K40 刷的 PixelOS 更新版本后,大量国内银行类 app 挂了,这算是谁的锅?

6次阅读

共计 1064 个字符,预计需要花费 3 分钟才能阅读完成。

先上个崩溃日志吧:

2024-04-29 14:16:19.805 16883-16883 LOG.OUT                 pid-16883                            W  [FindValidSymbolFromElfFile] Can not found symbols in libdexfile.so

2024-04-29 14:16:19.806 16883-16883 libc                    pid-16883                            A  Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 16883 (nkcomm.maidanba), pid 16883 (nkcomm.maidanba)

……………………


2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A  *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A  PixelOS Version: 'PixelOS_alioth-14.0-20240428-2007'

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A  Build fingerprint: 'Redmi/alioth/alioth:13/TKQ1.220829.002/V14.0.7.0.TKHCNXM:user/release-keys'

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A  Revision: '0'

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A  ABI: 'arm64'

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A  Timestamp: 2024-04-29 14:16:19.857165725+0800

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A  Process uptime: 2s

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A  Cmdline: com.bankcomm.maidanba

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A  pid: 16883, tid: 16883, name: nkcomm.maidanba  >>> com.bankcomm.maidanba <<<

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A  uid: 10324

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A  signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A      x0  0000000000000000  x1  00000000000041f3  x2  0000000000000006  x3  0000007fe64408b0

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A      x4  6d60421f5c646b68  x5  6d60421f5c646b68  x6  6d60421f5c646b68  x7  7f7f7f7f7f7f7f7f

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A      x8  00000000000000f0  x9  0000007daa057ac8  x10 0000000000000001  x11 0000007daa0f3260

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A      x12 0000007fe643f210  x13 0000000000000044  x14 0000007fe6440508  x15 0000000034155555

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A      x16 0000007daa163718  x17 0000007daa13b820  x18 0000007dd38a4000  x19 00000000000041f3

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A      x20 00000000000041f3  x21 00000000ffffffff  x22 0000000000000003  x23 0000000000000010

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A      x24 000000000000002a  x25 0000007dd2a7f180  x26 0000002900000000  x27 b400007d1885ed00

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A      x28 0000007dd26eb16d  x29 0000007fe6440930

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A      lr  0000007daa0e4538  sp  0000007fe6440890  pc  0000007daa0e4564  pst 0000000000001000

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A  2 total frames

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A  backtrace:

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A        #00 pc 00000000000b7564  /apex/com.android.runtime/lib64/bionic/libc.so (abort+164) (BuildId: b94bf7992c3f9c4ab236cfad8cf8a883)

2024-04-29 14:16:20.091 16913-16913 DEBUG                   pid-16913                            A        #01 pc 000000000002ea28  /data/app/~~uOn_oN0xr_480aVPNRkKig==/com.bankcomm.maidanba-LIz5ZZHhLEsa60-4MyREhA==/lib/arm64/libDexHelper.so`

目测是 app 为了校验 classes.dex 是否被篡改那步失败了,所以卡闪屏界面了。现在发现国内很多 app 做了这个加固。真的不知道是谁的问题,如果是 rom 问题,那要考虑换 rom 了。还是有不少常用 app 出现这个问题的。

正文完
 0