asLody / SandHook

Android ART Hook/Native Inline Hook/Single Instruction Hook - support 4.4 - 11.0 32/64 bit - Xposed API Compat

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

部分 MIUI 12 & Android 10 的小米手机,使用 SandHook 出现报错

Jokerman1991 opened this issue · comments

RT,以下是部分日志,想请教下是什么原因,有什么办法能解决吗?

2020-11-18 21:02:27.565 3823-3823/? A/DEBUG: backtrace:
2020-11-18 21:02:27.565 3823-3823/? A/DEBUG: #00 pc 0000000000037d38 /system/lib64/libsandhook-native.so (SandHook::Decoder::Arm64Decoder::Disassemble(void*, unsigned long, SandHook::Decoder::InstVisitor&, bool)+72) (BuildId: 7836b240d507a8e1d948d7b8233a6f3f0c1a667f)
2020-11-18 21:02:27.565 3823-3823/? A/DEBUG: #1 pc 00000000000383ac /system/lib64/libsandhook-native.so (SandHook::Asm::CodeRelocateA64::Relocate(void*, unsigned long, void*)+112) (BuildId: 7836b240d507a8e1d948d7b8233a6f3f0c1a667f)
2020-11-18 21:02:27.565 3823-3823/? A/DEBUG: #2 pc 0000000000039048 /system/lib64/libsandhook-native.so (SandHook::Hook::InlineHookArm64Android::Hook(void*, void*)+248) (BuildId: 7836b240d507a8e1d948d7b8233a6f3f0c1a667f)
2020-11-18 21:02:27.565 3823-3823/? A/DEBUG: #3 pc 000000000002060c /system/lib64/libsandhook.so (hookClassInit+96) (BuildId: 3d65fe7ec763668d7cffb20e1b03723f6e315705)
2020-11-18 21:02:27.565 3823-3823/? A/DEBUG: #4 pc 000000000001ce48 /system/lib64/libsandhook.so (Java_com_swift_sandhook_SandHook_initForPendingHook+116) (BuildId: 3d65fe7ec763668d7cffb20e1b03723f6e315705)
2020-11-18 21:02:27.565 3823-3823/? A/DEBUG: #5 pc 0000000000140350 /apex/com.android.runtime/lib64/libart.so (art_quick_generic_jni_trampoline+144) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.565 3823-3823/? A/DEBUG: #6 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #7 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #8 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #9 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #10 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #11 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #12 pc 00000000000969a6 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.swift.sandhook.PendingHookHandler.+22)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #13 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #14 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #15 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #16 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #17 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #18 pc 00000000001723b0 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x157000) (art::ClassLinker::InitializeClass(art::Thread*, art::Handleart::mirror::Class, bool, bool)+2312) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #19 pc 000000000015ced8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x157000) (art::ClassLinker::EnsureInitialized(art::Thread*, art::Handleart::mirror::Class, bool, bool)+92) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #20 pc 00000000002e3894 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+532) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #21 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #22 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #23 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #24 pc 000000000009773a [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.swift.sandhook.SandHook.hook+70)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #25 pc 00000000005a3d44 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+1040) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #26 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #27 pc 00000000000a23a2 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.swift.sandhook.coocompat.methodgen.DynamicBridge.hookMethod+238)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #28 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #29 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #30 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #31 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #32 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #33 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #34 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #35 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #36 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #37 pc 0000000000092002 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.CooBridge.hookMethodNative+10)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #38 pc 00000000005a3d44 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+1040) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #39 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #40 pc 0000000000091d76 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.CooBridge.hookMethod+298)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #41 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.566 3823-3823/? A/DEBUG: #42 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #43 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #44 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #45 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #46 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #47 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #48 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #49 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #50 pc 00000000000924ce [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.Coo.findAndHookMethod+62)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #51 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #52 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #53 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #54 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #55 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #56 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #57 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #58 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #59 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #60 pc 0000000000095698 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.main.onStart+40)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #61 pc 00000000005a3d44 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+1040) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #62 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #63 pc 000000000009571a [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.main.onSystemServerStart+62)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #64 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #65 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #66 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #67 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #68 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #69 pc 00000000004b0f40 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #70 pc 00000000004b0b30 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #71 pc 00000000003bb6b4 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+624) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #72 pc 000000000004c4cc /system/lib64/libriru_CooWind.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: f4440d6707b978318fe0f356c8e1decb486cba2b)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #73 pc 000000000004c014 /system/lib64/libriru_CooWind.so (Coo::Context::onSystemServerStart(_JNIEnv*)+268) (BuildId: f4440d6707b978318fe0f356c8e1decb486cba2b)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #74 pc 000000000004c5d4 /system/lib64/libriru_CooWind.so (nativeForkSystemServerPost+32) (BuildId: f4440d6707b978318fe0f356c8e1decb486cba2b)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #75 pc 000000000000bbec /system/lib64/libmemtrack.so (BuildId: b057242d5c6d0ff1bc31a9c75ad7318f94273fe0)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #76 pc 00000000022eefec /system/framework/arm64/boot-framework.oat (art_jni_trampoline+252) (BuildId: c5407c051a8976843c5a4f334b50aaf4fa00e01d)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #77 pc 00000000022f5d0c /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.forkSystemServer+1340) (BuildId: c5407c051a8976843c5a4f334b50aaf4fa00e01d)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #78 pc 00000000022f6fe0 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+1952) (BuildId: c5407c051a8976843c5a4f334b50aaf4fa00e01d)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #79 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #80 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #81 pc 00000000004b0f40 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #82 pc 00000000004b0b30 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #83 pc 00000000003bb6b4 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+624) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #84 pc 00000000000c19ec /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: 8220b57e0c265b51b59e6f6ff54cd456)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #85 pc 00000000000c49b0 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+944) (BuildId: 8220b57e0c265b51b59e6f6ff54cd456)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #86 pc 00000000000035bc /system/bin/app_process64 (main+1388) (BuildId: 27cd9ba96bffd08740403a49d59f8818)
2020-11-18 21:02:27.567 3823-3823/? A/DEBUG: #87 pc 000000000007e978 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: 85ab2bc1ae7f4dbc4ee5d68f94085e8b)

已经解决了,昨天用SandHook最新代码往自己项目里合的时候,漏合了一个文件,今天用 DiffMerge 发现了,然后重新编译没问题了。