本帖最后由 360fans_WDWy8Z 于 2019-12-16 17:41 编辑
backtrace:
#00 pc 00000000003aa930 /system/lib64/libart.so (_ZN3artL15Unsafe_getByteJEP7_JNIEnvP8_jobjectl)
#01 pc 00000000008a5c18 /system/framework/arm64/boot.oat (offset 0x5a2000) (sun.misc.Unsafe.getByte+132)
#02 pc 00000000006dcad8 /system/framework/arm64/boot.oat (offset 0x5a2000) (java.nio.MappedByteBuffer.load+388)
#03 pc 00000000016f0f44 /data/data/com.auntec.photo/.jiagu/classes.oat (offset 0x12c1000) |
|
|
|
评论
直达楼层