Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

java8 lambda not support #524

Open
h634462445 opened this issue Jan 28, 2022 · 1 comment
Open

java8 lambda not support #524

h634462445 opened this issue Jan 28, 2022 · 1 comment

Comments

@h634462445
Copy link

The dex contain lambda expressions in java。
the code is :
private void test() {
new Thread(()-> System.out.println("hello world")).start();
}

I use d2j-dex2jar.bat to translate dex file to jar file。

when invoke the test() method ,it occur exception 。 log is below:

2022-01-28 11:19:30.961 30579-30579/? I/crash_dump64: performing dump of process 30386 (target tid = 30386)
2022-01-28 11:19:30.982 30579-30579/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2022-01-28 11:19:30.983 30579-30579/? A/DEBUG: Build fingerprint: 'HUAWEI/MHA-AL00/HWMHA:9/HUAWEIMHA-AL00/9.1.0.228C00:user/release-keys'
2022-01-28 11:19:30.983 30579-30579/? A/DEBUG: Revision: '0'
2022-01-28 11:19:30.983 30579-30579/? A/DEBUG: ABI: 'arm64'
2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: Happend: 'Fri Jan 28 11:19:30 2022
'
2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: SYSVMTYPE: Art
APPVMTYPE: Art
2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: pid: 30386, tid: 30386, name: com.gzyy.qqyxol >>> com.gzyy.qqyxol <<<
2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x40
2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: Cause: null pointer dereference
2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x0 0000000012c87180 x1 0000000000000000 x2 000000785c400000 x3 0000000000000006
2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x4 000000000000006c x5 0000000072cebdb4 x6 1f3963646b686065 x7 7f7f7f7f7f7f7f7f
2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x8 000000787ae15c00 x9 0000007fc0ef9258 x10 0000000000000070 x11 0000000000000001
2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x12 0000000000000001 x13 0000000000000084 x14 0000000000000000 x15 0000000000000002
2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x16 00000078fcbb3bd8 x17 00000078fcb4822c x18 0000000012c895b0 x19 0000000000000000
2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x20 00000078710a988c x21 0000000000000000 x22 0000000012c87180 x23 0000000012ea6418
2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x24 000000787adc4300 x25 00000000000071fb x26 0000000012ea6418 x27 0000000012ea6418
2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x28 000000787adc4ed8 x29 0000007fc0ef8a00
2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: sp 0000007fc0ef89d0 lr 000000787a9e2cfc pc 000000787a9ed3c8
2022-01-28 11:19:30.999 643-643/? E/WifiHAL: enter wifi_get_link_stats
2022-01-28 11:19:31.012 1188-1543/? E/WificondControl: Noise: -92, Snr: 0, Chload: -1
2022-01-28 11:19:31.019 1188-1599/? I/WifiService: getConnectionInfo uid=1000
2022-01-28 11:19:31.019 1188-1598/? I/WifiService: getConnectionInfo uid=1000
2022-01-28 11:19:31.020 1188-1600/? I/WifiService: getConnectionInfo uid=1000
2022-01-28 11:19:31.020 1188-9164/? I/WifiService: getConnectionInfo uid=1000
2022-01-28 11:19:31.020 1188-2471/? I/WifiService: getConnectionInfo uid=1000
2022-01-28 11:19:31.021 1188-1542/? I/QosMonitor: queryRtt: rtt_type = 3
2022-01-28 11:19:31.022 1188-2474/? I/WifiService: getConnectionInfo uid=10034
2022-01-28 11:19:31.022 1188-1542/? I/QosMonitor: postEventFromNative: msg=100,arg1=4,arg2=10
2022-01-28 11:19:31.023 1188-2471/? I/WifiService: getConnectionInfo uid=1000
2022-01-28 11:19:31.023 1188-2474/? I/WifiService: getConnectionInfo uid=10034
2022-01-28 11:19:31.024 1829-2003/? E/HwWifiStatStore: updateLinkSpeed linkSpeed =65 lastSpdLev=2 index=2
2022-01-28 11:19:31.027 1846-2960/? I/HwNaturalBase: [Timer-0]: MultiUserManagerService: getNotActiveUser start
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: backtrace:
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #00 pc 000000000028e3c8 /system/lib64/libart.so (_ZN3art6mirror6Object18VerifierInstanceOfILNS_17VerifyObjectFlagsE0EEEbNS_6ObjPtrINS0_5ClassEEE+24)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #1 pc 0000000000283cf8 /system/lib64/libart.so (ZN3art11interpreter10DoFieldPutILNS_13FindFieldTypeE5ELNS_9Primitive4TypeE0ELb1ELb0EEEbPNS_6ThreadERKNS_11ShadowFrameEPKNS_11InstructionEt+1196)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #2 pc 00000000002a1060 /system/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<true, false>(art::interpreter::SwitchImplContext*)+71064)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #3 pc 000000000058bf38 /system/lib64/libart.so (ExecuteSwitchImplAsm+8)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #4 pc 0000000000410218 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.gzyy.qqyxol-hhWjA2BSiZUkFi82n-HG_Q==/base.apk (deleted) (com.cp.sdk.demo.
$$Lambda$MainActivity$khQ2cUOPQGiIiU9G_4hMFk5QRkA.)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #5 pc 0000000000260b74 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+392)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #6 pc 0000000000533b90 /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #7 pc 00000000005896fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #8 pc 000000000058084c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #9 pc 00000000000d8628 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #10 pc 000000000013088c /system/lib64/libart.so (art::ClassLinker::InitializeClass(art::Thread*, art::Handleart::mirror::Class, bool, bool)+2196)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #11 pc 000000000011bb78 /system/lib64/libart.so (art::ClassLinker::EnsureInitialized(art::Thread*, art::Handleart::mirror::Class, bool, bool)+192)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #12 pc 000000000054d3e4 /system/lib64/libart.so (MterpGetObjStatic+332)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #13 pc 0000000000572690 /system/lib64/libart.so (ExecuteMterpImpl+12688)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #14 pc 00000000004101f4 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.gzyy.qqyxol-hhWjA2BSiZUkFi82n-HG_Q==/base.apk (deleted) (com.cp.sdk.demo.MainActivity.test+4)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #15 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #16 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #17 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #18 pc 0000000000548f3c /system/lib64/libart.so (MterpInvokeDirect+296)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #19 pc 0000000000572d94 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #20 pc 000000000040fae0 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.gzyy.qqyxol-hhWjA2BSiZUkFi82n-HG_Q==/base.apk (deleted) (com.cp.sdk.demo.MainActivity.logout)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #21 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #22 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #23 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #24 pc 0000000000547bf8 /system/lib64/libart.so (MterpInvokeVirtual+588)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #25 pc 0000000000572c94 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #26 pc 000000000040fbae /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.gzyy.qqyxol-hhWjA2BSiZUkFi82n-HG_Q==/base.apk (deleted) (com.cp.sdk.demo.MainActivity.onClick+50)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #27 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #28 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #29 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #30 pc 00000000005489b4 /system/lib64/libart.so (MterpInvokeInterface+944)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #31 pc 0000000000572e94 /system/lib64/libart.so (ExecuteMterpImpl+14740)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #32 pc 0000000000bf6552 /system/framework/boot-framework.vdex (android.view.View.performClick+78)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #33 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #34 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #35 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #36 pc 0000000000547bf8 /system/lib64/libart.so (MterpInvokeVirtual+588)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #37 pc 0000000000572c94 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #38 pc 0000000000bf65b6 /system/framework/boot-framework.vdex (android.view.View.performClickInternal+6)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #39 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #40 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #41 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #42 pc 0000000000548f3c /system/lib64/libart.so (MterpInvokeDirect+296)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #43 pc 0000000000572d94 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #44 pc 0000000000d93e4a /system/framework/boot-framework.vdex (android.view.View.access$3100)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #45 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #46 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #47 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #48 pc 0000000000549100 /system/lib64/libart.so (MterpInvokeStatic+204)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #49 pc 0000000000572e14 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #50 pc 0000000000be1c00 /system/framework/boot-framework.vdex (android.view.View$PerformClick.run+18)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #51 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #52 pc 0000000000533b90 /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #53 pc 00000000005896fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #54 pc 000000000004adb0 /dev/ashmem/dalvik-jit-code-cache (deleted) (android.os.Handler.handleCallback+64)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #55 pc 000000000004c51c /dev/ashmem/dalvik-jit-code-cache (deleted) (android.os.Handler.dispatchMessage+60)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #56 pc 0000000000580588 /system/lib64/libart.so (art_quick_invoke_stub+584)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #57 pc 00000000000d8608 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #58 pc 000000000028cec8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #59 pc 0000000000286ed0 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #60 pc 0000000000547bf8 /system/lib64/libart.so (MterpInvokeVirtual+588)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #61 pc 0000000000572c94 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #62 pc 0000000000b51a94 /system/framework/boot-framework.vdex (android.os.Looper.loop+498)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #63 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #64 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #65 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #66 pc 0000000000549100 /system/lib64/libart.so (MterpInvokeStatic+204)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #67 pc 0000000000572e14 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #68 pc 00000000003defdc /system/framework/boot-framework.vdex (android.app.ActivityThread.main+428)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #69 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #70 pc 0000000000533b90 /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #71 pc 00000000005896fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #72 pc 000000000058084c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #73 pc 00000000000d8628 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #74 pc 000000000047b3e8 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #75 pc 000000000047ce3c /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #76 pc 000000000040c5a4 /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #77 pc 00000000001456d4 /system/framework/arm64/boot.oat (offset 0x13b000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #78 pc 0000000000580588 /system/lib64/libart.so (art_quick_invoke_stub+584)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #79 pc 00000000000d8608 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #80 pc 000000000028cec8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #81 pc 0000000000286ed0 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #82 pc 0000000000547bf8 /system/lib64/libart.so (MterpInvokeVirtual+588)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #83 pc 0000000000572c94 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #84 pc 0000000001231b80 /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #85 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488)
2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #86 pc 0000000000533b90 /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #87 pc 00000000005896fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #88 pc 0000000000ee3e3c /system/framework/arm64/boot-framework.oat (offset 0x415000) (com.android.internal.os.ZygoteInit.main+2540)
2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #89 pc 000000000058084c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #90 pc 00000000000d8628 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #91 pc 000000000047b3e8 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #92 pc 000000000047b048 /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+424)
2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #93 pc 0000000000370200 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+660)
2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #94 pc 00000000000b9bcc /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120)
2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #95 pc 00000000000bc944 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+780)
2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #96 pc 0000000000002368 /system/bin/app_process64 (main+1444)
2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #97 pc 00000000000aecc8 /system/lib64/libc.so (__libc_init+88)
2022-01-28 11:19:31.383 770-3206/? E/LOGSERVER_UTILS: [Erecovery]readEvent: eRecEventManager readEvent 0
2022-01-28 11:19:31.512 1188-30582/? W/ActivityManager: finishTopCrashedActivityLocked Force finishing activity com.gzyy.qqyxol/com.cp.sdk.demo.MainActivity
2022-01-28 11:19:31.512 772-772/? E//system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_03

@SerendipityKim
Copy link

do you resolve this,now

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants