Open EddyDaddy opened 5 years ago
操作步骤如下: 1、启动demo 2、点击“我是主播” 3、点击“准备直播” 4、返回 若没有复现:可以重复步骤3、4 测试机子为:小米8 mate10 Android9.0的系统
Hi, have you solved this problem or anyway to work around?
hello, any work around?
操作步骤如下: 1、启动demo 2、点击“我是主播” 3、点击“准备直播” 4、返回 若没有复现:可以重复步骤3、4 测试机子为:小米8 mate10 Android9.0的系统
你好, 最後你怎樣解決這問題
这个问题我后来通过native hook解决了。用爱奇艺的xhook去hook pthread_mutex_destroy函数,在前面做一个保护就行了。 ` static int my_pthread_mutex_destroy(pthread_mutex_t mutex) { if ((((int32_t*)mutex) & 0x0000ffff) != 0x0000ffff) { return pthread_mutex_destroy(mutex); } return 0; }
void Java_xxxx_xxxx_fixAndroidPCrash( JNIEnv env, jclass clazz) { xhook_register(".\ksylive.so$", "pthread_mutex_destroy", (void *) my_pthread_mutex_destroy, NULL); xhook_refresh(1); } `
我这里写了一篇博客来记录修复的过程: https://blog.csdn.net/yutao52shi/article/details/105279652
我这里写了一篇博客来记录修复的过程: https://blog.csdn.net/yutao52shi/article/details/105279652
我这里写了一篇博客来记录修复的过程:https : //blog.csdn.net/yutao52shi/article/details/105279652
您好,您能分享一下您的方案吗?我看了您的博客,杜宇hook那块还是不太明白,我这边被这个问题困扰好久了,期待您的回复
我这里写了一篇博客来记录修复的过程: https://blog.csdn.net/yutao52shi/article/details/105279652
我这里写了一篇博客来记录修复的过程:https : //blog.csdn.net/yutao52shi/article/details/105279652
您好,您能分享一下您的方案吗?我看了您的博客,杜宇hook那块还是不太明白,我这边被这个问题困扰好久了,期待您的回复
我参考 @tbruceyu 这位老铁的文章https://blog.csdn.net/yutao52shi/article/details/105279652 尝试了一下,虽然没有解决闪退问题,但是成功hook调用到了native方法,有兴趣的可以看看 https://www.jianshu.com/p/3a585345b60c
hi @caiyoufei I follow your comment but unfortunately the problem can't be solved. might I know what have you done for overcome this problem?
hi @tbruceyu I read you blog but can't figure out how to solve the problem? could you explain me more in detail? what is the apm-remote-data-observer and what is it duty here?
hi @tbruceyu I read you blog but can't figure out how to solve the problem? could you explain me more in detail? what is the apm-remote-data-observer and what is it duty here?
I've created a repository for this issue. You can just visit https://github.com/tbruceyu/KSYStreamer_Android-fixpcrash for it. Good luck.
@tbruceyu 请教一下,
SDK名称 KSYLive_android SDK版本 v3.0.4 设备型号 samsung SM-M115F OS版本 Android 10
问题描述: 我也是第二次开启直播闪退crash 使用您的套件fixpcrash, 發布为apk 可以hook到错误, 并无报错。
但是打包aab,上架GooglePlay再下载安装, fixpcrash就失效了。 一样会出现pthread_mutex_destroy。 请问您能给我建议吗 一直找不到问题...
操作描述: 由GooglePlay下载安装, 第二次开启直播闪退。
附件: apk版本可hook到错误, 并且不会闪退
上架GooglePlay再下载安装, fixpcrash失效:
以下为程序配置:
@tbruceyu 请教一下,
SDK名称 KSYLive_android SDK版本 v3.0.4 设备型号 samsung SM-M115F OS版本 Android 10
问题描述: 我也是第二次开启直播闪退crash 使用您的套件fixpcrash, 發布为apk 可以hook到错误, 并无报错。
但是打包aab,上架GooglePlay再下载安装, fixpcrash就失效了。 一样会出现pthread_mutex_destroy。 请问您能给我建议吗 一直找不到问题...
操作描述: 由GooglePlay下载安装, 第二次开启直播闪退。
附件: apk版本可hook到错误, 并且不会闪退
上架GooglePlay再下载安装, fixpcrash失效:
以下为程序配置:
额,你是第一次运行就报错了吗?AAB我也不清楚。还得加日志看看有没有做这个Hook了
@tbruceyu
打包成aab上架的应用程式, 第二次运行才报错,
就像fixpcrash失效, 没有效果
@Chun-LaingChen I followed @tbruceyu solution and it works fine. No more crashes. However, this repo https://github.com/tbruceyu/KSYStreamer_Android-fixpcrash supports for armeabi-v7a only which might be a problem when distributing to other CPU ABIs.
On the crash devices, you could confirm if the libxhook.so is included in the apk using this tool and look for NATIVE LIBRARY PATH: https://play.google.com/store/apps/details?id=com.andatsoft.myapk.fwa
@Chun-LaingChen I followed @tbruceyu solution and it works fine. No more crashes. However, this repo https://github.com/tbruceyu/KSYStreamer_Android-fixpcrash supports for armeabi-v7a only which might be a problem when distributing to other CPU ABIs.
On the crash devices, you could confirm if the libxhook.so is included in the apk using this tool and look for NATIVE LIBRARY PATH: https://play.google.com/store/apps/details?id=com.andatsoft.myapk.fwa
I've submited a new commit to fix this.
Build fingerprint: 'Xiaomi/dipper/dipper:9/PKQ1.180729.001/V10.2.3.0.PEACNXM:user/release-keys' Revision: '0' ABI: 'arm' pid: 17540, tid: 17540, name: ksyun.live.demo >>> com.ksyun.live.demo <<< signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr -------- Abort message: 'FORTIFY: pthread_mutex_destroy called on a destroyed mutex (0xe60a6638)' r0 00000000 r1 00004484 r2 00000006 r3 00000008 r4 00004484 r5 00004484 r6 ffc9d79c r7 0000010c r8 00000000 r9 e60ce000 r10 ffc9d830 r11 e60ce000 ip ffc9d738 sp ffc9d788 lr e65b5139 pc e65ace56
backtrace:
00 pc 0001ce56 /system/lib/libc.so (abort+58)