Xpatch icon indicating copy to clipboard operation
Xpatch copied to clipboard

华为HarmonyOS4,适配API31,运行报错

Open 15198184721 opened this issue 7 months ago • 0 comments

打包之后再其他手机正常运行。但是再华为手机HarmonyOS4,运行报错了,日志如下: 使用并非最新版本Xpatch 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A pid: 3273, tid: 3273, name: com.kakao.talk >>> com.kakao.talk <<< 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A uid: 10246 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x100000000 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x0 b4000076b9e921f8 x1 b4000076b9ef2c00 x2 b4000076109aaf40 x3 0000000000000000 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x4 0000007fffa80fb0 x5 8000000000000000 x6 0000000000000010 x7 7f7f7f7f7f7f7f7f 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x8 0000000100000000 x9 65ef6bda27f75a42 x10 00000000ffffffff x11 00000076b9e885fc 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x12 0000000000000020 x13 0000007fffa824b8 x14 0027798e5eff4f51 x15 0000000034155555 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x16 000000769c9300b0 x17 000000769c91f92c x18 00000076ba96a000 x19 b4000076b9ef2c00 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x20 0000000000000001 x21 b4000076b9e921f8 x22 b4000076b9e92080 x23 0000000000000001 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x24 00000076ba0ea000 x25 0000007fffa82b88 x26 000000006f379dc8 x27 000000000000008d 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x28 0000007fffa82a80 x29 0000007fffa829e0 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A lr 000000761509e1a4 sp 0000007fffa829a0 pc 0000000100000000 pst 0000000060001000 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A backtrace: 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #00 pc 0000000100000000 <unknown> 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #01 pc 000000000029e1a0 /apex/com.android.art/lib64/libart.so!libart.so (art::ClassLinker::MakeInitializedClassesVisiblyInitialized(art::Thread*, bool)+112) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #02 pc 0000000000055f8c /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/lib/arm64/libsandhook.so (MakeInitializedClassVisibilyInitialized+144) (BuildId: b362d0eab572205a4738ffc63402013571414f60) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #03 pc 0000000000222244 /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+148) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #04 pc 0000000000211d0c /apex/com.android.art/lib64/libart.so (nterp_helper+1948) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #05 pc 0000000004c2e7c2 /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (com.swift.sandhook.SandHook.hook+130) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #06 pc 0000000000218be8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #07 pc 00000000002845c4 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+216) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #08 pc 00000000003fd680 /apex/com.android.art/lib64/libart.so!libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+400) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #09 pc 00000000003f84f4 /apex/com.android.art/lib64/libart.so!libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+804) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #10 pc 00000000007a0e98 /apex/com.android.art/lib64/libart.so!libart.so (MterpInvokeStatic+980) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #11 pc 0000000000203994 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #12 pc 0000000004c3d02c /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (com.swift.sandhook.xposedcompat.methodgen.DynamicBridge.hookMethod+232) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #13 pc 00000000003eff8c /apex/com.android.art/lib64/libart.so!libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)+816) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #14 pc 000000000077cd80 /apex/com.android.art/lib64/libart.so!libart.so (artQuickToInterpreterBridge+776) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #15 pc 0000000000222378 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #16 pc 0000000000211608 /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #17 pc 0000000004c45030 /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (de.robv.android.xposed.XposedBridge.hookMethodNative+12) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #18 pc 0000000000218be8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #19 pc 00000000002845c4 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+216) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #20 pc 00000000003fd680 /apex/com.android.art/lib64/libart.so!libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+400) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #21 pc 00000000003f84f4 /apex/com.android.art/lib64/libart.so!libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+804) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #22 pc 00000000007a0e98 /apex/com.android.art/lib64/libart.so!libart.so (MterpInvokeStatic+980) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #23 pc 0000000000203994 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #24 pc 0000000004c44d6c /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (de.robv.android.xposed.XposedBridge.hookMethod+288) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #25 pc 00000000003eff8c /apex/com.android.art/lib64/libart.so!libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)+816) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #26 pc 000000000077cd80 /apex/com.android.art/lib64/libart.so!libart.so (artQuickToInterpreterBridge+776) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #27 pc 0000000000222378 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #28 pc 0000000000211608 /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #29 pc 0000000004c455f6 /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (de.robv.android.xposed.XposedHelpers.findAndHookMethod+62) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #30 pc 00000000002115a4 /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #31 pc 0000000004c45628 /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (de.robv.android.xposed.XposedHelpers.findAndHookMethod+8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #32 pc 00000000002115a4 /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #33 pc 0000000004c40a4c /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (com.wind.xpatch.proxy.XpatchProxyApplication.hookContextImpl_setOuterContext+48) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #34 pc 0000000000211608 /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #35 pc 0000000004c409f0 /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (com.wind.xpatch.proxy.XpatchProxyApplication.doHook+0) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #36 pc 0000000000211608 /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #37 pc 0000000004c40902 /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (com.wind.xpatch.proxy.XpatchProxyApplication.<clinit>+130) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #38 pc 0000000000218be8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #39 pc 00000000002845c4 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+216) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #40 pc 00000000002bbc88 /apex/com.android.art/lib64/libart.so!libart.so (art::ClassLinker::InitializeClass(art::Thread*, art::Handle<art::mirror::Class>, bool, bool)+1776) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #41 pc 0000000000297754 /apex/com.android.art/lib64/libart.so (art::ClassLinker::EnsureInitialized(art::Thread*, art::Handle<art::mirror::Class>, bool, bool)+156) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #42 pc 00000000005a5020 /apex/com.android.art/lib64/libart.so!libart.so (art::Class_newInstance(_JNIEnv*, _jobject*)+1516) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #43 pc 00000000000c41cc /apex/com.android.art/javalib/arm64/boot.oat (art_jni_trampoline+92) (BuildId: 1130667ac787a42eda3228cde0de377f768bf32d) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #44 pc 00000000002206bc /system/framework/arm64/boot-framework.oat (android.app.AppComponentFactory.instantiateApplication+92) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #45 pc 0000000000212520 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #46 pc 000000000025e24c /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (androidx.core.app.CoreComponentFactory.instantiateApplication+0) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #47 pc 0000000000231204 /system/framework/arm64/boot-framework.oat (android.app.Instrumentation.newApplication+132) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #48 pc 000000000023b578 /system/framework/arm64/boot-framework.oat (android.app.LoadedApk.makeApplication+1032) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #49 pc 000000000035c35c /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.handleBindApplication+5148) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #50 pc 0000000000212520 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #51 pc 00000000001b7fbc /system/framework/framework.jar (android.app.ActivityThread.access$2800+0) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #52 pc 00000000003504b0 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread$H.handleMessage+9856) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #53 pc 00000000006333ec /system/framework/arm64/boot-framework.oat (android.os.Handler.dispatchMessage+188) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #54 pc 0000000000636508 /system/framework/arm64/boot-framework.oat (android.os.Looper.loopOnce+1096) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #55 pc 0000000000636008 /system/framework/arm64/boot-framework.oat (android.os.Looper.loop+536) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #56 pc 0000000000367154 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+5220) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #57 pc 0000000000218be8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #58 pc 00000000002845c4 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+216) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #59 pc 0000000000654f6c /apex/com.android.art/lib64/libart.so!libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1384) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #60 pc 00000000005bc608 /apex/com.android.art/lib64/libart.so!libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #61 pc 00000000000cbf74 /apex/com.android.art/javalib/arm64/boot.oat (art_jni_trampoline+132) (BuildId: 1130667ac787a42eda3228cde0de377f768bf32d) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #62 pc 00000000009338a4 /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+180) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #63 pc 000000000093c338 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+3224) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #64 pc 0000000000218be8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #65 pc 00000000002845c4 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+216) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #66 pc 00000000006556c4 /apex/com.android.art/lib64/libart.so!libart.so (art::JValue art::InvokeWithVarArgs<art::ArtMethod*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+448) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #67 pc 0000000000655b88 /apex/com.android.art/lib64/libart.so!libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+92) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #68 pc 000000000051aa88 /apex/com.android.art/lib64/libart.so!libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+640) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #69 pc 00000000000e9c40 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120) (BuildId: 0fcbdffed3547972d2378d1310236089) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #70 pc 00000000000f6b6c /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+1264) (BuildId: 0fcbdffed3547972d2378d1310236089) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #71 pc 0000000000002634 /system/bin/app_process64 (main+1504) (BuildId: d8fcd9cad5d51e7d76046a7d17ca01cb) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #72 pc 0000000000082304 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+96) (BuildId: a85ef5fb74e0282813cd1edb10854577) 2024-01-08 14:53:47.263 782-782 tombstoned tombstoned E

15198184721 avatar Jan 08 '24 06:01 15198184721