-
Notifications
You must be signed in to change notification settings - Fork 181
Description
2022-07-08 17:20:52.738 28929-28929/? I/crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone
2022-07-08 17:20:52.740 456-456/? I//system/bin/tombstoned: received crash request for pid 26121
2022-07-08 17:20:52.744 28929-28929/? I/crash_dump64: performing dump of process 26121 (target tid = 26121)
2022-07-08 17:20:52.815 28929-28929/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2022-07-08 17:20:52.816 28929-28929/? A/DEBUG: Build fingerprint: 'rockchip/rk3399pro_pcie/rk3399pro:9/PQ3B.190705.003/neardi03291416:userdebug/test-keys'
2022-07-08 17:20:52.816 28929-28929/? A/DEBUG: Revision: '0'
2022-07-08 17:20:52.816 28929-28929/? A/DEBUG: ABI: 'arm64'
2022-07-08 17:20:52.816 28929-28929/? A/DEBUG: pid: 26121, tid: 26121, name: guang.jingcheng >>> com.xiaguang.jingcheng <<<
2022-07-08 17:20:52.816 28929-28929/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x65695674786554
2022-07-08 17:20:52.816 28929-28929/? A/DEBUG: x0 7765695674786554 x1 00000070d3f697e0 x2 00000070e4d2f9b0 x3 00000000133a13f8
2022-07-08 17:20:52.816 28929-28929/? A/DEBUG: x4 000000001372e830 x5 0000000000000004 x6 0000000000000000 x7 77656926a78ef2b4
2022-07-08 17:20:52.816 28929-28929/? A/DEBUG: x8 0000007ffce093f8 x9 aa585dbffddc252a x10 0101010101010101 x11 0000007ffce0a558
2022-07-08 17:20:52.816 28929-28929/? A/DEBUG: x12 0000000000000018 x13 0000000062c7f6f4 x14 001b399c24f60812 x15 000005512a5e4efb
2022-07-08 17:20:52.816 28929-28929/? A/DEBUG: x16 00000070cdca74f0 x17 0000007184b9f100 x18 0000000000000008 x19 00000070d3f697e0
2022-07-08 17:20:52.816 28929-28929/? A/DEBUG: x20 7765695674786554 x21 0000000000000000 x22 00000070e4d2f9b0 x23 0000000012ec9f08
2022-07-08 17:20:52.817 28929-28929/? A/DEBUG: x24 0000000000000001 x25 0000000000000000 x26 0000000000000000 x27 0000000000000000
2022-07-08 17:20:52.817 28929-28929/? A/DEBUG: x28 0000000000000000 x29 0000007ffce09340
2022-07-08 17:20:52.817 28929-28929/? A/DEBUG: sp 0000007ffce09320 lr 00000070cdc53b28 pc 0000007184b9f188
2022-07-08 17:20:52.818 28929-28929/? A/DEBUG: backtrace:
2022-07-08 17:20:52.819 28929-28929/? A/DEBUG: #00 pc 000000000001e188 /system/lib64/libc.so (strcmp+136)
2022-07-08 17:20:52.819 28929-28929/? A/DEBUG: #1 pc 000000000004db24 /data/app/com.xiaguang.jingcheng-d-C-S3JIJjFJPoBreIIlig==/lib/arm64/libandroidwty.so (dev_info_record_find(char*)+44)
2022-07-08 17:20:52.842 26121-28777/com.xiaguang.jingcheng E/FFmpeg: Error running FFmpeg binary
java.lang.NullPointerException: Attempt to invoke virtual method 'int java.lang.Process.exitValue()' on a null object reference
at nl.bravobit.ffmpeg.CommandResult.getOutputFromProcess(CommandResult.java:18)
at nl.bravobit.ffmpeg.FFcommandExecuteAsyncTask.doInBackground(FFcommandExecuteAsyncTask.java:49)
at nl.bravobit.ffmpeg.FFcommandExecuteAsyncTask.doInBackground(FFcommandExecuteAsyncTask.java:12)
at android.os.AsyncTask$2.call(AsyncTask.java:333)
at java.util.concurrent.FutureTask.run(FutureTask.java:266)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1167)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:641)
at java.lang.Thread.run(Thread.java:764)
2022-07-08 17:20:52.876 28929-28929/? I/crash_dump64: type=1400 audit(0.0:479): avc: denied { read } for name="AppDataBase.db-shm" dev="dm-2" ino=18003 scontext=u:r:crash_dump:s0 tcontext=u:object_r:system_app_data_file:s0 tclass=file permissive=1
2022-07-08 17:20:52.906 28929-28929/? I/crash_dump64: type=1400 audit(0.0:482): avc: denied { read } for name="framework-res__auto_generated_rro.apk" dev="dm-1" ino=276 scontext=u:r:crash_dump:s0 tcontext=u:object_r:vendor_overlay_file:s0 tclass=file permissive=1