【语言-C++】Image - .exe 中的 0x0043a998 处有未经处理的异常: 0xC0000005: 读取位置 0x029d846c 时发生访问冲突

本文分析了一个关于GDI+在使用Image对象时发生的异常问题,详细解释了异常产生的原因,并提供了解决方案,即避免在程序运行过程中不当关闭GDI+。

问题

xxxxxx.exe 中的 0x0043a998 处有未经处理的异常:0xC0000005: 读取位置 0x029d846c 时发生访问冲突

 

断点位置

..\MicrosoftSDKs\Windows\v7.0A\Include\GdiPlusBitmap.h
Image::GetWidth()
{
    UINT width = 0;
 
→ SetStatus(DllExports::GdipGetImageWidth(nativeImage,&width));
 
    return width;
}



原因及解决方案:

原因

在使用Image对象之前调用了Gdiplus::GdiplusShutdown函数,使得之前创建的Image对象全部为野指针,建议一个程序只初始化一次GDI,在整个程序结束后关闭,而不要在操作程序过程中使用Gdiplus::GdiplusShutdown关闭GDI

解决方案

在整个解决方案里搜索“Gdiplus::GdiplusShutdown “,删掉冗余的GDI关闭函数。

Gdiplus::GdiplusShutdown(gdiplusToken);
GdiplusStartupInput gdiplusStartupInput;
bool fRet = true;
if( gdiplusToken == 0 )
fRet = GdiplusStartup(&gdiplusToken,&gdiplusStartupInput,NULL);


 

11-04 17:35:14.810650 27368 27374 F DEBUG : *** engrave_tombstone_ucontext *** 11-04 17:35:15.620708 27368 27374 F DEBUG : Process name is com.google.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:0, uid is 99001, not key_process 11-04 17:35:15.620718 27368 27374 F DEBUG : keyProcess: 0 11-04 17:35:15.620722 27368 27374 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 11-04 17:35:15.620725 27368 27374 F DEBUG : Build fingerprint: 'realme/RMX5130/RE640BL1:16/AP3A.240617.008/B.4b6f142-2ad1801-2ac7aa8:user/release-keys' 11-04 17:35:15.620727 27368 27374 F DEBUG : Revision: '0' 11-04 17:35:15.620730 27368 27374 F DEBUG : ABI: 'arm64' 11-04 17:35:15.620732 27368 27374 F DEBUG : Timestamp: 2025-11-04 17:35:14.821360125+0800 11-04 17:35:15.620735 27368 27374 F DEBUG : Process uptime: 37s 11-04 17:35:15.620740 27368 27374 F DEBUG : Cmdline: com.google.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:0 11-04 17:35:15.620744 27368 27374 F DEBUG : pid: 27368, tid: 27374, name: HeapTaskDaemon >>> com.google.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:0 <<< 11-04 17:35:15.620747 27368 27374 F DEBUG : uid: 99001 11-04 17:35:15.620752 27368 27374 F DEBUG : tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE) 11-04 17:35:15.620756 27368 27374 F DEBUG : pac_enabled_keys: 000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY) 11-04 17:35:15.620758 27368 27374 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr -------- 11-04 17:35:15.620767 27368 27374 F DEBUG : x0 0000000000000001 x1 000000773d25e998 x2 000000000000003d x3 0000000000000072 11-04 17:35:15.620771 27368 27374 F DEBUG : x4 000000773d25d2e2 x5 0000000000000031 x6 0000000000000031 x7 7f7f7f7f7f7f7f7f 11-04 17:35:15.620775 27368 27374 F DEBUG : x8 0000000000002701 x9 f53c3685f3848309 x10 000000773d25e998 x11 00000076de30c9ab 11-04 17:35:15.620779 27368 27374 F DEBUG : x12 000000000000000b x13 0000000000000001 x14 00000000ffffffff x15 00000000ffffffa5 11-04 17:35:15.620783 27368 27374 F DEBUG : x16 00000076e79060e8 x17 00000078436ddfc0 x18 00000076db788000 x19 000000773d25eb00 11-04 17:35:15.620786 27368 27374 F DEBUG : x20 000000773d25ec10 x21 0000007200ac8030 x22 000000773d25eb90 x23 000000000000006e 11-04 17:35:15.620789 27368 27374 F DEBUG : x24 000000784371df4c x25 00000000c00000b7 x26 000000000000001d x27 000000778f81c000 11-04 17:35:15.620793 27368 27374 F DEBUG : x28 000000773d260840 x29 000000773d25ead0 11-04 17:35:15.620796 27368 27374 F DEBUG : lr 00000076e52408bc sp 000000773d25ead0 pc 00000076e52408d0 pst 0000000060001000 11-04 17:35:15.620799 27368 27374 F DEBUG : 20 total frames 11-04 17:35:15.620802 27368 27374 F DEBUG : backtrace: 11-04 17:35:15.620807 27368 27374 F DEBUG : #00 pc 0000000007a0c8d0 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:15.620811 27368 27374 F DEBUG : #01 pc 0000000007a0d2f4 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:15.620814 27368 27374 F DEBUG : #02 pc 0000000000000848 [vdso] 11-04 17:35:15.620817 27368 27374 F DEBUG : #03 pc 00000000000eff48 /apex/com.android.runtime/lib64/bionic/libc.so (__ioctl+8) (BuildId: f0468d2d3a31c553a7103b6114f35dc6) 11-04 17:35:15.620820 27368 27374 F DEBUG : #04 pc 0000000000094f84 /apex/com.android.runtime/lib64/bionic/libc.so (ioctl+156) (BuildId: f0468d2d3a31c553a7103b6114f35dc6) 11-04 17:35:15.620824 27368 27374 F DEBUG : #05 pc 00000000007b78a0 /apex/com.android.art/lib64/libart.so (art::gc::SchedPriorityAssist::ctrlAppThreadUx(int, int, int)+88) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620827 27368 27374 F DEBUG : #06 pc 00000000005ccb8c /apex/com.android.art/lib64/libart.so (art::gc::ScopedRaiseThreadPriority::ScopedRaiseThreadPriority(int, bool, bool)+172) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620831 27368 27374 F DEBUG : #07 pc 00000000006ebd88 /apex/com.android.art/lib64/libart.so (art::gc::Heap::Trim(art::Thread*)+304) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620834 27368 27374 F DEBUG : #08 pc 00000000006ebc3c /apex/com.android.art/lib64/libart.so (art::gc::Heap::HeapTrimTask::Run(art::Thread*)+36) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620838 27368 27374 F DEBUG : #09 pc 00000000004785a4 /apex/com.android.art/lib64/libart.so (art::gc::TaskProcessor::RunAllTasks(art::Thread*)+308) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620841 27368 27374 F DEBUG : #10 pc 0000000000059f00 /system/framework/arm64/boot-core-libart.oat (art_jni_trampoline+112) (BuildId: beeddc2d3500962b64fef4331c807b2dc7d1a0df) 11-04 17:35:15.620844 27368 27374 F DEBUG : #11 pc 000000000002bd08 /system/framework/arm64/boot-core-libart.oat (java.lang.Daemons$HeapTaskDaemon.runInternal+184) (BuildId: beeddc2d3500962b64fef4331c807b2dc7d1a0df) 11-04 17:35:15.620848 27368 27374 F DEBUG : #12 pc 000000000002a244 /system/framework/arm64/boot-core-libart.oat (java.lang.Daemons$Daemon.run+116) (BuildId: beeddc2d3500962b64fef4331c807b2dc7d1a0df) 11-04 17:35:15.620852 27368 27374 F DEBUG : #13 pc 00000000000d6ff0 /system/framework/arm64/boot.oat (java.lang.Thread.run+128) (BuildId: be44d58d0345926eaaa238bc707d9274c5f64ba7) 11-04 17:35:15.620857 27368 27374 F DEBUG : #14 pc 00000000004bdd94 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+612) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620861 27368 27374 F DEBUG : #15 pc 000000000063b240 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+140) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620865 27368 27374 F DEBUG : #16 pc 00000000006ceaa0 /apex/com.android.art/lib64/libart.so (art::Thread::CreateCallback(void*)+1052) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620868 27368 27374 F DEBUG : #17 pc 00000000006ce670 /apex/com.android.art/lib64/libart.so (art::Thread::CreateCallbackWithUffdGc(void*)+12) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:15.620872 27368 27374 F DEBUG : #18 pc 000000000009a22c /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+184) (BuildId: f0468d2d3a31c553a7103b6114f35dc6) 11-04 17:35:15.620876 27368 27374 F DEBUG : #19 pc 000000000008ca48 /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+68) (BuildId: f0468d2d3a31c553a7103b6114f35dc6) 11-04 17:35:15.716633 27336 27336 F libc : Fatal signal 5 (SIGTRAP), code 1 (TRAP_BRKPT), fault addr 0x76e1679128 in tid 27336 (_app_activity_0), pid 27336 (_app_activity_0) 11-04 17:35:16.343503 27973 27973 F DEBUG : Process name is com.newcall:mini_app_activity_0, uid is 10102, not key_process 11-04 17:35:16.343525 27973 27973 F DEBUG : keyProcess: 0 11-04 17:35:16.343535 27973 27973 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 11-04 17:35:16.343542 27973 27973 F DEBUG : Build fingerprint: 'realme/RMX5130/RE640BL1:16/AP3A.240617.008/B.4b6f142-2ad1801-2ac7aa8:user/release-keys' 11-04 17:35:16.343549 27973 27973 F DEBUG : Revision: '0' 11-04 17:35:16.343554 27973 27973 F DEBUG : ABI: 'arm64' 11-04 17:35:16.343559 27973 27973 F DEBUG : Timestamp: 2025-11-04 17:35:15.887628927+0800 11-04 17:35:16.343566 27973 27973 F DEBUG : Process uptime: 38s 11-04 17:35:16.343572 27973 27973 F DEBUG : Cmdline: com.newcall:mini_app_activity_0 11-04 17:35:16.343578 27973 27973 F DEBUG : pid: 27336, tid: 27336, name: _app_activity_0 >>> com.newcall:mini_app_activity_0 <<< 11-04 17:35:16.343584 27973 27973 F DEBUG : uid: 10102 11-04 17:35:16.343593 27973 27973 F DEBUG : tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE) 11-04 17:35:16.343599 27973 27973 F DEBUG : pac_enabled_keys: 000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY) 11-04 17:35:16.343610 27973 27973 F DEBUG : signal 5 (SIGTRAP), code 1 (TRAP_BRKPT), fault addr 0x00000076e1679128 11-04 17:35:16.343617 27973 27973 F DEBUG : Abort message: '[FATAL:crashpad_client_linux.cc(745)] Render process (27368)'s crash wasn't handled by all associated webviews, triggering application crash.' 11-04 17:35:16.343632 27973 27973 F DEBUG : x0 0000000000000000 x1 00000076e7a454e0 x2 00000076e7a454e0 x3 0000000000000000 11-04 17:35:16.343639 27973 27973 F DEBUG : x4 0000000000000000 x5 2762622d77746d68 x6 2762622d77746d68 x7 7f7f7f7f7f7f7f7f 11-04 17:35:16.343646 27973 27973 F DEBUG : x8 0000000000000000 x9 0000000000000000 x10 0000000000000090 x11 0000000000000090 11-04 17:35:16.343654 27973 27973 F DEBUG : x12 0000000000000090 x13 000000000000008f x14 000000000000000a x15 00000000ffffffa5 11-04 17:35:16.343660 27973 27973 F DEBUG : x16 0000000000000001 x17 00000078436c9c1c x18 000000784cf8c000 x19 0000007fe7080470 11-04 17:35:16.343667 27973 27973 F DEBUG : x20 000000000000008e x21 0000007fe70803b0 x22 00000076e7a45f58 x23 000000784c65c840 11-04 17:35:16.343674 27973 27973 F DEBUG : x24 000000000000008f x25 000000000000000b x26 000000000000008f x27 0000000000000026 11-04 17:35:16.343680 27973 27973 F DEBUG : x28 000000000000008f x29 0000007fe7080350 11-04 17:35:16.343686 27973 27973 F DEBUG : lr 00000076e1678fdc sp 0000007fe707ff20 pc 00000076e1679128 pst 0000000060001000 11-04 17:35:16.343694 27973 27973 F DEBUG : 29 total frames 11-04 17:35:16.343698 27973 27973 F DEBUG : backtrace: 11-04 17:35:16.343707 27973 27973 F DEBUG : #00 pc 0000000003e45128 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343715 27973 27973 F DEBUG : #01 pc 000000000606a694 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343722 27973 27973 F DEBUG : #02 pc 00000000070bed0c /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343728 27973 27973 F DEBUG : #03 pc 0000000004286298 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343734 27973 27973 F DEBUG : #04 pc 0000000007b2a024 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343749 27973 27973 F DEBUG : #05 pc 0000000001fe2acc /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343756 27973 27973 F DEBUG : #06 pc 0000000006b33844 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343762 27973 27973 F DEBUG : #07 pc 0000000006b3523c /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) 11-04 17:35:16.343769 27973 27973 F DEBUG : #08 pc 0000000000014df8 /system/lib64/libutils.so (android::Looper::pollOnce(int, int*, int*, void**)+1200) (BuildId: cd6fe1a2f106f83ac0868f825dfc8390) 11-04 17:35:16.343778 27973 27973 F DEBUG : #09 pc 00000000001e854c /system/lib64/libandroid_runtime.so (android::android_os_MessageQueue_nativePollOnce(_JNIEnv*, _jobject*, long, int)+48) (BuildId: 14a8ae10abcdb616b6621ca08b12b54e) 11-04 17:35:16.343786 27973 27973 F DEBUG : #10 pc 0000000000af0390 /system/framework/arm64/boot-framework.oat (art_jni_trampoline+112) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343792 27973 27973 F DEBUG : #11 pc 00000000006a2f9c /system/framework/arm64/boot-framework.oat (android.os.MessageQueue.nextLegacy+268) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343799 27973 27973 F DEBUG : #12 pc 00000000006aa21c /system/framework/arm64/boot-framework.oat (android.os.MessageQueue.next+44) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343815 27973 27973 F DEBUG : #13 pc 000000000069a998 /system/framework/arm64/boot-framework.oat (android.os.Looper.loopOnce+88) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343823 27973 27973 F DEBUG : #14 pc 000000000069a8b8 /system/framework/arm64/boot-framework.oat (android.os.Looper.loop+296) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343830 27973 27973 F DEBUG : #15 pc 00000000002f2af4 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+1748) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343853 27973 27973 F DEBUG : #16 pc 00000000004be060 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:16.343862 27973 27973 F DEBUG : #17 pc 00000000004b4ef4 /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1628) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:16.343871 27973 27973 F DEBUG : #18 pc 000000000079e900 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+36) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:16.343877 27973 27973 F DEBUG : #19 pc 00000000003acb14 /system/framework/arm64/boot.oat (art_jni_trampoline+116) (BuildId: be44d58d0345926eaaa238bc707d9274c5f64ba7) 11-04 17:35:16.343893 27973 27973 F DEBUG : #20 pc 0000000000a3a3c4 /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343900 27973 27973 F DEBUG : #21 pc 0000000000a43c34 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+5508) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) 11-04 17:35:16.343906 27973 27973 F DEBUG : #22 pc 00000000004be060 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:16.343912 27973 27973 F DEBUG : #23 pc 00000000004bcb78 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<art::ArtMethod*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+916) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:16.343919 27973 27973 F DEBUG : #24 pc 0000000000811f80 /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+180) (BuildId: 13b8970099d35c13e2f5256887649a54) 11-04 17:35:16.343925 27973 27973 F DEBUG : #25 pc 000000000010cacc /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108) (BuildId: 14a8ae10abcdb616b6621ca08b12b54e) 11-04 17:35:16.343931 27973 27973 F DEBUG : #26 pc 00000000001384e0 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+1020) (BuildId: 14a8ae10abcdb616b6621ca08b12b54e) 11-04 17:35:16.343937 27973 27973 F DEBUG : #27 pc 0000000000002718 /system/bin/app_process64 (main+1624) (BuildId: 9d1c8ac843cff429ce808524242c9a73) 11-04 17:35:16.343944 27973 27973 F DEBUG : #28 pc 0000000000082d60 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+124) (BuildId: f0468d2d3a31c553a7103b6114f35dc6) 11-04 17:35:58.254363 28759 28759 F crashpad: -----BEGIN CRASHPAD MINIDUMP-----
11-18
11-04 17:36:01.575088 6484 28034 D LogKit_AnrCrashDumpRunnable: The log switch is turned on, but the conditions are not met. exceptionInfo = ExceptionInfo{appInfoList=[AppInfo{packageName='com.newcall', processName='com.newcall:mini_app_activity_0', appName='新通话', versionName='1.0.9', versionCode=1001000, componentName='Native crash', isForeground=true}], crashInfo=CrashInfo{exceptionClassName='signal 5 (SIGTRAP)', message='Trap', stackTrace='Process name is com.newcall:mini_app_activity_0, uid is 10102, not key_process keyProcess: 0 *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** Build fingerprint: 'realme/RMX5130/RE640BL1:16/AP3A.240617.008/B.4b6f142-2ad1801-2ac7aa8:user/release-keys' Revision: '0' ABI: 'arm64' Timestamp: 2025-11-04 17:35:58.987987817+0800 Process uptime: 37s Cmdline: com.newcall:mini_app_activity_0 pid: 28232, tid: 28232, name: _app_activity_0 >>> com.newcall:mini_app_activity_0 <<< uid: 10102 tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE) pac_enabled_keys: 000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY) signal 5 (SIGTRAP), code 1 (TRAP_BRKPT), fault addr 0x00000076e1679128 Abort message: '[FATAL:crashpad_client_linux.cc(745)] Render process (28274)'s crash wasn't handled by all associated webviews, triggering application crash.' x0 0000000000000000 x1 00000076e7a454e0 x2 00000076e7a454e0 x3 0000000000000000 x4 0000000000000000 x5 2762622d77746d68 x6 2762622d77746d68 x7 7f7f7f7f7f7f7f7f x8 0000000000000000 x9 0000000000000000 x10 0000000000000090 x11 0000000000000090 x12 0000000000000090 x13 000000000000008f x14 000000000000000a x15 00000000ffffffa5 x16 0000000000000001 x17 00000078436c9c1c x18 000000784cf8c000 x19 0000007fe7080470 x20 000000000000008e x21 0000007fe70803b0 x22 00000076e7a45f58 x23 000000784c65c840 x24 000000000000008f x25 000000000000000b x26 000000000000008f x27 0000000000000026 x28 000000000000008f x29 0000007fe7080350 lr 00000076e1678fdc sp 0000007fe707ff20 pc 00000076e1679128 pst 0000000060001000 29 total frames backtrace: #00 pc 0000000003e45128 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) #01 pc 000000000606a694 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) #02 pc 00000000070bed0c /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) #03 pc 0000000004286298 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) #04 pc 0000000007b2a024 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) #05 pc 0000000001fe2acc /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) #06 pc 0000000006b33844 /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) #07 pc 0000000006b3523c /product/app/TrichromeLibrary64CN/TrichromeLibrary64CN.apk!libmonochrome_64.so (offset 0x8dc000) (BuildId: e8dcb611cc3cb26f7babf3e164d9395cfcab25c8) #08 pc 0000000000014df8 /system/lib64/libutils.so (android::Looper::pollOnce(int, int*, int*, void**)+1200) (BuildId: cd6fe1a2f106f83ac0868f825dfc8390) #09 pc 00000000001e854c /system/lib64/libandroid_runtime.so (android::android_os_MessageQueue_nativePollOnce(_JNIEnv*, _jobject*, long, int)+48) (BuildId: 14a8ae10abcdb616b6621ca08b12b54e) 11-04 17:36:01.575113 1962 28969 D QC2PipelineCodec: [pipeE_avcE_78] pipelineid=101 handleOutputBufDone got vectorId=0 11-04 17:36:01.575119 1962 28969 D QC2PipelineCodec: [pipeE_avcE_78] pipelineid=101 handleOutputBufDone numOutputs=1 11-04 17:36:01.575120 6484 28034 D LogKit_AnrCrashDumpRunnable: #10 pc 0000000000af0390 /system/framework/arm64/boot-framework.oat (art_jni_trampoline+112) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) #11 pc 00000000006a2f9c /system/framework/arm64/boot-framework.oat (android.os.MessageQueue.nextLegacy+268) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) #12 pc 00000000006aa21c /system/framework/arm64/boot-framework.oat (android.os.MessageQueue.next+44) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) #13 pc 000000000069a998 /system/framework/arm64/boot-framework.oat (android.os.Looper.loopOnce+88) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) #14 pc 000000000069a8b8 /system/framework/arm64/boot-framework.oat (android.os.Looper.loop+296) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) #15 pc 00000000002f2af4 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+1748) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) #16 pc 00000000004be060 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 13b8970099d35c13e2f5256887649a54) #17 pc 00000000004b4ef4 /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1628) (BuildId: 13b8970099d35c13e2f5256887649a54) #18 pc 000000000079e900 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+36) (BuildId: 13b8970099d35c13e2f5256887649a54) #19 pc 00000000003acb14 /system/framework/arm64/boot.oat (art_jni_trampoline+116) (BuildId: be44d58d0345926eaaa238bc707d9274c5f64ba7) #20 pc 0000000000a3a3c4 /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) #21 pc 0000000000a43c34 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+5508) (BuildId: dec99815fa1bd74b87e09cff447774478ce45949) #22 pc 00000000004be060 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 13b8970099d35c13e2f5256887649a54) #23 pc 00000000004bcb78 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<art::ArtMethod*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+916) (BuildId: 13b8970099d35c13e2f5256887649a54) #24 pc 0000000000811f80 /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+180) (BuildId: 13b8970099d35c13e2f5256887649a54) #25 pc 000000000010cacc /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108) (BuildId: 14a8ae10abcdb616b6621ca08b12b54e) #26 pc 00000000001384e0 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+1020) (BuildId: 14a8ae10abcdb616b6621ca08b12b54e) #27 pc 0000000000002718 /system/bin/app_process64 (main+1624) (BuildId: 9d1c8ac843cff429ce808524242c9a73) #28 pc 0000000000082d60 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+124) (BuildId: f0468d2d3a31c553a7103b6114f35dc6) '}, anrInfo=null, eventType='native_crash', time=1762248959426, timeZone='GMT+08:00', count=1, fileId='185359c4-9572-40ad-a785-197e22667f16', filePath='null', fileDir='null'}
最新发布
11-19
评论 1
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值