Giter Site home page Giter Site logo

changhuapeng / frameworkpatchergo Goto Github PK

View Code? Open in Web Editor NEW
164.0 5.0 19.0 12.9 MB

A Magisk/KernelSU/APatch module to modify framework.jar directly on the phone, to build a valid system-level certificate chain.

Home Page: https://xdaforums.com/t/module-framework-patcher-go.4674536/

Shell 100.00%

frameworkpatchergo's Introduction

Framework Patcher GO

A Magisk/KernelSU/APatch module to modify framework.jar directly on the phone, to build a valid system-level certificate chain.

How to use

If you have your own keybox or fingerprint:

  1. Open FrameworkPatch project in Android Studio.
  2. Add your keybox or fingerprint to Keybox.java or Android.java respectively and do a release build.
  3. Extract compiled classes.dex from the release .apk file.
  4. Copy the classes.dex file and paste it into META-INF/com/google/android/magisk/dex directory of this module.
  5. Install the module in your root manager app.

If you do not have your own keybox or fingerprint:

  1. Simply install the module. The module script will prompt you to download the required classes.dex file during installation.
Alternatively, if you prefer to do it manually:
  1. Download a pre-compiled classes.dex here. This classes.dex is compiled from FrameworkPatch source and contains whatever keybox and fingerprint included there.
  2. Copy the classes.dex file and paste it into META-INF/com/google/android/magisk/dex directory of this module.
  3. Install the module in your root manager app.

Extra Info

XDA thread with FAQs @ https://xdaforums.com/t/module-framework-patcher-go.4674536/

Important

Credits

frameworkpatchergo's People

Contributors

changhuapeng avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar

frameworkpatchergo's Issues

Module Installs, but Device Bootloops

I have tried to install this module on a Pixel 3 XL running the crosshatch-unity-20240512-1420-release build of the PixelBuilds ROM. The module installation completes successfully, however, the device boot loops when I attempt to restart. I used a custom classes.dex file for it.

Contained in attached zip file is the copy of the framework.jar that I extracted from the phone.

framework.zip

If there is any additional information that I can provide to aid in solving this issue, please let me know!

Unfortunately, I did not obtain an install log, but if it would be helpful for you to have one, I do not mind reproducing the issue.

Install fails if hasSystemFeature method not found

First of all, great work on this! I just tried to install it, and everything is fine up to the above item. I believe that portion of the process is optional, so perhaps if that method can't be found, the install should continue rather than exit?

Install log below:

  _  __                    _ ____  _   _ 
 | |/ /___ _ __ _ __   ___| / ___|| | | |
 | ' // _ \ '__| '_ \ / _ \ \___ \| | | |
 | . \  __/ |  | | | |  __/ |___) | |_| |
 |_|\_\___|_|  |_| |_|\___|_|____/ \___/ 

- Preparing image
- Module size: 8.22 MB
- Mounting image
- Current boot slot: _a
- Device is system-as-root
Archive:  /data/user/0/me.weishu.kernelsu/cache/module.zip
  inflating: module.prop
**********************
 Framework Patcher GO 
 by changhuapeng 
**********************
*********************
 Powered by KernelSU 
*********************
Archive:  /data/user/0/me.weishu.kernelsu/cache/module.zip
  inflating: customize.sh
- Extracting module files
Archive:  /data/user/0/me.weishu.kernelsu/cache/module.zip
  inflating: customize.sh
  inflating: module.prop
Getting: busybox
Getting: bash
Getting: bin
Getting: core
------------Device INFO------------
API=34
ABI=arm
ABILONG=arm64-v8a
arch=arm64
arch32=arm
max_arch=arm64
is64bit=true
status=Enforcing
encrypted=true
slot=_a
dynamic_partitions=true
virtual_partitions=true
free_root=0
free_system=1071231320064
free_vendor=0
------------Setup INFO------------
CUSTOM_SETUP=2
TMP=/dev/tmp19970
MODPATH=/data/adb/modules_update/FrameworkPatcherGo
SKIPUNZIP=0
KSU=true
KSU_VER=0.9.4-33-gf381e324
KSU_VER_CODE=11871
KSU_KERNEL_VER_CODE=11871
ARCH=arm64
di_version=4.8-b
main_version=4.8
----------------------------------
 
Currently using: "/dev/tmp19970/ugu/unzip" binary
No possible changes found for: "unzip" binary
 
---------Installer Configs----------
devices=off
apex_mount=off
magisk_support=on
ensure_root=on
import_addons=off
extraction_speed=default
permissions=0:0:0755:0644
-----------------------------------
ZIP: Cant find folder [META-INF/addons]
----------------Running SCRIPTs------------
- Setting common permissions/contexts
 
- Installing from KernelSU app
Installation may seem stuck at times, please wait patiently ...
 
******************************
> Decompiling framework.jar ...
******************************
I: Using Apktool 2.7.0 on framework.jar
I: Baksmaling classes.dex...
I: Baksmaling classes2.dex...
I: Baksmaling classes3.dex...
I: Baksmaling classes4.dex...
I: Baksmaling classes5.dex...
I: Copying assets and libs...
I: Copying unknown files...
I: Copying original files...
 
******************************
> Patching AndroidKeyStoreSpi.smali file...
******************************
--------------------
Patching engineGetCertificateChain method:

    invoke-static {v3}, Lcom/android/internal/util/framework/Android;->engineGetCertificateChain([Ljava/security/cert/Certificate;)[Ljava/security/cert/Certificate;

    move-result-object v3

added.
Edited: "/dev/tmp19970/framework/smali_classes3/android/security/keystore2/AndroidKeyStoreSpi.smali"
--------------------
 
******************************
> Patching Instrumentation.smali file ...
******************************
 
--------------------
Patching newApplication static method:

    invoke-static {p1}, Lcom/android/internal/util/framework/Android;->newApplication(Landroid/content/Context;)V

added.
Edited: "/dev/tmp19970/framework/smali/android/app/Instrumentation.smali"
--------------------
 
--------------------
Patching newApplication method:

    invoke-static {p3}, Lcom/android/internal/util/framework/Android;->newApplication(Landroid/content/Context;)V

added.
Edited: "/dev/tmp19970/framework/smali/android/app/Instrumentation.smali"
--------------------
 
******************************
> Patching ApplicationPackageManager.smali file ...
******************************
sed: unmatched '/'
Name register not found in hasSystemFeature method
 Mounting:auto:ro:1: /dev/block/dm-3 /system_ext
 Mounting:auto:ro:1: /dev/block/dm-4 /vendor
 Mounting:auto:ro:1: /dev/block/dm-1 /product
 Mounting:auto:ro:1: /dev/block/dm-0 /odm
- Error: Failed to install module script
Error: Failed to install module script

EDIT: It could also just be an error with the sed command, upon reviewing the above output...

EDIT 2: Seems like the sed command reporting the error is from line 158 in META-INF/com/google/android/magisk/customize.sh, which uses the "name_regex" variable from line 157. That's the one that seems to be causing the error.

EDIT 3: Okay, I did some actual Debugging by adding a few echo commands to the code to see where that sed error is coming from. This is what I added:

ui_print " "
ui_print "******************************"
ui_print "> Patching ApplicationPackageManager.smali file ..."
ui_print "******************************"
apm_line=$(grep -w "$app_package_manager_file" -e "$apm_method")
echo -e "DEBUG: apm_line: $apm_line"
apm_method_code=$(string -f "$app_package_manager_file" extract "$apm_line" ".end method")
echo -e "DEBUG: apm_method_code: $apm_method_code"

And this is the corresponding log output:

******************************
> Patching ApplicationPackageManager.smali file ...
******************************
DEBUG: apm_line:     invoke-virtual {p0, v0}, Landroid/app/ApplicationPackageManager;->hasSystemFeature(Ljava/lang/String;)Z
.method public whitelist hasSystemFeature(Ljava/lang/String;)Z
sed: unmatched '/'
DEBUG: apm_method_code: 
Name register not found in hasSystemFeature method

So I guess the issue is the apm_method_code variable? Something in that command is causing a sed error, and making that variable end up blank.

The module did not install properly.

magisk:kitsune mask
magisk version:R65C33E4F-kitsune mask(27001)
Phone model: Redmi K40 Gaming(aras)
system version:MIUI 13 22.10.25 Dev
Kernel version:4.14.186-g89d850276fb2

When I was installing the module, Magisk's log directly returned a failure to install.

Error patchinginstrumentation.smali - FrameworkPatcherGO-v1.0.1

android_14.0.0-r35
Voltage os 3.4
MANUFACTURER": "Xiaomi",
"MODEL": "Redmi Note 10 Pro",
"FINGERPRINT": "Redmi/sweet_eea/sweet:13/RKQ1.210614.002/V14.0.9.0.TKFEUXM:user/release-keys",

[******************************

Patching Instrumentation.smali file ...


Method found: .method public static whitelist newApplication(Ljava/lang/Class;Landroid/content/Context;)Landroid/app/Application;
Context register not found in newApplication static method
Mounting:auto:ro:1: /dev/block/dm-4 /system_ext
Mounting:auto:ro:1: /dev/block/dm-1 /vendor
Mounting:auto:ro:1: /dev/block/dm-2 /product
Mounting:auto:ro:1: /dev/block/dm-3 /odm

  • Error: Failed to install module script
    Error: Failed to install module script

KernelSU_install_log_2024-06-10-09-13-04.log](https://github.com/user-attachments/files/15758057/KernelSU_install_log_2024-06-10-09-13-04.log)

Module Installation can't find bash

I tried to install the FrameworkPatcher v1.1.1 on my Pixel 8 with Evolution X ROM and Magisk 27.0.

The Installation fails on my side because it can't find the bash binary.
Magisk install log

I have executed the find command in termux and found the following binaries:

su
:/ # find / -name bash
/data_mirror/data_ce/null/0/com.termux/files/usr/lib/bash
/data_mirror/data_ce/null/0/com.termux/files/usr/bin/bash
/data_mirror/data_ce/null/0/com.termux/files/usr/share/doc/bash
/data_mirror/data_ce/null/0/com.termux/files/usr/include/bash
/data_mirror/data_ce/null/0/com.sonelli.juicessh/files/bin/arm/pie/bash
/dev/tmp17534/bash
/dev/tmp17073/bash
/data/user/0/com.termux/files/usr/lib/bash
/data/user/0/com.termux/files/usr/bin/bash
/data/user/0/com.termux/files/usr/share/doc/bash
/data/user/0/com.termux/files/usr/include/bash
/data/user/0/com.sonelli.juicessh/files/bin/arm/pie/bash
/data/data/com.termux/files/usr/lib/bash
/data/data/com.termux/files/usr/bin/bash
/data/data/com.termux/files/usr/share/doc/bash
/data/data/com.termux/files/usr/include/bash
/data/data/com.sonelli.juicessh/files/bin/arm/pie/bash
/system_ext/etc/bash
/system_ext/bin/bash

Do you need some information from my side?

[Error] keycheck

"error: keycheck" error occurred, causing the module to be unable to install
Using Magisk Alpha c6f07625 (27002)

GMS Crashed

2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A Build fingerprint: 'Redmi/ares/ares:13/TP1A.220624.014/V816.0.3.1.TKJCNXM:user/release-keys'
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A Revision: '0'
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A ABI: 'arm64'
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A Timestamp: 2024-06-14 10:22:27.522576004+0800
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A Process uptime: 3s
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A ZygotePid: 867
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A Cmdline: com.google.android.gms.persistent
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A pid: 6752, tid: 6752, name: .gms.persistent >>> com.google.android.gms.persistent <<<
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A uid: 10130
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x0000000070ccdd10
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x0 0000000071c4feb0 x1 0000000013b41f70 x2 0000000000000001 x3 0000007fdc3dd300
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x4 0000000071851520 x5 0000000000000000 x6 0080000000000000 x7 71636d604b3bff3a
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x8 56e6fda4539c2580 x9 56e6fda4539c2580 x10 0000000013b42140 x11 0000000013b41f70
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x12 0000000010390000 x13 0000000010390000 x14 0000000018300001 x15 0000007c0b7b3e58
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x16 0000000013b42128 x17 000000000004ed08 x18 0000007cb0992000 x19 b400007cb02a2c00
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x20 0000000000000000 x21 0000000000000000 x22 0000000013b41db0 x23 0000000013b42118
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x24 0000007c0b400880 x25 0000007fdc3dd7d0 x26 0000007fdc3dd7d8 x27 0000007fdc3dd7d0
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x28 0000007fdc3dd7e0 x29 0000007fdc3dd7d8
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A lr 0000007bf4e6e908 sp 0000007fdc3dd760 pc 0000000070ccdd10 pst 0000000060001000
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A backtrace:
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #00 pc 0000000000276d10 [anon:dalvik-/system/framework/boot.art]
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #1 pc 0000000000006904 /system/framework/oat/arm64/com.android.location.provider.odex (com.android.location.provider.GeofenceProvider.+116) (BuildId: 107c50c205e8fae848d181abcc3d2df5245a68f3)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #2 pc 000000000020a2b0 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #3 pc 0000000000504950 /product/priv-app/GmsCore/GmsCore.apk (dbol.+0)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #4 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #5 pc 00000000005048aa /product/priv-app/GmsCore/GmsCore.apk (dbok.+22)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #6 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #7 pc 000000000050ac8c /product/priv-app/GmsCore/GmsCore.apk (dbrr.+396)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #8 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #9 pc 0000000000509636 /product/priv-app/GmsCore/GmsCore.apk (com.google.android.location.internal.GoogleLocationManagerChimeraService.onCreate+62)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #10 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #11 pc 000000000040c624 /product/priv-app/GmsCore/GmsCore.apk (hny.onCreate+28)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #12 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #13 pc 00000000004d572a /product/priv-app/GmsCore/GmsCore.apk (zpu.onCreate+30)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #14 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #15 pc 000000000056a0a4 /system/framework/framework.jar (android.app.ActivityThread.handleCreateService+368)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #16 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #17 pc 0000000000565b44 /system/framework/framework.jar (android.app.ActivityThread.-$$Nest$mhandleCreateService+0)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #18 pc 0000000000209334 /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #19 pc 0000000000565154 /system/framework/framework.jar (android.app.ActivityThread$H.handleMessage+1556)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #20 pc 00000000020601f8 /memfd:jit-zygote-cache (deleted) (android.os.Handler.dispatchMessage+184)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #21 pc 000000000220d83c /memfd:jit-zygote-cache (deleted) (android.os.Looper.loopOnce+1068)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #22 pc 0000000002079728 /memfd:jit-zygote-cache (deleted) (android.os.Looper.loop+584)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #23 pc 0000000000209398 /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #24 pc 000000000056c808 /system/framework/framework.jar (android.app.ActivityThread.main+264)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #25 pc 0000000000210c00 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+576) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #26 pc 0000000000279e1c /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+236) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #27 pc 000000000062ad74 /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1396) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #28 pc 00000000005abff0 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+48) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #29 pc 000000000009a148 /system/framework/arm64/boot.oat (art_jni_trampoline+120) (BuildId: 2ef1228f25296a2a3f3b0a54ffd2762d21183678)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #30 pc 0000000002403168 /memfd:jit-zygote-cache (deleted) (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #31 pc 000000000020b0d4 /apex/com.android.art/lib64/libart.so (nterp_helper+7636) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #32 pc 000000000040e008 /system/framework/framework.jar (com.android.internal.os.ZygoteInit.main+664)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #33 pc 0000000000210c00 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+576) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #34 pc 0000000000279e1c /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+236) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #35 pc 000000000062b5b0 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgsart::ArtMethod*(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+448) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #36 pc 000000000062bb5c /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+92) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #37 pc 0000000000510aa8 /apex/com.android.art/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+664) (BuildId: 70011d870c6c7182170268e38f4a5af6)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #38 pc 00000000000c1ce8 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120) (BuildId: 1aae297150b301fbc2d3bc80c0be54c1)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #39 pc 00000000000ce1d8 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+1016) (BuildId: 1aae297150b301fbc2d3bc80c0be54c1)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #40 pc 0000000000002560 /system/bin/app_process64 (main+1280) (BuildId: 49ad4827ab1c2f851ee245d69f06be9f)
2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #41 pc 0000000000085240 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+96) (BuildId: 95768e541c682c20709fc11df6431f16)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.