changhuapeng / FrameworkPatcherGO

A Magisk/KernelSU/APatch module to modify framework.jar directly on the phone, to build a valid system-level certificate chain.
https://xdaforums.com/t/module-framework-patcher-go.4674536/
312 stars 30 forks source link

GMS Crashed #7

Closed Freedom0925 closed 1 month ago

Freedom0925 commented 3 months ago

2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A Build fingerprint: 'Redmi/ares/ares:13/TP1A.220624.014/V816.0.3.1.TKJCNXM:user/release-keys' 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A Revision: '0' 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A ABI: 'arm64' 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A Timestamp: 2024-06-14 10:22:27.522576004+0800 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A Process uptime: 3s 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A ZygotePid: 867 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A Cmdline: com.google.android.gms.persistent 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A pid: 6752, tid: 6752, name: .gms.persistent >>> com.google.android.gms.persistent <<< 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A uid: 10130 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x0000000070ccdd10 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x0 0000000071c4feb0 x1 0000000013b41f70 x2 0000000000000001 x3 0000007fdc3dd300 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x4 0000000071851520 x5 0000000000000000 x6 0080000000000000 x7 71636d604b3bff3a 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x8 56e6fda4539c2580 x9 56e6fda4539c2580 x10 0000000013b42140 x11 0000000013b41f70 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x12 0000000010390000 x13 0000000010390000 x14 0000000018300001 x15 0000007c0b7b3e58 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x16 0000000013b42128 x17 000000000004ed08 x18 0000007cb0992000 x19 b400007cb02a2c00 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x20 0000000000000000 x21 0000000000000000 x22 0000000013b41db0 x23 0000000013b42118 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x24 0000007c0b400880 x25 0000007fdc3dd7d0 x26 0000007fdc3dd7d8 x27 0000007fdc3dd7d0 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A x28 0000007fdc3dd7e0 x29 0000007fdc3dd7d8 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A lr 0000007bf4e6e908 sp 0000007fdc3dd760 pc 0000000070ccdd10 pst 0000000060001000 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A backtrace: 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #00 pc 0000000000276d10 [anon:dalvik-/system/framework/boot.art] 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #01 pc 0000000000006904 /system/framework/oat/arm64/com.android.location.provider.odex (com.android.location.provider.GeofenceProvider.+116) (BuildId: 107c50c205e8fae848d181abcc3d2df5245a68f3) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #02 pc 000000000020a2b0 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #03 pc 0000000000504950 /product/priv-app/GmsCore/GmsCore.apk (dbol.+0) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #04 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #05 pc 00000000005048aa /product/priv-app/GmsCore/GmsCore.apk (dbok.+22) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #06 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #07 pc 000000000050ac8c /product/priv-app/GmsCore/GmsCore.apk (dbrr.+396) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #08 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #09 pc 0000000000509636 /product/priv-app/GmsCore/GmsCore.apk (com.google.android.location.internal.GoogleLocationManagerChimeraService.onCreate+62) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #10 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #11 pc 000000000040c624 /product/priv-app/GmsCore/GmsCore.apk (hny.onCreate+28) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #12 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #13 pc 00000000004d572a /product/priv-app/GmsCore/GmsCore.apk (zpu.onCreate+30) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #14 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #15 pc 000000000056a0a4 /system/framework/framework.jar (android.app.ActivityThread.handleCreateService+368) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #16 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #17 pc 0000000000565b44 /system/framework/framework.jar (android.app.ActivityThread.-$$Nest$mhandleCreateService+0) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #18 pc 0000000000209334 /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #19 pc 0000000000565154 /system/framework/framework.jar (android.app.ActivityThread$H.handleMessage+1556) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #20 pc 00000000020601f8 /memfd:jit-zygote-cache (deleted) (android.os.Handler.dispatchMessage+184) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #21 pc 000000000220d83c /memfd:jit-zygote-cache (deleted) (android.os.Looper.loopOnce+1068) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #22 pc 0000000002079728 /memfd:jit-zygote-cache (deleted) (android.os.Looper.loop+584) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #23 pc 0000000000209398 /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #24 pc 000000000056c808 /system/framework/framework.jar (android.app.ActivityThread.main+264) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #25 pc 0000000000210c00 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+576) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #26 pc 0000000000279e1c /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+236) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #27 pc 000000000062ad74 /apex/com.android.art/lib64/libart.so (_jobject art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jobject, _jobject, unsigned long)+1396) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #28 pc 00000000005abff0 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv, _jobject, _jobject, _jobjectArray)+48) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #29 pc 000000000009a148 /system/framework/arm64/boot.oat (art_jni_trampoline+120) (BuildId: 2ef1228f25296a2a3f3b0a54ffd2762d21183678) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #30 pc 0000000002403168 /memfd:jit-zygote-cache (deleted) (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #31 pc 000000000020b0d4 /apex/com.android.art/lib64/libart.so (nterp_helper+7636) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #32 pc 000000000040e008 /system/framework/framework.jar (com.android.internal.os.ZygoteInit.main+664) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #33 pc 0000000000210c00 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+576) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #34 pc 0000000000279e1c /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+236) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #35 pc 000000000062b5b0 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<art::ArtMethod>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, art::ArtMethod, std::__va_list)+448) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #36 pc 000000000062bb5c /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jmethodID, std::va_list)+92) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #37 pc 0000000000510aa8 /apex/com.android.art/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv, _jclass, _jmethodID*, std::va_list)+664) (BuildId: 70011d870c6c7182170268e38f4a5af6) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #38 pc 00000000000c1ce8 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass, _jmethodID, ...)+120) (BuildId: 1aae297150b301fbc2d3bc80c0be54c1) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #39 pc 00000000000ce1d8 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector const&, bool)+1016) (BuildId: 1aae297150b301fbc2d3bc80c0be54c1) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #40 pc 0000000000002560 /system/bin/app_process64 (main+1280) (BuildId: 49ad4827ab1c2f851ee245d69f06be9f) 2024-06-14 10:22:27.747 7072-7072 DEBUG pid-7072 A #41 pc 0000000000085240 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+96) (BuildId: 95768e541c682c20709fc11df6431f16)

changhuapeng commented 3 months ago

Is this after the module is installed successfully without error? If so, then this part of the FAQ in my XDA thread mighe be relevant.

Q: After installing the module successfully, my device is bootlooping / apps are crashing / system is feeling sluggish. Please help!

A: Issues like these are not uncommon when it comes to patching or overlaying system files and that is the inherent problem of overlaying framework in this module. Whatever optimisation the system has for the overlaid components are disabled and that will sometimes cause unexpected outcomes like system lagginess or crashes.

Clearing device dalvik-cache have been observed to sometimes help solve these problems so that is what you should try first. If that does not work, then there's really no easy solution other than one that needs your system to be read-write.

Freedom0925 commented 3 months ago

installed successfully without error,Then I deleted the /data/dalvik-cache folder and restarted the device

00raq00 commented 3 months ago

installed successfully without error,Then I deleted the /data/dalvik-cache folder and restarted the device

are you using stock rom or xiaomi.eu (or other rom with own fixes for playintegrity) ?