Closed yujincheng08 closed 1 year ago
又找到一些log希望又帮助 @ganyao114 使用的Sandhook版本是4.2.1
07-16 01:04:54.836 27875 27875 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
07-16 01:04:54.836 27875 27875 F DEBUG : Build fingerprint: 'Xiaomi/umi/umi:10/QKQ1.191117.002/V12.0.1.0.QJBCNXM:user/release-keys'
07-16 01:04:54.836 27875 27875 F DEBUG : Revision: '0'
07-16 01:04:54.836 27875 27875 F DEBUG : ABI: 'arm'
07-16 01:04:54.837 27875 27875 F DEBUG : Timestamp: 2020-07-16 01:04:54+0800
07-16 01:04:54.837 27875 27875 F DEBUG : pid: 27804, tid: 27804, name: libili.app.blue >>> com.bilibili.app.blue <<<
07-16 01:04:54.837 27875 27875 F DEBUG : uid: 10192
07-16 01:04:54.837 27875 27875 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x12f8ef60
07-16 01:04:54.837 27875 27875 F DEBUG : r0 12f8ef20 r1 0000000c r2 00000000 r3 e1a54558
07-16 01:04:54.837 27875 27875 F DEBUG : r4 000018f0 r5 e1a55e48 r6 00000000 r7 e1a55e48
07-16 01:04:54.837 27875 27875 F DEBUG : r8 00200100 r9 000020ec r10 00000000 r11 0000001c
07-16 01:04:54.837 27875 27875 F DEBUG : ip 00000035 sp ffbc7710 lr f0ad2951 pc f0ad291c
07-16 01:04:55.923 27875 27875 F DEBUG :
07-16 01:04:55.923 27875 27875 F DEBUG : backtrace:
07-16 01:04:55.923 27875 27875 F DEBUG : #00 pc 002e991c /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x1dc000) (_ZN3art6mirror5Class25GetDeclaredMethodInternalILNS_11PointerSizeE4ELb0EEENS_6ObjPtrINS0_6MethodEEEPNS_6ThreadENS4_IS1_EENS4_INS0_6StringEEENS4_INS0_11ObjectArrayIS1_EEEERKNSt3__18functionIFNS_9hiddenapi13AccessContextEvEEE+196) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.923 27875 27875 F DEBUG : #01 pc 0031987f /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x2ee000) (art::Class_getDeclaredMethodInternal(_JNIEnv*, _jobject*, _jstring*, _jobjectArray*)+110) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.923 27875 27875 F DEBUG : #02 pc 005f97e7 /system/framework/arm/boot.oat (art_jni_trampoline+110) (BuildId: 5ba93039439621bece8ffce184fb4f849cad0ba5)
07-16 01:04:55.923 27875 27875 F DEBUG : #03 pc 005f99e9 /system/framework/arm/boot.oat (java.lang.Class.getMethod+320) (BuildId: 5ba93039439621bece8ffce184fb4f849cad0ba5)
07-16 01:04:55.923 27875 27875 F DEBUG : #04 pc 005fbbcd /system/framework/arm/boot.oat (java.lang.Class.getDeclaredMethod+52) (BuildId: 5ba93039439621bece8ffce184fb4f849cad0ba5)
07-16 01:04:55.923 27875 27875 F DEBUG : #05 pc 000d8bc5 /apex/com.android.runtime/lib/libart.so (art_quick_invoke_stub_internal+68) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.923 27875 27875 F DEBUG : #06 pc 00441f59 /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (art_quick_invoke_stub+248) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.923 27875 27875 F DEBUG : #07 pc 000e0f81 /apex/com.android.runtime/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+168) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.923 27875 27875 F DEBUG : #08 pc 00215663 /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x1dc000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+270) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.923 27875 27875 F DEBUG : #09 pc 00211857 /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x1dc000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+738) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.923 27875 27875 F DEBUG : #10 pc 0043c743 /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (MterpInvokeVirtualQuick+458) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.923 27875 27875 F DEBUG : #11 pc 000d7594 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_virtual_quick+20) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.923 27875 27875 F DEBUG : #12 pc 05646826 /data/app/com.bilibili.app.blue-iyBRqX2TLq8YEsS4nHf_Sg==/oat/arm/base.vdex (com.swift.sandhook.wrapper.StubMethodsFactory.getStubMethod+70)
07-16 01:04:55.923 27875 27875 F DEBUG : #13 pc 00439abb /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (MterpInvokeStatic+934) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.923 27875 27875 F DEBUG : #14 pc 000d3994 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_static+20) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.923 27875 27875 F DEBUG : #15 pc 0564892e /data/app/com.bilibili.app.blue-iyBRqX2TLq8YEsS4nHf_Sg==/oat/arm/base.vdex (com.swift.sandhook.xposedcompat.hookstub.HookStubManager.getStubMethodPair+190)
07-16 01:04:55.924 27875 27875 F DEBUG : #16 pc 00439abb /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (MterpInvokeStatic+934) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #17 pc 000d3994 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_static+20) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #18 pc 05648792 /data/app/com.bilibili.app.blue-iyBRqX2TLq8YEsS4nHf_Sg==/oat/arm/base.vdex (com.swift.sandhook.xposedcompat.hookstub.HookStubManager.getHookMethodEntity+190)
07-16 01:04:55.924 27875 27875 F DEBUG : #19 pc 00439abb /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (MterpInvokeStatic+934) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #20 pc 000d3994 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_static+20) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #21 pc 05652860 /data/app/com.bilibili.app.blue-iyBRqX2TLq8YEsS4nHf_Sg==/oat/arm/base.vdex (com.swift.sandhook.xposedcompat.methodgen.DynamicBridge.hookMethod+200)
07-16 01:04:55.924 27875 27875 F DEBUG : #22 pc 00439abb /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (MterpInvokeStatic+934) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #23 pc 000d3994 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_static+20) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #24 pc 056593d4 /data/app/com.bilibili.app.blue-iyBRqX2TLq8YEsS4nHf_Sg==/oat/arm/base.vdex (de.robv.android.xposed.XposedBridge.hookMethodNative+12)
07-16 01:04:55.924 27875 27875 F DEBUG : #25 pc 00439abb /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (MterpInvokeStatic+934) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #26 pc 000d3994 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_static+20) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #27 pc 0565910c /data/app/com.bilibili.app.blue-iyBRqX2TLq8YEsS4nHf_Sg==/oat/arm/base.vdex (de.robv.android.xposed.XposedBridge.hookMethod+296)
07-16 01:04:55.924 27875 27875 F DEBUG : #28 pc 00439abb /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (MterpInvokeStatic+934) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #29 pc 000d3994 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_static+20) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #30 pc 0565927e /data/app/com.bilibili.app.blue-iyBRqX2TLq8YEsS4nHf_Sg==/oat/arm/base.vdex (de.robv.android.xposed.XposedBridge.hookAllConstructors+30)
07-16 01:04:55.924 27875 27875 F DEBUG : #31 pc 00439abb /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (MterpInvokeStatic+934) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #32 pc 000d3994 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_static+20) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #33 pc 00024558 [anon:dalvik-classes.dex extracted in memory from /data/app/com.bilibili.app.blue-iyBRqX2TLq8YEsS4nHf_Sg==/lib/arm/libxpatch_xp_module_0.so] (b.b.a.f.c0)
07-16 01:04:55.924 27875 27875 F DEBUG : #34 pc 00439abb /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (MterpInvokeStatic+934) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #35 pc 000d3994 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_static+20) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #36 pc 0008f056 [anon:dalvik-classes.dex extracted in memory from /data/app/com.bilibili.app.blue-iyBRqX2TLq8YEsS4nHf_Sg==/lib/arm/libxpatch_xp_module_0.so] (a.a.a.b.d.a+130)
07-16 01:04:55.924 27875 27875 F DEBUG : #37 pc 00437543 /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (MterpInvokeVirtual+1226) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #38 pc 000d3814 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_virtual+20) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #39 pc 0008c580 [anon:dalvik-classes.dex extracted in memory from /data/app/com.bilibili.app.blue-iyBRqX2TLq8YEsS4nHf_Sg==/lib/arm/libxpatch_xp_module_0.so] (me.iacn.biliroaming.XposedInit.a+4)
07-16 01:04:55.924 27875 27875 F DEBUG : #40 pc 00439abb /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (MterpInvokeStatic+934) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #41 pc 000d3994 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_static+20) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #42 pc 0008c386 [anon:dalvik-classes.dex extracted in memory from /data/app/com.bilibili.app.blue-iyBRqX2TLq8YEsS4nHf_Sg==/lib/arm/libxpatch_xp_module_0.so] (me.iacn.biliroaming.XposedInit$c.beforeHookedMethod+938)
07-16 01:04:55.924 27875 27875 F DEBUG : #43 pc 0043c9ad /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (MterpInvokeVirtualQuick+1076) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #44 pc 000d7594 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_virtual_quick+20) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.924 27875 27875 F DEBUG : #45 pc 0565856c /data/app/com.bilibili.app.blue-iyBRqX2TLq8YEsS4nHf_Sg==/oat/arm/base.vdex (de.robv.android.xposed.XC_MethodHook.callBeforeHookedMethod)
07-16 01:04:55.925 27875 27875 F DEBUG : #46 pc 0043c9ad /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (MterpInvokeVirtualQuick+1076) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.925 27875 27875 F DEBUG : #47 pc 000d7594 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_virtual_quick+20) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.925 27875 27875 F DEBUG : #48 pc 05648dde /data/app/com.bilibili.app.blue-iyBRqX2TLq8YEsS4nHf_Sg==/oat/arm/base.vdex (com.swift.sandhook.xposedcompat.hookstub.HookStubManager.hookBridge+162)
07-16 01:04:55.925 27875 27875 F DEBUG : #49 pc 00439abb /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (MterpInvokeStatic+934) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.925 27875 27875 F DEBUG : #50 pc 000d3994 /apex/com.android.runtime/lib/libart.so (mterp_op_invoke_static+20) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.925 27875 27875 F DEBUG : #51 pc 056495c0 /data/app/com.bilibili.app.blue-iyBRqX2TLq8YEsS4nHf_Sg==/oat/arm/base.vdex (com.swift.sandhook.xposedcompat.hookstub.MethodHookerStubs32.stub_hook_1+32)
07-16 01:04:55.925 27875 27875 F DEBUG : #52 pc 001f167f /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x1dc000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.2416103670385422949+166) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.925 27875 27875 F DEBUG : #53 pc 001f6093 /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x1dc000) (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+122) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.925 27875 27875 F DEBUG : #54 pc 0042b9b3 /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (artQuickToInterpreterBridge+866) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.925 27875 27875 F DEBUG : #55 pc 000dd5a1 /apex/com.android.runtime/lib/libart.so (art_quick_to_interpreter_bridge+32) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.925 27875 27875 F DEBUG : #56 pc 00bf1319 /system/framework/arm/boot-framework.oat (android.app.ActivityThread.handleBindApplication+7024) (BuildId: 09dc7f3c279cf0ab629a6da4b41ce62285f4555f)
07-16 01:04:55.925 27875 27875 F DEBUG : #57 pc 00be79d5 /system/framework/arm/boot-framework.oat (android.app.ActivityThread$H.handleMessage+6772) (BuildId: 09dc7f3c279cf0ab629a6da4b41ce62285f4555f)
07-16 01:04:55.925 27875 27875 F DEBUG : #58 pc 0137dbf1 /system/framework/arm/boot-framework.oat (android.os.Handler.dispatchMessage+136) (BuildId: 09dc7f3c279cf0ab629a6da4b41ce62285f4555f)
07-16 01:04:55.925 27875 27875 F DEBUG : #59 pc 01384abd /system/framework/arm/boot-framework.oat (android.os.Looper.loop+1340) (BuildId: 09dc7f3c279cf0ab629a6da4b41ce62285f4555f)
07-16 01:04:55.925 27875 27875 F DEBUG : #60 pc 00bf8765 /system/framework/arm/boot-framework.oat (android.app.ActivityThread.main+756) (BuildId: 09dc7f3c279cf0ab629a6da4b41ce62285f4555f)
07-16 01:04:55.925 27875 27875 F DEBUG : #61 pc 000d8bc5 /apex/com.android.runtime/lib/libart.so (art_quick_invoke_stub_internal+68) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.925 27875 27875 F DEBUG : #62 pc 0044206b /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (art_quick_invoke_static_stub+246) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.925 27875 27875 F DEBUG : #63 pc 000e0f95 /apex/com.android.runtime/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+188) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.925 27875 27875 F DEBUG : #64 pc 0037e807 /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x33f000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+54) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.925 27875 27875 F DEBUG : #65 pc 0037fcf5 /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x33f000) (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned int)+872) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.925 27875 27875 F DEBUG : #66 pc 00329d9b /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x2ee000) (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+30) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.925 27875 27875 F DEBUG : #67 pc 005f97e7 /system/framework/arm/boot.oat (art_jni_trampoline+110) (BuildId: 5ba93039439621bece8ffce184fb4f849cad0ba5)
07-16 01:04:55.925 27875 27875 F DEBUG : #68 pc 01d87b3b /system/framework/arm/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+114) (BuildId: 09dc7f3c279cf0ab629a6da4b41ce62285f4555f)
07-16 01:04:55.925 27875 27875 F DEBUG : #69 pc 01da2771 /system/framework/arm/boot-framework.oat (com.android.internal.os.ZygoteInit.main+1888) (BuildId: 09dc7f3c279cf0ab629a6da4b41ce62285f4555f)
07-16 01:04:55.925 27875 27875 F DEBUG : #70 pc 000d8bc5 /apex/com.android.runtime/lib/libart.so (art_quick_invoke_stub_internal+68) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.926 27875 27875 F DEBUG : #71 pc 0044206b /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x387000) (art_quick_invoke_static_stub+246) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.926 27875 27875 F DEBUG : #72 pc 000e0f95 /apex/com.android.runtime/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+188) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.926 27875 27875 F DEBUG : #73 pc 0037e807 /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x33f000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+54) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.926 27875 27875 F DEBUG : #74 pc 0037e5a3 /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x33f000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+290) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.926 27875 27875 F DEBUG : #75 pc 002c4ce1 /apex/com.android.runtime/lib/libart.so!libart.so (offset 0x1dc000) (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+492) (BuildId: 422386db5b3b24277572750a06bcffa0)
07-16 01:04:55.926 27875 27875 F DEBUG : #76 pc 000876a9 /system/lib/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+28) (BuildId: ec2a04b214a7252a029a1b00a9b71750)
07-16 01:04:55.926 27875 27875 F DEBUG : #77 pc 00089cd1 /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+552) (BuildId: ec2a04b214a7252a029a1b00a9b71750)
07-16 01:04:55.926 27875 27875 F DEBUG : #78 pc 000023bd /system/bin/app_process32 (main+880) (BuildId: 225b439036e590753eec73eeb0a320c5)
07-16 01:04:55.926 27875 27875 F DEBUG : #79 pc 0005ba83 /apex/com.android.runtime/lib/bionic/libc.so (__libc_init+66) (BuildId: 4f277b45cdd6aba6dbf234937ed923c5)
07-16 01:04:55.926 27875 27875 F DEBUG : #80 pc 00002037 /system/bin/app_process32 (_start_main+46) (BuildId: 225b439036e590753eec73eeb0a320c5)
07-16 01:04:55.926 27875 27875 F DEBUG : #81 pc 0002fd71 /apex/com.android.runtime/bin/linker!ld-android.so (offset 0x1f000) (__dl__ZN6soinfoD1Ev+16) (BuildId: 059a0eecab06d03be09c64424bc2695e)
07-16 01:04:55.926 27875 27875 F DEBUG : #82 pc 007fe6a3 [stack]
使用Xpatch(基于sandhook)打包插件入应用之后,有一定概率打开应用会闪退。但是使用基于sandhook的EdXposed没遇到过。Xpatch作者说大概率是sandhook问题WindySha/Xpatch#59。相关日志如下: