pxb1988 / dex2jar

Tools to work with android .dex and java .class files
Apache License 2.0
12.06k stars 2.09k forks source link

java8 lambda not support #524

Open h634462445 opened 2 years ago

h634462445 commented 2 years ago

The dex contain lambda expressions in java。 the code is : private void test() { new Thread(()-> System.out.println("hello world")).start(); }

I use d2j-dex2jar.bat to translate dex file to jar file。

when invoke the test() method ,it occur exception 。 log is below:

2022-01-28 11:19:30.961 30579-30579/? I/crash_dump64: performing dump of process 30386 (target tid = 30386) 2022-01-28 11:19:30.982 30579-30579/? A/DEBUG: 2022-01-28 11:19:30.983 30579-30579/? A/DEBUG: Build fingerprint: 'HUAWEI/MHA-AL00/HWMHA:9/HUAWEIMHA-AL00/9.1.0.228C00:user/release-keys' 2022-01-28 11:19:30.983 30579-30579/? A/DEBUG: Revision: '0' 2022-01-28 11:19:30.983 30579-30579/? A/DEBUG: ABI: 'arm64' 2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: Happend: 'Fri Jan 28 11:19:30 2022 ' 2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: SYSVMTYPE: Art APPVMTYPE: Art 2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: pid: 30386, tid: 30386, name: com.gzyy.qqyxol >>> com.gzyy.qqyxol <<< 2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x40 2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: Cause: null pointer dereference 2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x0 0000000012c87180 x1 0000000000000000 x2 000000785c400000 x3 0000000000000006 2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x4 000000000000006c x5 0000000072cebdb4 x6 1f3963646b686065 x7 7f7f7f7f7f7f7f7f 2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x8 000000787ae15c00 x9 0000007fc0ef9258 x10 0000000000000070 x11 0000000000000001 2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x12 0000000000000001 x13 0000000000000084 x14 0000000000000000 x15 0000000000000002 2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x16 00000078fcbb3bd8 x17 00000078fcb4822c x18 0000000012c895b0 x19 0000000000000000 2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x20 00000078710a988c x21 0000000000000000 x22 0000000012c87180 x23 0000000012ea6418 2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x24 000000787adc4300 x25 00000000000071fb x26 0000000012ea6418 x27 0000000012ea6418 2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: x28 000000787adc4ed8 x29 0000007fc0ef8a00 2022-01-28 11:19:30.984 30579-30579/? A/DEBUG: sp 0000007fc0ef89d0 lr 000000787a9e2cfc pc 000000787a9ed3c8 2022-01-28 11:19:30.999 643-643/? E/WifiHAL: enter wifi_get_link_stats 2022-01-28 11:19:31.012 1188-1543/? E/WificondControl: Noise: -92, Snr: 0, Chload: -1 2022-01-28 11:19:31.019 1188-1599/? I/WifiService: getConnectionInfo uid=1000 2022-01-28 11:19:31.019 1188-1598/? I/WifiService: getConnectionInfo uid=1000 2022-01-28 11:19:31.020 1188-1600/? I/WifiService: getConnectionInfo uid=1000 2022-01-28 11:19:31.020 1188-9164/? I/WifiService: getConnectionInfo uid=1000 2022-01-28 11:19:31.020 1188-2471/? I/WifiService: getConnectionInfo uid=1000 2022-01-28 11:19:31.021 1188-1542/? I/QosMonitor: queryRtt: rtt_type = 3 2022-01-28 11:19:31.022 1188-2474/? I/WifiService: getConnectionInfo uid=10034 2022-01-28 11:19:31.022 1188-1542/? I/QosMonitor: postEventFromNative: msg=100,arg1=4,arg2=10 2022-01-28 11:19:31.023 1188-2471/? I/WifiService: getConnectionInfo uid=1000 2022-01-28 11:19:31.023 1188-2474/? I/WifiService: getConnectionInfo uid=10034 2022-01-28 11:19:31.024 1829-2003/? E/HwWifiStatStore: updateLinkSpeed linkSpeed =65 lastSpdLev=2 index=2 2022-01-28 11:19:31.027 1846-2960/? I/HwNaturalBase: [Timer-0]: MultiUserManagerService: getNotActiveUser start 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: backtrace: 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #00 pc 000000000028e3c8 /system/lib64/libart.so (_ZN3art6mirror6Object18VerifierInstanceOfILNS_17VerifyObjectFlagsE0EEEbNS_6ObjPtrINS0_5ClassEEE+24) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #01 pc 0000000000283cf8 /system/lib64/libart.so (_ZN3art11interpreter10DoFieldPutILNS_13FindFieldTypeE5ELNS_9Primitive4TypeE0ELb1ELb0EEEbPNS_6ThreadERKNS_11ShadowFrameEPKNS_11InstructionEt+1196) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #02 pc 00000000002a1060 /system/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<true, false>(art::interpreter::SwitchImplContext)+71064) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #03 pc 000000000058bf38 /system/lib64/libart.so (ExecuteSwitchImplAsm+8) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #04 pc 0000000000410218 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.gzyy.qqyxol-hhWjA2BSiZUkFi82n-HGQ==/base.apk (deleted) (com.cp.sdk.demo.$$Lambda$MainActivity$khQ2cUOPQGiIiU9G_4hMFk5QRkA.) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #05 pc 0000000000260b74 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+392) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #06 pc 0000000000533b90 /system/lib64/libart.so (artQuickToInterpreterBridge+1020) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #07 pc 00000000005896fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #08 pc 000000000058084c /system/lib64/libart.so (art_quick_invoke_static_stub+604) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #09 pc 00000000000d8628 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+232) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #10 pc 000000000013088c /system/lib64/libart.so (art::ClassLinker::InitializeClass(art::Thread, art::Handle, bool, bool)+2196) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #11 pc 000000000011bb78 /system/lib64/libart.so (art::ClassLinker::EnsureInitialized(art::Thread, art::Handle, bool, bool)+192) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #12 pc 000000000054d3e4 /system/lib64/libart.so (MterpGetObjStatic+332) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #13 pc 0000000000572690 /system/lib64/libart.so (ExecuteMterpImpl+12688) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #14 pc 00000000004101f4 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.gzyy.qqyxol-hhWjA2BSiZUkFi82n-HG_Q==/base.apk (deleted) (com.cp.sdk.demo.MainActivity.test+4) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #15 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #16 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #17 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #18 pc 0000000000548f3c /system/lib64/libart.so (MterpInvokeDirect+296) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #19 pc 0000000000572d94 /system/lib64/libart.so (ExecuteMterpImpl+14484) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #20 pc 000000000040fae0 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.gzyy.qqyxol-hhWjA2BSiZUkFi82n-HG_Q==/base.apk (deleted) (com.cp.sdk.demo.MainActivity.logout) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #21 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #22 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #23 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #24 pc 0000000000547bf8 /system/lib64/libart.so (MterpInvokeVirtual+588) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #25 pc 0000000000572c94 /system/lib64/libart.so (ExecuteMterpImpl+14228) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #26 pc 000000000040fbae /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.gzyy.qqyxol-hhWjA2BSiZUkFi82n-HG_Q==/base.apk (deleted) (com.cp.sdk.demo.MainActivity.onClick+50) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #27 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #28 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #29 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #30 pc 00000000005489b4 /system/lib64/libart.so (MterpInvokeInterface+944) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #31 pc 0000000000572e94 /system/lib64/libart.so (ExecuteMterpImpl+14740) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #32 pc 0000000000bf6552 /system/framework/boot-framework.vdex (android.view.View.performClick+78) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #33 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #34 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #35 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #36 pc 0000000000547bf8 /system/lib64/libart.so (MterpInvokeVirtual+588) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #37 pc 0000000000572c94 /system/lib64/libart.so (ExecuteMterpImpl+14228) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #38 pc 0000000000bf65b6 /system/framework/boot-framework.vdex (android.view.View.performClickInternal+6) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #39 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #40 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #41 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #42 pc 0000000000548f3c /system/lib64/libart.so (MterpInvokeDirect+296) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #43 pc 0000000000572d94 /system/lib64/libart.so (ExecuteMterpImpl+14484) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #44 pc 0000000000d93e4a /system/framework/boot-framework.vdex (android.view.View.access$3100) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #45 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #46 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #47 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #48 pc 0000000000549100 /system/lib64/libart.so (MterpInvokeStatic+204) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #49 pc 0000000000572e14 /system/lib64/libart.so (ExecuteMterpImpl+14612) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #50 pc 0000000000be1c00 /system/framework/boot-framework.vdex (android.view.View$PerformClick.run+18) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #51 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #52 pc 0000000000533b90 /system/lib64/libart.so (artQuickToInterpreterBridge+1020) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #53 pc 00000000005896fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #54 pc 000000000004adb0 /dev/ashmem/dalvik-jit-code-cache (deleted) (android.os.Handler.handleCallback+64) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #55 pc 000000000004c51c /dev/ashmem/dalvik-jit-code-cache (deleted) (android.os.Handler.dispatchMessage+60) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #56 pc 0000000000580588 /system/lib64/libart.so (art_quick_invoke_stub+584) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #57 pc 00000000000d8608 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+200) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #58 pc 000000000028cec8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+344) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #59 pc 0000000000286ed0 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+968) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #60 pc 0000000000547bf8 /system/lib64/libart.so (MterpInvokeVirtual+588) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #61 pc 0000000000572c94 /system/lib64/libart.so (ExecuteMterpImpl+14228) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #62 pc 0000000000b51a94 /system/framework/boot-framework.vdex (android.os.Looper.loop+498) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #63 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #64 pc 00000000002666c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #65 pc 0000000000286eb4 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #66 pc 0000000000549100 /system/lib64/libart.so (MterpInvokeStatic+204) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #67 pc 0000000000572e14 /system/lib64/libart.so (ExecuteMterpImpl+14612) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #68 pc 00000000003defdc /system/framework/boot-framework.vdex (android.app.ActivityThread.main+428) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #69 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #70 pc 0000000000533b90 /system/lib64/libart.so (artQuickToInterpreterBridge+1020) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #71 pc 00000000005896fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #72 pc 000000000058084c /system/lib64/libart.so (art_quick_invoke_static_stub+604) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #73 pc 00000000000d8628 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+232) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #74 pc 000000000047b3e8 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod, art::(anonymous namespace)::ArgArray, art::JValue, char const)+104) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #75 pc 000000000047ce3c /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jobject, _jobject, unsigned long)+1440) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #76 pc 000000000040c5a4 /system/lib64/libart.so (art::Method_invoke(_JNIEnv, _jobject, _jobject, _jobjectArray)+52) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #77 pc 00000000001456d4 /system/framework/arm64/boot.oat (offset 0x13b000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #78 pc 0000000000580588 /system/lib64/libart.so (art_quick_invoke_stub+584) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #79 pc 00000000000d8608 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+200) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #80 pc 000000000028cec8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+344) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #81 pc 0000000000286ed0 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+968) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #82 pc 0000000000547bf8 /system/lib64/libart.so (MterpInvokeVirtual+588) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #83 pc 0000000000572c94 /system/lib64/libart.so (ExecuteMterpImpl+14228) 2022-01-28 11:19:31.168 30579-30579/? A/DEBUG: #84 pc 0000000001231b80 /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22) 2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #85 pc 0000000000260bd4 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.4179671085+488) 2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #86 pc 0000000000533b90 /system/lib64/libart.so (artQuickToInterpreterBridge+1020) 2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #87 pc 00000000005896fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) 2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #88 pc 0000000000ee3e3c /system/framework/arm64/boot-framework.oat (offset 0x415000) (com.android.internal.os.ZygoteInit.main+2540) 2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #89 pc 000000000058084c /system/lib64/libart.so (art_quick_invoke_static_stub+604) 2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #90 pc 00000000000d8628 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+232) 2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #91 pc 000000000047b3e8 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod, art::(anonymous namespace)::ArgArray, art::JValue, char const)+104) 2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #92 pc 000000000047b048 /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jmethodID, std::__va_list)+424) 2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #93 pc 0000000000370200 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv, _jclass, _jmethodID, std::__va_list)+660) 2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #94 pc 00000000000b9bcc /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass, _jmethodID, ...)+120) 2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #95 pc 00000000000bc944 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector const&, bool)+780) 2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #96 pc 0000000000002368 /system/bin/app_process64 (main+1444) 2022-01-28 11:19:31.169 30579-30579/? A/DEBUG: #97 pc 00000000000aecc8 /system/lib64/libc.so (__libc_init+88) 2022-01-28 11:19:31.383 770-3206/? E/LOGSERVER_UTILS: [Erecovery]readEvent: eRecEventManager readEvent 0 2022-01-28 11:19:31.512 1188-30582/? W/ActivityManager: finishTopCrashedActivityLocked Force finishing activity com.gzyy.qqyxol/com.cp.sdk.demo.MainActivity 2022-01-28 11:19:31.512 772-772/? E//system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_03

SerendipityKim commented 1 year ago

do you resolve this,now