能力值:
( LV2,RANK:10 )
18 楼
大大,请问下,你是否出现过当应用运行在后台一小段时间后,返回应用,再次调用含有反射调用原方法的hook方法时导致崩溃的现象。 --------- beginning of crash 2019-02-18 14:22:56.663 2937-2937/ A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x10 in tid 2937 , pid 2937 (curity.demohook) 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: Build fingerprint: 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: Revision: 'MP1.0' 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: ABI: 'arm64' 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x10 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: Cause: null pointer dereference 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: x0 0000000000000000 x1 0000007fe5025000 x2 0000000000000010 x3 656d003c7373616c 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: x4 000000782844fcbd x5 0000007fe5025071 x6 6e616c2e6176616a x7 3c7373616c432e67 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: x8 0000000000000000 x9 0000000000000000 x10 0000000000000000 x11 0000000000000010 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: x12 6c616974696e496e x13 203a7373616c4320 x14 0000007fe5024794 x15 0000007fe502432c 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: x16 00000078a93ba838 x17 00000078a9161b30 x18 0000007fe502432a x19 0000007fe5025000 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: x20 000000001492aaa8 x21 00000078ae0545e0 x22 0000000000000001 x23 0000000000000001 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: x24 00000078ae0545f0 x25 00000078287fdc00 x26 00000078ae0545e0 x27 0000007fe5025060 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: x28 0000007fe5025080 x29 0000007fe5024fd0 2019-02-18 14:22:56.700 2980-2980/? A/DEBUG: sp 0000007fe5024f90 lr 0000007828267d0c pc 0000007828268308 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: backtrace: 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #00 pc 000000000038f308 /system/lib64/libart.so (art::mirror::Class::GetDescriptor(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>*)+160) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #01 pc 000000000038ed08 /system/lib64/libart.so (art::mirror::Class::PrettyClass()+80) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #02 pc 0000000000111348 /system/lib64/libart.so (art::ClassLinker::EnsureInitialized(art::Thread*, art::Handle<art::mirror::Class>, bool, bool)+724) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #03 pc 0000000000451608 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+2544) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #04 pc 00000000003e278c /system/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #05 pc 000000000011d6d4 /system/framework/arm64/boot.oat (offset 0x113000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #06 pc 0000000000545d88 /system/lib64/libart.so (art_quick_invoke_stub+584) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #07 pc 00000000000cf698 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #08 pc 000000000027aba8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #09 pc 0000000000274be8 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #10 pc 0000000000515a20 /system/lib64/libart.so (MterpInvokeVirtual+588) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #11 pc 0000000000538314 /system/lib64/libart.so (ExecuteMterpImpl+14228) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #12 pc 0000000000010440 /data/app/akira.me.security.demohook-qd0Lxs7ej66x3B5_ZIPOew==/oat/arm64/base.vdex (akira.me.security.demohook.hook.InstanceAddHook.addHook+52) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #13 pc 000000000024eb68 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3830762457+488) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #14 pc 00000000005066dc /system/lib64/libart.so (artQuickToInterpreterBridge+1032) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #15 pc 000000000054eefc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #16 pc 0000000000545d88 /system/lib64/libart.so (art_quick_invoke_stub+584) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #17 pc 00000000000cf698 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #18 pc 000000000027aba8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #19 pc 0000000000274be8 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+948) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #20 pc 0000000000515a20 /system/lib64/libart.so (MterpInvokeVirtual+588) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #21 pc 0000000000538314 /system/lib64/libart.so (ExecuteMterpImpl+14228) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #22 pc 000000000000f30a /data/app/akira.me.security.demohook-qd0Lxs7ej66x3B5_ZIPOew==/oat/arm64/base.vdex (akira.me.security.demohook.MainActivity$2.onClick+18) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #23 pc 000000000024eb68 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3830762457+488) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #24 pc 00000000002542c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #25 pc 0000000000274bcc /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #26 pc 0000000000516990 /system/lib64/libart.so (MterpInvokeInterface+1392) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #27 pc 0000000000538514 /system/lib64/libart.so (ExecuteMterpImpl+14740) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #28 pc 0000000000b83b2a /system/framework/boot-framework.vdex (android.view.View.performClick+34) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #29 pc 000000000024eb68 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3830762457+488) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #30 pc 00000000002542c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #31 pc 0000000000274bcc /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #32 pc 0000000000518a4c /system/lib64/libart.so (MterpInvokeVirtualQuick+584) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #33 pc 000000000053c094 /system/lib64/libart.so (ExecuteMterpImpl+29972) 2019-02-18 14:22:56.787 2980-2980/? A/DEBUG: #34 pc 0000000000d27fd6 /system/framework/boot-framework.vdex (android.view.View.performClickInternal+6) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #35 pc 000000000024eb68 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3830762457+488) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #36 pc 00000000002542c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #37 pc 0000000000274bcc /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #38 pc 0000000000516d54 /system/lib64/libart.so (MterpInvokeDirect+296) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #39 pc 0000000000538414 /system/lib64/libart.so (ExecuteMterpImpl+14484) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #40 pc 0000000000d26f96 /system/framework/boot-framework.vdex (android.view.View.access$3100) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #41 pc 000000000024eb68 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3830762457+488) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #42 pc 00000000002542c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #43 pc 0000000000274bcc /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #44 pc 0000000000516f18 /system/lib64/libart.so (MterpInvokeStatic+204) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #45 pc 0000000000538494 /system/lib64/libart.so (ExecuteMterpImpl+14612) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #46 pc 0000000000b72922 /system/framework/boot-framework.vdex (android.view.View$PerformClick.run+4) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #47 pc 000000000024eb68 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3830762457+488) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #48 pc 00000000002542c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #49 pc 0000000000274bcc /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #50 pc 0000000000516990 /system/lib64/libart.so (MterpInvokeInterface+1392) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #51 pc 0000000000538514 /system/lib64/libart.so (ExecuteMterpImpl+14740) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #52 pc 0000000000c47cf2 /system/framework/boot-framework.vdex (android.os.Handler.handleCallback+4) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #53 pc 000000000024eb68 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3830762457+488) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #54 pc 00000000002542c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #55 pc 0000000000274bcc /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #56 pc 0000000000516f18 /system/lib64/libart.so (MterpInvokeStatic+204) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #57 pc 0000000000538494 /system/lib64/libart.so (ExecuteMterpImpl+14612) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #58 pc 0000000000ae5500 /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+8) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #59 pc 000000000024eb68 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3830762457+488) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #60 pc 00000000002542c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #61 pc 0000000000274bcc /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #62 pc 0000000000515a20 /system/lib64/libart.so (MterpInvokeVirtual+588) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #63 pc 0000000000538314 /system/lib64/libart.so (ExecuteMterpImpl+14228) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #64 pc 0000000000aec610 /system/framework/boot-framework.vdex (android.os.Looper.loop+404) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #65 pc 000000000024eb68 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3830762457+488) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #66 pc 00000000002542c8 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+216) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #67 pc 0000000000274bcc /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+920) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #68 pc 0000000000516f18 /system/lib64/libart.so (MterpInvokeStatic+204) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #69 pc 0000000000538494 /system/lib64/libart.so (ExecuteMterpImpl+14612) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #70 pc 00000000003856a2 /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #71 pc 000000000024eb68 /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3830762457+488) 2019-02-18 14:22:56.788 2980-2980/? A/DEBUG: #72 pc 00000000005066dc /system/lib64/libart.so (artQuickToInterpreterBridge+1032)