We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
--------- beginning of crash
2020-12-02 16:19:54.217 1684-1684/? A/libc: Fatal signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x6f88b83bd0 in tid 1684 (system_server), pid 1684 (system_server) 2020-12-02 16:19:54.336 1742-1742/? I/crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone 2020-12-02 16:19:54.338 1742-1742/? I/crash_dump64: performing dump of process 1684 (target tid = 1684) 2020-12-02 16:19:54.364 1742-1742/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: Build fingerprint: 'xiaomi/ginkgo/ginkgo:10/QKQ1.200114.002/20.11.11:user/release-keys' 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: Revision: '0' 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: ABI: 'arm64' 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: Timestamp: 2020-12-02 16:19:54+0800 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: pid: 1684, tid: 1684, name: system_server >>> zygote64 <<< 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: uid: 1000 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x6f88b83bd0 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: Cause: execute-only (no-read) memory access error; likely due to data in .text. 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x0 000000700eced510 x1 0000006f88b83bd0 x2 0000000000000010 x3 0000007fef050738 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x4 0000000000000001 x5 0000000000000004 x6 0000007fef05055c x7 0000000000000000 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x8 0000006f7fefccf0 x9 0000000000000002 x10 0000000000000001 x11 0000000000000000 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x12 000000700eea4000 x13 fffffffffc000000 x14 0000000000000020 x15 0000000000000200 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x16 0000006f7ff313f8 x17 0000006f7fef6aac x18 000000700fcc2000 x19 0000000000000001 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x20 0000006f88b83bd0 x21 0000007fef050738 x22 0000006f88b83bd0 x23 0000006f88b83be0 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x24 0000000014000000 x25 0000000036000000 x26 0000000034000000 x27 0000000018000000 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x28 0000000010000000 x29 0000007fef0506e0 2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: sp 0000007fef050690 lr 0000006f7fefd3b0 pc 0000006f7fefcd38 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: backtrace: 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #00 pc 0000000000037d38 /system/lib64/libsandhook-native.so (SandHook::Decoder::Arm64Decoder::Disassemble(void*, unsigned long, SandHook::Decoder::InstVisitor&, bool)+72) (BuildId: 7836b240d507a8e1d948d7b8233a6f3f0c1a667f) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #1 pc 00000000000383ac /system/lib64/libsandhook-native.so (SandHook::Asm::CodeRelocateA64::Relocate(void*, unsigned long, void*)+112) (BuildId: 7836b240d507a8e1d948d7b8233a6f3f0c1a667f) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #2 pc 0000000000039048 /system/lib64/libsandhook-native.so (SandHook::Hook::InlineHookArm64Android::Hook(void*, void*)+248) (BuildId: 7836b240d507a8e1d948d7b8233a6f3f0c1a667f) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #3 pc 000000000001ef20 /system/lib64/libsandhook.so (hookClassInit+96) (BuildId: 10c3f1cf126ba5c7c65912f115bdcf903c473095) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #4 pc 000000000001ca5c /system/lib64/libsandhook.so (Java_com_swift_sandhook_SandHook_initForPendingHook+116) (BuildId: 10c3f1cf126ba5c7c65912f115bdcf903c473095) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #5 pc 0000000000140350 /apex/com.android.runtime/lib64/libart.so (art_quick_generic_jni_trampoline+144) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #6 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #7 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #8 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #9 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #10 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #11 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #12 pc 0000000000096962 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.swift.sandhook.PendingHookHandler.+14) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #13 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #14 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #15 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #16 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #17 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #18 pc 00000000001723b0 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x157000) (art::ClassLinker::InitializeClass(art::Thread*, art::Handleart::mirror::Class, bool, bool)+2312) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #19 pc 000000000015ced8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x157000) (art::ClassLinker::EnsureInitialized(art::Thread*, art::Handleart::mirror::Class, bool, bool)+92) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #20 pc 00000000002e3894 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+532) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #21 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #22 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #23 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #24 pc 0000000000097636 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.swift.sandhook.SandHook.hook+70) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #25 pc 00000000005a3d44 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+1040) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #26 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #27 pc 00000000000a2276 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.swift.sandhook.coocompat.methodgen.DynamicBridge.hookMethod+238) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #28 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #29 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #30 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #31 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #32 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #33 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #34 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #35 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #36 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #37 pc 0000000000091fc6 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.CooBridge.hookMethodNative+10) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #38 pc 00000000005a3d44 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+1040) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #39 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #40 pc 0000000000091d3a [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.CooBridge.hookMethod+298) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #41 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #42 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #43 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #44 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #45 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #46 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #47 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #48 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #49 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #50 pc 0000000000092492 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.Coo.findAndHookMethod+62) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #51 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #52 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #53 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #54 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #55 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #56 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #57 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #58 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #59 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #60 pc 000000000009565c [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.main.onStart+40) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #61 pc 00000000005a3d44 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+1040) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #62 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #63 pc 00000000000956de [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.main.onSystemServerStart+62) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #64 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #65 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #66 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #67 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #68 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #69 pc 00000000004b0f40 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #70 pc 00000000004b0b30 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #71 pc 00000000003bb6b4 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+624) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #72 pc 000000000004c4cc /system/lib64/libriru_CooWind.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: f4440d6707b978318fe0f356c8e1decb486cba2b) 2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #73 pc 000000000004c014 /system/lib64/libriru_CooWind.so (Coo::Context::onSystemServerStart(_JNIEnv*)+268) (BuildId: f4440d6707b978318fe0f356c8e1decb486cba2b) 2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #74 pc 000000000004c5d4 /system/lib64/libriru_CooWind.so (nativeForkSystemServerPost+32) (BuildId: f4440d6707b978318fe0f356c8e1decb486cba2b) 2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #75 pc 000000000000bbec /system/lib64/libmemtrack.so (BuildId: b057242d5c6d0ff1bc31a9c75ad7318f94273fe0) 2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #76 pc 00000000022eefec /system/framework/arm64/boot-framework.oat (art_jni_trampoline+252) (BuildId: c5407c051a8976843c5a4f334b50aaf4fa00e01d) 2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #77 pc 00000000022f5d0c /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.forkSystemServer+1340) (BuildId: c5407c051a8976843c5a4f334b50aaf4fa00e01d) 2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #78 pc 00000000022f6fe0 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+1952) (BuildId: c5407c051a8976843c5a4f334b50aaf4fa00e01d) 2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #79 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #80 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #81 pc 00000000004b0f40 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #82 pc 00000000004b0b30 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #83 pc 00000000003bb6b4 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+624) (BuildId: ab384bba78c42c67d77af1934002f275) 2020-12-02 16:19:55.182 1742-1742/? A/DEBUG: #84 pc 00000000000c19ec /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: 8220b57e0c265b51b59e6f6ff54cd456) 2020-12-02 16:19:55.182 1742-1742/? A/DEBUG: #85 pc 00000000000c49b0 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+944) (BuildId: 8220b57e0c265b51b59e6f6ff54cd456) 2020-12-02 16:19:55.182 1742-1742/? A/DEBUG: #86 pc 00000000000035bc /system/bin/app_process64 (main+1388) (BuildId: 27cd9ba96bffd08740403a49d59f8818) 2020-12-02 16:19:55.182 1742-1742/? A/DEBUG: #87 pc 000000000007e978 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: 85ab2bc1ae7f4dbc4ee5d68f94085e8b) 2020-12-02 16:19:55.485 1742-1742/? E/MIUINDBG: miui_native_debug_process_O
The text was updated successfully, but these errors were encountered:
还是自己技术水平太渣,是 PendingHook 的逻辑自己没处理好,强行关闭就好了,不是 SandHook 的问题
Sorry, something went wrong.
@Jokerman1991 @ganyao114 这个问题也有碰到,能分享下patch吗?只用了native hook,这个好像是Android 10上面都会碰到,尤其小米和三星
解决了吗
No branches or pull requests
2020-12-02 16:19:54.217 1684-1684/? A/libc: Fatal signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x6f88b83bd0 in tid 1684 (system_server), pid 1684 (system_server)
2020-12-02 16:19:54.336 1742-1742/? I/crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone
2020-12-02 16:19:54.338 1742-1742/? I/crash_dump64: performing dump of process 1684 (target tid = 1684)
2020-12-02 16:19:54.364 1742-1742/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: Build fingerprint: 'xiaomi/ginkgo/ginkgo:10/QKQ1.200114.002/20.11.11:user/release-keys'
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: Revision: '0'
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: ABI: 'arm64'
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: Timestamp: 2020-12-02 16:19:54+0800
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: pid: 1684, tid: 1684, name: system_server >>> zygote64 <<<
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: uid: 1000
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x6f88b83bd0
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: Cause: execute-only (no-read) memory access error; likely due to data in .text.
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x0 000000700eced510 x1 0000006f88b83bd0 x2 0000000000000010 x3 0000007fef050738
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x4 0000000000000001 x5 0000000000000004 x6 0000007fef05055c x7 0000000000000000
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x8 0000006f7fefccf0 x9 0000000000000002 x10 0000000000000001 x11 0000000000000000
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x12 000000700eea4000 x13 fffffffffc000000 x14 0000000000000020 x15 0000000000000200
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x16 0000006f7ff313f8 x17 0000006f7fef6aac x18 000000700fcc2000 x19 0000000000000001
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x20 0000006f88b83bd0 x21 0000007fef050738 x22 0000006f88b83bd0 x23 0000006f88b83be0
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x24 0000000014000000 x25 0000000036000000 x26 0000000034000000 x27 0000000018000000
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x28 0000000010000000 x29 0000007fef0506e0
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: sp 0000007fef050690 lr 0000006f7fefd3b0 pc 0000006f7fefcd38
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: backtrace:
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #00 pc 0000000000037d38 /system/lib64/libsandhook-native.so (SandHook::Decoder::Arm64Decoder::Disassemble(void*, unsigned long, SandHook::Decoder::InstVisitor&, bool)+72) (BuildId: 7836b240d507a8e1d948d7b8233a6f3f0c1a667f)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #1 pc 00000000000383ac /system/lib64/libsandhook-native.so (SandHook::Asm::CodeRelocateA64::Relocate(void*, unsigned long, void*)+112) (BuildId: 7836b240d507a8e1d948d7b8233a6f3f0c1a667f)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #2 pc 0000000000039048 /system/lib64/libsandhook-native.so (SandHook::Hook::InlineHookArm64Android::Hook(void*, void*)+248) (BuildId: 7836b240d507a8e1d948d7b8233a6f3f0c1a667f)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #3 pc 000000000001ef20 /system/lib64/libsandhook.so (hookClassInit+96) (BuildId: 10c3f1cf126ba5c7c65912f115bdcf903c473095)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #4 pc 000000000001ca5c /system/lib64/libsandhook.so (Java_com_swift_sandhook_SandHook_initForPendingHook+116) (BuildId: 10c3f1cf126ba5c7c65912f115bdcf903c473095)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #5 pc 0000000000140350 /apex/com.android.runtime/lib64/libart.so (art_quick_generic_jni_trampoline+144) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #6 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #7 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #8 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #9 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #10 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #11 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #12 pc 0000000000096962 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.swift.sandhook.PendingHookHandler.+14)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #13 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #14 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #15 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #16 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #17 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #18 pc 00000000001723b0 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x157000) (art::ClassLinker::InitializeClass(art::Thread*, art::Handleart::mirror::Class, bool, bool)+2312) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #19 pc 000000000015ced8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x157000) (art::ClassLinker::EnsureInitialized(art::Thread*, art::Handleart::mirror::Class, bool, bool)+92) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #20 pc 00000000002e3894 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+532) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #21 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #22 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #23 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #24 pc 0000000000097636 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.swift.sandhook.SandHook.hook+70)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #25 pc 00000000005a3d44 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+1040) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #26 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #27 pc 00000000000a2276 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.swift.sandhook.coocompat.methodgen.DynamicBridge.hookMethod+238)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #28 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #29 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #30 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #31 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #32 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #33 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #34 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #35 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #36 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #37 pc 0000000000091fc6 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.CooBridge.hookMethodNative+10)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #38 pc 00000000005a3d44 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+1040) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #39 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #40 pc 0000000000091d3a [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.CooBridge.hookMethod+298)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #41 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #42 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #43 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #44 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #45 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #46 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #47 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #48 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #49 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #50 pc 0000000000092492 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.Coo.findAndHookMethod+62)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #51 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #52 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #53 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #54 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #55 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #56 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #57 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #58 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #59 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #60 pc 000000000009565c [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.main.onStart+40)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #61 pc 00000000005a3d44 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+1040) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #62 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #63 pc 00000000000956de [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.main.onSystemServerStart+62)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #64 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #65 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #66 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #67 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #68 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #69 pc 00000000004b0f40 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #70 pc 00000000004b0b30 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #71 pc 00000000003bb6b4 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+624) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #72 pc 000000000004c4cc /system/lib64/libriru_CooWind.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: f4440d6707b978318fe0f356c8e1decb486cba2b)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #73 pc 000000000004c014 /system/lib64/libriru_CooWind.so (Coo::Context::onSystemServerStart(_JNIEnv*)+268) (BuildId: f4440d6707b978318fe0f356c8e1decb486cba2b)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #74 pc 000000000004c5d4 /system/lib64/libriru_CooWind.so (nativeForkSystemServerPost+32) (BuildId: f4440d6707b978318fe0f356c8e1decb486cba2b)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #75 pc 000000000000bbec /system/lib64/libmemtrack.so (BuildId: b057242d5c6d0ff1bc31a9c75ad7318f94273fe0)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #76 pc 00000000022eefec /system/framework/arm64/boot-framework.oat (art_jni_trampoline+252) (BuildId: c5407c051a8976843c5a4f334b50aaf4fa00e01d)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #77 pc 00000000022f5d0c /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.forkSystemServer+1340) (BuildId: c5407c051a8976843c5a4f334b50aaf4fa00e01d)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #78 pc 00000000022f6fe0 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+1952) (BuildId: c5407c051a8976843c5a4f334b50aaf4fa00e01d)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #79 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #80 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #81 pc 00000000004b0f40 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #82 pc 00000000004b0b30 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #83 pc 00000000003bb6b4 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+624) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.182 1742-1742/? A/DEBUG: #84 pc 00000000000c19ec /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: 8220b57e0c265b51b59e6f6ff54cd456)
2020-12-02 16:19:55.182 1742-1742/? A/DEBUG: #85 pc 00000000000c49b0 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+944) (BuildId: 8220b57e0c265b51b59e6f6ff54cd456)
2020-12-02 16:19:55.182 1742-1742/? A/DEBUG: #86 pc 00000000000035bc /system/bin/app_process64 (main+1388) (BuildId: 27cd9ba96bffd08740403a49d59f8818)
2020-12-02 16:19:55.182 1742-1742/? A/DEBUG: #87 pc 000000000007e978 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: 85ab2bc1ae7f4dbc4ee5d68f94085e8b)
2020-12-02 16:19:55.485 1742-1742/? E/MIUINDBG: miui_native_debug_process_O
The text was updated successfully, but these errors were encountered: