JingMatrix / LSPatch

LSPatch: A non-root Xposed framework extending from LSPosed
GNU General Public License v3.0
121 stars 17 forks source link

Crashing on the first launch of a patched App #7

Closed skxev closed 1 week ago

skxev commented 1 week ago

Steps to reproduce/复现步骤

Using latest debug build b409cd3, still crashing on first launch

Expected behaviour/预期行为

After the August Google Play system update, the application patched via Lspatch (b409cd3) crashes on first launch.

Actual behaviour/实际行为

JNI DETECTED ERROR IN APPLICATION: JNI NewGlobalRef called with pending exception java.lang.NoClassDefFoundError: Class not found using the boot class loader; no stack trace available

Xposed Module List/Xposed 模块列表

Re:Telegram
TMoe

LSPatch version/LSPatch 版本

418

Android version/Android 版本

14

Shizuku version/Shizuku 版本

13.5

Version requirement/版本要求

Apk file/Apk 文件

No response

Logs/日志

logcat-sAndroidRuntimeLSPatchLSPosedLSPatch-MetaLoaderLSPatch-SigBypassLSPosed-BridgeLSPlantLSPosedContextzygisk64LSPltDobbyLSPosedService.__F._20240905105521.txt

JingMatrix commented 1 week ago

Cannot reproduce on my phone. Could you please try a clean re-patch of the original APK to see if the bug persists?

skxev commented 1 week ago

Cannot reproduce on my phone. Could you please try a clean re-patch of the original APK to see if the bug persists?

I removed the debug Lspatch manager (b409cd3), deleted all modules, deleted the patched application, cleared the entire cache on the phone, rebooted, downloaded and installed the latest action (b409cd3) manager-v0.6-418-debug.apk, downloaded the telegram apk from the official site, patched it through Lspatch, and the crash repeats on first launch.

I would like to mention that if you use the original Lspatch (not a fork) for the patch, the patched application will not launch at all, it will just crash)

skxev commented 1 week ago

Now I checked what @harshitshah4 did from #6, I downloaded b8c4664, and there is no more crash on startup 👀

skxev commented 1 week ago

@JingMatrix, I hope you will make a fix in the next build, since the last build b409cd3 is currently broken, the previous one b8c4664 works correctly, in any case, thank you very much for your work, the fact that you support Lspatch/Lsposed, all the hopes of the community are on you at the moment <3

mario6714 commented 1 week ago

One question, this "b409cd3" work in this moment for me but the "debug" version, the "release" version don't work for the app netease cloud music, why? i can open the app but wont load the module in the app using the "release" version

This "b8c4664" also the "release" version don't work for me.

android 14 and google play system release "August"

Thanks

JingMatrix commented 1 week ago

@mario6714 Thank you for the information, I will investigate the Release version.

If possible, please upload some related logs.

JingMatrix commented 1 week ago

Could not reproduce your issue with the Release version. Maybe you forget to embed some modules so that the app didn't start?

skxev commented 1 week ago

Could not reproduce your issue with the Release version. Maybe you forget to embed some modules so that the app didn't start?

Issue not fixed, b409cd3 not working at release and debug versions, please note Logcat of release version b409cd3

--------- beginning of main
09-09 16:08:03.598 17805 17805 D AndroidRuntime: >>>>>> START com.android.internal.os.RuntimeInit uid 2000 <<<<<<
09-09 16:08:03.603 17805 17805 I AndroidRuntime: Using default boot image
09-09 16:08:03.603 17805 17805 I AndroidRuntime: Leaving lock profiling enabled
09-09 16:08:03.603 17805 17805 D AndroidRuntime: addProductProperty not brand or 7
09-09 16:08:03.719 17805 17805 D AndroidRuntime: Calling main entry moe.shizuku.starter.ServiceStarter
09-09 16:08:06.170 17805 17909 I AndroidRuntime: VM exiting with result code 0.
09-09 16:08:08.042 18118 18118 I LSPatch-MetaLoader: Bootstrap loader from manager
09-09 16:08:08.112 18118 18118 W LSPlant : Failed to hook EncodeGenericId, attaching debugger may crash the process
09-09 16:08:08.128 18118 18118 I LSPatch : Use manager: true
09-09 16:08:08.128 18118 18118 I LSPatch : Signature bypass level: 2
09-09 16:08:08.144 18118 18118 I LSPatch : Extract original apk
09-09 16:08:08.328 18118 18118 I LSPatch : hooked app initialized: android.app.LoadedApk@d76e2dd
09-09 16:08:08.331 18118 18118 D LSPatch : Initialize service client
09-09 16:08:08.331 18118 18118 I LSPatch : Request manager binder
09-09 16:08:08.336 18118 18137 I LSPatch : Manager binder received
09-09 16:08:08.337 18118 18118 D LSPatch : Processing /data/misc/profiles/cur/0/org.telegram.messenger.web/primary.prof
09-09 16:08:08.339 18118 18118 D LSPosed : deoptimizing public android.app.Application android.app.Instrumentation.newApplication(java.lang.ClassLoader,java.lang.String,android.content.Context) throws java.lang.InstantiationException,java.lang.IllegalAccessException,java.lang.ClassNotFoundException: pkg=org.telegram.messenger.web, prc=org.telegram.messenger.web
09-09 16:08:08.339 18118 18118 D LSPosed : deoptimizing public java.io.File android.app.ContextImpl.getSharedPreferencesPath(java.lang.String): pkg=org.telegram.messenger.web, prc=org.telegram.messenger.web
09-09 16:08:08.339 18118 18118 D LSPosed : startBootstrapHook starts: isSystem = false
09-09 16:08:08.345 18118 18118 I LSPatch : Load modules
skxev commented 1 week ago

here is logcat dump.txt b409cd3 debug executed with the first run and crash, and the second run without crash

skxev commented 1 week ago

It is possible that libart.so was updated in the August Google Play system update, this is part of the Android Runtime (ART), and perhaps that is why the crash occurs

skxev commented 1 week ago

After Lspatch tries to load modules for the first time (whether modules are installed or not), the patched application crashes

09-09 16:38:19.311  2654  2654 I LSPatch : Load modules
09-09 16:38:19.312  2654  2654 F m.messenger.web: java_vm_ext.cc:598] JNI DETECTED ERROR IN APPLICATION: JNI NewGlobalRef called with pending exception java.lang.NoClassDefFoundError: Class not found using the boot class loader; no stack trace available
09-09 16:38:19.312  2654  2654 F m.messenger.web: java_vm_ext.cc:598] (Throwable with no stack trace)
09-09 16:38:19.312  2654  2654 F m.messenger.web: java_vm_ext.cc:598] 
09-09 16:38:19.312  2654  2654 F m.messenger.web: java_vm_ext.cc:598]     in call to NewGlobalRef
09-09 16:38:19.312  2654  2654 F m.messenger.web: java_vm_ext.cc:598]     from java.lang.String java.lang.Runtime.nativeLoad(java.lang.String, java.lang.ClassLoader, java.lang.Class)

Here is full debug from logcat

09-09 16:38:19.557  2742  2742 F DEBUG   : Build fingerprint: 'samsung/dm1qxxx/dm1q:14/UP1A.231005.007/S911BXXS6CXG8:user/release-keys'
09-09 16:38:19.557  2742  2742 F DEBUG   : Revision: '13'
09-09 16:38:19.557  2742  2742 F DEBUG   : ABI: 'arm64'
09-09 16:38:19.557  2742  2742 F DEBUG   : Processor: '7'
09-09 16:38:19.557  2742  2742 F DEBUG   : Timestamp: 2024-09-09 16:38:19.434819792+0400
09-09 16:38:19.557  2742  2742 F DEBUG   : Process uptime: 2s
09-09 16:38:19.557  2742  2742 F DEBUG   : Cmdline: org.telegram.messenger.web
09-09 16:38:19.557  2742  2742 F DEBUG   : pid: 2654, tid: 2654, name: m.messenger.web  >>> org.telegram.messenger.web <<<
09-09 16:38:19.557  2742  2742 F DEBUG   : uid: 10438
09-09 16:38:19.557  2742  2742 F DEBUG   : tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE)
09-09 16:38:19.557  2742  2742 F DEBUG   : pac_enabled_keys: 000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY)
09-09 16:38:19.557  2742  2742 F DEBUG   : signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------
09-09 16:38:19.557  2742  2742 F DEBUG   : Abort message: 'JNI DETECTED ERROR IN APPLICATION: JNI NewGlobalRef called with pending exception java.lang.NoClassDefFoundError: Class not found using the boot class loader; no stack trace available
09-09 16:38:19.557  2742  2742 F DEBUG   : (Throwable with no stack trace)
09-09 16:38:19.557  2742  2742 F DEBUG   : 
09-09 16:38:19.557  2742  2742 F DEBUG   :     in call to NewGlobalRef
09-09 16:38:19.557  2742  2742 F DEBUG   :     from java.lang.String java.lang.Runtime.nativeLoad(java.lang.String, java.lang.ClassLoader, java.lang.Class)'
09-09 16:38:19.557  2742  2742 F DEBUG   :     x0  0000000000000000  x1  0000000000000a5e  x2  0000000000000006  x3  0000007fc24f33c0
09-09 16:38:19.557  2742  2742 F DEBUG   :     x4  5151441f43445342  x5  5151441f43445342  x6  5151441f43445342  x7  7f7f7f7f7f7f7f7f
09-09 16:38:19.557  2742  2742 F DEBUG   :     x8  00000000000000f0  x9  0000007b81447f28  x10 0000000000000001  x11 0000007b814c4344
09-09 16:38:19.557  2742  2742 F DEBUG   :     x12 0000007fc24f2100  x13 0000000000000000  x14 0000007fc24f21b0  x15 000000d0950b6554
09-09 16:38:19.557  2742  2742 F DEBUG   :     x16 0000007b8152fa00  x17 0000007b81507e60  x18 0000007baf16c000  x19 0000000000000a5e
09-09 16:38:19.557  2742  2742 F DEBUG   :     x20 0000000000000a5e  x21 00000000ffffffff  x22 0000000000000016  x23 0000007bae709000
09-09 16:38:19.557  2742  2742 F DEBUG   :     x24 000000000000016f  x25 0000007bae709000  x26 0000000000000000  x27 b400007afa104b00
09-09 16:38:19.557  2742  2742 F DEBUG   :     x28 0000007af80920a4  x29 0000007fc24f3440
09-09 16:38:19.557  2742  2742 F DEBUG   :     lr  0000007b814b5084  sp  0000007fc24f33a0  pc  0000007b814b50b0  pst 0000000000001000
09-09 16:38:19.557  2742  2742 F DEBUG   : 126 total frames
09-09 16:38:19.557  2742  2742 F DEBUG   : backtrace:
09-09 16:38:19.557  2742  2742 F DEBUG   :       #00 pc 00000000000950b0  /apex/com.android.runtime/lib64/bionic/libc.so (abort+168) (BuildId: 02a91a85343debb2911714273ff2b670)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #01 pc 00000000009300cc  /apex/com.android.art/lib64/libart.so (art::Runtime::Abort(char const*)+344) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #02 pc 00000000000160fc  /apex/com.android.art/lib64/libbase.so (android::base::SetAborter(std::__1::function<void (char const*)>&&)::$_0::__invoke(char const*)+80) (BuildId: 42d41ca7c77853791d096606e7186547)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #03 pc 00000000000156d0  /apex/com.android.art/lib64/libbase.so (android::base::LogMessage::~LogMessage()+516) (BuildId: 42d41ca7c77853791d096606e7186547)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #04 pc 00000000003b7e84  /apex/com.android.art/lib64/libart.so (art::JavaVMExt::JniAbort(char const*, char const*)+1696) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #05 pc 000000000088a784  /apex/com.android.art/lib64/libart.so (art::JavaVMExt::JniAbortV(char const*, char const*, std::__va_list)+108) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #06 pc 00000000005a5908  /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::ScopedCheck::AbortF(char const*, ...) (.__uniq.99033978352804627313491551960229047428)+140) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #07 pc 00000000005a07ac  /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::ScopedCheck::Check(art::ScopedObjectAccess&, bool, char const*, art::(anonymous namespace)::JniValueType*) (.__uniq.99033978352804627313491551960229047428)+5440) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #08 pc 000000000059b604  /apex/com.android.art/lib64/libart.so (art::(anonymous namespace)::CheckJNI::NewRef(char const*, _JNIEnv*, _jobject*, art::IndirectRefKind) (.__uniq.99033978352804627313491551960229047428)+196) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #09 pc 000000000066fd08  /apex/com.android.art/lib64/libart.so (art::JavaVMExt::LoadNativeLibrary(_JNIEnv*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, _jobject*, _jclass*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >*)+1352) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #10 pc 0000000000005914  /apex/com.android.art/lib64/libopenjdkjvm.so (JVM_NativeLoad+356) (BuildId: 52e480f4d160d1f919dafa72cae26e8a)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #11 pc 0000000002112df0  /memfd:jit-cache (deleted) (offset 0x2000000) (art_jni_trampoline+176)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #12 pc 0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #13 pc 000000000035bd94  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+2048) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #14 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #15 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #16 pc 0000000000109d10  /apex/com.android.art/javalib/core-oj.jar (java.lang.Runtime.load0+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #17 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #18 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #19 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #20 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #21 pc 0000000000115240  /apex/com.android.art/javalib/core-oj.jar (java.lang.System.load+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #22 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #23 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #24 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #25 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #26 pc 0000000000001f9c  [anon:dalvik-classes5.dex extracted in memory from /data/app/~~xWVXAWpuLmCXLq39AKdYzw==/org.telegram.messenger.web-beN3bth9445Zm1cxH-DgsA==/base.apk] (org.lsposed.lspatch.metaloader.LSPAppComponentFactoryStub.bootstrap+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #27 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #28 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #29 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #30 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #31 pc 0000000000001f34  [anon:dalvik-classes5.dex extracted in memory from /data/app/~~xWVXAWpuLmCXLq39AKdYzw==/org.telegram.messenger.web-beN3bth9445Zm1cxH-DgsA==/base.apk] (org.lsposed.lspatch.metaloader.LSPAppComponentFactoryStub.<clinit>+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #32 pc 000000000034d5a8  /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+1932) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #33 pc 0000000000379098  /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #34 pc 0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #35 pc 000000000042fb28  /apex/com.android.art/lib64/libart.so (art::ClassLinker::InitializeClass(art::Thread*, art::Handle<art::mirror::Class>, bool, bool)+5260) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #36 pc 000000000057e34c  /apex/com.android.art/lib64/libart.so (art::ClassLinker::EnsureInitialized(art::Thread*, art::Handle<art::mirror::Class>, bool, bool)+160) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #37 pc 000000000072e120  /apex/com.android.art/lib64/libart.so (art::Class_newInstance(_JNIEnv*, _jobject*) (.__uniq.181829539739573773940154555818377431209)+1600) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #38 pc 0000000000378f70  /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+144) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #39 pc 0000000000362774  /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+612) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #40 pc 000000000035bd1c  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+1928) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #41 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #42 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #43 pc 0000000000261f90  /system/framework/framework.jar (android.app.LoadedApk.createAppFactory+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #44 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #45 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #46 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #47 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #48 pc 00000000002634fc  /system/framework/framework.jar (android.app.LoadedApk.createOrUpdateClassLoaderLocked+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #49 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #50 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #51 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #52 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #53 pc 0000000000262f00  /system/framework/framework.jar (android.app.LoadedApk.getClassLoader+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #54 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #55 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #56 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #57 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #58 pc 0000000000262a84  /system/framework/framework.jar (android.app.LoadedApk.getResources+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #59 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #60 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #61 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #62 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #63 pc 00000000001fba20  /system/framework/framework.jar (android.app.ContextImpl.createAppContext+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #64 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #65 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #66 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #67 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #68 pc 00000000001fba04  /system/framework/framework.jar (android.app.ContextImpl.createAppContext+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #69 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #70 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #71 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #72 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #73 pc 00000000001ceda8  /system/framework/framework.jar (android.app.ActivityThread.handleBindApplication+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #74 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #75 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #76 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #77 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #78 pc 00000000001cbd98  /system/framework/framework.jar (android.app.ActivityThread.-$$Nest$mhandleBindApplication+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #79 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #80 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #81 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #82 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #83 pc 00000000001c744c  /system/framework/framework.jar (android.app.ActivityThread$H.handleMessage+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #84 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #85 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #86 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #87 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #88 pc 00000000002048ec  /system/framework/framework.jar (android.os.Handler.dispatchMessage+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #89 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #90 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #91 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #92 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #93 pc 0000000000238c4c  /system/framework/framework.jar (android.os.Looper.loopOnce+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #94 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #95 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #96 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #97 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #98 pc 0000000000239488  /system/framework/framework.jar (android.os.Looper.loop+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #99 pc 000000000034e21c  /apex/com.android.art/lib64/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool, bool) (.__uniq.112435418011751916792819755956732575238.llvm.2845697060370838518)+428) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #100 pc 000000000035c5b0  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+4124) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #101 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #102 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #103 pc 00000000001d30ac  /system/framework/framework.jar (android.app.ActivityThread.main+0)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #104 pc 000000000034d5a8  /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+1932) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #105 pc 0000000000379098  /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #106 pc 0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #107 pc 000000000035e42c  /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+732) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #108 pc 00000000006c8cb8  /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+32) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #109 pc 0000000000378f70  /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+144) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #110 pc 0000000000362774  /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+612) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.557  2742  2742 F DEBUG   :       #111 pc 000000000035bd1c  /apex/com.android.art/lib64/libart.so (bool art::interpreter::DoCall<false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, bool, art::JValue*)+1928) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.558  2742  2742 F DEBUG   :       #112 pc 000000000076dec0  /apex/com.android.art/lib64/libart.so (void art::interpreter::ExecuteSwitchImplCpp<false>(art::interpreter::SwitchImplContext*)+12208) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.558  2742  2742 F DEBUG   :       #113 pc 000000000037b5d8  /apex/com.android.art/lib64/libart.so (ExecuteSwitchImplAsm+8) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.558  2742  2742 F DEBUG   :       #114 pc 0000000000268714  /system/framework/framework.jar (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+0)
09-09 16:38:19.558  2742  2742 F DEBUG   :       #115 pc 000000000034d5a8  /apex/com.android.art/lib64/libart.so (artQuickToInterpreterBridge+1932) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.558  2742  2742 F DEBUG   :       #116 pc 0000000000379098  /apex/com.android.art/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.558  2742  2742 F DEBUG   :       #117 pc 0000000000cb5514  /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (com.android.internal.os.ZygoteInit.main+3396)
09-09 16:38:19.558  2742  2742 F DEBUG   :       #118 pc 0000000000362a40  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.558  2742  2742 F DEBUG   :       #119 pc 000000000034df38  /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.558  2742  2742 F DEBUG   :       #120 pc 000000000034beec  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+512) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.558  2742  2742 F DEBUG   :       #121 pc 0000000000739d34  /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+104) (BuildId: 3b4ed3e67a9a04e3a37d259cd59da05b)
09-09 16:38:19.558  2742  2742 F DEBUG   :       #122 pc 00000000000e3be8  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108) (BuildId: b1487f04b6aaac9e254a39f394eadd59)
09-09 16:38:19.558  2742  2742 F DEBUG   :       #123 pc 00000000000f05bc  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+856) (BuildId: b1487f04b6aaac9e254a39f394eadd59)
09-09 16:38:19.558  2742  2742 F DEBUG   :       #124 pc 0000000000002558  /system/bin/app_process64 (main+1280) (BuildId: 63c2631b63b6085792801dff29427263)
09-09 16:38:19.558  2742  2742 F DEBUG   :       #125 pc 000000000008d7c8  /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: 02a91a85343debb2911714273ff2b670)

The second launch is successful and the application starts successfully and initializes the modules

09-09 16:38:22.039  2815  2815 I LSPatch : Load modules
*splash screen rendering*
09-09 16:38:22.186  2815  2815 I LSPatch : Modules initialized
JingMatrix commented 1 week ago

@skxev Do you mean that LSPatch worked at expected after the second launch ?

skxev commented 1 week ago

@skxev Do you mean that LSPatch worked at expected after the second launch ?

An application patched through LSpatch (without modules) crashes on the first launch, all subsequent times it is launched without crashing, if you mean the LSpatch application itself, then it does not crash

JingMatrix commented 1 week ago

@skxev According to your description, the first crash of the patched app is indeed normal. Because after your patching of an app, its first lauch will confict previous remained executing thread in the device memory. Therefore, if the patched app works fine after the second launch, then LSPatch is working as expected. No need to worry about the first crash. If you understand my explication, please close the issue.

skxev commented 1 week ago

@JingMatrix I understood your explanation, I closed the issue, but I didn’t understand why there are no crashes in build b8c4664 when first launched, but in the latest build b409cd3 there are and you say that this is normal

JingMatrix commented 1 week ago

@skxev That part surprises me a bit as well. I will inverstigate it further to see if there is a reasonable explanation. I will post or "fix" this in the future. Currently, you can be relaxed and take it easy. It is okay to have a small part unclear.

mario6714 commented 1 week ago

@mario6714 Thank you for the information, I will investigate the Release version.

If possible, please upload some related logs.

How i can do that? because in the debug seem work but in the release not

kmod-midori commented 1 week ago

In my case the main application loaded fine after the first crash, but is not operational due to a service (possibly in a separate process?) failing.

09-11 13:13:12.138 17062 17062 E LSPatch : java.lang.NoSuchMethodError: No static method a(Ljava/lang/ClassLoader;Ljava/lang/String;)Ljava/lang/Class; in class Le; or its super classes (declaration of 'e' appears in /data/app/~~rCy0LWjtRcCnDCTyzp8dWg==/com.tencent.mobileqq-9E7nozwjTy3V9DizcPfLNw==/base.apk!classes8.dex)
09-11 13:13:12.138 17062 17062 E LSPatch :      at de.robv.android.xposed.XposedHelpers.findClass(SourceFile:3)
09-11 13:13:12.138 17062 17062 E LSPatch :      at org.lsposed.lspatch.loader.LSPApplication.createLoadedApkWithContext(LSPApplication.java:147)
09-11 13:13:12.138 17062 17062 E LSPatch :      at org.lsposed.lspatch.loader.LSPApplication.onLoad(LSPApplication.java:72)
09-11 13:13:12.138 17062 17062 E LSPatch :      at java.lang.Runtime.nativeLoad(Native Method)
09-11 13:13:12.138 17062 17062 E LSPatch :      at java.lang.Runtime.load0(Runtime.java:931)
09-11 13:13:12.138 17062 17062 E LSPatch :      at java.lang.System.load(System.java:1729)
09-11 13:13:12.138 17062 17062 E LSPatch :      at org.lsposed.lspatch.metaloader.LSPAppComponentFactoryStub.a(Unknown Source:395)
09-11 13:13:12.138 17062 17062 E LSPatch :      at org.lsposed.lspatch.metaloader.LSPAppComponentFactoryStub.<clinit>(Unknown Source:22)
09-11 13:13:12.138 17062 17062 E LSPatch :      at java.lang.Class.newInstance(Native Method)
09-11 13:13:12.138 17062 17062 E LSPatch :      at android.app.LoadedApk.createAppFactory(LoadedApk.java:290)
09-11 13:13:12.138 17062 17062 E LSPatch :      at android.app.LoadedApk.createOrUpdateClassLoaderLocked(LoadedApk.java:1056)
09-11 13:13:12.138 17062 17062 E LSPatch :      at android.app.LoadedApk.getClassLoader(LoadedApk.java:1143)
09-11 13:13:12.138 17062 17062 E LSPatch :      at android.app.LoadedApk.getResources(LoadedApk.java:1463)
09-11 13:13:12.138 17062 17062 E LSPatch :      at android.app.ContextImpl.createAppContext(ContextImpl.java:3487)
09-11 13:13:12.138 17062 17062 E LSPatch :      at android.app.ContextImpl.createAppContext(ContextImpl.java:3479)
09-11 13:13:12.138 17062 17062 E LSPatch :      at android.app.ActivityThread.handleBindApplication(ActivityThread.java:7580)
09-11 13:13:12.138 17062 17062 E LSPatch :      at android.app.ActivityThread.-$$Nest$mhandleBindApplication(Unknown Source:0)
09-11 13:13:12.138 17062 17062 E LSPatch :      at android.app.ActivityThread$H.handleMessage(ActivityThread.java:2478)
09-11 13:13:12.138 17062 17062 E LSPatch :      at android.os.Handler.dispatchMessage(Handler.java:106)
09-11 13:13:12.138 17062 17062 E LSPatch :      at android.os.Looper.loopOnce(Looper.java:230)
09-11 13:13:12.138 17062 17062 E LSPatch :      at android.os.Looper.loop(Looper.java:319)
09-11 13:13:12.138 17062 17062 E LSPatch :      at android.app.ActivityThread.main(ActivityThread.java:8934)
09-11 13:13:12.138 17062 17062 E LSPatch :      at java.lang.reflect.Method.invoke(Native Method)
09-11 13:13:12.138 17062 17062 E LSPatch :      at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:578)
09-11 13:13:12.138 17062 17062 E LSPatch :      at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1103)

Is this related? The class e is actually org.apache.commons.lang3.ClassUtils, and is not renamed in upstream LSPatch's loader.dex. I can see that we have isMinifyEnabled = false in patch-loader, but the resulting dex does have minified classes.

Also

09-11 13:15:19.857 18363 18363 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
09-11 13:15:19.857 18363 18363 F DEBUG   : Build fingerprint: 'samsung/gts8wifixx/gts8wifi:14/UP1A.231005.007/X700XXS8CXG5:user/release-keys'
09-11 13:15:19.857 18363 18363 F DEBUG   : Revision: '8'
09-11 13:15:19.857 18363 18363 F DEBUG   : ABI: 'arm64'
09-11 13:15:19.857 18363 18363 F DEBUG   : Processor: '0'
09-11 13:15:19.857 18363 18363 F DEBUG   : Timestamp: 2024-09-11 13:15:19.471353409+0800
09-11 13:15:19.857 18363 18363 F DEBUG   : Process uptime: 72s
09-11 13:15:19.857 18363 18363 F DEBUG   : Cmdline: com.tencent.mobileqq:MSF
09-11 13:15:19.857 18363 18363 F DEBUG   : pid: 17734, tid: 18336, name: Thread-23  >>> com.tencent.mobileqq:MSF <<<
09-11 13:15:19.857 18363 18363 F DEBUG   : uid: 10393
09-11 13:15:19.857 18363 18363 F DEBUG   : tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE)
09-11 13:15:19.857 18363 18363 F DEBUG   : pac_enabled_keys: 000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY)
09-11 13:15:19.857 18363 18363 F DEBUG   : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
09-11 13:15:19.857 18363 18363 F DEBUG   : Abort message: 'Pointer tag for 0x773efc24c0 was truncated, see 'https://source.android.com/devices/tech/debug/tagged-pointers'.'
09-11 13:15:19.857 18363 18363 F DEBUG   :     x0  0000000000000000  x1  00000000000047a0  x2  0000000000000006  x3  0000007b7b601b40
09-11 13:15:19.857 18363 18363 F DEBUG   :     x4  7260761f2f623331  x5  7260761f2f623331  x6  7260761f2f623331  x7  7f7f7f7f7f7f7f7f
09-11 13:15:19.857 18363 18363 F DEBUG   :     x8  00000000000000f0  x9  0000007b5ea8e278  x10 0000000000000001  x11 0000007b5ead6a48
09-11 13:15:19.857 18363 18363 F DEBUG   :     x12 0000007b87ede020  x13 000000007fffffff  x14 0000000005fef7cc  x15 000012002ddb7872
09-11 13:15:19.857 18363 18363 F DEBUG   :     x16 0000007b5eb3fd18  x17 0000007b5eb1a560  x18 0000007701a02000  x19 0000000000004546
09-11 13:15:19.857 18363 18363 F DEBUG   :     x20 00000000000047a0  x21 00000000ffffffff  x22 0000000000000000  x23 000000770dc79000
09-11 13:15:19.857 18363 18363 F DEBUG   :     x24 000000773efc2000  x25 0000007b7b601e20  x26 000000773efc0000  x27 000000773efc2000
09-11 13:15:19.857 18363 18363 F DEBUG   :     x28 000000773efbd000  x29 0000007b7b601bc0
09-11 13:15:19.857 18363 18363 F DEBUG   :     lr  0000007b5eac7744  sp  0000007b7b601b20  pc  0000007b5eac7770  pst 0000000000001000
09-11 13:15:19.857 18363 18363 F DEBUG   : 8 total frames
09-11 13:15:19.857 18363 18363 F DEBUG   : backtrace:
09-11 13:15:19.857 18363 18363 F DEBUG   :       #00 pc 000000000005b770  /apex/com.android.runtime/lib64/bionic/libc.so (abort+168) (BuildId: 544bc6c8e3556e98efbc4406b97f6a3e)
09-11 13:15:19.857 18363 18363 F DEBUG   :       #01 pc 00000000000454f4  /apex/com.android.runtime/lib64/bionic/libc.so (free+108) (BuildId: 544bc6c8e3556e98efbc4406b97f6a3e)
09-11 13:15:19.857 18363 18363 F DEBUG   :       #02 pc 000000000000cd4c  /data/app/~~rCy0LWjtRcCnDCTyzp8dWg==/com.tencent.mobileqq-9E7nozwjTy3V9DizcPfLNw==/lib/arm64/libBugly_Native.so (BuildId: c18737bfe564ba3470b173b71767b67f7ebfc6d5)
09-11 13:15:19.857 18363 18363 F DEBUG   :       #03 pc 0000000000007384  /apex/com.android.art/lib64/libsigchain.so (art::SignalChain::Handler(int, siginfo*, void*)+1164) (BuildId: 1dfc84ea17eda8296164845381922b35)
09-11 13:15:19.857 18363 18363 F DEBUG   :       #04 pc 000000000000089c  [vdso]
09-11 13:15:19.857 18363 18363 F DEBUG   :       #05 pc 0000000000054ca0  /apex/com.android.runtime/lib64/bionic/libc.so (__strchr_aarch64+32) (BuildId: 544bc6c8e3556e98efbc4406b97f6a3e)
09-11 13:15:19.857 18363 18363 F DEBUG   :       #06 pc 00000000000a6274  /apex/com.android.runtime/lib64/bionic/libc.so (strstr+28) (BuildId: 544bc6c8e3556e98efbc4406b97f6a3e)
09-11 13:15:19.857 18363 18363 F DEBUG   :       #07 pc 000000000042baf4  /data/app/~~rCy0LWjtRcCnDCTyzp8dWg==/com.tencent.mobileqq-9E7nozwjTy3V9DizcPfLNw==/lib/arm64/libfekit.so (BuildId: 5b09e9637bd97ffac5af8118713b24bac48a172b)

Though I have no idea why this is happening, does not seem to be related to LSPatch on the surface.

JingMatrix commented 1 week ago

@kmod-midori If you suspect that it is the problem of renaming the classname, you may try the debug version to test your hyperthesis. @mario6714 If you can use the patched app after the first crash, then it is normal and you don't need to care about that crash.

kmod-midori commented 1 week ago

The exception is gone in debug version, but the problem is still there. The same application + module combination worked fine in upstream LSPatch, maybe I should investigate further.

JingMatrix commented 1 week ago

The same application + module combination worked fine in upstream LSPatch,

@kmod-midori by worked fine, you meant no crash for the first lauch ? Or you meant the latest build doesn't work for you at all?

JingMatrix commented 1 week ago

To reliably reproduce this issue: Clear the app data and launch it. Here is an examplar log: lspatch.log

kmod-midori commented 1 week ago

Both? Upstream LSPatch did not crash at all (in my memory). I came here because the recent Google update basically destroyed upstream LSPosed and LSPatch (all the patched apps do not launch).

However, the latest build here have a totally different problem: if I patch QQ with the latest build (integrated mode, without any module), the application launches, but a background process (com.tencent.mobileqq:MSF) fails to start, making it impossible to login since login is handled partially by that process.

I can confirm that the exact same base app (QQ 9.0.60 6478) worked flawlessly with or without any module on upstream LSPatch.

Here is log file after clearing app data, include the first (crash) and second (runs but not very well) launch. qq.log

mario6714 commented 1 week ago

To reliably reproduce this issue: Clear the app data and launch it. Here is an examplar log: lspatch.log

Mmm, step by step for create the lspatch.log? i already clean the data and open the app but cant find the lsptach.log in my phone, where is the file?

mario6714 commented 1 week ago

It is possible that libart.so was updated in the August Google Play system update, this is part of the Android Runtime (ART), and perhaps that is why the crash occurs

One question, how i can update that file in the lspatch? for test

JingMatrix commented 1 week ago

@mario6714 You don't need provide the log if you don't know how to. Currently, a first crash is normal behavior, so you can safely ignore this issue. libart.so is updated by your system updates, you cannot do it manually.

JingMatrix commented 1 week ago

@kmod-midori For your problem of QQ, open a new issue. It is not related to here. Please upload (in the new issue) filtred logs using:

adb logcat -s AndroidRuntime LSPatch LSPosed LSPatch-MetaLoader LSPatch-SigBypass LSPosed-Bridge LSPlant LSPosedContext zygisk64 LSPlt Dobby LSPosedService '*:F'
mario6714 commented 1 week ago

@mario6714 You don't need provide the log if you don't know how to. Currently, a first crash is normal behavior, so you can safely ignore this issue. libart.so is updated by your system updates, you cannot do it manually.

is ok use the debug version? because the release is not working for me

The problem is, release version wont open the app just crash, no matter how much i try to open the app and the debug i think work fine

JingMatrix commented 1 week ago

@mario6714 Yes, you can surely keep using the debug version.

mario6714 commented 1 week ago

Funny error, in the "release" last version, the app open fine but is like the module does not exists jaja

skxev commented 1 week ago

Screenshot_20240912_033816_Telegram Beta.png

skxev commented 1 week ago

Information from the Official Lsposed telegram channel, here translate: LSPosed is not compatible with ART that contains this change https://android.googlesource.com/platform/art/+/c7f5eb7654a9689f03dc0f038ad802758ed24623 Android 14 QPR2 starts to include this change Google Play system updates push ART updates containing this change to devices with system versions of Android 12 and above

skxev commented 1 week ago

as I wrote the problem is due to the Google system update, I hope for a fix from @JingMatrix

kmod-midori commented 1 week ago

Based on commits in this repo, this fork already contains necessary changes to work around that ART change, but along the way introduced some compatibility problems.

skxev commented 1 week ago

Based on commits in this repo, this fork already contains necessary changes to work around that ART change, but along the way introduced some compatibility problems.

oh, that's true, i forgot that @JingMatrix made important changes in recent builds, due to which LSpatch now works on new system updates, but everything is still not perfect, there are bugs like crash on first launch

JingMatrix commented 6 days ago

The reason for a first crash is found. In JingMatrix/LSPosed, I tried to use PLT hook to replace Dobby inline hook, which replaces function address in memory directly. The crash is caused by the background verification of the oat file manager. In the latest build, I explicitly set LSPatch to use Dobby hook instead of PLT hook, so that it could replace the memory address of the verification function (even it already exists in the background).

For second launch, there is no more remaining verification function in the memory, so PLT hook won't cause crash.

mario6714 commented 6 days ago

I go back to the previous release, the "debug" version from that release, now the app wont open, no matter how many times i try

skxev commented 6 days ago

Installed 2681111 and everything working without any crashes or error, thanks @JingMatrix for work