Hello,
I've cloned source code then try to run on AVD emulator and app crash.
Could someone help me on this? Thank you!
AVD Emulator: Android 8, 64bit
Magisk 23
Riru 25.4.4
EdXposed 0.5.2.2
App crash after turn on Data Filter on EdXposed
I also tried with AVD Android 11, 64bit + Magisk Canary + LSPosed Zygisk and got crash too.
App logcat
2021-12-01 04:11:32.357 4921-4921/? I/zygote64: Late-enabling -Xcheck:jni
2021-12-01 04:11:32.376 4921-4921/? W/zygote64: Unexpected CPU variant for X86 using defaults: x86_64
2021-12-01 04:11:32.407 4921-4921/? I/EdXposed: Start to install inline hooks
2021-12-01 04:11:32.408 4921-4921/? I/EdXposed: Using api level 26
2021-12-01 04:11:32.408 4921-4921/? I/EdXposed: Start to install Riru hook
2021-12-01 04:11:32.455 4921-4921/? I/EdXposed: Riru hooks installed
2021-12-01 04:11:32.497 4921-4921/? I/EdXposed: ART hooks installed
2021-12-01 04:11:32.946 4921-4921/? I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:32.983 4921-4921/? I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:32.984 4921-4921/? I/EdXposed: Loading modules for com.sanfengandroid.datafilter
2021-12-01 04:11:32.990 4921-4921/? I/EdXposed-Bridge: Loading modules from /data/app/com.sanfengandroid.datafilter-k568Ao6evTCntWjl79ap_A==/base.apk
2021-12-01 04:11:32.997 4921-4921/? I/EdXposed-Bridge: Loading class com.sanfengandroid.xp.XposedEntry
2021-12-01 04:11:33.053 4921-4921/? W/Riru64: 383a is too old to hide so
2021-12-01 04:11:33.288 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.319 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedEntry: process: com.sanfengandroid.datafilter, package: com.sanfengandroid.datafilter
2021-12-01 04:11:33.327 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedEntry: hook myself
2021-12-01 04:11:33.433 4921-4921/com.sanfengandroid.datafilter D/com.sanfengandroid.fakelinker.FakeLinker: trying to load fake linker at : /data/app/com.sanfengandroid.datafilter-k568Ao6evTCntWjl79ap_A==/lib/x86_64/libfake-linker-2664.so
2021-12-01 04:11:33.451 4921-4921/com.sanfengandroid.datafilter E/HookLog: Current operating platform: x86_64
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL6solist, library: /linker64, address: 709e4931f7f8
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_ld_debug_verbosity, library: /linker64, address: 709e4931f800
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL10g_dl_mutex, library: /linker64, address: 709e4931d000
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL19__linker_dl_err_buf, library: /linker64, address: 709e4931f4e0
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZN6soinfo10link_imageERK10LinkedListIS_19SoinfoListAllocatorES4_PK17android_dlextinfo, library: /linker64, address: 709e4921a880
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_default_namespace, library: /linker64, address: 709e4931f438
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_soinfo_handles_map, library: /linker64, address: 709e4931f4b8
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__Z9do_dlopenPKciPK17android_dlextinfoPKv, library: /linker64, address: 709e49217d60
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: _dl__Z8do_dlsymPvPKcS1_PKvPS, library: /linker64, address: 709e49218690
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__Z16create_namespacePKvPKcS2_S2_mS2_P19android_namespace_t, library: /linker64, address: 709e492192e0
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter V/HookLog: find linker soinfo: 0x709e4931f008, g_ld_debug_verbosity:0x709e4931f800, g_default_namespace: 0x709e4931f438, g_soinfo_handles_map: 0x709e4931f4b8, link_image: 0x709e4921a880
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter V/HookLog: linker __loader_android_dlopen_ext: 0x709e49214f40, __loader_dlsym: 0x709e49215180, __loader_android_create_namespace: 0x709e49215350
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter D/HookLog: found art method entrypoint jni offset: 4
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter D/HookLog: found art method match access flags offset: 4
2021-12-01 04:11:33.491 4921-4921/com.sanfengandroid.datafilter D/HookLog: Init Hook module, cache path: /data/user/0/com.sanfengandroid.datafilter/cache
2021-12-01 04:11:33.491 4921-4921/com.sanfengandroid.datafilter D/HookLog: Registering com/sanfengandroid/fakeinterface/NativeHook's 19 native methods...
2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter D/HookLog: libc handle: 0x9bc071abf36df405, libc soinfo: 0x709e4911b890, self soinfo: 0x709e48b31670
2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: ro.build.version.sdk, value: 26"
2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter D/com.sanfengandroid.fakelinker.FakeLinker: initialization fake linker: true
2021-12-01 04:11:33.496 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: su
2021-12-01 04:11:33.498 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: /data/user/0/com.sanfengandroid.datafilter/cache/test_key
2021-12-01 04:11:33.500 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: ZUPERFAKEFILE
2021-12-01 04:11:33.502 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: daemonsu
2021-12-01 04:11:33.504 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: superuser.apk
2021-12-01 04:11:33.506 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: xposed
2021-12-01 04:11:33.513 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native FILE_HIDE blacklist result: ERROR_NO
2021-12-01 04:11:33.515 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type SYMBOL_HIDE, keyword: riru_get_version
2021-12-01 04:11:33.516 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type SYMBOL_HIDE, keyword: riru_is_zygote_methods_replaced
2021-12-01 04:11:33.518 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native SYMBOL_HIDE blacklist result: ERROR_NO
2021-12-01 04:11:33.521 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.build.tags, value: release-keys
2021-12-01 04:11:33.524 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.build.tags, value: release-keys, result: ERROR_NO
2021-12-01 04:11:33.524 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.zygote, value: android
2021-12-01 04:11:33.527 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.zygote, value: android, result: ERROR_NO
2021-12-01 04:11:33.527 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.build.selinux, value: 1
2021-12-01 04:11:33.530 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.build.selinux, value: 1, result: ERROR_NO
2021-12-01 04:11:33.530 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 1, name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers
2021-12-01 04:11:33.533 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native LOAD_CLASS_HIDE string option name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers, result: ERROR_NO
2021-12-01 04:11:33.534 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 1, name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge
2021-12-01 04:11:33.536 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native LOAD_CLASS_HIDE string option name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge, result: ERROR_NO
2021-12-01 04:11:33.536 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 2, name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers
2021-12-01 04:11:33.539 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native STACK_ELEMENT_HIDE string option name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers, result: ERROR_NO
2021-12-01 04:11:33.540 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 2, name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge
2021-12-01 04:11:33.542 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native STACK_ELEMENT_HIDE string option name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge, result: ERROR_NO
2021-12-01 04:11:33.545 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add runtime option result: ERROR_NO
2021-12-01 04:11:33.547 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add runtime option result: ERROR_NO
2021-12-01 04:11:33.549 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r com.sanfengandroid.datafilter, result: ERROR_NO
2021-12-01 04:11:33.551 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r XposedBridge, result: ERROR_NO
2021-12-01 04:11:33.553 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r libmemtrack_real.so, result: ERROR_NO
2021-12-01 04:11:33.555 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add file redirect path src: /data/user/0/com.sanfengandroid.datafilter/cache/test_keysanfeng, dst: /data/user/0/com.sanfengandroid.datafilter/cache/test_keyandroid, result: true
2021-12-01 04:11:33.559 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add file access control path: /data/user/0/com.sanfengandroid.datafilter/cache/sanfengandroid, uid: -1, gid: -1, access: 400, result: true
2021-12-01 04:11:33.625 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.625 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedFilter: Original build tags: dev-keys
2021-12-01 04:11:33.626 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedFilter: New build tags: release-keys
2021-12-01 04:11:33.662 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.706 4921-4926/com.sanfengandroid.datafilter I/zygote64: Do partial code cache collection, code=29KB, data=20KB
2021-12-01 04:11:33.709 4921-4926/com.sanfengandroid.datafilter I/zygote64: After code cache collection, code=29KB, data=20KB
2021-12-01 04:11:33.709 4921-4926/com.sanfengandroid.datafilter I/zygote64: Increasing code cache capacity to 128KB
2021-12-01 04:11:33.743 4921-4921/com.sanfengandroid.datafilter V/HookLog_HookClassLoad: hide class load
2021-12-01 04:11:33.767 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.786 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.787 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: hook class loader success
2021-12-01 04:11:33.803 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: edxposed find class EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6
2021-12-01 04:11:33.805 4921-4921/com.sanfengandroid.datafilter I/chatty: uid=10080(u0_a80) com.sanfengandroid.datafilter identical 2 lines
2021-12-01 04:11:33.806 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: edxposed find class EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6
2021-12-01 04:11:33.809 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.810 4921-4921/com.sanfengandroid.datafilter V/HookLog_HookNativeMethodChecked: Hook Method Native check success
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL18g_soinfo_allocator, library: /linker64, address: 709e4931f258
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL24g_soinfo_links_allocator, library: /linker64, address: 709e4931f270
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL21g_namespace_allocator, library: /linker64, address: 709e4931f288
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL26g_namespace_list_allocator, library: /linker64, address: 709e4931f2a0
2021-12-01 04:11:33.843 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libjavacore.so
2021-12-01 04:11:33.849 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:33.853 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat64, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lchown, original address: 0x709e452b5060, new address: 0x709e2a9a9700
2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: link, original address: 0x709e452b66e0, new address: 0x709e2a9a8a00
2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:33.856 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:33.856 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: symlink, original address: 0x709e452baca0, new address: 0x709e2a9a9070
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat64, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:33.858 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:33.858 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:33.860 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:33.898 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libnativehelper.so
2021-12-01 04:11:33.899 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0
2021-12-01 04:11:33.900 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300
2021-12-01 04:11:33.900 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:33.915 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libnativeloader.so
2021-12-01 04:11:33.916 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:33.916 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300
2021-12-01 04:11:33.917 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_create_namespace, original address: 0x709e47bec180, new address: 0x709e2a9a57b0
2021-12-01 04:11:33.917 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_dlopen_ext, original address: 0x709e47bec140, new address: 0x709e2a9a5610
2021-12-01 04:11:33.940 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libart.so
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300
2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950
2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readdir, original address: 0x709e452affa0, new address: 0x709e2a9a7600
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_dlopen_ext, original address: 0x709e47bec140, new address: 0x709e2a9a5610
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:33.947 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:33.948 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:33.949 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:33.949 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:33.964 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libopenjdkjvm.so
2021-12-01 04:11:33.964 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:33.965 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:33.978 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libandroid_runtime.so
2021-12-01 04:11:33.979 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol Typical ABSOLUTE: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:33.986 4921-4921/com.sanfengandroid.datafilter I/chatty: uid=10080(u0_a80) com.sanfengandroid.datafilter identical 82 lines
2021-12-01 04:11:33.986 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol Typical ABSOLUTE: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:34.028 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:34.028 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.029 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:34.035 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: utimes, original address: 0x709e452bb4c0, new address: 0x709e2a9a9f50
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:34.037 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.039 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:34.055 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readdir, original address: 0x709e452affa0, new address: 0x709e2a9a7600
2021-12-01 04:11:34.069 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:34.070 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.079 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0
2021-12-01 04:11:34.086 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.113 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statfs, original address: 0x709e452ba700, new address: 0x709e2a9b1ff0
2021-12-01 04:11:34.116 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:34.132 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libcutils.so
2021-12-01 04:11:34.133 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.133 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:34.134 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80
2021-12-01 04:11:34.134 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstatat, original address: 0x709e45300a30, new address: 0x709e2a9a7dd0
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdirat, original address: 0x709e45300eb0, new address: 0x709e2a9a7c10
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __openat_2, original address: 0x709e452b8390, new address: 0x709e2a9a6d90
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.137 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0
2021-12-01 04:11:34.137 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_read_callback, original address: 0x709e452bc770, new address: 0x709e2a9c4200
2021-12-01 04:11:34.152 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libbase.so
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.155 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.155 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:34.156 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.157 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:34.157 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rmdir, original address: 0x709e452b97b0, new address: 0x709e2a9a8d00
2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_find, original address: 0x709e452bc540, new address: 0x709e2a9c3fd0
2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_read_callback, original address: 0x709e452bc770, new address: 0x709e2a9c4200
2021-12-01 04:11:34.174 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libopenjdk.so
2021-12-01 04:11:34.185 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat64, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open64, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat64, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: utimes, original address: 0x709e452bb4c0, new address: 0x709e2a9a9f50
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs64, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lchown, original address: 0x709e452b5060, new address: 0x709e2a9a9700
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rmdir, original address: 0x709e452b97b0, new address: 0x709e2a9a8d00
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: link, original address: 0x709e452b66e0, new address: 0x709e2a9a8a00
2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: symlink, original address: 0x709e452baca0, new address: 0x709e2a9a9070
2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mknod, original address: 0x709e452b77c0, new address: 0x709e2a9a83c0
2021-12-01 04:11:34.192 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.193 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chdir, original address: 0x709e45300790, new address: 0x709e2a9a8dd0
2021-12-01 04:11:34.193 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: call manual relink library
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: PATH=/sbin:/system/sbin:/system/bin:/system/xbin:/vendor/bin:/vendor/xbin
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: DOWNLOAD_CACHE=/data/cache
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_BOOTLOGO=1
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_ROOT=/system
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_ASSETS=/system/app
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_DATA=/data
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_STORAGE=/storage
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: EXTERNAL_STORAGE=/sdcard
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ASEC_MOUNTPOINT=/mnt/asec
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: BOOTCLASSPATH=/system/framework/core-oj.jar:/system/framework/core-libart.jar:/system/framework/conscrypt.jar:/system/framework/okhttp.jar:/system/framework/legacy-test.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/framework/ims-common.jar:/system/framework/apache-xml.jar:/system/framework/org.apache.http.legacy.boot.jar:/system/framework/android.hidl.base-V1.0-java.jar:/system/framework/android.hidl.manager-V1.0-java.jar
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: SYSTEMSERVERCLASSPATH=/system/framework/services.jar:/system/framework/ethernet-service.jar:/system/framework/wifi-service.jar
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_SOCKET_zygote=9
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: test_key=sanfengandroid
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: dalvik.system.VMDebug, method name: isDebuggerConnected, function signature: ()Z, register address: 0x709e2a9c67a0"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: register VMDebug result: 1
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.Throwable, method name: nativeGetStackTrace, function signature: (Ljava/lang/Object;)[Ljava/lang/StackTraceElement;, register address: 0x709e2a9c67f0"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: register Throwable result: 1
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.Class, method name: classForName, function signature: (Ljava/lang/String;ZLjava/lang/ClassLoader;)Ljava/lang/Class;, register address: 0x709e2a9c6d90"
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: register Throwable result: 1
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.UNIXProcess, method name: forkAndExec, function signature: ([B[BI[BI[B[IZ)I, register address: 0x709e2a9c6fc0"
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: register UNIXProcess result: 1
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native init result: 0
2021-12-01 04:11:34.200 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: debug.force_rtl, value: 0"
2021-12-01 04:11:34.201 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter, mode: 0\n"
2021-12-01 04:11:34.201 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter/cache, mode: 0\n"
2021-12-01 04:11:34.202 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter, mode: 0\n"
2021-12-01 04:11:34.202 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter/code_cache, mode: 0\n"
2021-12-01 04:11:34.203 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: ro.gfx.driver.0, value: "
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __open_2] "path /dev/ashmem, flags: 2"
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 257
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 257, result: 33
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: dalvik.vm.usejitprofiles, value: true"
2021-12-01 04:11:34.205 4921-4951/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 158
2021-12-01 04:11:34.205 4921-4951/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 158, result: 0
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __open_2] "path /dev/ashmem, flags: 2"
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 257
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 257, result: 33
2021-12-01 04:11:39.637 4921-4921/com.sanfengandroid.datafilter D/AndroidRuntime: Shutting down VM
--------- beginning of crash
2021-12-01 04:11:39.758 4921-4921/com.sanfengandroid.datafilter E/AndroidRuntime: FATAL EXCEPTION: main
Process: com.sanfengandroid.datafilter, PID: 4921
java.lang.StackOverflowError: stack size 8MB
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:0)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
2021-12-01 04:11:39.770 4921-4921/com.sanfengandroid.datafilter E/AndroidRuntime: at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)