android-hacker / VirtualXposed

A simple app to use Xposed without root, unlock the bootloader or modify system image, etc.
https://vxp.app
GNU General Public License v3.0
15.19k stars 2.47k forks source link

编译release版,应用启动不了 #1133

Open hzucmj opened 1 year ago

hzucmj commented 1 year ago

反馈BUG之前,先issue里面搜看看有没有别人已经反馈过,重复的不予处理!!

问题描述

编译生成Release版本出现以下报错,安装应用后启动不了。如果把debuggable开关设置为true,则可以正常启动,请问是什么原因?

09-07 00:13:07.918 15516 15516 F DEBUG : Process name is com.uwzbxmtske.yhlarp, not key_process 09-07 00:13:07.918 15516 15516 F DEBUG : keyProcess: 0 09-07 00:13:07.918 15516 15516 F DEBUG : 09-07 00:13:07.918 15516 15516 F DEBUG : Build fingerprint: 'OnePlus/OnePlus9Pro_CH/OnePlus9Pro:12/RKQ1.211119.001/R.202208261700:user/release-keys' 09-07 00:13:07.918 15516 15516 F DEBUG : Revision: '0' 09-07 00:13:07.918 15516 15516 F DEBUG : ABI: 'arm64' 09-07 00:13:07.918 15516 15516 F DEBUG : Timestamp: 2022-09-07 00:13:07.366759834+0800 09-07 00:13:07.918 15516 15516 F DEBUG : Process uptime: 0s 09-07 00:13:07.918 15516 15516 F DEBUG : Cmdline: com.uwzbxmtske.yhlarp 09-07 00:13:07.918 15516 15516 F DEBUG : pid: 15258, tid: 15258, name: zbxmtske.yhlarp >>> com.uwzbxmtske.yhlarp <<< 09-07 00:13:07.918 15516 15516 F DEBUG : uid: 11796 09-07 00:13:07.918 15516 15516 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x3b9a 09-07 00:13:07.918 15516 15516 F DEBUG : x0 b40000744baae500 x1 0000007febe8db30 x2 0000000000010006 x3 0000000000000000 09-07 00:13:07.918 15516 15516 F DEBUG : x4 0000000070147ae8 x5 0000007441e56bde x6 0000000000000dd8 x7 0000000000000010 09-07 00:13:07.918 15516 15516 F DEBUG : x8 f2c35c1a49c567a5 x9 f2c35c1a49c567a5 x10 000000000000002b x11 0000000000000001 09-07 00:13:07.918 15516 15516 F DEBUG : x12 00000074456ca654 x13 00000074456ca69c x14 00000074456ca6fc x15 0000000070d8cf50 09-07 00:13:07.918 15516 15516 F DEBUG : x16 00000073c87e9120 x17 00000073c87561e0 x18 00000074eb862000 x19 0000000000003b9a 09-07 00:13:07.918 15516 15516 F DEBUG : x20 00000074e185b990 x21 0000000012d788e0 x22 00000000132168a8 x23 0000000000000000 09-07 00:13:07.918 15516 15516 F DEBUG : x24 0000000070d8cf50 x25 000000001323eb38 x26 00000000700ab2f8 x27 000000001323e0c0 09-07 00:13:07.918 15516 15516 F DEBUG : x28 0000000000003b9a x29 0000007febe8db90 09-07 00:13:07.918 15516 15516 F DEBUG : lr 00000073c8750ca0 sp 0000007febe8db80 pc 00000073c8750ca0 pst 0000000060001000 09-07 00:13:07.918 15516 15516 F DEBUG : backtrace: 09-07 00:13:07.918 15516 15516 F DEBUG : #00 pc 000000000004eca0 /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/lib/arm64/libva++.so (getCallingUid(facebook::jni::alias_ref<_jclass>)+40) (BuildId: a6a6e090c3e9d731a55644b43ad0d903bf373df6) 09-07 00:13:07.918 15516 15516 F DEBUG : #01 pc 000000000036c31c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.ContextImpl.createAppContext+412) 09-07 00:13:07.918 15516 15516 F DEBUG : #02 pc 0000000000262f60 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.LoadedApk.makeApplication+768) 09-07 00:13:07.918 15516 15516 F DEBUG : #03 pc 00000000002ca764 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #04 pc 000000000035b658 /apex/com.android.art/lib64/libart.so (_jobject art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jobject, _jobject, unsigned long)+744) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #05 pc 000000000035b348 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv, _jobject, _jobject, _jobjectArray)+52) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #06 pc 00000000000b2f74 /apex/com.android.art/javalib/arm64/boot.oat (art_jni_trampoline+132) (BuildId: ad9ee401645a5135206a62ff86fc2ef5cdc29120) 09-07 00:13:07.918 15516 15516 F DEBUG : #07 pc 0000000000184804 /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.odex (mirror.RefMethod.call+84) 09-07 00:13:07.918 15516 15516 F DEBUG : #08 pc 000000000020a0a0 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #09 pc 000000000035ec6a /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.vdex (com.lody.virtual.client.VClientImpl.bindApplicationNoCheck+1148) 09-07 00:13:07.918 8495 8621 E loros.gallery3: Invalid ID 0x00000000. 09-07 00:13:07.918 15516 15516 F DEBUG : #10 pc 000000000020a044 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #11 pc 000000000035e79e /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.vdex (com.lody.virtual.client.VClientImpl.bindApplication+30) 09-07 00:13:07.918 15516 15516 F DEBUG : #12 pc 000000000020a044 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #13 pc 000000000035e7e0 /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.vdex (com.lody.virtual.client.VClientImpl.bindApplicationForActivity+12) 09-07 00:13:07.918 15516 15516 F DEBUG : #14 pc 00000000002ca764 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #15 pc 00000000002ee6b0 /apex/com.android.art/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+312) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #16 pc 00000000002ed4fc /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false, true>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+1480) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #17 pc 00000000002c0fbc /apex/com.android.art/lib64/libart.so (MterpInvokeVirtual+5660) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #18 pc 00000000002c4e94 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #19 pc 00000000001df75a /data/app/~~IHmUzHlIaefVgMvvmxMm3A==/io.va.exposed64-_kgE76sWUOBmvs5gpQ99nw==/oat/arm64/base.vdex (android.app.TransactionHandlerProxy.handleLaunchActivity+226) 09-07 00:13:07.918 15516 15516 F DEBUG : #20 pc 000000000027d840 /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.llvm.3351068054637636664)+644) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #21 pc 000000000027c9e8 /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+1176) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #22 pc 00000000002d4178 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #23 pc 0000000000521c28 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.servertransaction.LaunchActivityItem.execute+168) 09-07 00:13:07.918 15516 15516 F DEBUG : #24 pc 0000000000284264 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.servertransaction.TransactionExecutor.executeCallbacks+1972) 09-07 00:13:07.918 15516 15516 F DEBUG : #25 pc 00000000002839fc /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.servertransaction.TransactionExecutor.execute+988) 09-07 00:13:07.918 15516 15516 F DEBUG : #26 pc 0000000000338d04 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.ActivityThread$H.handleMessage+1428) 09-07 00:13:07.918 15516 15516 F DEBUG : #27 pc 000000000058598c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.os.Handler.dispatchMessage+188) 09-07 00:13:07.918 15516 15516 F DEBUG : #28 pc 00000000005889b8 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.os.Looper.loopOnce+1384) 09-07 00:13:07.918 15516 15516 F DEBUG : #29 pc 000000000058839c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.os.Looper.loop+604) 09-07 00:13:07.918 15516 15516 F DEBUG : #30 pc 000000000034ea10 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (android.app.ActivityThread.main+928) 09-07 00:13:07.918 15516 15516 F DEBUG : #31 pc 00000000002ca9e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #32 pc 000000000035b5d0 /apex/com.android.art/lib64/libart.so (_jobject art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jobject, _jobject, unsigned long)+608) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #33 pc 000000000035b348 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv, _jobject, _jobject, _jobjectArray)+52) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #34 pc 00000000000b2f74 /apex/com.android.art/javalib/arm64/boot.oat (art_jni_trampoline+132) (BuildId: ad9ee401645a5135206a62ff86fc2ef5cdc29120) 09-07 00:13:07.918 15516 15516 F DEBUG : #35 pc 00000000008cd51c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+140) 09-07 00:13:07.918 15516 15516 F DEBUG : #36 pc 00000000008d5ec0 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+2800) 09-07 00:13:07.918 15516 15516 F DEBUG : #37 pc 00000000002ca9e8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #38 pc 000000000044ca04 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jmethodID, std::__va_list)+464) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #39 pc 000000000062cf30 /apex/com.android.art/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv, _jclass, _jmethodID, std::__va_list)+268) (BuildId: 34e3dd028e2e682b63a512d6a4f1b5eb) 09-07 00:13:07.918 15516 15516 F DEBUG : #40 pc 00000000000b2bf8 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass, _jmethodID, ...)+124) (BuildId: 160cc0219f19ffc9217dc99af81a87d5) 09-07 00:13:07.918 15516 15516 F DEBUG : #41 pc 00000000000bf0fc /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector const&, bool)+840) (BuildId: 160cc0219f19ffc9217dc99af81a87d5) 09-07 00:13:07.918 15516 15516 F DEBUG : #42 pc 0000000000002684 /system/bin/app_process64 (main+1580) (BuildId: b66800b6ac5d87b7c521c256d6340555) 09-07 00:13:07.918 15516 15516 F DEBUG : #43 pc 00000000000720c4 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+100) (BuildId: bbbdeb7c87c74f1491f92c6e605095b0)

复现步骤

(请分步骤描述如何复现这个BUG,非毕现BUG请给出如何能大概率复现的步骤)

环境

机型: 系统版本:Android 12 ROM版本:(请区分内测版和开发版稳定版,除稳定版本外不予修复) Xposed 插件以及插件版本: VirtualXposed版本:0.22.0

补充

(别的需要描述的内容)

写完之后,请自己再读一遍自己写的,如果你自己都读不懂,就不用说修复了