K40 刷的 PixelOS 更新版本后,大量国内银行类 app 挂了,这算是谁的锅? - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
paranoiagu
V2EX    Android

K40 刷的 PixelOS 更新版本后,大量国内银行类 app 挂了,这算是谁的锅?

  •  1
     
  •   paranoiagu 2024-04-29 14:27:27 +08:00 11850 次点击
    这是一个创建于 579 天前的主题,其中的信息可能已经有所发展或是发生改变。

    先上个崩溃日志吧:

    2024-04-29 14:16:19.805 16883-16883 LOG.OUT pid-16883 W [FindValidSymbolFromElfFile] Can not found symbols in libdexfile.so 2024-04-29 14:16:19.806 16883-16883 libc pid-16883 A Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 16883 (nkcomm.maidanba), pid 16883 (nkcomm.maidanba) …………………… 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A PixelOS Version: 'PixelOS_alioth-14.0-20240428-2007' 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A Build fingerprint: 'Redmi/alioth/alioth:13/TKQ1.220829.002/V14.0.7.0.TKHCNXM:user/release-keys' 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A Revision: '0' 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A ABI: 'arm64' 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A Timestamp: 2024-04-29 14:16:19.857165725+0800 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A Process uptime: 2s 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A Cmdline: com.bankcomm.maidanba 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A pid: 16883, tid: 16883, name: nkcomm.maidanba >>> com.bankcomm.maidanba <<< 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A uid: 10324 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr -------- 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A x0 0000000000000000 x1 00000000000041f3 x2 0000000000000006 x3 0000007fe64408b0 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A x4 6d60421f5c646b68 x5 6d60421f5c646b68 x6 6d60421f5c646b68 x7 7f7f7f7f7f7f7f7f 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A x8 00000000000000f0 x9 0000007daa057ac8 x10 0000000000000001 x11 0000007daa0f3260 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A x12 0000007fe643f210 x13 0000000000000044 x14 0000007fe6440508 x15 0000000034155555 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A x16 0000007daa163718 x17 0000007daa13b820 x18 0000007dd38a4000 x19 00000000000041f3 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A x20 00000000000041f3 x21 00000000ffffffff x22 0000000000000003 x23 0000000000000010 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A x24 000000000000002a x25 0000007dd2a7f180 x26 0000002900000000 x27 b400007d1885ed00 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A x28 0000007dd26eb16d x29 0000007fe6440930 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A lr 0000007daa0e4538 sp 0000007fe6440890 pc 0000007daa0e4564 pst 0000000000001000 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A 2 total frames 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A backtrace: 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A #00 pc 00000000000b7564 /apex/com.android.runtime/lib64/bionic/libc.so (abort+164) (BuildId: b94bf7992c3f9c4ab236cfad8cf8a883) 2024-04-29 14:16:20.091 16913-16913 DEBUG pid-16913 A #01 pc 000000000002ea28 /data/app/~~uOn_oN0xr_480aVPNRkKig==/com.bankcomm.maidanba-LIz5ZZHhLEsa60-4MyREhA==/lib/arm64/libDexHelper.so` 

    目测是 app 为了校验 classes.dex 是否被篡改那步失败了,所以卡闪屏界面了。现在发现国内很多 app 做了这个加固。真的不知道是谁的问题,如果是 rom 问题,那要考虑换 rom 了。还是有不少常用 app 出现这个问题的。

    15 条回复    2025-01-13 18:19:17 +08:00
    zhouyin
        1
    zhouyin  
       2024-04-29 14:28:56 +08:00 via Android
    刷欧版小米好了 我一加 8t 刷了 lineageos 很多银行 app 根本无法用 magisk 都不行
    甚至浙里办也不能用
    Xunit
        2
    Xunit  
       2024-04-29 15:44:37 +08:00   1
    如果是最新的 lineageos21 ,那是 app 的问题,没适配最新的 qpr2
    Xunit
        3
    Xunit  
       2024-04-29 15:45:04 +08:00   1
    @Xunit 说错了,lineageos 21 -> aosp 14
    paranoiagu
        4
    paranoiagu  
    OP
       2024-04-29 18:29:11 +08:00 via Android
    @Xunit 确实是 qpr2 ,但是感觉这个问题不是 qpr2 导致的
    xiaoranj
        5
    xiaoranj  
       2024-04-29 22:06:57 +08:00
    非原厂系统检测
    iminto
        6
    iminto  
       2024-04-29 22:36:20 +08:00 via Android
    是的,谷歌的 14 qpr2 导致的。
    Scars
        7
    Scars  
       2024-04-30 09:09:28 +08:00   1
    Android 14 的 qpr2 似乎把 art 虚拟机做了些修改,导致包括国内银行在内的大部分上了梆梆企业加固的 app 崩溃,只能等梆梆加固更新->app 适配新版梆梆,不然只能回退 ROM 版本
    terabithia
        8
    terabithia  
       2024-04-30 09:11:21 +08:00
    一加 6T LineageOS 21 更新到 QPR2 后也是银行 APP 基本上都挂了,目前知道的农行和招行没问题。但也只有银行类 APP 用不了,其他的暂时还没发现。
    psklf
        9
    psklf  
       2024-04-30 09:31:51 +08:00   1
    @terabithia #8 没错,招行技术还是领先,我直接 Play 市场安装的,没啥问题。
    anonymous64
        10
    anonymous64  
       2024-04-30 09:52:32 +08:00
    我的 grapheneOS 当时也是 QPR2 后银行打不开,不过一个多礼拜就修复了
    https://grapheneos.org/releases#2024032100

    Android Runtime: disable stripping symbols for libart to restore compatibility with some popular obfuscated Chinese apps using a specific obfuscation SDK depending on private APIs which was broken by Android 14 QPR2 when not using the mainline ART module based on older code like the stock Pixel OS (does not result in any lost storage space, just slightly larger factory images / updates as if we'd bundled another small app)
    paranoiagu
        11
    paranoiagu  
    OP
       2024-04-30 18:38:49 +08:00 via Android   1
    @terabithia 发现 play 上能下到的 app 基本都没问题,招行就是。
    paranoiagu
        12
    paranoiagu  
    OP
       2024-04-30 21:00:31 +08:00 via Android
    @anonymous64 这个厉害,希望 pixelos 也能一样搞
    paranoiagu
        13
    paranoiagu  
    OP
       2024-05-09 20:13:26 +08:00
    @anonymous64 感谢,根据你提供的信息,自己编译了 rom ,银行 app 们复活了。
    hiwind
        14
    hiwind  
       320 天前
    妈耶 google 下的 alipay 也不行 看了 logcat 貌似也是这个 dex 文件问题
    paranoiagu
        15
    paranoiagu  
    OP
       320 天前 via Android
    @dejavuwind 貌似那时候,支付宝是没问题的
    关于     帮助文档     自助推广系统     博客     API     FAQ     Solana     822 人在线   最高记录 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 78ms UTC 21:30 PVG 05:30 LAX 13:30 JFK 16:30
    Do have faith in what you're doing.
    ubao msn snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86