Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Redmi Note 8 MIUI 12 Android 10 system_server crash, Cause: execute-only (no-read) memory access error; likely due to data in .text. #72

Closed
Jokerman1991 opened this issue Dec 2, 2020 · 3 comments

Comments

@Jokerman1991
Copy link

--------- beginning of crash

2020-12-02 16:19:54.217 1684-1684/? A/libc: Fatal signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x6f88b83bd0 in tid 1684 (system_server), pid 1684 (system_server)
2020-12-02 16:19:54.336 1742-1742/? I/crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone
2020-12-02 16:19:54.338 1742-1742/? I/crash_dump64: performing dump of process 1684 (target tid = 1684)
2020-12-02 16:19:54.364 1742-1742/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: Build fingerprint: 'xiaomi/ginkgo/ginkgo:10/QKQ1.200114.002/20.11.11:user/release-keys'
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: Revision: '0'
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: ABI: 'arm64'
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: Timestamp: 2020-12-02 16:19:54+0800
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: pid: 1684, tid: 1684, name: system_server >>> zygote64 <<<
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: uid: 1000
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x6f88b83bd0
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: Cause: execute-only (no-read) memory access error; likely due to data in .text.
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x0 000000700eced510 x1 0000006f88b83bd0 x2 0000000000000010 x3 0000007fef050738
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x4 0000000000000001 x5 0000000000000004 x6 0000007fef05055c x7 0000000000000000
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x8 0000006f7fefccf0 x9 0000000000000002 x10 0000000000000001 x11 0000000000000000
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x12 000000700eea4000 x13 fffffffffc000000 x14 0000000000000020 x15 0000000000000200
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x16 0000006f7ff313f8 x17 0000006f7fef6aac x18 000000700fcc2000 x19 0000000000000001
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x20 0000006f88b83bd0 x21 0000007fef050738 x22 0000006f88b83bd0 x23 0000006f88b83be0
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x24 0000000014000000 x25 0000000036000000 x26 0000000034000000 x27 0000000018000000
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: x28 0000000010000000 x29 0000007fef0506e0
2020-12-02 16:19:54.365 1742-1742/? A/DEBUG: sp 0000007fef050690 lr 0000006f7fefd3b0 pc 0000006f7fefcd38
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: backtrace:
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #00 pc 0000000000037d38 /system/lib64/libsandhook-native.so (SandHook::Decoder::Arm64Decoder::Disassemble(void*, unsigned long, SandHook::Decoder::InstVisitor&, bool)+72) (BuildId: 7836b240d507a8e1d948d7b8233a6f3f0c1a667f)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #1 pc 00000000000383ac /system/lib64/libsandhook-native.so (SandHook::Asm::CodeRelocateA64::Relocate(void*, unsigned long, void*)+112) (BuildId: 7836b240d507a8e1d948d7b8233a6f3f0c1a667f)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #2 pc 0000000000039048 /system/lib64/libsandhook-native.so (SandHook::Hook::InlineHookArm64Android::Hook(void*, void*)+248) (BuildId: 7836b240d507a8e1d948d7b8233a6f3f0c1a667f)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #3 pc 000000000001ef20 /system/lib64/libsandhook.so (hookClassInit+96) (BuildId: 10c3f1cf126ba5c7c65912f115bdcf903c473095)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #4 pc 000000000001ca5c /system/lib64/libsandhook.so (Java_com_swift_sandhook_SandHook_initForPendingHook+116) (BuildId: 10c3f1cf126ba5c7c65912f115bdcf903c473095)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #5 pc 0000000000140350 /apex/com.android.runtime/lib64/libart.so (art_quick_generic_jni_trampoline+144) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #6 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #7 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #8 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #9 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #10 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #11 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #12 pc 0000000000096962 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.swift.sandhook.PendingHookHandler.+14)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #13 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #14 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #15 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #16 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #17 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #18 pc 00000000001723b0 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x157000) (art::ClassLinker::InitializeClass(art::Thread*, art::Handleart::mirror::Class, bool, bool)+2312) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #19 pc 000000000015ced8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x157000) (art::ClassLinker::EnsureInitialized(art::Thread*, art::Handleart::mirror::Class, bool, bool)+92) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #20 pc 00000000002e3894 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+532) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #21 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #22 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #23 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #24 pc 0000000000097636 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.swift.sandhook.SandHook.hook+70)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #25 pc 00000000005a3d44 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+1040) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #26 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #27 pc 00000000000a2276 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.swift.sandhook.coocompat.methodgen.DynamicBridge.hookMethod+238)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #28 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #29 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #30 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.179 1742-1742/? A/DEBUG: #31 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #32 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #33 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #34 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #35 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #36 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #37 pc 0000000000091fc6 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.CooBridge.hookMethodNative+10)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #38 pc 00000000005a3d44 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+1040) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #39 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #40 pc 0000000000091d3a [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.CooBridge.hookMethod+298)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #41 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #42 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #43 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #44 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #45 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #46 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #47 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #48 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #49 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #50 pc 0000000000092492 [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.Coo.findAndHookMethod+62)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #51 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #52 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #53 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #54 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #55 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #56 pc 00000000002e3800 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #57 pc 00000000002dea60 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+892) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #58 pc 00000000005a3aa8 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+372) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #59 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #60 pc 000000000009565c [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.main.onStart+40)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #61 pc 00000000005a3d44 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (MterpInvokeStatic+1040) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #62 pc 0000000000131994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #63 pc 00000000000956de [anon:dalvik-classes.dex extracted in memory from /system/framework/framework-coo.jar] (com.android.framework.coo.main.onSystemServerStart+62)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #64 pc 00000000002b4b14 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.7452927453013456699+240) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #65 pc 000000000059253c /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x4bb000) (artQuickToInterpreterBridge+1032) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #66 pc 0000000000140468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #67 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #68 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #69 pc 00000000004b0f40 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #70 pc 00000000004b0b30 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #71 pc 00000000003bb6b4 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+624) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #72 pc 000000000004c4cc /system/lib64/libriru_CooWind.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: f4440d6707b978318fe0f356c8e1decb486cba2b)
2020-12-02 16:19:55.180 1742-1742/? A/DEBUG: #73 pc 000000000004c014 /system/lib64/libriru_CooWind.so (Coo::Context::onSystemServerStart(_JNIEnv*)+268) (BuildId: f4440d6707b978318fe0f356c8e1decb486cba2b)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #74 pc 000000000004c5d4 /system/lib64/libriru_CooWind.so (nativeForkSystemServerPost+32) (BuildId: f4440d6707b978318fe0f356c8e1decb486cba2b)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #75 pc 000000000000bbec /system/lib64/libmemtrack.so (BuildId: b057242d5c6d0ff1bc31a9c75ad7318f94273fe0)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #76 pc 00000000022eefec /system/framework/arm64/boot-framework.oat (art_jni_trampoline+252) (BuildId: c5407c051a8976843c5a4f334b50aaf4fa00e01d)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #77 pc 00000000022f5d0c /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.forkSystemServer+1340) (BuildId: c5407c051a8976843c5a4f334b50aaf4fa00e01d)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #78 pc 00000000022f6fe0 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+1952) (BuildId: c5407c051a8976843c5a4f334b50aaf4fa00e01d)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #79 pc 00000000001375b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #80 pc 000000000014600c /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #81 pc 00000000004b0f40 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #82 pc 00000000004b0b30 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x3ee000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.181 1742-1742/? A/DEBUG: #83 pc 00000000003bb6b4 /apex/com.android.runtime/lib64/libart.so!libart.so (offset 0x297000) (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+624) (BuildId: ab384bba78c42c67d77af1934002f275)
2020-12-02 16:19:55.182 1742-1742/? A/DEBUG: #84 pc 00000000000c19ec /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: 8220b57e0c265b51b59e6f6ff54cd456)
2020-12-02 16:19:55.182 1742-1742/? A/DEBUG: #85 pc 00000000000c49b0 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+944) (BuildId: 8220b57e0c265b51b59e6f6ff54cd456)
2020-12-02 16:19:55.182 1742-1742/? A/DEBUG: #86 pc 00000000000035bc /system/bin/app_process64 (main+1388) (BuildId: 27cd9ba96bffd08740403a49d59f8818)
2020-12-02 16:19:55.182 1742-1742/? A/DEBUG: #87 pc 000000000007e978 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: 85ab2bc1ae7f4dbc4ee5d68f94085e8b)
2020-12-02 16:19:55.485 1742-1742/? E/MIUINDBG: miui_native_debug_process_O

@Jokerman1991
Copy link
Author

还是自己技术水平太渣,是 PendingHook 的逻辑自己没处理好,强行关闭就好了,不是 SandHook 的问题

@guozixie
Copy link

guozixie commented Dec 9, 2020

@Jokerman1991 @ganyao114 这个问题也有碰到,能分享下patch吗?只用了native hook,这个好像是Android 10上面都会碰到,尤其小米和三星

@buffcow
Copy link

buffcow commented Feb 10, 2021

@Jokerman1991 @ganyao114 这个问题也有碰到,能分享下patch吗?只用了native hook,这个好像是Android 10上面都会碰到,尤其小米和三星

解决了吗

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants