PAGalaxyLab / YAHFA

Yet Another Hook Framework for ART
GNU General Public License v3.0
1.56k stars 350 forks source link

安卓9:调用backup时触发exception != nullptr而崩溃(Android 9: crash when call backup() due to a Exception in thread.cc) #152

Closed Gstalker closed 2 years ago

Gstalker commented 2 years ago

07-19 15:23:11.202 4286 4286 I YAHFA-Native: init to SDK 28 07-19 15:23:11.202 4286 4286 I YAHFA-Native: ArtMethod: 0x70a7bbe8 07-19 15:23:11.202 4286 4286 I YAHFA-Native: ArtMethod: 0x71f61c9e88 07-19 15:23:11.202 4286 4286 I YAHFA-Native: ArtMethod: 0x71f61c9e60 07-19 15:23:11.202 4286 4286 I YAHFA-Native: target method is at 0x70a7bbe8, hook method is at 0x71f61c9e88, backup method is at 0x71f61c9e60 07-19 15:23:11.202 4286 4286 I YAHFA-Native: setNonCompilable: change access flags from 0x80009 to 0x2080009 07-19 15:23:11.202 4286 4286 I YAHFA-Native: setNonCompilable: change access flags from 0x9 to 0x2000009 07-19 15:23:11.202 4286 4286 I YAHFA-Native: replace method from 0x71f61c9e60 to 0x70a7bbe8 07-19 15:23:11.202 4286 4286 I YAHFA-Native: allocating space for trampoline code at 0x71fb038000 07-19 15:23:11.202 4286 4286 I YAHFA-Native: replace entry point from 0x7175707a10 to 0x71fb038004 07-19 15:23:11.202 4286 4286 I YAHFA-Native: change access flags from 0x2000009 to 0x2000109 07-19 15:23:11.202 4286 4286 I YAHFA-Native: replace method from 0x70a7bbe8 to 0x71f61c9e88 07-19 15:23:11.203 4286 4286 I YAHFA-Native: replace entry point from 0x70ddf040 to 0x71fb03801c 07-19 15:23:11.203 4286 4286 I YAHFA-Native: change access flags from 0x2080009 to 0x2080109 07-19 15:23:11.203 4286 4286 I YAHFA-Native: hook and backup done 07-19 15:23:11.203 4286 4286 W KEEN TEST: in Log.e(): KEEN, this is a test for JavaLayerHooker! 07-19 15:23:11.203 4286 4286 F droid.gallery3: thread.cc:3333] Check failed: exception != nullptr 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] Runtime aborting... 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] Dumping all threads without appropriate locks held: thread list lock mutator lock 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] All threads: 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] DALVIK THREADS (4): 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] "main" prio=5 tid=1 Runnable 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] | group="" sCount=0 dsCount=0 flags=0 obj=0x7301f9e8 self=0x7175814c00 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] | sysTid=4286 nice=0 cgrp=default sched=0/0 handle=0x71fb3d0548 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] | state=R schedstat=( 75367037 69894841 66 ) utm=1 stm=5 core=2 HZ=100 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] | stack=0x7ff78a2000-0x7ff78a4000 stackSize=8MB 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] | held mutexes= "abort lock" "mutator lock"(shared held) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #00 pc 00000000003c8f54 /system/lib64/libart.so (offset 360000) (art::DumpNativeStack(std::1::basic_ostream<char, std::__1::char_traits>&, int, BacktraceMap, char const, art::ArtMethod, void, bool)+220) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #01 pc 000000000049a394 /system/lib64/libart.so (offset 360000) (art::Thread::DumpStack(std::1::basic_ostream<char, std::1::char_traits>&, bool, BacktraceMap, bool) const+352) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #02 pc 00000000004b41a8 /system/lib64/libart.so (offset 360000) (art::DumpCheckpoint::Run(art::Thread)+828) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #03 pc 00000000004acf24 /system/lib64/libart.so (offset 360000) (art::ThreadList::RunCheckpoint(art::Closure, art::Closure)+476) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #04 pc 00000000004ac378 /system/lib64/libart.so (offset 360000) (art::ThreadList::Dump(std::__1::basic_ostream<char, std::1::char_traits>&, bool)+1036) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #05 pc 000000000046f09c /system/lib64/libart.so (offset 360000) (art::Runtime::Abort(char const)+392) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #06 pc 0000000000008d08 /system/lib64/libbase.so (android::base::LogMessage::~LogMessage()+720) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #07 pc 00000000004a5518 /system/lib64/libart.so (offset 360000) (art::Thread::QuickDeliverException()+128) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #08 pc 00000000005211cc /system/lib64/libart.so (offset 360000) (artDeliverPendingExceptionFromCode+8) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #09 pc 000000000056ac98 /system/lib64/libart.so (offset 360000) (art_quick_generic_jni_trampoline+328) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #10 pc 000000000056abac /system/lib64/libart.so (offset 360000) (art_quick_generic_jni_trampoline+92) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #11 pc 0000000000561e4c /system/lib64/libart.so (offset 360000) (art_quick_invoke_static_stub+604) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #12 pc 00000000000d053c /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+248) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #13 pc 0000000000282cc0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+344) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #14 pc 000000000027cd70 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+960) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #15 pc 0000000000532788 /system/lib64/libart.so (offset 360000) (MterpInvokeStatic+200) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #16 pc 0000000000554314 /system/lib64/libart.so (offset 360000) (ExecuteMterpImpl+14612) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #17 pc 00000000000019b4 /data/local/tmp/dexfile/inject.dex (xxxxxxx.hook+68) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #18 pc 0000000000256ed0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2445068178+488) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #19 pc 0000000000521a88 /system/lib64/libart.so (offset 360000) (artQuickToInterpreterBridge+944) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #20 pc 000000000056acfc /system/lib64/libart.so (offset 360000) (art_quick_to_interpreter_bridge+92) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #21 pc 0000000000561e4c /system/lib64/libart.so (offset 360000) (art_quick_invoke_static_stub+604) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #22 pc 00000000000d053c /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+248) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #23 pc 0000000000282cc0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+344) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #24 pc 000000000027cd70 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+960) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #25 pc 0000000000532788 /system/lib64/libart.so (offset 360000) (MterpInvokeStatic+200) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #26 pc 0000000000554314 /system/lib64/libart.so (offset 360000) (ExecuteMterpImpl+14612) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #27 pc 0000000000001866 /data/local/tmp/dexfile/inject.dex (xxxxxxx.init+162) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #28 pc 0000000000256ed0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2445068178+488) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #29 pc 0000000000521a88 /system/lib64/libart.so (offset 360000) (artQuickToInterpreterBridge+944) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #30 pc 000000000056acfc /system/lib64/libart.so (offset 360000) (art_quick_to_interpreter_bridge+92) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #31 pc 0000000000561e4c /system/lib64/libart.so (offset 360000) (art_quick_invoke_static_stub+604) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #32 pc 00000000000d053c /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+248) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #33 pc 00000000004679d8 /system/lib64/libart.so (offset 360000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod, art::(anonymous namespace)::ArgArray, art::JValue, char const)+104) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #34 pc 00000000004675dc /system/lib64/libart.so (offset 360000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jmethodID, std::__va_list)+424) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #35 pc 00000000003686e4 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv, _jclass, _jmethodID, std::va_list)+652) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #36 pc 00000000000594c4 /sbin/.magisk/modules/antiDebugModule/riru/lib64/libxxxxxxxx.so (_JNIEnv::CallStaticVoidMethod(_jclass, _jmethodID, ...)+192) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #37 pc 00000000000593c4 /sbin/.magisk/modules/antiDebugModule/riru/lib64/libxxxxx.so (xxxxxx(_JNIEnv, _jclass, char const)+268) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #38 pc 000000000004d02c /sbin/.magisk/modules/antiDebugModule/riru/lib64/libxxxxx.so (xxxxxxxt(_JNIEnv, _jclass, int)+280) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #39 pc 0000000000002d58 /sbin/.magisk/modules/riru-core/lib64/libriru.so (???) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] native: #40 pc 00000000000032d8 /sbin/.magisk/modules/riru-core/lib64/libriru.so (???) 07-19 15:23:11.270 4286 4286 F droid.gallery3: runtime.cc:558] at xxxx.backup(Native method) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] at xxxxxxxx.hook(LogHooker.java:20) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] at xxxxxx.init(JavaLayerHooker.java:35) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] at com.android.internal.os.Zygote.nativeForkAndSpecialize(Native method) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] at com.android.internal.os.Zygote.forkAndSpecialize(Zygote.java:139) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] at com.android.internal.os.ZygoteConnection.processOneCommand(ZygoteConnection.java:234) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] at com.android.internal.os.ZygoteServer.runSelectLoop(ZygoteServer.java:204) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:847) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] "Jit thread pool worker thread 0" prio=5 tid=2 Native 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | group="" sCount=1 dsCount=0 flags=1 obj=0x14500030 self=0x716f00e000 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | sysTid=4291 nice=9 cgrp=default sched=0/0 handle=0x716ef034f0 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | state=S schedstat=( 1454323 29137865 2 ) utm=0 stm=0 core=1 HZ=100 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | stack=0x716ee05000-0x716ee07000 stackSize=1021KB 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | held mutexes= 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] kernel: (couldn't read /proc/self/task/4291/stack) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #00 pc 000000000001f02c /system/lib64/libc.so (offset 7000) (syscall+28) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #01 pc 00000000000d8284 /system/lib64/libart.so (art::ConditionVariable::WaitHoldingLocks(art::Thread)+148) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #02 pc 00000000004b59fc /system/lib64/libart.so (offset 360000) (art::ThreadPool::GetTask(art::Thread)+260) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #03 pc 00000000004b4f64 /system/lib64/libart.so (offset 360000) (art::ThreadPoolWorker::Run()+124) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #04 pc 00000000004b4a24 /system/lib64/libart.so (offset 360000) (art::ThreadPoolWorker::Callback(void)+148) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #05 pc 00000000000847b8 /system/lib64/libc.so (offset 7000) (pthread_start(void)+36) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #06 pc 0000000000023574 /system/lib64/libc.so (offset 7000) (__start_thread+68) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] (no managed stack frames) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] "Signal Catcher" prio=5 tid=3 WaitingInMainSignalCatcherLoop 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | group="" sCount=1 dsCount=0 flags=1 obj=0x14540020 self=0x7175816400 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | sysTid=4292 nice=0 cgrp=default sched=0/0 handle=0x716ee024f0 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | state=S schedstat=( 460574 28771927 2 ) utm=0 stm=0 core=2 HZ=100 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | stack=0x716ed07000-0x716ed09000 stackSize=1009KB 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | held mutexes= 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] kernel: (couldn't read /proc/self/task/4292/stack) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #00 pc 0000000000070ef4 /system/lib64/libc.so (offset 7000) (__rt_sigtimedwait+8) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #01 pc 000000000002db50 /system/lib64/libc.so (offset 7000) (sigwait+64) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #02 pc 000000000048806c /system/lib64/libart.so (offset 360000) (art::SignalCatcher::WaitForSignal(art::Thread, art::SignalSet&)+416) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #03 pc 0000000000486974 /system/lib64/libart.so (offset 360000) (art::SignalCatcher::Run(void)+272) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #04 pc 00000000000847b8 /system/lib64/libc.so (offset 7000) (__pthread_start(void)+36) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #05 pc 0000000000023574 /system/lib64/libc.so (offset 7000) (start_thread+68) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] (no managed stack frames) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] "ADB-JDWP Connection Control Thread" prio=5 tid=4 WaitingInMainDebuggerLoop 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | group="" sCount=1 dsCount=0 flags=1 obj=0x12c219f0 self=0x716f015800 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | sysTid=4293 nice=0 cgrp=default sched=0/0 handle=0x715ea9e4f0 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | state=S schedstat=( 7684116 25666510 18 ) utm=0 stm=0 core=2 HZ=100 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | stack=0x715e9a3000-0x715e9a5000 stackSize=1009KB 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | held mutexes= 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] kernel: (couldn't read /proc/self/task/4293/stack) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #00 pc 0000000000070e34 /system/lib64/libc.so (offset 7000) (ppoll+8) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #01 pc 000000000002b814 /system/lib64/libc.so (offset 7000) (poll+88) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #02 pc 0000000000006cbc /system/lib64/libadbconnection.so (adbconnection::AdbConnectionState::RunPollLoop(art::Thread)+824) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #03 pc 000000000000525c /system/lib64/libadbconnection.so (adbconnection::CallbackFunction(void)+1060) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #04 pc 00000000000847b8 /system/lib64/libc.so (offset 7000) (pthread_start(void*)+36) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] native: #05 pc 0000000000023574 /system/lib64/libc.so (offset 7000) (start_thread+68) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] (no managed stack frames) 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] Aborting thread: 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] "main" prio=5 tid=1 Native 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | group="" sCount=0 dsCount=0 flags=0 obj=0x7301f9e8 self=0x7175814c00 07-19 15:23:11.271 4286 4286 F droid.gallery3: runtime.cc:558] | sysTid=4286 nice=0 cgrp=default sched=0/0 handle=0x71fb3d0548 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] | state=R schedstat=( 88260210 70061457 73 ) utm=2 stm=5 core=2 HZ=100 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] | stack=0x7ff78a2000-0x7ff78a4000 stackSize=8MB 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] | held mutexes= "abort lock" 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #00 pc 00000000003c8f54 /system/lib64/libart.so (offset 360000) (art::DumpNativeStack(std::1::basic_ostream<char, std::__1::char_traits>&, int, BacktraceMap, char const, art::ArtMethod, void, bool)+220) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #01 pc 000000000049a394 /system/lib64/libart.so (offset 360000) (art::Thread::DumpStack(std::1::basic_ostream<char, std::1::char_traits>&, bool, BacktraceMap*, bool) const+352) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #02 pc 000000000047ed20 /system/lib64/libart.so (offset 360000) (art::AbortState::DumpThread(std::__1::basic_ostream<char, std::1::char_traits>&, art::Thread) const+60) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #03 pc 000000000046f114 /system/lib64/libart.so (offset 360000) (art::Runtime::Abort(char const)+512) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #04 pc 0000000000008d08 /system/lib64/libbase.so (android::base::LogMessage::~LogMessage()+720) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #05 pc 00000000004a5518 /system/lib64/libart.so (offset 360000) (art::Thread::QuickDeliverException()+128) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #06 pc 00000000005211cc /system/lib64/libart.so (offset 360000) (artDeliverPendingExceptionFromCode+8) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #07 pc 000000000056ac98 /system/lib64/libart.so (offset 360000) (art_quick_generic_jni_trampoline+328) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #08 pc 000000000056abac /system/lib64/libart.so (offset 360000) (art_quick_generic_jni_trampoline+92) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #09 pc 0000000000561e4c /system/lib64/libart.so (offset 360000) (art_quick_invoke_static_stub+604) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #10 pc 00000000000d053c /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+248) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #11 pc 0000000000282cc0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+344) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #12 pc 000000000027cd70 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+960) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #13 pc 0000000000532788 /system/lib64/libart.so (offset 360000) (MterpInvokeStatic+200) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #14 pc 0000000000554314 /system/lib64/libart.so (offset 360000) (ExecuteMterpImpl+14612) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #15 pc 00000000000019b4 /data/local/tmp/dexfile/inject.dex (xxxxxxx.hook+68) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #16 pc 0000000000256ed0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2445068178+488) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #17 pc 0000000000521a88 /system/lib64/libart.so (offset 360000) (artQuickToInterpreterBridge+944) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #18 pc 000000000056acfc /system/lib64/libart.so (offset 360000) (art_quick_to_interpreter_bridge+92) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #19 pc 0000000000561e4c /system/lib64/libart.so (offset 360000) (art_quick_invoke_static_stub+604) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #20 pc 00000000000d053c /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+248) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #21 pc 0000000000282cc0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+344) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #22 pc 000000000027cd70 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+960) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #23 pc 0000000000532788 /system/lib64/libart.so (offset 360000) (MterpInvokeStatic+200) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #24 pc 0000000000554314 /system/lib64/libart.so (offset 360000) (ExecuteMterpImpl+14612) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #25 pc 0000000000001866 /data/local/tmp/dexfile/inject.dex (xxxxxxxx.init+162) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #26 pc 0000000000256ed0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2445068178+488) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #27 pc 0000000000521a88 /system/lib64/libart.so (offset 360000) (artQuickToInterpreterBridge+944) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #28 pc 000000000056acfc /system/lib64/libart.so (offset 360000) (art_quick_to_interpreter_bridge+92) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #29 pc 0000000000561e4c /system/lib64/libart.so (offset 360000) (art_quick_invoke_static_stub+604) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #30 pc 00000000000d053c /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+248) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #31 pc 00000000004679d8 /system/lib64/libart.so (offset 360000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod, art::(anonymous namespace)::ArgArray, art::JValue, char const)+104) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #32 pc 00000000004675dc /system/lib64/libart.so (offset 360000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jmethodID, std::va_list)+424) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #33 pc 00000000003686e4 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv, _jclass, _jmethodID*, std::va_list)+652) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #34 pc 00000000000594c4 /sbin/.magisk/modules/antiDebugModule/riru/lib64/libxxxxxx.so (_JNIEnv::CallStaticVoidMethod(_jclass, _jmethodID, ...)+192) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #35 pc 00000000000593c4 /sbin/.magisk/modules/antiDebugModule/riru/lib64/libxxxxxxso (init_java_layer_hooker(_JNIEnv, _jclass, char const)+268) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #36 pc 000000000004d02c /sbin/.magisk/modules/antiDebugModule/riru/lib64/libxxxxxx.so (forkAndSpecializePost(_JNIEnv, _jclass, int)+280) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #37 pc 0000000000002d58 /sbin/.magisk/modules/riru-core/lib64/libriru.so (???) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #38 pc 00000000000032d8 /sbin/.magisk/modules/riru-core/lib64/libriru.so (???) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #39 pc 00000000000790e0 /system/framework/arm64/boot-framework.oat (offset 46000) (com.android.internal.os.Zygote.nativeForkAndSpecialize+416) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #40 pc 0000000000561e4c /system/lib64/libart.so (offset 360000) (art_quick_invoke_static_stub+604) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #41 pc 00000000000d053c /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+248) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #42 pc 0000000000282cc0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+344) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #43 pc 000000000027de68 /system/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+772) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #44 pc 0000000000533f54 /system/lib64/libart.so (offset 360000) (MterpInvokeStaticRange+148) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #45 pc 0000000000554614 /system/lib64/libart.so (offset 360000) (ExecuteMterpImpl+15380) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #46 pc 0000000000c12c16 /system/framework/boot-framework.vdex (com.android.internal.os.Zygote.forkAndSpecialize+16) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #47 pc 0000000000256ed0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2445068178+488) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #48 pc 000000000025ca80 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #49 pc 000000000027de4c /system/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+744) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #50 pc 0000000000533f54 /system/lib64/libart.so (offset 360000) (MterpInvokeStaticRange+148) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #51 pc 0000000000554614 /system/lib64/libart.so (offset 360000) (ExecuteMterpImpl+15380) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #52 pc 0000000000c10f14 /system/framework/boot-framework.vdex (com.android.internal.os.ZygoteConnection.processOneCommand+528) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #53 pc 0000000000256ed0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2445068178+488) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #54 pc 000000000025ca80 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #55 pc 000000000027cd54 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+932) 07-19 15:23:11.272 4286 4286 F droid.gallery3: runtime.cc:558] native: #56 pc 00000000005312c0 /system/lib64/libart.so (offset 360000) (MterpInvokeVirtual+576) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #57 pc 0000000000554194 /system/lib64/libart.so (offset 360000) (ExecuteMterpImpl+14228) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #58 pc 0000000000c12988 /system/framework/boot-framework.vdex (com.android.internal.os.ZygoteServer.runSelectLoop+208) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #59 pc 0000000000256ed0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2445068178+488) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #60 pc 000000000025ca80 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #61 pc 000000000027cd54 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+932) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #62 pc 00000000005312c0 /system/lib64/libart.so (offset 360000) (MterpInvokeVirtual+576) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #63 pc 0000000000554194 /system/lib64/libart.so (offset 360000) (ExecuteMterpImpl+14228) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #64 pc 0000000000c11dac /system/framework/boot-framework.vdex (com.android.internal.os.ZygoteInit.main+526) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #65 pc 0000000000256ed0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2445068178+488) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #66 pc 0000000000521a88 /system/lib64/libart.so (offset 360000) (artQuickToInterpreterBridge+944) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #67 pc 000000000056acfc /system/lib64/libart.so (offset 360000) (art_quick_to_interpreter_bridge+92) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #68 pc 0000000000561e4c /system/lib64/libart.so (offset 360000) (art_quick_invoke_static_stub+604) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #69 pc 00000000000d053c /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+248) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #70 pc 00000000004679d8 /system/lib64/libart.so (offset 360000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod, art::(anonymous namespace)::ArgArray, art::JValue, char const)+104) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #71 pc 00000000004675dc /system/lib64/libart.so (offset 360000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jmethodID, std::va_list)+424) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #72 pc 00000000003686e4 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv, _jclass, _jmethodID*, std::va_list)+652) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #73 pc 00000000000b1f04 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass, _jmethodID, ...)+136) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #74 pc 00000000000b4890 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector const&, bool)+752) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #75 pc 000000000000219c /system/bin/app_process64 (main+1200) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] native: #76 pc 00000000000b0558 /system/lib64/libc.so (offset 7000) (libc_init+88) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] atxxxxxx.backup(Native method) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] at xxxxxxx.hook(LogHooker.java:20) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] at xxxxxxxx.JavaLayerHooker.init(JavaLayerHooker.java:35) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] at com.android.internal.os.Zygote.nativeForkAndSpecialize(Native method) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] at com.android.internal.os.Zygote.forkAndSpecialize(Zygote.java:139) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] at com.android.internal.os.ZygoteConnection.processOneCommand(ZygoteConnection.java:234) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] at com.android.internal.os.ZygoteServer.runSelectLoop(ZygoteServer.java:204) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:847) 07-19 15:23:11.273 4286 4286 F droid.gallery3: runtime.cc:558] 07-19 15:23:11.273 4286 4286 F libc : Fatal signal 6 (SIGABRT), code -6 (SI_TKILL) in tid 4286 (droid.gallery3), pid 4286 (droid.gallery3) 07-19 15:23:11.343 4297 4297 I crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone 07-19 15:23:11.343 894 894 I /system/bin/tombstoned: received crash request for pid 4286 07-19 15:23:11.344 4297 4297 I crash_dump64: performing dump of process 4286 (target tid = 4286) 07-19 15:23:11.350 4297 4297 F DEBUG : 07-19 15:23:11.350 4297 4297 F DEBUG : Build fingerprint: 'Android/aosp_sailfish/sailfish:9/PQ3A.190801.002/zqqz07191520:userdebug/release-keys' 07-19 15:23:11.350 4297 4297 F DEBUG : Revision: '0' 07-19 15:23:11.350 4297 4297 F DEBUG : ABI: 'arm64' 07-19 15:23:11.350 4297 4297 F DEBUG : pid: 4286, tid: 4286, name: droid.gallery3 >>> zygote64 <<< 07-19 15:23:11.350 4297 4297 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr -------- 07-19 15:23:11.350 4297 4297 F DEBUG : Abort message: 'app_dir : /data/user/0/com.android.gallery3d' 07-19 15:23:11.350 4297 4297 F DEBUG : x0 0000000000000000 x1 00000000000010be x2 0000000000000006 x3 0000000000000008 07-19 15:23:11.350 4297 4297 F DEBUG : x4 0000000000000000 x5 0000000000000000 x6 0000000000000000 x7 0000000000000080 07-19 15:23:11.350 4297 4297 F DEBUG : x8 0000000000000083 x9 6ae3586563165576 x10 fffffff87ffffbdf x11 fffffffc7ffffbdf 07-19 15:23:11.350 4297 4297 F DEBUG : x12 fffffffffffff000 x13 ffffffffffffefff x14 ffffffffffffffff x15 0000007ff809b5e8 07-19 15:23:11.350 4297 4297 F DEBUG : x16 00000071f70332c8 x17 00000071f6f71358 x18 0000007ff809b070 x19 00000000000010be 07-19 15:23:11.350 4297 4297 F DEBUG : x20 00000000000010be x21 0000000000000083 x22 0000007175814c00 x23 00000071758e7060 07-19 15:23:11.350 4297 4297 F DEBUG : x24 000000000000000d x25 00000000ffffffff x26 0000000000000012 x27 0000000000000005 07-19 15:23:11.350 4297 4297 F DEBUG : x28 000000717570ebaa x29 0000007ff809bde0 07-19 15:23:11.350 4297 4297 F DEBUG : sp 0000007ff809bda0 lr 00000071f6f65c7c pc 00000071f6f65c9c 07-19 15:23:11.354 4246 4246 W .huolala.drive: ClassLoaderContext classpath size mismatch for position 0. expected=3, found=0 (PCL[/system/framework/android.test.runner.jar3846605392:/system/framework/android.test.mock.jar2077058553:/system/framework/org.apache.http.legacy.boot.jar796383208] | PCL[]) 07-19 15:23:11.353 4297 4297 I crash_dump64: type=1400 audit(0.0:243): avc: denied { read } for name="inject.dex" dev="sda35" ino=745479 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:shell_data_file:s0 tclass=file permissive=1 07-19 15:23:11.353 4297 4297 I crash_dump64: type=1400 audit(0.0:244): avc: denied { open } for path="/data/local/tmp/dexfile/inject.dex" dev="sda35" ino=745479 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:shell_data_file:s0 tclass=file permissive=1 07-19 15:23:11.353 4297 4297 I crash_dump64: type=1400 audit(0.0:245): avc: denied { getattr } for path="/data/local/tmp/dexfile/inject.dex" dev="sda35" ino=745479 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:shell_data_file:s0 tclass=file permissive=1 07-19 15:23:11.383 4297 4297 F DEBUG : 07-19 15:23:11.383 4297 4297 F DEBUG : backtrace: 07-19 15:23:11.383 4297 4297 F DEBUG : #00 pc 0000000000021c9c /system/lib64/libc.so (offset 0x7000) (abort+112) 07-19 15:23:11.383 4297 4297 F DEBUG : #01 pc 000000000046f3cc /system/lib64/libart.so (offset 0x360000) (art::Runtime::Abort(char const)+1208) 07-19 15:23:11.383 4297 4297 F DEBUG : #02 pc 0000000000008d08 /system/lib64/libbase.so (android::base::LogMessage::~LogMessage()+720) 07-19 15:23:11.383 4297 4297 F DEBUG : #03 pc 00000000004a5518 /system/lib64/libart.so (offset 0x360000) (art::Thread::QuickDeliverException()+128) 07-19 15:23:11.383 4297 4297 F DEBUG : #04 pc 00000000005211cc /system/lib64/libart.so (offset 0x360000) (artDeliverPendingExceptionFromCode+8) 07-19 15:23:11.383 4297 4297 F DEBUG : #05 pc 000000000056ac98 /system/lib64/libart.so (offset 0x360000) (art_quick_generic_jni_trampoline+328) 07-19 15:23:11.383 4297 4297 F DEBUG : #06 pc 000000000056abac /system/lib64/libart.so (offset 0x360000) (art_quick_generic_jni_trampoline+92) 07-19 15:23:11.383 4297 4297 F DEBUG : #07 pc 0000000000561e4c /system/lib64/libart.so (offset 0x360000) (art_quick_invoke_static_stub+604) 07-19 15:23:11.383 4297 4297 F DEBUG : #08 pc 00000000000d053c /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+248) 07-19 15:23:11.383 4297 4297 F DEBUG : #09 pc 0000000000282cc0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+344) 07-19 15:23:11.383 4297 4297 F DEBUG : #10 pc 000000000027cd70 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+960) 07-19 15:23:11.383 4297 4297 F DEBUG : #11 pc 0000000000532788 /system/lib64/libart.so (offset 0x360000) (MterpInvokeStatic+200) 07-19 15:23:11.383 4297 4297 F DEBUG : #12 pc 0000000000554314 /system/lib64/libart.so (offset 0x360000) (ExecuteMterpImpl+14612) 07-19 15:23:11.383 4297 4297 F DEBUG : #13 pc 00000000000019b4 /data/local/tmp/dexfile/inject.dex (xxxxxxx.hook+68) 07-19 15:23:11.383 4297 4297 F DEBUG : #14 pc 0000000000256ed0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2445068178+488) 07-19 15:23:11.383 4297 4297 F DEBUG : #15 pc 0000000000521a88 /system/lib64/libart.so (offset 0x360000) (artQuickToInterpreterBridge+944) 07-19 15:23:11.383 4297 4297 F DEBUG : #16 pc 000000000056acfc /system/lib64/libart.so (offset 0x360000) (art_quick_to_interpreter_bridge+92) 07-19 15:23:11.384 4297 4297 F DEBUG : #17 pc 0000000000561e4c /system/lib64/libart.so (offset 0x360000) (art_quick_invoke_static_stub+604) 07-19 15:23:11.384 4297 4297 F DEBUG : #18 pc 00000000000d053c /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+248) 07-19 15:23:11.384 4297 4297 F DEBUG : #19 pc 0000000000282cc0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+344) 07-19 15:23:11.384 4297 4297 F DEBUG : #20 pc 000000000027cd70 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+960) 07-19 15:23:11.384 4297 4297 F DEBUG : #21 pc 0000000000532788 /system/lib64/libart.so (offset 0x360000) (MterpInvokeStatic+200) 07-19 15:23:11.384 4297 4297 F DEBUG : #22 pc 0000000000554314 /system/lib64/libart.so (offset 0x360000) (ExecuteMterpImpl+14612) 07-19 15:23:11.384 4297 4297 F DEBUG : #23 pc 0000000000001866 /data/local/tmp/dexfile/inject.dex (xxxxxxx.JavaLayerHooker.init+162) 07-19 15:23:11.384 4297 4297 F DEBUG : #24 pc 0000000000256ed0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2445068178+488) 07-19 15:23:11.384 4297 4297 F DEBUG : #25 pc 0000000000521a88 /system/lib64/libart.so (offset 0x360000) (artQuickToInterpreterBridge+944) 07-19 15:23:11.384 4297 4297 F DEBUG : #26 pc 000000000056acfc /system/lib64/libart.so (offset 0x360000) (art_quick_to_interpreter_bridge+92) 07-19 15:23:11.384 4297 4297 F DEBUG : #27 pc 0000000000561e4c /system/lib64/libart.so (offset 0x360000) (art_quick_invoke_static_stub+604) 07-19 15:23:11.384 4297 4297 F DEBUG : #28 pc 00000000000d053c /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+248) 07-19 15:23:11.384 4297 4297 F DEBUG : #29 pc 00000000004679d8 /system/lib64/libart.so (offset 0x360000) (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod, art::(anonymous namespace)::ArgArray, art::JValue, char const)+104) 07-19 15:23:11.384 4297 4297 F DEBUG : #30 pc 00000000004675dc /system/lib64/libart.so (offset 0x360000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jmethodID, std::va_list)+424) 07-19 15:23:11.384 4297 4297 F DEBUG : #31 pc 00000000003686e4 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv, _jclass, _jmethodID, std::__va_list)+652) 07-19 15:23:11.384 4297 4297 F DEBUG : #32 pc 00000000000594c4 /sbin/.magisk/modules/antiDebugModule/riru/lib64/xxxxxxx。so (_JNIEnv::CallStaticVoidMethod(_jclass, _jmethodID, ...)+192) 07-19 15:23:11.384 4297 4297 F DEBUG : #33 pc 00000000000593c4 /sbin/.magisk/modules/antiDebugModule/riru/lib64/xxxxxx.so (init_java_layer_hooker(_JNIEnv, _jclass, char const)+268) 07-19 15:23:11.384 4297 4297 F DEBUG : #34 pc 000000000004d02c /sbin/.magisk/modules/antiDebugModule/riru/lib64/xxxxxxx.so (forkAndSpecializePost(_JNIEnv, _jclass, int)+280) 07-19 15:23:11.384 4297 4297 F DEBUG : #35 pc 0000000000002d58 /sbin/.magisk/modules/riru-core/lib64/libriru.so 07-19 15:23:11.384 4297 4297 F DEBUG : #36 pc 00000000000032d8 /sbin/.magisk/modules/riru-core/lib64/libriru.so 07-19 15:23:11.384 4297 4297 F DEBUG : #37 pc 00000000000790e0 /system/framework/arm64/boot-framework.oat (offset 0x46000) (com.android.internal.os.Zygote.nativeForkAndSpecialize+416) 07-19 15:23:11.384 4297 4297 F DEBUG : #38 pc 0000000000561e4c /system/lib64/libart.so (offset 0x360000) (art_quick_invoke_static_stub+604) 07-19 15:23:11.384 4297 4297 F DEBUG : #39 pc 00000000000d053c /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+248) 07-19 15:23:11.384 4297 4297 F DEBUG : #40 pc 0000000000282cc0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+344) 07-19 15:23:11.384 4297 4297 F DEBUG : #41 pc 000000000027de68 /system/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+772) 07-19 15:23:11.384 4297 4297 F DEBUG : #42 pc 0000000000533f54 /system/lib64/libart.so (offset 0x360000) (MterpInvokeStaticRange+148) 07-19 15:23:11.384 4297 4297 F DEBUG : #43 pc 0000000000554614 /system/lib64/libart.so (offset 0x360000) (ExecuteMterpImpl+15380) 07-19 15:23:11.384 4297 4297 F DEBUG : #44 pc 0000000000c12c16 /system/framework/boot-framework.vdex (com.android.internal.os.Zygote.forkAndSpecialize+16) 07-19 15:23:11.384 4297 4297 F DEBUG : #45 pc 0000000000256ed0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2445068178+488) 07-19 15:23:11.384 4297 4297 F DEBUG : #46 pc 000000000025ca80 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 07-19 15:23:11.384 4297 4297 F DEBUG : #47 pc 000000000027de4c /system/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+744) 07-19 15:23:11.384 4297 4297 F DEBUG : #48 pc 0000000000533f54 /system/lib64/libart.so (offset 0x360000) (MterpInvokeStaticRange+148) 07-19 15:23:11.384 4297 4297 F DEBUG : #49 pc 0000000000554614 /system/lib64/libart.so (offset 0x360000) (ExecuteMterpImpl+15380) 07-19 15:23:11.384 4297 4297 F DEBUG : #50 pc 0000000000c10f14 /system/framework/boot-framework.vdex (com.android.internal.os.ZygoteConnection.processOneCommand+528) 07-19 15:23:11.384 4297 4297 F DEBUG : #51 pc 0000000000256ed0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2445068178+488) 07-19 15:23:11.385 4297 4297 F DEBUG : #52 pc 000000000025ca80 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 07-19 15:23:11.385 4297 4297 F DEBUG : #53 pc 000000000027cd54 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+932) 07-19 15:23:11.385 4297 4297 F DEBUG : #54 pc 00000000005312c0 /system/lib64/libart.so (offset 0x360000) (MterpInvokeVirtual+576) 07-19 15:23:11.385 4297 4297 F DEBUG : #55 pc 0000000000554194 /system/lib64/libart.so (offset 0x360000) (ExecuteMterpImpl+14228) 07-19 15:23:11.385 4297 4297 F DEBUG : #56 pc 0000000000c12988 /system/framework/boot-framework.vdex (com.android.internal.os.ZygoteServer.runSelectLoop+208) 07-19 15:23:11.385 4297 4297 F DEBUG : #57 pc 0000000000256ed0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2445068178+488) 07-19 15:23:11.386 4297 4297 F DEBUG : #58 pc 000000000025ca80 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 07-19 15:23:11.386 4297 4297 F DEBUG : #59 pc 000000000027cd54 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+932) 07-19 15:23:11.386 4297 4297 F DEBUG : #60 pc 00000000005312c0 /system/lib64/libart.so (offset 0x360000) (MterpInvokeVirtual+576) 07-19 15:23:11.386 4297 4297 F DEBUG : #61 pc 0000000000554194 /system/lib64/libart.so (offset 0x360000) (ExecuteMterpImpl+14228) 07-19 15:23:11.386 4297 4297 F DEBUG : #62 pc 0000000000c11dac /system/framework/boot-framework.vdex (com.android.internal.os.ZygoteInit.main+526) 07-19 15:23:11.386 4297 4297 F DEBUG : #63 pc 0000000000256ed0 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.2445068178+488) 07-19 15:23:11.386 4297 4297 F DEBUG : #64 pc 0000000000521a88 /system/lib64/libart.so (offset 0x360000) (artQuickToInterpreterBridge+944) 07-19 15:23:11.386 4297 4297 F DEBUG : #65 pc 000000000056acfc /system/lib64/libart.so (offset 0x360000) (art_quick_to_interpreter_bridge+92) 07-19 15:23:11.386 4297 4297 F DEBUG : #66 pc 0000000000561e4c /system/lib64/libart.so (offset 0x360000) (art_quick_invoke_static_stub+604) 07-19 15:23:11.386 4297 4297 F DEBUG : #67 pc 00000000000d053c /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+248) JValue, char const)+104) 07-19 15:23:11.386 4297 4297 F DEBUG : #69 pc 00000000004675dc /system/lib64/libart.so (offset 0x360000) (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jmethodID, std::__va_list)+424) 07-19 15:23:11.386 4297 4297 F DEBUG : #70 pc 00000000003686e4 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv, _jclass, _jmethodID, std::va_list)+652) 07-19 15:23:11.386 4297 4297 F DEBUG : #71 pc 00000000000b1f04 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass, _jmethodID, ...)+136) 07-19 15:23:11.386 4297 4297 F DEBUG : #72 pc 00000000000b4890 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector const&, bool)+752) 07-19 15:23:11.386 4297 4297 F DEBUG : #73 pc 000000000000219c /system/bin/app_process64 (main+1200) 07-19 15:23:11.386 4297 4297 F DEBUG : #74 pc 00000000000b0558 /system/lib64/libc.so (offset 0x7000) (libc_init+88) 07-19 15:23:11.396 4297 4297 I crash_dump64: type=1400 audit(0.0:246): avc: denied { read } for name="framework-resauto_generated_rro.apk" dev="dm-0" ino=287 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:vendor_overlay_file:s0 tclass=file permissive=1 07-19 15:23:11.396 4297 4297 I crash_dump64: type=1400 audit(0.0:247): avc: denied { open } for path="/vendor/overlay/framework-resauto_generated_rro.apk" dev="dm-0" ino=287 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:vendor_overlay_file:s0 tclass=file permissive=1 07-19 15:23:11.396 4297 4297 I crash_dump64: type=1400 audit(0.0:248): avc: denied { getattr } for path="/vendor/overlay/framework-res__auto_generated_rro.apk" dev="dm-0" ino=287 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:vendor_overlay_file:s0 tclass=file permissive=1 07-19 15:23:11.400 4297 4297 I crash_dump64: type=1400 audit(0.0:249): avc: denied { read } for name="vendor@overlay@framework-res__auto_generated_rro.apk@idmap" dev="sda35" ino=16386 scontext=u:r:crash_dump:s0:c512,c768 tcontext=u:object_r:resourcecache_data_file:s0 tclass=file permissive=1 07-19 15:23:11.505 894 894 E /system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_04

Gstalker commented 2 years ago

我把您的代码整合到一个riru插件中了。现在的情况是这样的: 钩子可以钩到目标方法,但是不能调用backup() 调用backup()会出现如上问所示的报错 走的Java_lab_galaxy_yahfa_HookMain_backupAndHookNative

Gstalker commented 2 years ago

架构(Architecture):arm64

系统(System Version):Android 9

java层的代码(HookMain.java)是插件加载后从native层手动加载的dex文件

rk700 commented 2 years ago

调用栈里有jni相关,是jni方法吗

Gstalker commented 2 years ago

调用栈里有jni相关,是jni方法吗

不是jni方法

使用yahfa的方式:riru注入zygote,在 native: #38 forkAndSpecializePost()处加载了一个dex文件。这个dex文件再调用yahfa的api

Gstalker commented 2 years ago

已解决: 解决方案见#126 虽然并不清楚原理,但是现在backup()可以跑了

Gstalker commented 2 years ago

这个问题一直困扰我很久,最后我想到一个可能性,但是还没验证: backup()调用失败后会触发一个java thread.CC的exception,那么backup()到底调用了什么会触发这个东西?

126 的处理方法是用Class.forName来让Class初始化后再进行hook,参考http://rk700.github.io/2017/03/30/YAHFA-introduction/ 中有关ArtMethod的“重定向”的描述,这个exception可能是因为触发了resolution_method_导致的。