Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

seccomp prevented call to disallowed arm64 system call 300 #54

Closed
lozn00 opened this issue May 9, 2019 · 0 comments
Closed

seccomp prevented call to disallowed arm64 system call 300 #54

lozn00 opened this issue May 9, 2019 · 0 comments

Comments

@lozn00
Copy link

lozn00 commented May 9, 2019

三星A70 9.0系统 hook fstatat64 出现seccomp prevented call to disallowed arm64 system call 300

A/libc: Fatal signal 31 (SIGSYS), code 1 (SYS_SECCOMP) in tid 6546 (.fileredirect:x), pid 6546 (.fileredirect:x)
2019-05-09 19:06:04.185 1797-11947/? E/WindowManager: win=Window{6b989cf u0 com.sec.android.app.launcher/com.sec.android.app.launcher.activities.LauncherActivity} destroySurfaces: appStopped=false win.mWindowRemovalAllowed=false win.mRemoveOnExit=false win.mViewVisibility=8 caller=com.android.server.wm.WindowManagerService.tryStartExitingAnimation:2752 com.android.server.wm.WindowManagerService.relayoutWindow:2449 com.android.server.wm.Session.relayoutForTranslate:287 android.view.IWindowSession$Stub.onTransact:432 com.android.server.wm.Session.onTransact:186 android.os.Binder.execTransact:739
2019-05-09 19:06:06.831 6566-6566/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2019-05-09 19:06:06.831 6566-6566/? A/DEBUG: Build fingerprint: 'samsung/a70qzc/a70q:9/PPR1.180610.011/A7050ZCU1ASD6:user/release-keys'
2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: Revision: '12'
2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: ABI: 'arm64'
2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: pid: 6546, tid: 6546, name: .fileredirect:x >>> cn.qssq666.fileredirect:x <<<
2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: signal 31 (SIGSYS), code 1 (SYS_SECCOMP), fault addr --------
2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: Cause: seccomp prevented call to disallowed arm64 system call 300
2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x0 00000000ffffff9c x1 0000007fd2014418 x2 0000007fd20102a8 x3 0000000000000100
2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x4 0000000000000000 x5 f81d610211055200 x6 f81d610211055200 x7 0052051102611df8
2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x8 000000000000012c x9 0000007fd20100e0 x10 000000000000012c x11 0101010101010101
2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x12 0000000000000009 x13 0000000000000003 x14 0000007d68655320 x15 f81d610211055200
2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x16 0000007d50d928f0 x17 0000007de9337490 x18 0000000000000000 x19 0000007fd2014418
2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x20 0000000000000005 x21 0000000000000001 x22 0000007fd2011328 x23 000000000000002d
2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x24 0000007fd201232c x25 0000000000000004 x26 0000007def2715f8 x27 0000007fd201232c
2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x28 0000007fd2012328 x29 0000007fd2010280
2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: sp 0000007fd2010240 lr 0000007d50d52d1c pc 0000007de93374b0
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: backtrace:
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #00 pc 000000000001f4b0 /system/lib64/libc.so (syscall+32)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #1 pc 000000000000cd18 /data/app/cn.qssq666.fileredirect-K8mW5u6caOcgcWJomj8QfA==/lib/arm64/libqssqredirect.so (new_fstatat64+84)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #2 pc 0000000000054e48 /system/lib64/libc.so (offset 0x26000) (realpath+640)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #3 pc 000000000001c8cc /system/lib64/libopenjdk.so (canonicalize+176)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #4 pc 000000000001fc34 /system/lib64/libopenjdk.so (Java_java_io_UnixFileSystem_canonicalize0+88)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #5 pc 0000000000116748 /system/framework/arm64/boot.oat (offset 0x115000) (java.lang.invoke.MethodHandle.invoke [DEDUPED]+152)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #6 pc 0000000000559388 /system/lib64/libart.so (art_quick_invoke_stub+584)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #7 pc 00000000000d02c8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #8 pc 0000000000280cc0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #9 pc 000000000027acc8 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #10 pc 000000000052971c /system/lib64/libart.so (MterpInvokeDirect+296)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #11 pc 000000000054bb14 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #12 pc 00000000000c1802 /system/framework/boot.vdex (java.io.UnixFileSystem.canonicalize+8)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #13 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #14 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #15 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #16 pc 00000000005283dc /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #17 pc 000000000054ba14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #18 pc 00000000000b856a /system/framework/boot.vdex (java.io.File.getCanonicalPath+28)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #19 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #20 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #21 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #22 pc 00000000005283dc /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #23 pc 000000000054ba14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #24 pc 000000000012585a /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/cn.qssq666.fileredirect-K8mW5u6caOcgcWJomj8QfA==/base.apk_6546_6546 (deleted) (cn.qssq666.fileredirect.AppContext.testRedirect+126)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #25 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #26 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #27 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #28 pc 000000000052971c /system/lib64/libart.so (MterpInvokeDirect+296)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #29 pc 000000000054bb14 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #30 pc 00000000001257bc /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/cn.qssq666.fileredirect-K8mW5u6caOcgcWJomj8QfA==/base.apk_6546_6546 (deleted) (cn.qssq666.fileredirect.AppContext.onCreate+20)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #31 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #32 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #33 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #34 pc 00000000005283dc /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #35 pc 000000000054ba14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #36 pc 00000000004eac94 /system/framework/boot-framework.vdex (android.app.Instrumentation.callApplicationOnCreate)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #37 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #38 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #39 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #40 pc 00000000005283dc /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #41 pc 000000000054ba14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #42 pc 00000000004c45c2 /system/framework/boot-framework.vdex (android.app.ActivityThread.handleBindApplication+2270)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #43 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #44 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #45 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #46 pc 000000000052971c /system/lib64/libart.so (MterpInvokeDirect+296)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #47 pc 000000000054bb14 /system/lib64/libart.so (ExecuteMterpImpl+14484)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #48 pc 00000000005e9fc8 /system/framework/boot-framework.vdex (android.app.ActivityThread.access$1200)
2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #49 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #50 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #51 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #52 pc 00000000005298e0 /system/lib64/libart.so (MterpInvokeStatic+204)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #53 pc 000000000054bb94 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #54 pc 00000000004c113a /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+1574)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #55 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #56 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #57 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #58 pc 00000000005283dc /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #59 pc 000000000054ba14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #60 pc 0000000000c73dde /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #61 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #62 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #63 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #64 pc 00000000005283dc /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #65 pc 000000000054ba14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #66 pc 0000000000c7c9b2 /system/framework/boot-framework.vdex (android.os.Looper.loop+406)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #67 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #68 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #69 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+940)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #70 pc 00000000005298e0 /system/lib64/libart.so (MterpInvokeStatic+204)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #71 pc 000000000054bb94 /system/lib64/libart.so (ExecuteMterpImpl+14612)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #72 pc 00000000004c68fc /system/framework/boot-framework.vdex (android.app.ActivityThread.main+220)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #73 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #74 pc 0000000000518c70 /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #75 pc 00000000005624fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #76 pc 000000000055964c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #77 pc 00000000000d02e8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #78 pc 000000000045ed50 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #79 pc 00000000004607a4 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1440)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #80 pc 00000000003efe28 /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #81 pc 000000000011f7e4 /system/framework/arm64/boot.oat (offset 0x115000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #82 pc 0000000000559388 /system/lib64/libart.so (art_quick_invoke_stub+584)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #83 pc 00000000000d02c8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #84 pc 0000000000280cc0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #85 pc 000000000027acc8 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #86 pc 00000000005283dc /system/lib64/libart.so (MterpInvokeVirtual+588)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #87 pc 000000000054ba14 /system/lib64/libart.so (ExecuteMterpImpl+14228)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #88 pc 00000000013e13ea /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #89 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #90 pc 0000000000518c70 /system/lib64/libart.so (artQuickToInterpreterBridge+1020)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #91 pc 00000000005624fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #92 pc 0000000000e15180 /system/framework/arm64/boot-framework.oat (offset 0x41e000) (com.android.internal.os.ZygoteInit.main+2208)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #93 pc 000000000055964c /system/lib64/libart.so (art_quick_invoke_static_stub+604)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #94 pc 00000000000d02e8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+232)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #95 pc 000000000045ed50 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #96 pc 000000000045e9b0 /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+424)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #97 pc 0000000000363698 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+652)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #98 pc 00000000000b8238 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #99 pc 00000000000bae90 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+768)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #100 pc 0000000000004c44 /system/bin/app_process64 (main+1832)
2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #101 pc 00000000000c9e60 /system/lib64/libc.so (offset 0x7e000) (__libc_init+88)
2019-05-09 19:06:07.116 1083-1083/? E//system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_03
2019-05-09 19:06:07.128 606-606/? E/audit: type=1701 audit(1557399967.115:3855): auid=4294967295 uid=10235 gid=10235 ses=4294967295 subj=u:r:untrusted_app:s0:c235,c256,c512,c768 pid=6546 comm=".fileredirect:x" exe="/system/bin/app_process64" sig=31 res=1
2019-05-09 19:06:07.172 1797-6015/? E/WindowManager: win=Window{d6c63ae u0 Splash Screen cn.qssq666.fileredirect EXITING} destroySurfaces: appStopped=false win.mWindowRemovalAllowed=true win.mRemoveOnExit=true win.mViewVisibility=0 caller=com.android.server.wm.AppWindowToken.destroySurfaces:888 com.android.server.wm.AppWindowToken.destroySurfaces:869 com.android.server.wm.WindowState.onExitAnimationDone:5453 com.android.server.wm.-$$Lambda$01bPtngJg5AqEoOWfW3rWfV7MH4.accept:2 java.util.ArrayList.forEach:1262 com.android.server.wm.AppWindowToken.onAnimationFinished:2422 com.android.server.wm.AppWindowToken.setVisibility:552
2019-05-09 19:06:13.266 606-606/? E/audit: type=1400 audit(1557399973.255:3856): avc: denied { read } for pid=6214 comm="KernelThread-2" name="version" dev="proc" ino=4026532038 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=0 SEPF_SM-A7050_9_0002 audit_filtered
2019-05-09 19:06:13.266 606-606/? E/audit: type=1300 audit(1557399973.255:3856): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=c1d67558 a2=20000 a3=0 items=0 ppid=614 pid=6214 auid=4294967295 uid=10208 gid=10208 euid=10208 suid=10208 fsuid=10208 egid=10208 sgid=10208 fsgid=10208 tty=(none) ses=4294967295 comm="KernelThread-2" exe="/system/bin/app_process32" subj=u:r:untrusted_app_27:s0:c512,c768 key=(null)
2019-05-09 19:06:13.266 606-606/? E/audit: type=1327 audit(1557399973.255:3856): proctitle="com.eg.android.AlipayGphone:push"
2019-05-09 19:06:13.269 606-606/? E/audit: type=1400 audit(1557399973.255:3857): avc: denied { read } for pid=6214 comm="KernelThread-2" name="power_supply" dev="sysfs" ino=34742 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0 SEPF_SM-A7050_9_0002 audit_filtered
2019-05-09 19:06:13.270 606-606/? E/audit: type=1300 audit(1557399973.255:3857): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=c1d67560 a2=a4000 a3=0 items=0 ppid=614 pid=6214 auid=4294967295 uid=10208 gid=10208 euid=10208 suid=10208 fsuid=10208 egid=10208 sgid=10208 fsgid=10208 tty=(none) ses=4294967295 comm="KernelThread-2" exe="/system/bin/app_process32" subj=u:r:untrusted_app_27:s0:c512,c768 key=(null)
2019-05-09 19:06:13.270 606-606/? E/audit: type=1327 audit(1557399973.255:3857): proctitle="com.eg.android.AlipayGphone:push"
2019-05-09 19:06:13.270 606-606/? E/audit: type=1400 audit(1557399973.255:3858): avc: denied { read } for pid=6214 comm="KernelThread-2" name="power_supply" dev="sysfs" ino=34742 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0 SEPF_SM-A7050_9_0002 audit_filtered
2019-05-09 19:06:13.270 606-606/? E/audit: type=1300 audit(1557399973.255:3858): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=c1d67560 a2=a4000 a3=0 items=0 ppid=614 pid=6214 auid=4294967295 uid=10208 gid=10208 euid=10208 suid=10208 fsuid=10208 egid=10208 sgid=10208 fsgid=10208 tty=(none) ses=4294967295 comm="KernelThread-2" exe="/system/bin/app_process32" subj=u:r:untrusted_app_27:s0:c512,c768 key=(null)
2019-05-09 19:06:13.270 606-606/? E/audit: type=1327 audit(1557399973.255:3858): proctitle="com.eg.android.AlipayGphone:push"
2019-05-09 19:06:13.284 6214-6528/? E/libc: Access denied finding property "ro.serialno"

@lozn00 lozn00 closed this as completed May 10, 2019
@Lamfi Lamfi mentioned this issue Dec 8, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant