FakeXposed icon indicating copy to clipboard operation
FakeXposed copied to clipboard

App crash on AVD + Edxposed/LSPosed

Open dhanh opened this issue 3 years ago • 0 comments

Hello,

I've cloned source code then try to run on AVD emulator and app crash.

Could someone help me on this? Thank you!

AVD Emulator: Android 8, 64bit Magisk 23 Riru 25.4.4 EdXposed 0.5.2.2

App crash after turn on Data Filter on EdXposed

I also tried with AVD Android 11, 64bit + Magisk Canary + LSPosed Zygisk and got crash too.

App logcat

2021-12-01 04:11:32.357 4921-4921/? I/zygote64: Late-enabling -Xcheck:jni 2021-12-01 04:11:32.376 4921-4921/? W/zygote64: Unexpected CPU variant for X86 using defaults: x86_64 2021-12-01 04:11:32.407 4921-4921/? I/EdXposed: Start to install inline hooks 2021-12-01 04:11:32.408 4921-4921/? I/EdXposed: Using api level 26 2021-12-01 04:11:32.408 4921-4921/? I/EdXposed: Start to install Riru hook 2021-12-01 04:11:32.455 4921-4921/? I/EdXposed: Riru hooks installed 2021-12-01 04:11:32.497 4921-4921/? I/EdXposed: ART hooks installed 2021-12-01 04:11:32.946 4921-4921/? I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:32.983 4921-4921/? I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:32.984 4921-4921/? I/EdXposed: Loading modules for com.sanfengandroid.datafilter 2021-12-01 04:11:32.990 4921-4921/? I/EdXposed-Bridge: Loading modules from /data/app/com.sanfengandroid.datafilter-k568Ao6evTCntWjl79ap_A==/base.apk 2021-12-01 04:11:32.997 4921-4921/? I/EdXposed-Bridge: Loading class com.sanfengandroid.xp.XposedEntry 2021-12-01 04:11:33.053 4921-4921/? W/Riru64: 383a is too old to hide so 2021-12-01 04:11:33.288 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:33.319 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedEntry: process: com.sanfengandroid.datafilter, package: com.sanfengandroid.datafilter 2021-12-01 04:11:33.327 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedEntry: hook myself 2021-12-01 04:11:33.433 4921-4921/com.sanfengandroid.datafilter D/com.sanfengandroid.fakelinker.FakeLinker: trying to load fake linker at : /data/app/com.sanfengandroid.datafilter-k568Ao6evTCntWjl79ap_A==/lib/x86_64/libfake-linker-2664.so 2021-12-01 04:11:33.451 4921-4921/com.sanfengandroid.datafilter E/HookLog: Current operating platform: x86_64 2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL6solist, library: /linker64, address: 709e4931f7f8 2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_ld_debug_verbosity, library: /linker64, address: 709e4931f800 2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL10g_dl_mutex, library: /linker64, address: 709e4931d000 2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL19__linker_dl_err_buf, library: /linker64, address: 709e4931f4e0 2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZN6soinfo10link_imageERK10LinkedListIS_19SoinfoListAllocatorES4_PK17android_dlextinfo, library: /linker64, address: 709e4921a880 2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_default_namespace, library: /linker64, address: 709e4931f438 2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_soinfo_handles_map, library: /linker64, address: 709e4931f4b8 2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__Z9do_dlopenPKciPK17android_dlextinfoPKv, library: /linker64, address: 709e49217d60 2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: _dl__Z8do_dlsymPvPKcS1_PKvPS, library: /linker64, address: 709e49218690 2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__Z16create_namespacePKvPKcS2_S2_mS2_P19android_namespace_t, library: /linker64, address: 709e492192e0 2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter V/HookLog: find linker soinfo: 0x709e4931f008, g_ld_debug_verbosity:0x709e4931f800, g_default_namespace: 0x709e4931f438, g_soinfo_handles_map: 0x709e4931f4b8, link_image: 0x709e4921a880 2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter V/HookLog: linker __loader_android_dlopen_ext: 0x709e49214f40, __loader_dlsym: 0x709e49215180, __loader_android_create_namespace: 0x709e49215350 2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter D/HookLog: found art method entrypoint jni offset: 4 2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter D/HookLog: found art method match access flags offset: 4 2021-12-01 04:11:33.491 4921-4921/com.sanfengandroid.datafilter D/HookLog: Init Hook module, cache path: /data/user/0/com.sanfengandroid.datafilter/cache 2021-12-01 04:11:33.491 4921-4921/com.sanfengandroid.datafilter D/HookLog: Registering com/sanfengandroid/fakeinterface/NativeHook's 19 native methods... 2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter D/HookLog: libc handle: 0x9bc071abf36df405, libc soinfo: 0x709e4911b890, self soinfo: 0x709e48b31670 2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: ro.build.version.sdk, value: 26" 2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter D/com.sanfengandroid.fakelinker.FakeLinker: initialization fake linker: true 2021-12-01 04:11:33.496 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: su 2021-12-01 04:11:33.498 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: /data/user/0/com.sanfengandroid.datafilter/cache/test_key 2021-12-01 04:11:33.500 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: ZUPERFAKEFILE 2021-12-01 04:11:33.502 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: daemonsu 2021-12-01 04:11:33.504 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: superuser.apk 2021-12-01 04:11:33.506 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: xposed 2021-12-01 04:11:33.513 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native FILE_HIDE blacklist result: ERROR_NO 2021-12-01 04:11:33.515 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type SYMBOL_HIDE, keyword: riru_get_version 2021-12-01 04:11:33.516 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type SYMBOL_HIDE, keyword: riru_is_zygote_methods_replaced 2021-12-01 04:11:33.518 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native SYMBOL_HIDE blacklist result: ERROR_NO 2021-12-01 04:11:33.521 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.build.tags, value: release-keys 2021-12-01 04:11:33.524 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.build.tags, value: release-keys, result: ERROR_NO 2021-12-01 04:11:33.524 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.zygote, value: android 2021-12-01 04:11:33.527 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.zygote, value: android, result: ERROR_NO 2021-12-01 04:11:33.527 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.build.selinux, value: 1 2021-12-01 04:11:33.530 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.build.selinux, value: 1, result: ERROR_NO 2021-12-01 04:11:33.530 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 1, name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers 2021-12-01 04:11:33.533 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native LOAD_CLASS_HIDE string option name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers, result: ERROR_NO 2021-12-01 04:11:33.534 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 1, name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge 2021-12-01 04:11:33.536 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native LOAD_CLASS_HIDE string option name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge, result: ERROR_NO 2021-12-01 04:11:33.536 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 2, name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers 2021-12-01 04:11:33.539 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native STACK_ELEMENT_HIDE string option name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers, result: ERROR_NO 2021-12-01 04:11:33.540 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 2, name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge 2021-12-01 04:11:33.542 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native STACK_ELEMENT_HIDE string option name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge, result: ERROR_NO 2021-12-01 04:11:33.545 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add runtime option result: ERROR_NO 2021-12-01 04:11:33.547 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add runtime option result: ERROR_NO 2021-12-01 04:11:33.549 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r com.sanfengandroid.datafilter, result: ERROR_NO 2021-12-01 04:11:33.551 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r XposedBridge, result: ERROR_NO 2021-12-01 04:11:33.553 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r libmemtrack_real.so, result: ERROR_NO 2021-12-01 04:11:33.555 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add file redirect path src: /data/user/0/com.sanfengandroid.datafilter/cache/test_keysanfeng, dst: /data/user/0/com.sanfengandroid.datafilter/cache/test_keyandroid, result: true 2021-12-01 04:11:33.559 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add file access control path: /data/user/0/com.sanfengandroid.datafilter/cache/sanfengandroid, uid: -1, gid: -1, access: 400, result: true 2021-12-01 04:11:33.625 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:33.625 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedFilter: Original build tags: dev-keys 2021-12-01 04:11:33.626 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedFilter: New build tags: release-keys 2021-12-01 04:11:33.662 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:33.706 4921-4926/com.sanfengandroid.datafilter I/zygote64: Do partial code cache collection, code=29KB, data=20KB 2021-12-01 04:11:33.709 4921-4926/com.sanfengandroid.datafilter I/zygote64: After code cache collection, code=29KB, data=20KB 2021-12-01 04:11:33.709 4921-4926/com.sanfengandroid.datafilter I/zygote64: Increasing code cache capacity to 128KB 2021-12-01 04:11:33.743 4921-4921/com.sanfengandroid.datafilter V/HookLog_HookClassLoad: hide class load 2021-12-01 04:11:33.767 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:33.786 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:33.787 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: hook class loader success 2021-12-01 04:11:33.803 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: edxposed find class EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6 2021-12-01 04:11:33.805 4921-4921/com.sanfengandroid.datafilter I/chatty: uid=10080(u0_a80) com.sanfengandroid.datafilter identical 2 lines 2021-12-01 04:11:33.806 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: edxposed find class EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6 2021-12-01 04:11:33.809 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc 2021-12-01 04:11:33.810 4921-4921/com.sanfengandroid.datafilter V/HookLog_HookNativeMethodChecked: Hook Method Native check success 2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL18g_soinfo_allocator, library: /linker64, address: 709e4931f258 2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL24g_soinfo_links_allocator, library: /linker64, address: 709e4931f270 2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL21g_namespace_allocator, library: /linker64, address: 709e4931f288 2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL26g_namespace_list_allocator, library: /linker64, address: 709e4931f2a0 2021-12-01 04:11:33.843 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libjavacore.so 2021-12-01 04:11:33.849 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0 2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80 2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220 2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0 2021-12-01 04:11:33.853 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0 2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40 2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630 2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950 2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat64, original address: 0x709e45300a10, new address: 0x709e2a9a80c0 2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lchown, original address: 0x709e452b5060, new address: 0x709e2a9a9700 2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: link, original address: 0x709e452b66e0, new address: 0x709e2a9a8a00 2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00 2021-12-01 04:11:33.856 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:33.856 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910 2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0 2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: symlink, original address: 0x709e452baca0, new address: 0x709e2a9a9070 2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30 2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat64, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0 2021-12-01 04:11:33.858 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:33.858 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0 2021-12-01 04:11:33.860 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300 2021-12-01 04:11:33.898 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libnativehelper.so 2021-12-01 04:11:33.899 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0 2021-12-01 04:11:33.900 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300 2021-12-01 04:11:33.900 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400 2021-12-01 04:11:33.915 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libnativeloader.so 2021-12-01 04:11:33.916 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80 2021-12-01 04:11:33.916 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300 2021-12-01 04:11:33.917 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_create_namespace, original address: 0x709e47bec180, new address: 0x709e2a9a57b0 2021-12-01 04:11:33.917 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_dlopen_ext, original address: 0x709e47bec140, new address: 0x709e2a9a5610 2021-12-01 04:11:33.940 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libart.so 2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80 2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070 2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0 2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0 2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220 2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30 2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300 2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400 2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950 2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0 2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0 2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readdir, original address: 0x709e452affa0, new address: 0x709e2a9a7600 2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_dlopen_ext, original address: 0x709e47bec140, new address: 0x709e2a9a5610 2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00 2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40 2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80 2021-12-01 04:11:33.947 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0 2021-12-01 04:11:33.948 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:33.949 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0 2021-12-01 04:11:33.949 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300 2021-12-01 04:11:33.964 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libopenjdkjvm.so 2021-12-01 04:11:33.964 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:33.965 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400 2021-12-01 04:11:33.978 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libandroid_runtime.so 2021-12-01 04:11:33.979 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol Typical ABSOLUTE: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070 2021-12-01 04:11:33.986 4921-4921/com.sanfengandroid.datafilter I/chatty: uid=10080(u0_a80) com.sanfengandroid.datafilter identical 82 lines 2021-12-01 04:11:33.986 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol Typical ABSOLUTE: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070 2021-12-01 04:11:34.028 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0 2021-12-01 04:11:34.028 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80 2021-12-01 04:11:34.029 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070 2021-12-01 04:11:34.035 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220 2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: utimes, original address: 0x709e452bb4c0, new address: 0x709e2a9a9f50 2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40 2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910 2021-12-01 04:11:34.037 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30 2021-12-01 04:11:34.039 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400 2021-12-01 04:11:34.055 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readdir, original address: 0x709e452affa0, new address: 0x709e2a9a7600 2021-12-01 04:11:34.069 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0 2021-12-01 04:11:34.070 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:34.079 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0 2021-12-01 04:11:34.086 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0 2021-12-01 04:11:34.113 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0 2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300 2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statfs, original address: 0x709e452ba700, new address: 0x709e2a9b1ff0 2021-12-01 04:11:34.116 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0 2021-12-01 04:11:34.132 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libcutils.so 2021-12-01 04:11:34.133 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220 2021-12-01 04:11:34.133 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0 2021-12-01 04:11:34.134 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80 2021-12-01 04:11:34.134 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30 2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910 2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstatat, original address: 0x709e45300a30, new address: 0x709e2a9a7dd0 2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdirat, original address: 0x709e45300eb0, new address: 0x709e2a9a7c10 2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __openat_2, original address: 0x709e452b8390, new address: 0x709e2a9a6d90 2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0 2021-12-01 04:11:34.137 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0 2021-12-01 04:11:34.137 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_read_callback, original address: 0x709e452bc770, new address: 0x709e2a9c4200 2021-12-01 04:11:34.152 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libbase.so 2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0 2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220 2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30 2021-12-01 04:11:34.155 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:34.155 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0 2021-12-01 04:11:34.156 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80 2021-12-01 04:11:34.157 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300 2021-12-01 04:11:34.157 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0 2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rmdir, original address: 0x709e452b97b0, new address: 0x709e2a9a8d00 2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_find, original address: 0x709e452bc540, new address: 0x709e2a9c3fd0 2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_read_callback, original address: 0x709e452bc770, new address: 0x709e2a9c4200 2021-12-01 04:11:34.174 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libopenjdk.so 2021-12-01 04:11:34.185 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat64, original address: 0x709e45300a10, new address: 0x709e2a9a80c0 2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220 2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40 2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open64, original address: 0x709e452b8150, new address: 0x709e2a9a6f10 2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat64, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0 2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0 2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00 2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910 2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: utimes, original address: 0x709e452bb4c0, new address: 0x709e2a9a9f50 2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs64, original address: 0x709e452ba720, new address: 0x709e2a9b21d0 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lchown, original address: 0x709e452b5060, new address: 0x709e2a9a9700 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rmdir, original address: 0x709e452b97b0, new address: 0x709e2a9a8d00 2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: link, original address: 0x709e452b66e0, new address: 0x709e2a9a8a00 2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30 2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: symlink, original address: 0x709e452baca0, new address: 0x709e2a9a9070 2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mknod, original address: 0x709e452b77c0, new address: 0x709e2a9a83c0 2021-12-01 04:11:34.192 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80 2021-12-01 04:11:34.193 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chdir, original address: 0x709e45300790, new address: 0x709e2a9a8dd0 2021-12-01 04:11:34.193 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950 2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: call manual relink library 2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: PATH=/sbin:/system/sbin:/system/bin:/system/xbin:/vendor/bin:/vendor/xbin 2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: DOWNLOAD_CACHE=/data/cache 2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_BOOTLOGO=1 2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_ROOT=/system 2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_ASSETS=/system/app 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_DATA=/data 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_STORAGE=/storage 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: EXTERNAL_STORAGE=/sdcard 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ASEC_MOUNTPOINT=/mnt/asec 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: BOOTCLASSPATH=/system/framework/core-oj.jar:/system/framework/core-libart.jar:/system/framework/conscrypt.jar:/system/framework/okhttp.jar:/system/framework/legacy-test.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/framework/ims-common.jar:/system/framework/apache-xml.jar:/system/framework/org.apache.http.legacy.boot.jar:/system/framework/android.hidl.base-V1.0-java.jar:/system/framework/android.hidl.manager-V1.0-java.jar 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: SYSTEMSERVERCLASSPATH=/system/framework/services.jar:/system/framework/ethernet-service.jar:/system/framework/wifi-service.jar 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_SOCKET_zygote=9 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: test_key=sanfengandroid 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756" 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: dalvik.system.VMDebug, method name: isDebuggerConnected, function signature: ()Z, register address: 0x709e2a9c67a0" 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: register VMDebug result: 1 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756" 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.Throwable, method name: nativeGetStackTrace, function signature: (Ljava/lang/Object;)[Ljava/lang/StackTraceElement;, register address: 0x709e2a9c67f0" 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: register Throwable result: 1 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756" 2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.Class, method name: classForName, function signature: (Ljava/lang/String;ZLjava/lang/ClassLoader;)Ljava/lang/Class;, register address: 0x709e2a9c6d90" 2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: register Throwable result: 1 2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756" 2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.UNIXProcess, method name: forkAndExec, function signature: ([B[BI[BI[B[IZ)I, register address: 0x709e2a9c6fc0" 2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: register UNIXProcess result: 1 2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native init result: 0 2021-12-01 04:11:34.200 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: debug.force_rtl, value: 0" 2021-12-01 04:11:34.201 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter, mode: 0\n" 2021-12-01 04:11:34.201 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter/cache, mode: 0\n" 2021-12-01 04:11:34.202 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter, mode: 0\n" 2021-12-01 04:11:34.202 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter/code_cache, mode: 0\n" 2021-12-01 04:11:34.203 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: ro.gfx.driver.0, value: " 2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __open_2] "path /dev/ashmem, flags: 2" 2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 257 2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0" 2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 257, result: 33 2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: dalvik.vm.usejitprofiles, value: true" 2021-12-01 04:11:34.205 4921-4951/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 158 2021-12-01 04:11:34.205 4921-4951/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 158, result: 0 2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __open_2] "path /dev/ashmem, flags: 2" 2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 257 2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0" 2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 257, result: 33 2021-12-01 04:11:39.637 4921-4921/com.sanfengandroid.datafilter D/AndroidRuntime: Shutting down VM

--------- beginning of crash

2021-12-01 04:11:39.758 4921-4921/com.sanfengandroid.datafilter E/AndroidRuntime: FATAL EXCEPTION: main Process: com.sanfengandroid.datafilter, PID: 4921 java.lang.StackOverflowError: stack size 8MB at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:0) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) 2021-12-01 04:11:39.770 4921-4921/com.sanfengandroid.datafilter E/AndroidRuntime: at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45) at java.lang.reflect.Method.getModifiers(Method.java:118) at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31) at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)

dhanh avatar Nov 30 '21 21:11 dhanh