Last active
November 30, 2023 19:52
-
-
Save AndnixSH/d974b28a3882372be51bd1d693ea48cc to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[armeabi-v7a] Compile++ arm : ab <= SymbolFinder.cpp | |
fatal error: error in backend: Do not know how to promote this operator's operand! | |
PLEASE submit a bug report to https://github.com/llvm/llvm-project/issues/ and include the crash backtrace, preprocessed source, and associated run script. | |
Stack dump: | |
0. Program arguments: D:/AndroidSDK/ndk/26.1.10909125/build/../toolchains/llvm/prebuilt/windows-x86_64/bin/clang++.exe -MMD -MP -MF F:\\Mobile-Modding\\AMain-Android-Hooking-Project\\/obj/local/armeabi-v7a/objs/ab/Substrate/SymbolFinder.o.d -target armv7-none-linux-androideabi22 -fdata-sections -ffunction-sections -fstack-protector-strong -funwind-tables -no-canonical-prefixes --sysroot D:/AndroidSDK/ndk/26.1.10909125/build/../toolchains/llvm/prebuilt/windows-x86_64/sysroot -g -Wno-invalid-command-line-argument -Wno-unused-command-line-argument -D_FORTIFY_SOURCE=2 -fno-exceptions -fno-rtti -fpic -O2 -DNDEBUG -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/JNI -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/libzip -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/include -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/source/InterceptRouting/Routing/FunctionInlineReplace -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/source/InterceptRouting/Routing/FunctionInlineHook -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/source -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/source/dobby -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/source/include -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/xnucxx/xnucxx -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/external/logging -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/external/misc-helper -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/external -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/source/Backend/UserMode/ -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/builtin-plugin -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/builtin-plugin/SymbolResolver -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/Nino/ -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/Includes/ -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/Substrate -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni -DANDROID -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/libs/curl/armeabi-v7a/include -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/libs/openssl/armeabi-v7a/include -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/libs/openssl/armeabi-v7a/include -w -std=c17 -fexceptions -ffunction-sections -fdata-sections -fvisibility-inlines-hidden -fvisibility=hidden -frtti -fpermissive -fms-extensions -mllvm -sub -mllvm -fla -mllvm -split -mllvm -bcf -mllvm -sobf -Wformat -Werror=format-security -frtti -fexceptions -mllvm -sub -mllvm -fla -mllvm -split -mllvm -bcf -mllvm -sobf -std=c++17 -w -fexceptions -ffunction-sections -fdata-sections -fvisibility-inlines-hidden -fvisibility=hidden -frtti -fpermissive -fms-extensions -c F:/Mobile-Modding/AMain-Android-Hooking-Project//jni/Substrate/SymbolFinder.cpp -o F:\\Mobile-Modding\\AMain-Android-Hooking-Project\\/obj/local/armeabi-v7a/objs/ab/Substrate/SymbolFinder.o | |
1. <eof> parser at end of file | |
2. Code generation | |
3. Running pass 'Function Pass Manager' on module 'F:/Mobile-Modding/AMain-Android-Hooking-Project//jni/Substrate/SymbolFinder.cpp'. | |
4. Running pass 'ARM Instruction Selection' on function '@.datadiv_decode4181894872295926397' | |
Exception Code: 0xE0000046 | |
#0 0x00007ffd8263565c (C:\Windows\System32\KERNELBASE.dll+0x6565c) | |
#1 0x00007ff64d07319a llvm::CrashRecoveryContext::HandleExit(int) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x56319a) | |
#2 0x00007ff64d09f3f9 llvm::sys::Process::Exit(int, bool) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x58f3f9) | |
#3 0x00007ff64cb17b17 LLVMErrorHandler(void*, char const*, bool) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x7b17) | |
#4 0x00007ff64d0748fc llvm::report_fatal_error(llvm::Twine const&, bool) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x5648fc) | |
#5 0x00007ff64d074795 llvm::report_fatal_error(char const*, bool) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x564795) | |
#6 0x00007ff6514eb72d llvm::DAGTypeLegalizer::PromoteIntegerOperand(llvm::SDNode*, unsigned int) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x49db72d) | |
#7 0x00007ff6504ef7fe llvm::DAGTypeLegalizer::run() (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x39df7fe) | |
#8 0x00007ff6504f44d8 llvm::SelectionDAG::LegalizeTypes() (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x39e44d8) | |
#9 0x00007ff64e94e39b llvm::SelectionDAGISel::CodeGenAndEmitDAG() (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x1e3e39b) | |
#10 0x00007ff64e94e1f0 llvm::SelectionDAGISel::SelectBasicBlock(llvm::ilist_iterator<llvm::ilist_detail::node_options<llvm::Instruction, false, false, void>, false, true>, llvm::ilist_iterator<llvm::ilist_detail::node_options<llvm::Instruction, false, false, void>, false, true>, bool&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x1e3e1f0) | |
#11 0x00007ff64e94d968 llvm::SelectionDAGISel::SelectAllBasicBlocks(llvm::Function const&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x1e3d968) | |
#12 0x00007ff64e94b6b9 llvm::SelectionDAGISel::runOnMachineFunction(llvm::MachineFunction&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x1e3b6b9) | |
#13 0x00007ff64d7c9784 (anonymous namespace)::ARMDAGToDAGISel::runOnMachineFunction(llvm::MachineFunction&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0xcb9784) | |
#14 0x00007ff64d283a36 llvm::MachineFunctionPass::runOnFunction(llvm::Function&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x773a36) | |
#15 0x00007ff64cee3558 llvm::FPPassManager::runOnFunction(llvm::Function&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x3d3558) | |
#16 0x00007ff64ceeac53 llvm::FPPassManager::runOnModule(llvm::Module&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x3dac53) | |
#17 0x00007ff64cee41e9 llvm::legacy::PassManagerImpl::run(llvm::Module&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x3d41e9) | |
#18 0x00007ff64e28bffd clang::EmitBackendOutput(clang::DiagnosticsEngine&, clang::HeaderSearchOptions const&, clang::CodeGenOptions const&, clang::TargetOptions const&, clang::LangOptions const&, llvm::StringRef, llvm::Module*, clang::BackendAction, llvm::IntrusiveRefCntPtr<llvm::vfs::FileSystem>, std::__1::unique_ptr<llvm::raw_pwrite_stream, std::__1::default_delete<llvm::raw_pwrite_stream>>) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x177bffd) | |
#19 0x00007ff64e664e63 clang::BackendConsumer::HandleTranslationUnit(clang::ASTContext&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x1b54e63) | |
#20 0x00007ff6501bcc04 clang::ParseAST(clang::Sema&, bool, bool) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x36acc04) | |
#21 0x00007ff64e5cef74 clang::FrontendAction::Execute() (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x1abef74) | |
#22 0x00007ff64d156b44 clang::CompilerInstance::ExecuteAction(clang::FrontendAction&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x646b44) | |
#23 0x00007ff64d1ede3f clang::ExecuteCompilerInvocation(clang::CompilerInstance*) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x6dde3f) | |
#24 0x00007ff64cb1733d cc1_main(llvm::ArrayRef<char const*>, char const*, void*) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x733d) | |
#25 0x00007ff64cb15095 ExecuteCC1Tool(llvm::SmallVectorImpl<char const*>&, llvm::ToolContext const&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x5095) | |
#26 0x00007ff64e380dfd void llvm::function_ref<void ()>::callback_fn<clang::driver::CC1Command::Execute(llvm::ArrayRef<std::__1::optional<llvm::StringRef>>, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>*, bool*) const::$_0>(long long) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x1870dfd) | |
#27 0x00007ff64d07316c llvm::CrashRecoveryContext::RunSafely(llvm::function_ref<void ()>) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x56316c) | |
#28 0x00007ff64e3805bc clang::driver::CC1Command::Execute(llvm::ArrayRef<std::__1::optional<llvm::StringRef>>, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>*, bool*) const (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x18705bc) | |
#29 0x00007ff64d10d453 clang::driver::Compilation::ExecuteCommand(clang::driver::Command const&, clang::driver::Command const*&, bool) const (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x5fd453) | |
#30 0x00007ff64d10d98e clang::driver::Compilation::ExecuteJobs(clang::driver::JobList const&, llvm::SmallVectorImpl<std::__1::pair<int, clang::driver::Command const*>>&, bool) const (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x5fd98e) | |
#31 0x00007ff64d129a1b clang::driver::Driver::ExecuteCompilation(clang::driver::Compilation&, llvm::SmallVectorImpl<std::__1::pair<int, clang::driver::Command const*>>&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x619a1b) | |
#32 0x00007ff64cb14545 clang_main(int, char**, llvm::ToolContext const&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x4545) | |
#33 0x00007ff64cb21c37 main (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x11c37) | |
#34 0x00007ff64cb11315 __tmainCRTStartup /home/runner/work/llvm-mingw/llvm-mingw/mingw-w64/mingw-w64-crt/build-x86_64/../crt/crtexe.c:267:13 | |
#35 0x00007ff64cb11366 .l_start /home/runner/work/llvm-mingw/llvm-mingw/mingw-w64/mingw-w64-crt/build-x86_64/../crt/crtexe.c:190:3 | |
#36 0x00007ffd8462257d (C:\Windows\System32\KERNEL32.DLL+0x1257d) | |
#37 0x00007ffd84c8aa58 (C:\Windows\SYSTEM32\ntdll.dll+0x5aa58) | |
clang++: error: clang frontend command failed with exit code 70 (use -v to see invocation) | |
clang version 17.0.2 | |
Target: armv7-none-linux-android22 | |
Thread model: posix | |
InstalledDir: D:/AndroidSDK/ndk/26.1.10909125/build/../toolchains/llvm/prebuilt/windows-x86_64/bin | |
clang++: note: diagnostic msg: | |
******************** | |
PLEASE ATTACH THE FOLLOWING FILES TO THE BUG REPORT: | |
Preprocessed source(s) and associated run script(s) are located at: | |
clang++: note: diagnostic msg: C:/Users/username/AppData/Local/Temp/SymbolFinder-f4f118.cpp | |
clang++: note: diagnostic msg: C:/Users/username/AppData/Local/Temp/SymbolFinder-f4f118.sh | |
clang++: note: diagnostic msg: | |
******************** | |
Apply bogus control flow obfuscation for _Z9find_nameiPKcS0_Pm | |
Apply split obfuscation for _Z9find_nameiPKcS0_Pm | |
Apply flatten obfuscation for _Z9find_nameiPKcS0_Pm | |
Apply substitution obfuscation for _Z9find_nameiPKcS0_Pm | |
Apply substitution obfuscation for _Z9find_nameiPKcS0_Pm | |
Apply bogus control flow obfuscation for _ZL11load_memmapiP2mmPi | |
Apply split obfuscation for _ZL11load_memmapiP2mmPi | |
Apply flatten obfuscation for _ZL11load_memmapiP2mmPi | |
Apply substitution obfuscation for _ZL11load_memmapiP2mmPi | |
Apply substitution obfuscation for _ZL11load_memmapiP2mmPi | |
Apply bogus control flow obfuscation for _ZL12find_libnamePKcPciPmP2mmi | |
Apply split obfuscation for _ZL12find_libnamePKcPciPmP2mmi | |
Apply flatten obfuscation for _ZL12find_libnamePKcPciPmP2mmi | |
Apply substitution obfuscation for _ZL12find_libnamePKcPciPmP2mmi | |
Apply substitution obfuscation for _ZL12find_libnamePKcPciPmP2mmi | |
Apply bogus control flow obfuscation for _Z12find_libbaseiPKcPm | |
Apply split obfuscation for _Z12find_libbaseiPKcPm | |
Apply flatten obfuscation for _Z12find_libbaseiPKcPm | |
Apply substitution obfuscation for _Z12find_libbaseiPKcPm | |
Apply substitution obfuscation for _Z12find_libbaseiPKcPm | |
Apply bogus control flow obfuscation for _ZL7sprintfPcU17pass_object_size1PKcz | |
Apply flatten obfuscation for _ZL7sprintfPcU17pass_object_size1PKcz | |
Apply substitution obfuscation for _ZL7sprintfPcU17pass_object_size1PKcz | |
Apply substitution obfuscation for _ZL7sprintfPcU17pass_object_size1PKcz | |
Apply bogus control flow obfuscation for _ZL8get_symsiP10elf32_shdrS0_ | |
Apply split obfuscation for _ZL8get_symsiP10elf32_shdrS0_ | |
Apply flatten obfuscation for _ZL8get_symsiP10elf32_shdrS0_ | |
Apply substitution obfuscation for _ZL8get_symsiP10elf32_shdrS0_ | |
Apply substitution obfuscation for _ZL8get_symsiP10elf32_shdrS0_ | |
Apply flatten obfuscation for .datadiv_decode4181894872295926397 | |
Apply string obfuscation for F:/Mobile-Modding/AMain-Android-Hooking-Project//jni/Substrate/SymbolFinder.cpp | |
make: *** [D:/AndroidSDK/ndk/26.1.10909125/build/../build/core/build-binary.mk:415: F:\Mobile-Modding\AMain-Android-Hooking-Project\/obj/local/armeabi-v7a/objs/ab/Substrate/SymbolFinder.o] Error 1 | |
PS F:\Mobile-Modding\AMain-Android-Hooking-Project> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment