WindySha / Xpatch

This is a tool to repackage apk file, then the apk can load any xposed modules installed in the device. It is another way to hook an app without root device.
Apache License 2.0
2.66k stars 399 forks source link

华为HarmonyOS4,适配API31,运行报错 #130

Open 15198184721 opened 10 months ago

15198184721 commented 10 months ago

打包之后再其他手机正常运行。但是再华为手机HarmonyOS4,运行报错了,日志如下: 使用并非最新版本Xpatch 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A pid: 3273, tid: 3273, name: com.kakao.talk >>> com.kakao.talk <<< 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A uid: 10246 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x100000000 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x0 b4000076b9e921f8 x1 b4000076b9ef2c00 x2 b4000076109aaf40 x3 0000000000000000 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x4 0000007fffa80fb0 x5 8000000000000000 x6 0000000000000010 x7 7f7f7f7f7f7f7f7f 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x8 0000000100000000 x9 65ef6bda27f75a42 x10 00000000ffffffff x11 00000076b9e885fc 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x12 0000000000000020 x13 0000007fffa824b8 x14 0027798e5eff4f51 x15 0000000034155555 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x16 000000769c9300b0 x17 000000769c91f92c x18 00000076ba96a000 x19 b4000076b9ef2c00 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x20 0000000000000001 x21 b4000076b9e921f8 x22 b4000076b9e92080 x23 0000000000000001 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x24 00000076ba0ea000 x25 0000007fffa82b88 x26 000000006f379dc8 x27 000000000000008d 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A x28 0000007fffa82a80 x29 0000007fffa829e0 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A lr 000000761509e1a4 sp 0000007fffa829a0 pc 0000000100000000 pst 0000000060001000 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A backtrace: 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #00 pc 0000000100000000 <unknown> 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #01 pc 000000000029e1a0 /apex/com.android.art/lib64/libart.so!libart.so (art::ClassLinker::MakeInitializedClassesVisiblyInitialized(art::Thread*, bool)+112) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #02 pc 0000000000055f8c /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/lib/arm64/libsandhook.so (MakeInitializedClassVisibilyInitialized+144) (BuildId: b362d0eab572205a4738ffc63402013571414f60) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #03 pc 0000000000222244 /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+148) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #04 pc 0000000000211d0c /apex/com.android.art/lib64/libart.so (nterp_helper+1948) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #05 pc 0000000004c2e7c2 /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (com.swift.sandhook.SandHook.hook+130) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #06 pc 0000000000218be8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #07 pc 00000000002845c4 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+216) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #08 pc 00000000003fd680 /apex/com.android.art/lib64/libart.so!libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+400) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #09 pc 00000000003f84f4 /apex/com.android.art/lib64/libart.so!libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+804) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #10 pc 00000000007a0e98 /apex/com.android.art/lib64/libart.so!libart.so (MterpInvokeStatic+980) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #11 pc 0000000000203994 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #12 pc 0000000004c3d02c /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (com.swift.sandhook.xposedcompat.methodgen.DynamicBridge.hookMethod+232) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #13 pc 00000000003eff8c /apex/com.android.art/lib64/libart.so!libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)+816) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #14 pc 000000000077cd80 /apex/com.android.art/lib64/libart.so!libart.so (artQuickToInterpreterBridge+776) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #15 pc 0000000000222378 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #16 pc 0000000000211608 /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #17 pc 0000000004c45030 /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (de.robv.android.xposed.XposedBridge.hookMethodNative+12) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #18 pc 0000000000218be8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #19 pc 00000000002845c4 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+216) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #20 pc 00000000003fd680 /apex/com.android.art/lib64/libart.so!libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+400) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #21 pc 00000000003f84f4 /apex/com.android.art/lib64/libart.so!libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+804) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #22 pc 00000000007a0e98 /apex/com.android.art/lib64/libart.so!libart.so (MterpInvokeStatic+980) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #23 pc 0000000000203994 /apex/com.android.art/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #24 pc 0000000004c44d6c /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (de.robv.android.xposed.XposedBridge.hookMethod+288) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #25 pc 00000000003eff8c /apex/com.android.art/lib64/libart.so!libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool)+816) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #26 pc 000000000077cd80 /apex/com.android.art/lib64/libart.so!libart.so (artQuickToInterpreterBridge+776) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #27 pc 0000000000222378 /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #28 pc 0000000000211608 /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #29 pc 0000000004c455f6 /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (de.robv.android.xposed.XposedHelpers.findAndHookMethod+62) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #30 pc 00000000002115a4 /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #31 pc 0000000004c45628 /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (de.robv.android.xposed.XposedHelpers.findAndHookMethod+8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #32 pc 00000000002115a4 /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #33 pc 0000000004c40a4c /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (com.wind.xpatch.proxy.XpatchProxyApplication.hookContextImpl_setOuterContext+48) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #34 pc 0000000000211608 /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #35 pc 0000000004c409f0 /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (com.wind.xpatch.proxy.XpatchProxyApplication.doHook+0) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #36 pc 0000000000211608 /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #37 pc 0000000004c40902 /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (com.wind.xpatch.proxy.XpatchProxyApplication.<clinit>+130) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #38 pc 0000000000218be8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #39 pc 00000000002845c4 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+216) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #40 pc 00000000002bbc88 /apex/com.android.art/lib64/libart.so!libart.so (art::ClassLinker::InitializeClass(art::Thread*, art::Handle<art::mirror::Class>, bool, bool)+1776) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #41 pc 0000000000297754 /apex/com.android.art/lib64/libart.so (art::ClassLinker::EnsureInitialized(art::Thread*, art::Handle<art::mirror::Class>, bool, bool)+156) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #42 pc 00000000005a5020 /apex/com.android.art/lib64/libart.so!libart.so (art::Class_newInstance(_JNIEnv*, _jobject*)+1516) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #43 pc 00000000000c41cc /apex/com.android.art/javalib/arm64/boot.oat (art_jni_trampoline+92) (BuildId: 1130667ac787a42eda3228cde0de377f768bf32d) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #44 pc 00000000002206bc /system/framework/arm64/boot-framework.oat (android.app.AppComponentFactory.instantiateApplication+92) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #45 pc 0000000000212520 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #46 pc 000000000025e24c /data/app/~~kPZBqWGt6WItozpEfPLZrA==/com.kakao.talk-Wuf41hjm12RGLYcTEDq8zw==/oat/arm64/base.vdex (androidx.core.app.CoreComponentFactory.instantiateApplication+0) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #47 pc 0000000000231204 /system/framework/arm64/boot-framework.oat (android.app.Instrumentation.newApplication+132) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #48 pc 000000000023b578 /system/framework/arm64/boot-framework.oat (android.app.LoadedApk.makeApplication+1032) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #49 pc 000000000035c35c /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.handleBindApplication+5148) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #50 pc 0000000000212520 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #51 pc 00000000001b7fbc /system/framework/framework.jar (android.app.ActivityThread.access$2800+0) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #52 pc 00000000003504b0 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread$H.handleMessage+9856) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #53 pc 00000000006333ec /system/framework/arm64/boot-framework.oat (android.os.Handler.dispatchMessage+188) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #54 pc 0000000000636508 /system/framework/arm64/boot-framework.oat (android.os.Looper.loopOnce+1096) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #55 pc 0000000000636008 /system/framework/arm64/boot-framework.oat (android.os.Looper.loop+536) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #56 pc 0000000000367154 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+5220) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #57 pc 0000000000218be8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #58 pc 00000000002845c4 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+216) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #59 pc 0000000000654f6c /apex/com.android.art/lib64/libart.so!libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1384) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #60 pc 00000000005bc608 /apex/com.android.art/lib64/libart.so!libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #61 pc 00000000000cbf74 /apex/com.android.art/javalib/arm64/boot.oat (art_jni_trampoline+132) (BuildId: 1130667ac787a42eda3228cde0de377f768bf32d) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #62 pc 00000000009338a4 /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+180) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #63 pc 000000000093c338 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+3224) (BuildId: 36323b301d4e14a2b877db5c254a4290bfe910a8) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #64 pc 0000000000218be8 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #65 pc 00000000002845c4 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+216) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #66 pc 00000000006556c4 /apex/com.android.art/lib64/libart.so!libart.so (art::JValue art::InvokeWithVarArgs<art::ArtMethod*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+448) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #67 pc 0000000000655b88 /apex/com.android.art/lib64/libart.so!libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+92) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #68 pc 000000000051aa88 /apex/com.android.art/lib64/libart.so!libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+640) (BuildId: 4735a57f2dca29c0b54f64550626670f) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #69 pc 00000000000e9c40 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120) (BuildId: 0fcbdffed3547972d2378d1310236089) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #70 pc 00000000000f6b6c /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+1264) (BuildId: 0fcbdffed3547972d2378d1310236089) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #71 pc 0000000000002634 /system/bin/app_process64 (main+1504) (BuildId: d8fcd9cad5d51e7d76046a7d17ca01cb) 2024-01-08 14:53:47.252 3312-3312 DEBUG pid-3312 A #72 pc 0000000000082304 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+96) (BuildId: a85ef5fb74e0282813cd1edb10854577) 2024-01-08 14:53:47.263 782-782 tombstoned tombstoned E