75a /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.vdex (android.app.TransactionHandlerProxy.handleLaunchActivity+226)
09-07 00:13:07.918 15516 15516 F DEBUG : #20 pc 000000000027d840 /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.llvm.3351068054637636664)+644) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #21 pc 000000000027c9e8 /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+1176) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #22 pc 00000000002d4178 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #23 pc 0000000000521c28 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.servertransaction.LaunchActivityItem.execute+168)
09-07 00:13:07.918 15516 15516 F DEBUG : #24 pc 0000000000284264 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.servertransaction.TransactionExecutor.executeCallbacks+1972)
09-07 00:13:07.918 15516 15516 F DEBUG : #25 pc 00000000002839fc /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.servertransaction.TransactionExecutor.execute+988)
09-07 00:13:07.918 15516 15516 F DEBUG : #26 pc 0000000000338d04 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.ActivityThread$H.handleMessage+1428)
09-07 00:13:07.918 15516 15516 F DEBUG : #27 pc 000000000058598c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.os.Handler.dispatchMessage+188)
09-07 00:13:07.918 15516 15516 F DEBUG : #28 pc 00000000005889b8 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.os.Looper.loopOnce+1384)
09-07 00:13:07.918 15516 15516 F DEBUG : #29 pc 000000000058839c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.os.Looper.loop+604)
09-07 00:13:07.918 15516 15516 F DEBUG : #30 pc 000000000034ea10 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.ActivityThread.main+928)
09-07 00:13:07.918 15516 15516 F DEBUG : #31 pc 00000000002ca9e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #32 pc 000000000035b5d0 /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+608) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #33 pc 000000000035b348 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #34 pc 00000000000b2f74 /apex/com.android.art/javalib/arm64/boot.oat (art_jni_trampoline+132) (BuildId: ad9ee401645a5135206a62ff86fc2ef5cdc29120)
09-07 00:13:07.918 15516 15516 F DEBUG : #35 pc 00000000008cd51c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+140)
09-07 00:13:07.918 15516 15516 F DEBUG : #36 pc 00000000008d5ec0 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+2800)
09-07 00:13:07.918 15516 15516 F DEBUG : #37 pc 00000000002ca9e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #38 pc 000000000044ca04 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+464) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #39 pc 000000000062cf30 /apex/com.android.art/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+268) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb)
09-07 00:13:07.918 15516 15516 F DEBUG : #40 pc 00000000000b2bf8 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+124) (BuildId: 160cc0219f19ffc9217dc99af81a87d5)
09-07 00:13:07.918 15516 15516 F DEBUG : #41 pc 00000000000bf0fc /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+840) (BuildId: 160cc0219f19ffc9217dc99af81a87d5)
09-07 00:13:07.918 15516 15516 F DEBUG : #42 pc 0000000000002684 /system/bin/app_process64 (main+1580) (BuildId: b66800b6ac5d87b7c521c256d6340555)
09-07 00:13:07.918 15516 15516 F DEBUG : #43 pc 00000000000720c4 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+100) (BuildId: bbbdeb7c87c74f1491f92c6e605095b0)
复现步骤
(请分步骤描述如何复现这个BUG,非毕现BUG请给出如何能大概率复现的步骤)
环境
机型:
系统版本:Android 12
ROM版本:(请区分内测版和开发版稳定版,除稳定版本外不予修复)
Xposed 插件以及插件版本:
VirtualXposed版本:0.22.0
补充
(别的需要描述的内容)
写完之后,请自己再读一遍自己写的,如果你自己都读不懂,就不用说修复了
The text was updated successfully, but these errors were encountered: