首页
学习
活动
专区
工具
TVP
发布
社区首页 >问答首页 >腾讯加固不兼容android12?

腾讯加固不兼容android12?

提问于 2021-08-04 10:35:46
回答 1关注 0查看 1.2K

使用腾讯加固后,在android12设备上打开APP闪退,以下为crash日志:

07-24 16:03:58.873019 29665 29665 F DEBUG : Revision: '0'

07-24 16:03:58.873033 29665 29665 F DEBUG : ABI: 'arm64'

07-24 16:03:58.873047 29665 29665 F DEBUG : Timestamp: 2021-07-24 16:03:58.660840377+0800

07-24 16:03:58.873059 29665 29665 F DEBUG : Process uptime: 0s

07-24 16:03:58.873081 29665 29665 F DEBUG : Cmdline: com.trafd.cradiat

07-24 16:03:58.873095 29665 29665 F DEBUG : pid: 29628, tid: 29628, name: cial.cradiat >>> com.trafd.cradiat <<<

07-24 16:03:58.873108 29665 29665 F DEBUG : uid: 10152

07-24 16:03:58.873123 29665 29665 F DEBUG : signal 6 (SIGABRT), code 0 (SI_USER), fault addr --------

07-24 16:03:58.873137 29665 29665 F DEBUG : Abort message: 'JNI DETECTED ERROR IN APPLICATION: java_object == null

07-24 16:03:58.873137 29665 29665 F DEBUG : in call to GetObjectClass

07-24 16:03:58.873137 29665 29665 F DEBUG : from void com.wrapper.proxyapplication.WrapperProxyApplication.Ooo0ooO0oO()'

07-24 16:03:58.873170 29665 29665 F DEBUG : x0 0000000000000000 x1 00000000000073bc x2 0000000000000006 x3 0000007fcc833df0

07-24 16:03:58.873193 29665 29665 F DEBUG : x4 00000079cf435000 x5 00000079cf435000 x6 00000079cf435000 x7 000000000030b1f2

07-24 16:03:58.873209 29665 29665 F DEBUG : x8 00000000000000f0 x9 00000079c44d0140 x10 ffffff00fffffbdf x11 0000000000000001

07-24 16:03:58.873224 29665 29665 F DEBUG : x12 0000fffffffff3ff x13 0000000000983e1a x14 b40000774d854450 x15 000000000000116e

07-24 16:03:58.873253 29665 29665 F DEBUG : x16 00000079c4571050 x17 00000079c454d790 x18 0000000000000024 x19 00000000000000ac

07-24 16:03:58.873268 29665 29665 F DEBUG : x20 00000000000073bc x21 00000000000000b2 x22 00000000000073bc x23 00000000ffffffff

07-24 16:03:58.873283 29665 29665 F DEBUG : x24 00000077142b64d3 x25 0000000000000000 x26 b40000773d77c280 x27 0000007714293a9c

07-24 16:03:58.873298 29665 29665 F DEBUG : x28 0000007714c17000 x29 0000007fcc833e70

07-24 16:03:58.873314 29665 29665 F DEBUG : lr 00000079c44fef3c sp 0000007fcc833dd0 pc 00000079c44fef6c pst 0000000000000000

07-24 16:03:58.873709 29665 29665 F DEBUG : backtrace:

07-24 16:03:58.873743 29665 29665 F DEBUG : #00 pc 0000000000050f6c /apex/com.android.runtime/lib64/bionic/libc.so (abort+180) (BuildId: 288886260747ec79c271f21a5e6c7d2d)

07-24 16:03:58.873759 29665 29665 F DEBUG : #01 pc 000000000062f69c /apex/com.android.art/lib64/libart.so (art::Runtime::Abort(char const*)+764) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.873775 29665 29665 F DEBUG : #02 pc 0000000000015aa0 /system/lib64/libbase.so (android::base::SetAborter(std::__1::function<void (char const*)>&&)::$_3::__invoke(char const*)+80) (BuildId: fc58b011b253e095bf1244e588fb3b2a)

07-24 16:03:58.873790 29665 29665 F DEBUG : #03 pc 000000000001508c /system/lib64/libbase.so (android::base::LogMessage::~LogMessage()+364) (BuildId: fc58b011b253e095bf1244e588fb3b2a)

07-24 16:03:58.873840 29665 29665 F DEBUG : #04 pc 0000000000454b1c /apex/com.android.art/lib64/libart.so (art::JavaVMExt::JniAbort(char const*, char const*)+2580) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.873856 29665 29665 F DEBUG : #05 pc 000000000046c2cc /apex/com.android.art/lib64/libart.so (art::JNI<false>::GetObjectClass(_JNIEnv*, _jobject*)+1420) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.873889 29665 29665 F DEBUG : #06 pc 000000000002417c /data/preload-app-lib/cradiat/libshell-super.2019.so (BuildId: ba52c5c336c3dd5be2b56bf7b2d99a089678f102)

07-24 16:03:58.873902 29665 29665 F DEBUG : #07 pc 0000000000007498 /data/preload-app-lib/cradiat/libshell-super.2019.so (BuildId: ba52c5c336c3dd5be2b56bf7b2d99a089678f102)

07-24 16:03:58.873922 29665 29665 F DEBUG : #08 pc 0000000000222244 /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+148) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.873937 29665 29665 F DEBUG : #09 pc 0000000000212520 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.873950 29665 29665 F DEBUG : #10 pc 0000000000058486 /data/dalvik-cache/arm64/product@operator@app@cradiat@cradiat.apk@classes.vdex

07-24 16:03:58.873964 29665 29665 F DEBUG : #11 pc 00000000002124c4 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.873977 29665 29665 F DEBUG : #12 pc 000000000004f244 /data/dalvik-cache/arm64/product@operator@app@cradiat@cradiat.apk@classes.vdex

07-24 16:03:58.873992 29665 29665 F DEBUG : #13 pc 000000000027d9a4 /system/framework/arm64/boot-framework.oat (android.app.Instrumentation.callApplicationOnCreate+52) (BuildId: 00506c4b5e2208b6eed11eebf1184e23e4ffbd8c)

07-24 16:03:58.874006 29665 29665 F DEBUG : #14 pc 000000000036b344 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.handleBindApplication+5956) (BuildId: 00506c4b5e2208b6eed11eebf1184e23e4ffbd8c)

07-24 16:03:58.874037 29665 29665 F DEBUG : #15 pc 0000000000360530 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread$H.handleMessage+6864) (BuildId: 00506c4b5e2208b6eed11eebf1184e23e4ffbd8c)

07-24 16:03:58.874051 29665 29665 F DEBUG : #16 pc 000000000059f42c /system/framework/arm64/boot-framework.oat (android.os.Handler.dispatchMessage+188) (BuildId: 00506c4b5e2208b6eed11eebf1184e23e4ffbd8c)

07-24 16:03:58.874077 29665 29665 F DEBUG : #17 pc 00000000005a2564 /system/framework/arm64/boot-framework.oat (android.os.Looper.loopOnce+1108) (BuildId: 00506c4b5e2208b6eed11eebf1184e23e4ffbd8c)

07-24 16:03:58.874092 29665 29665 F DEBUG : #18 pc 00000000005a205c /system/framework/arm64/boot-framework.oat (android.os.Looper.loop+604) (BuildId: 00506c4b5e2208b6eed11eebf1184e23e4ffbd8c)

07-24 16:03:58.874120 29665 29665 F DEBUG : #19 pc 0000000000374244 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+788) (BuildId: 00506c4b5e2208b6eed11eebf1184e23e4ffbd8c)

07-24 16:03:58.874134 29665 29665 F DEBUG : #20 pc 0000000000218be8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.874149 29665 29665 F DEBUG : #21 pc 000000000028520c /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+212) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.874164 29665 29665 F DEBUG : #22 pc 0000000000627638 /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1384) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.874190 29665 29665 F DEBUG : #23 pc 0000000000598320 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+48) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.874204 29665 29665 F DEBUG : #24 pc 00000000000a8f74 /apex/com.android.art/javalib/arm64/boot.oat (art_jni_trampoline+132) (BuildId: 22f8399784c5492456e1b7dbaee48ebc85bbe976)

07-24 16:03:58.874218 29665 29665 F DEBUG : #25 pc 00000000008eb3dc /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+140) (BuildId: 00506c4b5e2208b6eed11eebf1184e23e4ffbd8c)

07-24 16:03:58.874232 29665 29665 F DEBUG : #26 pc 00000000008f4780 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+2288) (BuildId: 00506c4b5e2208b6eed11eebf1184e23e4ffbd8c)

07-24 16:03:58.874257 29665 29665 F DEBUG : #27 pc 0000000000218be8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.874272 29665 29665 F DEBUG : #28 pc 000000000028520c /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+212) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.874286 29665 29665 F DEBUG : #29 pc 0000000000627d98 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<art::ArtMethod*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+448) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.874301 29665 29665 F DEBUG : #30 pc 000000000062826c /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+92) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.874315 29665 29665 F DEBUG : #31 pc 000000000050102c /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+612) (BuildId: 6342b30731e4f8a2005742cd6dada096)

07-24 16:03:58.874334 29665 29665 F DEBUG : #32 pc 00000000000afb28 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120) (BuildId: 101d56dd1597ced20d86f71825038347)

07-24 16:03:58.874348 29665 29665 F DEBUG : #33 pc 00000000000bb134 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+948) (BuildId: 101d56dd1597ced20d86f71825038347)

07-24 16:03:58.874362 29665 29665 F DEBUG : #34 pc 0000000000002580 /system/bin/app_process64 (main+1320) (BuildId: 1410b6f6903418cf8ba5b10d7f351072)

07-24 16:03:58.874381 29665 29665 F DEBUG : #35 pc 0000000000049ab0 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+96) (BuildId: 288886260747ec79c271f21a5e6c7d2d)

07-24 16:04:17.352873 29695 29695 F libc : Fatal signal 6 (SIGABRT), code 0 (SI_USER) in tid 29695 (cial.cradiat), pid 29695 (cial.cradiat)

相关文章

相似问题

相关问答用户
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档