canyie/pine

Trampoline code crashes with "Illegal instruction" on WearOS

fankes opened this issue · 5 comments

Pine 在 Wear OS 上 Hook 任意方法会发生这个问题

2022-03-08 00:29:15.546 4944-4944/? A/libc: Fatal signal 4 (SIGILL), code 1 (ILL_ILLOPC), fault addr 0xb322e020 in tid 4944 (able.purereader), pid 4944 (able.purereader)
2022-03-08 00:29:15.853 4968-4968/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2022-03-08 00:29:15.853 4968-4968/? A/DEBUG: Build fingerprint: 'Xiaomi/baiji_sw/baiji:9/PXDP.210508.001.XM129/PXDP.210508.001.XM129:user/release-keys'
2022-03-08 00:29:15.853 4968-4968/? A/DEBUG: Revision: '0'
2022-03-08 00:29:15.854 4968-4968/? A/DEBUG: ABI: 'arm'
2022-03-08 00:29:15.854 4968-4968/? A/DEBUG: pid: 4944, tid: 4944, name: able.purereader  >>> com.highcapable.purereader <<<
2022-03-08 00:29:15.854 4968-4968/? A/DEBUG: signal 4 (SIGILL), code 1 (ILL_ILLOPC), fault addr 0xb322e020
2022-03-08 00:29:15.854 4968-4968/? A/DEBUG:     r0  00000000  r1  bef8b480  r2  bef8b46c  r3  bef8b510
2022-03-08 00:29:15.854 4968-4968/? A/DEBUG:     r4  70ebfb78  r5  7399103d  r6  00000000  r7  bef8b608
2022-03-08 00:29:15.854 4968-4968/? A/DEBUG:     r8  00000000  r9  b3fb6000  r10 00000000  r11 bef8b3a4
2022-03-08 00:29:15.854 4968-4968/? A/DEBUG:     ip  ab2f02b0  sp  bef8b3a0  lr  b0a0d377  pc  b322e020
2022-03-08 00:29:17.125 4968-4968/? A/DEBUG: backtrace:
2022-03-08 00:29:17.125 4968-4968/? A/DEBUG:     #00 pc 00000020  [anon:pine codes:b322e000]
2022-03-08 00:29:17.126 4968-4968/? A/DEBUG:     #01 pc 00417375  /system/lib/libart.so (offset 0x1a5000) (art_quick_invoke_stub_internal+68)
2022-03-08 00:29:17.126 4968-4968/? A/DEBUG:     #02 pc 003f0b27  /system/lib/libart.so (offset 0x1a5000) (art_quick_invoke_static_stub+222)
2022-03-08 00:29:17.126 4968-4968/? A/DEBUG:     #03 pc 000a103b  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2022-03-08 00:29:17.126 4968-4968/? A/DEBUG:     #04 pc 001e84b5  /system/lib/libart.so (offset 0x1a5000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+232)
2022-03-08 00:29:17.126 4968-4968/? A/DEBUG:     #05 pc 001e3195  /system/lib/libart.so (offset 0x1a5000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+776)
2022-03-08 00:29:17.126 4968-4968/? A/DEBUG:     #06 pc 003ec623  /system/lib/libart.so (offset 0x1a5000) (MterpInvokeStatic+130)
2022-03-08 00:29:17.126 4968-4968/? A/DEBUG:     #07 pc 0040a294  /system/lib/libart.so (offset 0x1a5000) (ExecuteMterpImpl+14612)
2022-03-08 00:29:17.126 4968-4968/? A/DEBUG:     #08 pc 002821e6  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.highcapable.purereader-Ad-Tcb-ab936hZvTZ3btaw==/base.apk (deleted) (androidx.core.content.FileProvider.parsePathStrategy+210)
2022-03-08 00:29:17.126 4968-4968/? A/DEBUG:     #09 pc 001c7b0d  /system/lib/libart.so (offset 0x1a5000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2198965044+352)
2022-03-08 00:29:17.126 4968-4968/? A/DEBUG:     #10 pc 001cc3db  /system/lib/libart.so (offset 0x1a5000) (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2022-03-08 00:29:17.127 4968-4968/? A/DEBUG:     #11 pc 001e317f  /system/lib/libart.so (offset 0x1a5000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2022-03-08 00:29:17.127 4968-4968/? A/DEBUG:     #12 pc 003ec623  /system/lib/libart.so (offset 0x1a5000) (MterpInvokeStatic+130)
2022-03-08 00:29:17.127 4968-4968/? A/DEBUG:     #13 pc 0040a294  /system/lib/libart.so (offset 0x1a5000) (ExecuteMterpImpl+14612)
2022-03-08 00:29:17.127 4968-4968/? A/DEBUG:     #14 pc 0028209a  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.highcapable.purereader-Ad-Tcb-ab936hZvTZ3btaw==/base.apk (deleted) (androidx.core.content.FileProvider.getPathStrategy+26)
2022-03-08 00:29:17.127 4968-4968/? A/DEBUG:     #15 pc 001c7b0d  /system/lib/libart.so (offset 0x1a5000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2198965044+352)
2022-03-08 00:29:17.127 4968-4968/? A/DEBUG:     #16 pc 001cc3db  /system/lib/libart.so (offset 0x1a5000) (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2022-03-08 00:29:17.127 4968-4968/? A/DEBUG:     #17 pc 001e317f  /system/lib/libart.so (offset 0x1a5000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2022-03-08 00:29:17.127 4968-4968/? A/DEBUG:     #18 pc 003ec623  /system/lib/libart.so (offset 0x1a5000) (MterpInvokeStatic+130)
2022-03-08 00:29:17.128 4968-4968/? A/DEBUG:     #19 pc 0040a294  /system/lib/libart.so (offset 0x1a5000) (ExecuteMterpImpl+14612)
2022-03-08 00:29:17.128 4968-4968/? A/DEBUG:     #20 pc 0028255c  /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/com.highcapable.purereader-Ad-Tcb-ab936hZvTZ3btaw==/base.apk (deleted) (androidx.core.content.FileProvider.attachInfo+44)
2022-03-08 00:29:17.129 4968-4968/? A/DEBUG:     #21 pc 001c7b0d  /system/lib/libart.so (offset 0x1a5000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2198965044+352)
2022-03-08 00:29:17.129 4968-4968/? A/DEBUG:     #22 pc 001cc3db  /system/lib/libart.so (offset 0x1a5000) (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2022-03-08 00:29:17.129 4968-4968/? A/DEBUG:     #23 pc 001e317f  /system/lib/libart.so (offset 0x1a5000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2022-03-08 00:29:17.129 4968-4968/? A/DEBUG:     #24 pc 003eb647  /system/lib/libart.so (offset 0x1a5000) (MterpInvokeVirtual+442)
2022-03-08 00:29:17.129 4968-4968/? A/DEBUG:     #25 pc 0040a114  /system/lib/libart.so (offset 0x1a5000) (ExecuteMterpImpl+14228)
2022-03-08 00:29:17.129 4968-4968/? A/DEBUG:     #26 pc 0038501a  /system/framework/boot-framework.vdex (android.app.ActivityThread.installProvider+494)
2022-03-08 00:29:17.129 4968-4968/? A/DEBUG:     #27 pc 001c7b0d  /system/lib/libart.so (offset 0x1a5000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2198965044+352)
2022-03-08 00:29:17.129 4968-4968/? A/DEBUG:     #28 pc 001cc3db  /system/lib/libart.so (offset 0x1a5000) (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2022-03-08 00:29:17.129 4968-4968/? A/DEBUG:     #29 pc 001e3ff7  /system/lib/libart.so (offset 0x1a5000) (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+674)
2022-03-08 00:29:17.129 4968-4968/? A/DEBUG:     #30 pc 003ed71b  /system/lib/libart.so (offset 0x1a5000) (MterpInvokeDirectRange+170)
2022-03-08 00:29:17.129 4968-4968/? A/DEBUG:     #31 pc 0040a514  /system/lib/libart.so (offset 0x1a5000) (ExecuteMterpImpl+15252)
2022-03-08 00:29:17.130 4968-4968/? A/DEBUG:     #32 pc 0038929a  /system/framework/boot-framework.vdex (android.app.ActivityThread.installContentProviders+56)
2022-03-08 00:29:17.130 4968-4968/? A/DEBUG:     #33 pc 001c7b0d  /system/lib/libart.so (offset 0x1a5000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2198965044+352)
2022-03-08 00:29:17.130 4968-4968/? A/DEBUG:     #34 pc 001cc3db  /system/lib/libart.so (offset 0x1a5000) (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2022-03-08 00:29:17.130 4968-4968/? A/DEBUG:     #35 pc 001e317f  /system/lib/libart.so (offset 0x1a5000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2022-03-08 00:29:17.130 4968-4968/? A/DEBUG:     #36 pc 003ec4d9  /system/lib/libart.so (offset 0x1a5000) (MterpInvokeDirect+196)
2022-03-08 00:29:17.130 4968-4968/? A/DEBUG:     #37 pc 0040a214  /system/lib/libart.so (offset 0x1a5000) (ExecuteMterpImpl+14484)
2022-03-08 00:29:17.130 4968-4968/? A/DEBUG:     #38 pc 00387210  /system/framework/boot-framework.vdex (android.app.ActivityThread.handleBindApplication+2162)
2022-03-08 00:29:17.131 4968-4968/? A/DEBUG:     #39 pc 001c7b0d  /system/lib/libart.so (offset 0x1a5000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2198965044+352)
2022-03-08 00:29:17.131 4968-4968/? A/DEBUG:     #40 pc 001cc3db  /system/lib/libart.so (offset 0x1a5000) (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2022-03-08 00:29:17.131 4968-4968/? A/DEBUG:     #41 pc 001e317f  /system/lib/libart.so (offset 0x1a5000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2022-03-08 00:29:17.131 4968-4968/? A/DEBUG:     #42 pc 003ec4d9  /system/lib/libart.so (offset 0x1a5000) (MterpInvokeDirect+196)
2022-03-08 00:29:17.131 4968-4968/? A/DEBUG:     #43 pc 0040a214  /system/lib/libart.so (offset 0x1a5000) (ExecuteMterpImpl+14484)
2022-03-08 00:29:17.131 4968-4968/? A/DEBUG:     #44 pc 004bae64  /system/framework/boot-framework.vdex (android.app.ActivityThread.access$1100)
2022-03-08 00:29:17.131 4968-4968/? A/DEBUG:     #45 pc 001c7b0d  /system/lib/libart.so (offset 0x1a5000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2198965044+352)
2022-03-08 00:29:17.131 4968-4968/? A/DEBUG:     #46 pc 001cc3db  /system/lib/libart.so (offset 0x1a5000) (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2022-03-08 00:29:17.131 4968-4968/? A/DEBUG:     #47 pc 001e317f  /system/lib/libart.so (offset 0x1a5000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2022-03-08 00:29:17.131 4968-4968/? A/DEBUG:     #48 pc 003ec623  /system/lib/libart.so (offset 0x1a5000) (MterpInvokeStatic+130)
2022-03-08 00:29:17.132 4968-4968/? A/DEBUG:     #49 pc 0040a294  /system/lib/libart.so (offset 0x1a5000) (ExecuteMterpImpl+14612)
2022-03-08 00:29:17.132 4968-4968/? A/DEBUG:     #50 pc 00383f12  /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+1398)
2022-03-08 00:29:17.132 4968-4968/? A/DEBUG:     #51 pc 001c7b0d  /system/lib/libart.so (offset 0x1a5000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2198965044+352)
2022-03-08 00:29:17.132 4968-4968/? A/DEBUG:     #52 pc 001cc3db  /system/lib/libart.so (offset 0x1a5000) (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2022-03-08 00:29:17.132 4968-4968/? A/DEBUG:     #53 pc 001e317f  /system/lib/libart.so (offset 0x1a5000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2022-03-08 00:29:17.132 4968-4968/? A/DEBUG:     #54 pc 003eb647  /system/lib/libart.so (offset 0x1a5000) (MterpInvokeVirtual+442)
2022-03-08 00:29:17.132 4968-4968/? A/DEBUG:     #55 pc 0040a114  /system/lib/libart.so (offset 0x1a5000) (ExecuteMterpImpl+14228)
2022-03-08 00:29:17.132 4968-4968/? A/DEBUG:     #56 pc 00af044a  /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42)
2022-03-08 00:29:17.132 4968-4968/? A/DEBUG:     #57 pc 001c7b0d  /system/lib/libart.so (offset 0x1a5000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2198965044+352)
2022-03-08 00:29:17.132 4968-4968/? A/DEBUG:     #58 pc 001cc3db  /system/lib/libart.so (offset 0x1a5000) (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2022-03-08 00:29:17.132 4968-4968/? A/DEBUG:     #59 pc 001e317f  /system/lib/libart.so (offset 0x1a5000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2022-03-08 00:29:17.133 4968-4968/? A/DEBUG:     #60 pc 003eb647  /system/lib/libart.so (offset 0x1a5000) (MterpInvokeVirtual+442)
2022-03-08 00:29:17.133 4968-4968/? A/DEBUG:     #61 pc 0040a114  /system/lib/libart.so (offset 0x1a5000) (ExecuteMterpImpl+14228)
2022-03-08 00:29:17.133 4968-4968/? A/DEBUG:     #62 pc 00af7550  /system/framework/boot-framework.vdex (android.os.Looper.loop+404)
2022-03-08 00:29:17.133 4968-4968/? A/DEBUG:     #63 pc 001c7b0d  /system/lib/libart.so (offset 0x1a5000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2198965044+352)
2022-03-08 00:29:17.133 4968-4968/? A/DEBUG:     #64 pc 001cc3db  /system/lib/libart.so (offset 0x1a5000) (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2022-03-08 00:29:17.133 4968-4968/? A/DEBUG:     #65 pc 001e317f  /system/lib/libart.so (offset 0x1a5000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2022-03-08 00:29:17.133 4968-4968/? A/DEBUG:     #66 pc 003ec623  /system/lib/libart.so (offset 0x1a5000) (MterpInvokeStatic+130)
2022-03-08 00:29:17.133 4968-4968/? A/DEBUG:     #67 pc 0040a294  /system/lib/libart.so (offset 0x1a5000) (ExecuteMterpImpl+14612)
2022-03-08 00:29:17.133 4968-4968/? A/DEBUG:     #68 pc 0038949e  /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214)
2022-03-08 00:29:17.133 4968-4968/? A/DEBUG:     #69 pc 001c7b0d  /system/lib/libart.so (offset 0x1a5000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2198965044+352)
2022-03-08 00:29:17.133 4968-4968/? A/DEBUG:     #70 pc 001cc327  /system/lib/libart.so (offset 0x1a5000) (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
2022-03-08 00:29:17.133 4968-4968/? A/DEBUG:     #71 pc 003dee8b  /system/lib/libart.so (offset 0x1a5000) (artQuickToInterpreterBridge+890)
2022-03-08 00:29:17.134 4968-4968/? A/DEBUG:     #72 pc 0041b8ff  /system/lib/libart.so (offset 0x1a5000) (art_quick_to_interpreter_bridge+30)
2022-03-08 00:29:17.134 4968-4968/? A/DEBUG:     #73 pc 00417375  /system/lib/libart.so (offset 0x1a5000) (art_quick_invoke_stub_internal+68)
2022-03-08 00:29:17.134 4968-4968/? A/DEBUG:     #74 pc 003f0b27  /system/lib/libart.so (offset 0x1a5000) (art_quick_invoke_static_stub+222)
2022-03-08 00:29:17.134 4968-4968/? A/DEBUG:     #75 pc 000a103b  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2022-03-08 00:29:17.134 4968-4968/? A/DEBUG:     #76 pc 0035015d  /system/lib/libart.so (offset 0x1a5000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2022-03-08 00:29:17.134 4968-4968/? A/DEBUG:     #77 pc 003515a5  /system/lib/libart.so (offset 0x1a5000) (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned int)+960)
2022-03-08 00:29:17.135 4968-4968/? A/DEBUG:     #78 pc 003022c1  /system/lib/libart.so (offset 0x1a5000) (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+40)
2022-03-08 00:29:17.135 4968-4968/? A/DEBUG:     #79 pc 001121f7  /system/framework/arm/boot.oat (offset 0x10c000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+110)
2022-03-08 00:29:17.135 4968-4968/? A/DEBUG:     #80 pc 00417375  /system/lib/libart.so (offset 0x1a5000) (art_quick_invoke_stub_internal+68)
2022-03-08 00:29:17.135 4968-4968/? A/DEBUG:     #81 pc 003f0a23  /system/lib/libart.so (offset 0x1a5000) (art_quick_invoke_stub+226)
2022-03-08 00:29:17.135 4968-4968/? A/DEBUG:     #82 pc 000a1029  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
2022-03-08 00:29:17.135 4968-4968/? A/DEBUG:     #83 pc 001e84b5  /system/lib/libart.so (offset 0x1a5000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+232)
2022-03-08 00:29:17.135 4968-4968/? A/DEBUG:     #84 pc 001e3195  /system/lib/libart.so (offset 0x1a5000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+776)
2022-03-08 00:29:17.135 4968-4968/? A/DEBUG:     #85 pc 003eb647  /system/lib/libart.so (offset 0x1a5000) (MterpInvokeVirtual+442)
2022-03-08 00:29:17.135 4968-4968/? A/DEBUG:     #86 pc 0040a114  /system/lib/libart.so (offset 0x1a5000) (ExecuteMterpImpl+14228)
2022-03-08 00:29:17.135 4968-4968/? A/DEBUG:     #87 pc 00c181a2  /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2022-03-08 00:29:17.135 4968-4968/? A/DEBUG:     #88 pc 001c7b0d  /system/lib/libart.so (offset 0x1a5000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2198965044+352)
2022-03-08 00:29:17.136 4968-4968/? A/DEBUG:     #89 pc 001cc327  /system/lib/libart.so (offset 0x1a5000) (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
2022-03-08 00:29:17.136 4968-4968/? A/DEBUG:     #90 pc 003dee8b  /system/lib/libart.so (offset 0x1a5000) (artQuickToInterpreterBridge+890)
2022-03-08 00:29:17.136 4968-4968/? A/DEBUG:     #91 pc 0041b8ff  /system/lib/libart.so (offset 0x1a5000) (art_quick_to_interpreter_bridge+30)
2022-03-08 00:29:17.136 4968-4968/? A/DEBUG:     #92 pc 00a10905  /system/framework/arm/boot-framework.oat (offset 0x3ab000) (com.android.internal.os.ZygoteInit.main+2868)
2022-03-08 00:29:17.136 4968-4968/? A/DEBUG:     #93 pc 00417375  /system/lib/libart.so (offset 0x1a5000) (art_quick_invoke_stub_internal+68)
2022-03-08 00:29:17.136 4968-4968/? A/DEBUG:     #94 pc 003f0b27  /system/lib/libart.so (offset 0x1a5000) (art_quick_invoke_static_stub+222)
2022-03-08 00:29:17.136 4968-4968/? A/DEBUG:     #95 pc 000a103b  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2022-03-08 00:29:17.136 4968-4968/? A/DEBUG:     #96 pc 0035015d  /system/lib/libart.so (offset 0x1a5000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2022-03-08 00:29:17.136 4968-4968/? A/DEBUG:     #97 pc 0034ff79  /system/lib/libart.so (offset 0x1a5000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+304)
2022-03-08 00:29:17.136 4968-4968/? A/DEBUG:     #98 pc 00293a39  /system/lib/libart.so (offset 0x1a5000) (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+476)
2022-03-08 00:29:17.136 4968-4968/? A/DEBUG:     #99 pc 0006cbe3  /system/lib/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+38)
2022-03-08 00:29:17.136 4968-4968/? A/DEBUG:     #100 pc 0006ee0f  /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+462)
2022-03-08 00:29:17.137 4968-4968/? A/DEBUG:     #101 pc 0000198d  /system/bin/app_process32 (main+724)
2022-03-08 00:29:17.137 4968-4968/? A/DEBUG:     #102 pc 00088db5  /system/lib/libc.so (__libc_init+48)
2022-03-08 00:29:17.137 4968-4968/? A/DEBUG:     #103 pc 00001677  /system/bin/app_process32 (_start_main+46)
2022-03-08 00:29:17.137 4968-4968/? A/DEBUG:     #104 pc 0000031e  <anonymous:b46df000>
2022-03-08 00:29:19.743 505-3160/? E/sensors-hal: create_daily_report_file:565, create ok
2022-03-08 00:29:19.904 634-634/? E//system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_03

编译运行 pine 自带的测试 app 也会崩溃吗?可以提供一下测试 app 内置的 xcrash 收集到的崩溃信息吗?

编译运行 pine 自带的测试 app 也会崩溃吗?可以提供一下测试 app 内置的 xcrash 收集到的崩溃信息吗?

这个的话在 wear os 模拟器上面也是能复现的

编译运行 pine 自带的测试 app 也会崩溃吗?可以提供一下测试 app 内置的 xcrash 收集到的崩溃信息吗?

有空试一下

Should be fixed by fd829cc

小叶叶辛苦了,虽然现在可能已经用不到了吧(