ANECompilerService

Before you comment to crucify me for looking in logs, please tell me if this compiler looks suspicious, I didn’t post the full log as it’s very very long.


This iPad was factory reset at the Apple Store a few weeks, no additional apps installed. My MacBook Pro and MacMini were both compromised and jailbroken.


I am wondering if this is a persistent ‘horsey’ type issue and my iPad and Macs are now back on the merry-go-round despite factory resets and new AppleID.


{"app_name":"ANECompilerService","timestamp":"2023-03-28 09:42:12.00 +1100","slice_uuid":"","build_version":"1","bundleID":"com.apple.ANECompilerService","duration_ms":"120064","share_with_app_devs":0,"is_first_party":0,"bug_type":"202","os_version":"iPhone OS 16.3.1 (20D67)","roots_installed":0,"name":"ANECompilerService","incident_id":""}
Date/Time:        2023-03-28 09:40:11.292 +1100
End time:         2023-03-28 09:42:11.356 +1100
OS Version:       iPhone OS 16.3.1 (Build 20D67)
Architecture:     arm64e
Report Version:   40
Incident Identifier: 

Data Source:      Microstackshots
Shared Cache:     
Shared Cache:     

Command:          ANECompilerService
Path:             /System/Library/PrivateFrameworks/AppleNeuralEngine.framework/XPCServices/ANECompilerService.xpc/ANECompilerService
Identifier:       com.apple.ANECompilerService
Version:          ??? (1)
Resource Coalition ID: 463
Architecture:     arm64e
Parent:           launchd [1]
PID:              1021

Event:            cpu usage
Action taken:     none
CPU:              90 seconds cpu time over 120 seconds (75% cpu average), exceeding limit of 50% cpu over 180 seconds
CPU limit:        90s
Limit duration:   180s
CPU used:         90s
CPU duration:     120s
Duration:         120.06s
Duration Sampled: 118.88s
Steps:            47

Hardware model:   iPad12,1
Active cpus:      6
HW page size:     16384
VM page size:     16384

Advisory levels:  Battery -> 3, User -> 3, ThermalPressure -> 0, Combined -> 3
Free disk space:  48.07 GB/59.59 GB, low space threshold 150 MB
Vnodes Available: 47.69% (4769/10000)

Preferred User Language: en-AU
Country Code:     AU
Keyboards:        en_AU QWERTY
OS Cryptex File Extents: 4

Heaviest stack for the target process:
  30  ??? (libsystem_pthread.dylib + 2968) [0x227d3cb98]
  30  ??? (libsystem_pthread.dylib + 3576) [0x227d3cdf8]
  30  ??? (libdispatch.dylib + 93712) [0x1e1a63e10]
  30  ??? (libdispatch.dylib + 49600) [0x1e1a591c0]
  30  ??? (libdispatch.dylib + 46360) [0x1e1a58518]
  30  ??? (libdispatch.dylib + 136524) [0x1e1a6e54c]
  30  ??? (libdispatch.dylib + 46360) [0x1e1a58518]
  30  ??? (libdispatch.dylib + 133168) [0x1e1a6d830]
  30  ??? (libdispatch.dylib + 16456) [0x1e1a51048]
  30  ??? (libxpc.dylib + 72652) [0x227d91bcc]
  30  ??? (libxpc.dylib + 71580) [0x227d9179c]
  30  ??? (Foundation + 6599156) [0x1d4e611f4]
  30  ??? (Foundation + 6600584) [0x1d4e61788]
  30  ??? (Foundation + 6594040) [0x1d4e5fdf8]
  30  ??? (Foundation + 711484) [0x1d48c3b3c]
  30  ??? (CoreFoundation + 133916) [0x1da450b1c]
  30  ??? (CoreFoundation + 476852) [0x1da4a46b4]
  30  ??? (ANECompilerService + 106728) [0x10006e0e8]
  30  ??? (libdispatch.dylib + 79220) [0x1e1a60574]
  30  ??? (libdispatch.dylib + 16264) [0x1e1a50f88]
  30  ??? (ANECompilerService + 108084) [0x10006e634]
  30  ??? (ANECompilerService + 104844) [0x10006d98c]
  30  ??? (ANECompilerService + 99644) [0x10006c53c]
  29  ??? (ANECompiler + 1597532) [0x239a1205c]
  29  ??? (ANECompiler + 1603732) [0x239a13894]
  17  ??? (ANECompiler + 3655344) [0x239c086b0]
  17  ??? (ANECompiler + 3154400) [0x239b8e1e0]
  15  ??? (ANECompiler + 3149656) [0x239b8cf58]
  9   ??? (ANECompiler + 3127684) [0x239b87984]
  9   ??? (ANECompiler + 3147156) [0x239b8c594]
  7   ??? (ANECompiler + 3113240) [0x239b84118]
  6   ??? (ANECompiler + 3111264) [0x239b83960]
  6   ??? (ANECompiler + 2186660) [0x239aa1da4]
  6   ??? (ANECompiler + 4384816) [0x239cba830]
  4   ??? (ANECompiler + 2201700) [0x239aa5864]
  3   ??? (ANECompiler + 4386556) [0x239cbaefc]
  1   ??? (ANECompiler + 4386228) [0x239cbadb4]



iPad, iPadOS 16

Posted on Apr 1, 2023 9:57 PM

Reply
Question marked as Top-ranking reply

Posted on Oct 27, 2023 10:14 PM


Similar questions

77 replies

May 4, 2023 4:47 AM in response to Wattermellon

@Wattermellon


I have some further information, ANECompilerService is apparently a process that runs on Apple products with Adobe Creative Suite installed. ANE stands for Adobe Native Extensions which developers code for Adobe AIR applications. ANE files are libraries of native code, ANECompilerService compiles the code into an executable format. When there is an issue with the ANE compilation it may create a log entry, which is what we have found on our devices.


So, it’s a legitimate process, albeit an executable so worth keeping an eye on, HOWEVER, if you do NOT have Adobe AIR applications installed then it’s highly like either you have malware or an active exploit is using the compiler to execute code.


In my case, it has never had Adobe on the iPad (or my iPhone which it is also on). My compiler was accessing libcommonCrypto.dylib which is a cryptographic function for encryption, decryption etc and this is not something that ANECompilerService should be accessing along with other security processes. At the time of the crash it was using several system libraries and system level components. There was also the issue that the check for a root certificate failed or was invalid.


I also found evidence in other logs of security violations on the iPad. I also have a compromised MacbookPro and Mac mini (which has now been confirmed) which were both interacting with all of our iPads (also confirmed) even though they have different Adobe IDs for some devices.


The bad news is, if your appearance of the log is not for a legitimate reason then it may be impossible to get rid of, for me, Apple Store performed a full reset and it hasn’t gone away. The lastest security update which came out yesterday also did not make a difference. I run the iPad in lockdown mode but that hasn’t made any difference, they have altered the operating system.


I am waiting to hear back what the next steps are.

Aug 1, 2023 4:58 AM in response to gravityfed

ANE _might_ stand for "Adobe Native Extensions", but if you don't have Adobe software installed, and especially if you have no extensions installed, that's very unlikely to be the problem.


ANE also stands for "Apple Neural Engine", and since the crashing code is in a folder named "AppleNeuralEngine", you can bet that this is the problem. Apart from that, no idea what the problem is - best idea would be to upgrade to the latest iOS version and pray that the problem has been fixed. Or another factory reset, and be very, very, very careful what you restore. Because anything causing the problem might be in some file that gets backed up.

Jun 2, 2024 12:30 PM in response to Chris7511

All AI hype aside, Apple has been using machine learning for a while now. Why do I mention AI and ML in this context? Because that all preferably runs on processor cores tailored for and dedicated for running machine learning algorithms. Specialized processing cores which Apple calls Neural Engine.


How does ML code run on NE? It gets compiled.


Want to learn more about iOS and iPadOS and macOS, and about ML and NE?

  • Jonathan Levin’s three-volume New OS X Book (which also covers iOS and iPadOS)

I have three more links with more info, but the forum software persists in corrupting the links.

https://machinelearning.apple.com/research?domain=Computer+Vision&page=1&q=neural+engine

The forum software or Safari is unfortunately broken.

https://github.com/apple/ml-ane-transformers

There is a bug here.

https://github.com/hollance/neural-engine

A bug somewhere.


About forensics and hacking?

https://www.sans.org/cyber-security-courses/mac-and-ios-forensic-analysis-and-incident-response/


As for the rest, I don’t think anybody here really cares if folks read the logs and telemetry. By all means, have at. It’s the history of requests posted for help with seemingly endless screenshots of, well, nothing. Benign. Normal. Or flaky hardware.


It somewhere between difficult and impossible to prove a device is not hacked, too. Proving a negative is hard.


It’s also that some folks report having been hacked for six months or a year or longer. Having previously received assistance or suggestions. Some of those folks may well be hacked. Others can have other issues. And there are those that have multiple platforms they report are compromised.


iOS and iPadOS exploits are Really Expensive (full stack exploits with persistence were worth over two million dollars each, when last I checked), and those tend to be targeted as the vendors don’t want those investments patched and rendered less valuable. The more platforms, the more effort and costs. The more valuable the target, if the hack actually happened. Or they got black-bagged or otherwise.


Past links and suggestions such as the Personal Safety Guide and Safety Check, if folks’ devices are actually hacked, or if so if somebody got black-bagged or gaslight by folks with local access, nobody here can help. Not past the usual reset-and-reload-and-related suggestions. Forensics investigations need direct access, and are about as privacy-invasive as can be conceived, too. If multiple disparate devices and platforms (and Google IDs, Apple IDs, and other IDs) are hacked as can get claimed around here, nobody here can help. Same for cases involving thefts and burglary claims. Cases involving bad batteries are reported as hacks, too. And if otherwise benign or normal things are being persistently misinterpreted and not actually hacked, nobody here can help with that, either.

Apr 2, 2023 4:45 AM in response to gravityfed

Restricting comments to those permitted here, you should update your iPad to the current version (noting that iPadOS 16.3.1 is currently installed on your iPad). At the time of writing, this current version is iPadOS 16.4.


Having updated to the current version, if concerns remain, perform a full reset of the iPad before restoring from an iCloud or iTunes backup:

Settings > General > Transfer or Reset iPad > Erase All Content and Settings

May 25, 2023 3:06 AM in response to LM-OB

LM-OB wrote:

The advanced technicians at Apple Support keep trying to convince me this is ‘normal’ but of course it isn’t because the start of the log states “roots installed”.


Look a little closer - and the complete field (that you partially quote) likely states “roots_installed":0.


This “0” indicates that there are no kernel roots installed. An integer value of 1 or greater indicates presence of a root.



Sep 19, 2023 11:56 AM in response to gravityfed

Our computers and devices are currently under the control of an unknown attacker, so this information relates to my initial enquiry as to what ANECompilerService was for others seeking information. These are legitimate Apple services being misused. We are not enrolled in an Apple developer or beta program and the devices have always been kept updated and in lockdown mode since purchase.


ANECompilerService appears to be related to developer activities. It has been observed compiling unknown code both on macOS and iOS alongside kernel, triald, Trial, mediaanalysisd and PegasusKit in the forms of aned, _ANEServer, Espresso, ANECompiler, ANEServices, AppleH11ANEInterface and AppleNeuralEngine.


com.apple.aned


555    0    aned: [com.apple.ane:aned] -[_ANEServer initWithDataVaultDirectory:dataVaultStorageClass:buildVersion:tempDirectory:cloneDirectory:]: dataVaultDirectory=/Library/Caches/com.apple.aned
555    0    aned: [com.apple.ane:aned] -[_ANEServer initWithDataVaultDirectory:dataVaultStorageClass:buildVersion:tempDirectory:cloneDirectory:]: buildSpecificModelStorageDirectory=<private>
555    0    aned: [com.apple.ane:aned] -[_ANEServer initWithDataVaultDirectory:dataVaultStorageClass:buildVersion:tempDirectory:cloneDirectory:]: modelAssetsCacheDirectory=<private>
555    0    aned: [com.apple.ane:aned] -[_ANEServer initWithDataVaultDirectory:dataVaultStorageClass:buildVersion:tempDirectory:cloneDirectory:]: inMemoryModelCacheDirectory=<private>
555    0    aned: [com.apple.ane:aned] -[_ANEServer initWithDataVaultDirectory:dataVaultStorageClass:buildVersion:tempDirectory:cloneDirectory:]: tempDirectory=<private>
555    0    aned: [com.apple.ane:aned] -[_ANEServer initWithDataVaultDirectory:dataVaultStorageClass:buildVersion:tempDirectory:cloneDirectory:]: cloneDirectory=<private>
555    0    aned: [com.apple.ane:aned] Ready to accept restricted and unrestricted XPC connections
555    0    aned: [com.apple.ane:aned] <private>: SecTaskCopyTeamIdentifier() returned teamIdentity=""
555    0    aned: [com.apple.ane:aned] <private>: SecTaskCopySigningIdentifier() returned csIdentity="<private>"
557    0    ANECompilerService: (Espresso) [com.apple.espresso:espresso] Creating context XXXXXXXX04 eng=10008 dev=-1
557    0    ANECompilerService: (Espresso) [com.apple.espresso:espresso] Creating plan XXXXXXXX20
557    0    ANECompilerService: (Espresso) [com.apple.espresso:espresso] Creating plan XXXXXXXX20
557    0    ANECompilerService: (Espresso) [com.apple.espresso:espresso] espresso_plan_add_network plan=XXXXXXXX20 path=<private> cp=65568
557    0    ANECompilerService: (Espresso) [com.apple.espresso:espresso] Loaded network: '<private>' pf=10008 cp=0
557    0    ANECompilerService: (Espresso) [com.apple.espresso:espresso] espresso_plan_add_network plan=XXXXXXXX20 path=<private> cp=65568 Completed
557    0    ANECompilerService: (Espresso) [com.apple.espresso:espresso] Destroying plan XXXXXXXX20
557    0    ANECompilerService: (Espresso) [com.apple.espresso:espresso] Destroying context XXXXXXXX04
557    0    ANECompilerService: (ANECompiler) ANEC Compiler Input used legacy key names 'NetworkPlistName' 'NetworkPlistPath' - please update to use 'NetworkSourceFileName' 'NetworkSourcePath'
...
557    0    ANECompilerService: [com.apple.ane:compiler] <private>: SUCCESS: model=<private> : output=<private> : lAttr=<private> : lErr=(nil)
555    0    aned: [com.apple.ane:aned] Compilation success: attr=<private>
555    0    aned: [com.apple.ane:aned] END: <private>: <private> : <private> : <private>



ANEStorageMaintainer is also developer related with an ANEVirtualClient:


com.apple.private.ANEStorageMaintainer


The main signs include iOS logs that have a Beta Indentifier number. This is found at the top of logs where apps installed are referenced.

Beta Identifier:  XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX


Additionally, there will be the mention of titles like "legacyInfo", "trialInfo", "rollouts", "rolloutId", "factorPackIds", "deploymentId". As well as "experiment" information towards the bottom of some logs with some of these titles: "treatmentId", "experimentId", "deploymentId".


On macOS you can capture logs in the Terminal.app (a good time is immediately after startup) using the command:

sudo log show --info --debug  --last 2m


Please don’t bother replying with negativity. Users have a right to enquire when they feel something is not right on their tech, those responses are unhelpful and frankly, tiresome.

May 25, 2024 7:37 PM in response to Tonyd4151

Just curious how many people experiencing this issue had work from home jobs. I’ve never had this problem prior to starting a work from home job. I had a separate iPhone which I owned purely for WFH purposes and a personal iPhone. I called Apple support regarding my personal phone and they were unable to do screen sharing to look at it and advised me my device is managed and to have a chat to my employer. (I had never connected my personal phone to the same wifi network that I used for WFH). That didn’t go down well. I used an old iPad for teams for work and saw Pegasus in the logs, and found a virtual machine had been installed on my Mac Book. After numerous factory resets both by myself and Apple Store it still got reinfected. I too my Mac Book to a third party computer technician they removed Pegasus and the Virtual Machine, and it was back on within days. I had yubikeys setup on an old iPhone I had with my first ever Apple ID and my youbi keys had been removed off the device. I had to install Watchguard Authpoint on my work iPhone and I think this is somehow being exploited to get Device and network ID’s. Every device I own has been compromised, really curious to see if other people experiencing this had work from home jobs at some stage.

Apr 25, 2023 3:19 PM in response to gravityfed

Just following up for anyone also looking into these logs on their device. I discovered it is exploit CVE-2022-46689 which has been used to gain root privileges to my MacBook Pro, Mac Mini, iPhone and all our iPads (and wifi, security camera access). This exploit will allow someone to silently control your devices whilst sending your data to its servers. Unfortunately the problem persists regardless of patches/updates and re-installs.

May 20, 2023 10:09 PM in response to gravityfed

@gravityfed


You weren't paranoid or in the wrong for asking. Yes, it's compromised. As I have found out the long, torturous and painful way of finding out that Apple will not tell or even confirm if your account is compromised. Nor tell you what devices, telephone numbers, email addresses are attached to your account. ONLY CONFIRM. Plus when you call Apple Support, even a Senior Advisor will only go as far as telling you to wipe aka factory reset. But they will twist it to where it's an error on your part and always answer a question with a question. It's bogus.

Jan 28, 2024 9:32 AM in response to kn0sNuk3m

I share your pain, in an effort to mitigate the ongoing assault I purchased a windows machine 2 days later they hacked and destroyed the directory and the thing won’t even turn on. This is what I have gathered. Antivirus is of no help because the attack is through legitimate Apple processes however weaponized antivirus isn’t going to catch it. Some things to look at are your keychain, if your like me mine is persistent beyond erase and restore, it contains Kerberos SSO tokens, rsa keys, and has “shared keychain” entries as well as MDM profiles, take a look at directory services as my devices have all been bound to a network domain and truly that’s the issue. If one can unbind their devices the keychain issue would as well be remediated. To touch on your comment about windows I believe they are able to hack those devices by having access to my keychain getting my windows password and walking right through the front door. To make the whole issue almost impossible the domain administrator within mere minutes of boot from new os takes root which btw is surly the developer user account in my device and destroys my path variable so terminal commands don’t work and I’m cooked. The cherry on top is writing plist files to disable anything I try and download to mitigate ie antivirus, little snitch etc. I’ve fought this for over a year and things have escalated to the point it’s war with my only tool erasing to which I recently noticed while reinstalling and looking at the recovery logs a bridged connection hiding volumes as I’m installing Mac OS! So they are in the device before I can even put as user account in which makes sense being their the network admin. Find a freelance cycber security professional and an ethical hacker and fight back. Take control of your devices because this will follow you to windows to Apple and back. Ditching Mac OS and getting an iPad Pro isn’t bad idea as they can’t take root and destroy you before you even start. Lastly if anyone reads this and wants to make a snied comment about how this is impossible, if I were you I’d save it I’m tired and you won’t like my rebuttal.

Feb 25, 2024 8:27 AM in response to gravityfed

gravityfed,


I read a couple of your posts. They are so helpful. I might have said this before but thank you for taking the time to include this information. I wanted to share a life-changing bit of inask if you knew that there is a way to capture a sysdiagnose on an iPhone using only the iPhone itself? You may already know but I’m going to include it here as so many other users have gravitated to your posts. I mentioned this before and advised the community to “google it” but it was so helpful I wanted to post it here.


In Settings, tap Accessibility then Touch.


On the Customize Top Level Menu screen, tap the + button to add a new function and select Analytics. Analytics is now added to top menu for assist. You can tap the Back button to leave that menu.

I’ve seen a couple different ways to do this so I’m going to put here what worked for me. After turning on touch assist I went to my Home Screen then proceeded to do the following:


Press and hold both, volume up and volume down buttons and the power button until you feel a short vibration. (Has to be all three buttons.) This triggers the sysdiagnose. When you release the buttons slide to shutdown.

when the phone is turned back on double tap the assistive touch icon and “gathering analytics” appears at the top of the screen. This can take up to 10 minutes. Log files are captured. When it’s done a notification- “finished gathering Analytics” appears. Go to Settings and Analytics Data in Analytics and Privacy. Scroll down to the SysDiagnose entry and send it back to your phone. I just save to files.


I was shocked when I saw the device tree connected to my phone. The configurations and sophisticated software and processes running in my devices confirm “they” are spending enough to feed a small country with the fortune being blown to target and monitor my communications and track and follow me, a single mom with a little girl. It turns out many reporters, journals and activists are targeted like this. I’ve had a lump in my throat and a knot in my stomach since this began 5 yrs ago.


But this handy little system check was a God-send and I hope it helps someone else!


This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

ANECompilerService

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.