You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I also tried with AVD Android 11, 64bit + Magisk Canary + LSPosed Zygisk and got crash too.
App logcat
2021-12-01 04:11:32.357 4921-4921/? I/zygote64: Late-enabling -Xcheck:jni
2021-12-01 04:11:32.376 4921-4921/? W/zygote64: Unexpected CPU variant for X86 using defaults: x86_64
2021-12-01 04:11:32.407 4921-4921/? I/EdXposed: Start to install inline hooks
2021-12-01 04:11:32.408 4921-4921/? I/EdXposed: Using api level 26
2021-12-01 04:11:32.408 4921-4921/? I/EdXposed: Start to install Riru hook
2021-12-01 04:11:32.455 4921-4921/? I/EdXposed: Riru hooks installed
2021-12-01 04:11:32.497 4921-4921/? I/EdXposed: ART hooks installed
2021-12-01 04:11:32.946 4921-4921/? I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:32.983 4921-4921/? I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:32.984 4921-4921/? I/EdXposed: Loading modules for com.sanfengandroid.datafilter
2021-12-01 04:11:32.990 4921-4921/? I/EdXposed-Bridge: Loading modules from /data/app/com.sanfengandroid.datafilter-k568Ao6evTCntWjl79ap_A==/base.apk
2021-12-01 04:11:32.997 4921-4921/? I/EdXposed-Bridge: Loading class com.sanfengandroid.xp.XposedEntry
2021-12-01 04:11:33.053 4921-4921/? W/Riru64: 383a is too old to hide so
2021-12-01 04:11:33.288 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.319 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedEntry: process: com.sanfengandroid.datafilter, package: com.sanfengandroid.datafilter
2021-12-01 04:11:33.327 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedEntry: hook myself
2021-12-01 04:11:33.433 4921-4921/com.sanfengandroid.datafilter D/com.sanfengandroid.fakelinker.FakeLinker: trying to load fake linker at : /data/app/com.sanfengandroid.datafilter-k568Ao6evTCntWjl79ap_A==/lib/x86_64/libfake-linker-2664.so
2021-12-01 04:11:33.451 4921-4921/com.sanfengandroid.datafilter E/HookLog: Current operating platform: x86_64
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL6solist, library: /linker64, address: 709e4931f7f8
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_ld_debug_verbosity, library: /linker64, address: 709e4931f800
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL10g_dl_mutex, library: /linker64, address: 709e4931d000
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL19__linker_dl_err_buf, library: /linker64, address: 709e4931f4e0
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZN6soinfo10link_imageERK10LinkedListIS_19SoinfoListAllocatorES4_PK17android_dlextinfo, library: /linker64, address: 709e4921a880
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_default_namespace, library: /linker64, address: 709e4931f438
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_soinfo_handles_map, library: /linker64, address: 709e4931f4b8
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__Z9do_dlopenPKciPK17android_dlextinfoPKv, library: /linker64, address: 709e49217d60
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: _dl__Z8do_dlsymPvPKcS1_PKvPS, library: /linker64, address: 709e49218690
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__Z16create_namespacePKvPKcS2_S2_mS2_P19android_namespace_t, library: /linker64, address: 709e492192e0
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter V/HookLog: find linker soinfo: 0x709e4931f008, g_ld_debug_verbosity:0x709e4931f800, g_default_namespace: 0x709e4931f438, g_soinfo_handles_map: 0x709e4931f4b8, link_image: 0x709e4921a880
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter V/HookLog: linker __loader_android_dlopen_ext: 0x709e49214f40, __loader_dlsym: 0x709e49215180, __loader_android_create_namespace: 0x709e49215350
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter D/HookLog: found art method entrypoint jni offset: 4
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter D/HookLog: found art method match access flags offset: 4
2021-12-01 04:11:33.491 4921-4921/com.sanfengandroid.datafilter D/HookLog: Init Hook module, cache path: /data/user/0/com.sanfengandroid.datafilter/cache
2021-12-01 04:11:33.491 4921-4921/com.sanfengandroid.datafilter D/HookLog: Registering com/sanfengandroid/fakeinterface/NativeHook's 19 native methods...
2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter D/HookLog: libc handle: 0x9bc071abf36df405, libc soinfo: 0x709e4911b890, self soinfo: 0x709e48b31670
2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: ro.build.version.sdk, value: 26"
2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter D/com.sanfengandroid.fakelinker.FakeLinker: initialization fake linker: true
2021-12-01 04:11:33.496 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: su
2021-12-01 04:11:33.498 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: /data/user/0/com.sanfengandroid.datafilter/cache/test_key
2021-12-01 04:11:33.500 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: ZUPERFAKEFILE
2021-12-01 04:11:33.502 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: daemonsu
2021-12-01 04:11:33.504 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: superuser.apk
2021-12-01 04:11:33.506 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: xposed
2021-12-01 04:11:33.513 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native FILE_HIDE blacklist result: ERROR_NO
2021-12-01 04:11:33.515 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type SYMBOL_HIDE, keyword: riru_get_version
2021-12-01 04:11:33.516 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type SYMBOL_HIDE, keyword: riru_is_zygote_methods_replaced
2021-12-01 04:11:33.518 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native SYMBOL_HIDE blacklist result: ERROR_NO
2021-12-01 04:11:33.521 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.build.tags, value: release-keys
2021-12-01 04:11:33.524 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.build.tags, value: release-keys, result: ERROR_NO
2021-12-01 04:11:33.524 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.zygote, value: android
2021-12-01 04:11:33.527 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.zygote, value: android, result: ERROR_NO
2021-12-01 04:11:33.527 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.build.selinux, value: 1
2021-12-01 04:11:33.530 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.build.selinux, value: 1, result: ERROR_NO
2021-12-01 04:11:33.530 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 1, name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers
2021-12-01 04:11:33.533 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native LOAD_CLASS_HIDE string option name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers, result: ERROR_NO
2021-12-01 04:11:33.534 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 1, name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge
2021-12-01 04:11:33.536 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native LOAD_CLASS_HIDE string option name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge, result: ERROR_NO
2021-12-01 04:11:33.536 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 2, name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers
2021-12-01 04:11:33.539 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native STACK_ELEMENT_HIDE string option name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers, result: ERROR_NO
2021-12-01 04:11:33.540 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 2, name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge
2021-12-01 04:11:33.542 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native STACK_ELEMENT_HIDE string option name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge, result: ERROR_NO
2021-12-01 04:11:33.545 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add runtime option result: ERROR_NO
2021-12-01 04:11:33.547 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add runtime option result: ERROR_NO
2021-12-01 04:11:33.549 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r com.sanfengandroid.datafilter, result: ERROR_NO
2021-12-01 04:11:33.551 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r XposedBridge, result: ERROR_NO
2021-12-01 04:11:33.553 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r libmemtrack_real.so, result: ERROR_NO
2021-12-01 04:11:33.555 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add file redirect path src: /data/user/0/com.sanfengandroid.datafilter/cache/test_keysanfeng, dst: /data/user/0/com.sanfengandroid.datafilter/cache/test_keyandroid, result: true
2021-12-01 04:11:33.559 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add file access control path: /data/user/0/com.sanfengandroid.datafilter/cache/sanfengandroid, uid: -1, gid: -1, access: 400, result: true
2021-12-01 04:11:33.625 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.625 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedFilter: Original build tags: dev-keys
2021-12-01 04:11:33.626 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedFilter: New build tags: release-keys
2021-12-01 04:11:33.662 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.706 4921-4926/com.sanfengandroid.datafilter I/zygote64: Do partial code cache collection, code=29KB, data=20KB
2021-12-01 04:11:33.709 4921-4926/com.sanfengandroid.datafilter I/zygote64: After code cache collection, code=29KB, data=20KB
2021-12-01 04:11:33.709 4921-4926/com.sanfengandroid.datafilter I/zygote64: Increasing code cache capacity to 128KB
2021-12-01 04:11:33.743 4921-4921/com.sanfengandroid.datafilter V/HookLog_HookClassLoad: hide class load
2021-12-01 04:11:33.767 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.786 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.787 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: hook class loader success
2021-12-01 04:11:33.803 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: edxposed find class EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6
2021-12-01 04:11:33.805 4921-4921/com.sanfengandroid.datafilter I/chatty: uid=10080(u0_a80) com.sanfengandroid.datafilter identical 2 lines
2021-12-01 04:11:33.806 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: edxposed find class EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6
2021-12-01 04:11:33.809 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.810 4921-4921/com.sanfengandroid.datafilter V/HookLog_HookNativeMethodChecked: Hook Method Native check success
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL18g_soinfo_allocator, library: /linker64, address: 709e4931f258
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL24g_soinfo_links_allocator, library: /linker64, address: 709e4931f270
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL21g_namespace_allocator, library: /linker64, address: 709e4931f288
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL26g_namespace_list_allocator, library: /linker64, address: 709e4931f2a0
2021-12-01 04:11:33.843 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libjavacore.so
2021-12-01 04:11:33.849 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:33.853 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat64, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lchown, original address: 0x709e452b5060, new address: 0x709e2a9a9700
2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: link, original address: 0x709e452b66e0, new address: 0x709e2a9a8a00
2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:33.856 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:33.856 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: symlink, original address: 0x709e452baca0, new address: 0x709e2a9a9070
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat64, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:33.858 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:33.858 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:33.860 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:33.898 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libnativehelper.so
2021-12-01 04:11:33.899 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0
2021-12-01 04:11:33.900 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300
2021-12-01 04:11:33.900 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:33.915 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libnativeloader.so
2021-12-01 04:11:33.916 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:33.916 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300
2021-12-01 04:11:33.917 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_create_namespace, original address: 0x709e47bec180, new address: 0x709e2a9a57b0
2021-12-01 04:11:33.917 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_dlopen_ext, original address: 0x709e47bec140, new address: 0x709e2a9a5610
2021-12-01 04:11:33.940 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libart.so
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300
2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950
2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readdir, original address: 0x709e452affa0, new address: 0x709e2a9a7600
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_dlopen_ext, original address: 0x709e47bec140, new address: 0x709e2a9a5610
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:33.947 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:33.948 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:33.949 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:33.949 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:33.964 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libopenjdkjvm.so
2021-12-01 04:11:33.964 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:33.965 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:33.978 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libandroid_runtime.so
2021-12-01 04:11:33.979 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol Typical ABSOLUTE: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:33.986 4921-4921/com.sanfengandroid.datafilter I/chatty: uid=10080(u0_a80) com.sanfengandroid.datafilter identical 82 lines
2021-12-01 04:11:33.986 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol Typical ABSOLUTE: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:34.028 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:34.028 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.029 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:34.035 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: utimes, original address: 0x709e452bb4c0, new address: 0x709e2a9a9f50
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:34.037 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.039 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:34.055 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readdir, original address: 0x709e452affa0, new address: 0x709e2a9a7600
2021-12-01 04:11:34.069 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:34.070 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.079 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0
2021-12-01 04:11:34.086 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.113 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statfs, original address: 0x709e452ba700, new address: 0x709e2a9b1ff0
2021-12-01 04:11:34.116 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:34.132 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libcutils.so
2021-12-01 04:11:34.133 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.133 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:34.134 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80
2021-12-01 04:11:34.134 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstatat, original address: 0x709e45300a30, new address: 0x709e2a9a7dd0
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdirat, original address: 0x709e45300eb0, new address: 0x709e2a9a7c10
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __openat_2, original address: 0x709e452b8390, new address: 0x709e2a9a6d90
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.137 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0
2021-12-01 04:11:34.137 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_read_callback, original address: 0x709e452bc770, new address: 0x709e2a9c4200
2021-12-01 04:11:34.152 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libbase.so
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.155 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.155 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:34.156 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.157 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:34.157 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rmdir, original address: 0x709e452b97b0, new address: 0x709e2a9a8d00
2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_find, original address: 0x709e452bc540, new address: 0x709e2a9c3fd0
2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_read_callback, original address: 0x709e452bc770, new address: 0x709e2a9c4200
2021-12-01 04:11:34.174 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libopenjdk.so
2021-12-01 04:11:34.185 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat64, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open64, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat64, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: utimes, original address: 0x709e452bb4c0, new address: 0x709e2a9a9f50
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs64, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lchown, original address: 0x709e452b5060, new address: 0x709e2a9a9700
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rmdir, original address: 0x709e452b97b0, new address: 0x709e2a9a8d00
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: link, original address: 0x709e452b66e0, new address: 0x709e2a9a8a00
2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: symlink, original address: 0x709e452baca0, new address: 0x709e2a9a9070
2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mknod, original address: 0x709e452b77c0, new address: 0x709e2a9a83c0
2021-12-01 04:11:34.192 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.193 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chdir, original address: 0x709e45300790, new address: 0x709e2a9a8dd0
2021-12-01 04:11:34.193 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: call manual relink library
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: PATH=/sbin:/system/sbin:/system/bin:/system/xbin:/vendor/bin:/vendor/xbin
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: DOWNLOAD_CACHE=/data/cache
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_BOOTLOGO=1
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_ROOT=/system
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_ASSETS=/system/app
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_DATA=/data
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_STORAGE=/storage
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: EXTERNAL_STORAGE=/sdcard
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ASEC_MOUNTPOINT=/mnt/asec
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: BOOTCLASSPATH=/system/framework/core-oj.jar:/system/framework/core-libart.jar:/system/framework/conscrypt.jar:/system/framework/okhttp.jar:/system/framework/legacy-test.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/framework/ims-common.jar:/system/framework/apache-xml.jar:/system/framework/org.apache.http.legacy.boot.jar:/system/framework/android.hidl.base-V1.0-java.jar:/system/framework/android.hidl.manager-V1.0-java.jar
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: SYSTEMSERVERCLASSPATH=/system/framework/services.jar:/system/framework/ethernet-service.jar:/system/framework/wifi-service.jar
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_SOCKET_zygote=9
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: test_key=sanfengandroid
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: dalvik.system.VMDebug, method name: isDebuggerConnected, function signature: ()Z, register address: 0x709e2a9c67a0"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: register VMDebug result: 1
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.Throwable, method name: nativeGetStackTrace, function signature: (Ljava/lang/Object;)[Ljava/lang/StackTraceElement;, register address: 0x709e2a9c67f0"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: register Throwable result: 1
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.Class, method name: classForName, function signature: (Ljava/lang/String;ZLjava/lang/ClassLoader;)Ljava/lang/Class;, register address: 0x709e2a9c6d90"
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: register Throwable result: 1
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.UNIXProcess, method name: forkAndExec, function signature: ([B[BI[BI[B[IZ)I, register address: 0x709e2a9c6fc0"
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: register UNIXProcess result: 1
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native init result: 0
2021-12-01 04:11:34.200 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: debug.force_rtl, value: 0"
2021-12-01 04:11:34.201 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter, mode: 0\n"
2021-12-01 04:11:34.201 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter/cache, mode: 0\n"
2021-12-01 04:11:34.202 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter, mode: 0\n"
2021-12-01 04:11:34.202 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter/code_cache, mode: 0\n"
2021-12-01 04:11:34.203 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: ro.gfx.driver.0, value: "
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __open_2] "path /dev/ashmem, flags: 2"
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 257
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 257, result: 33
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: dalvik.vm.usejitprofiles, value: true"
2021-12-01 04:11:34.205 4921-4951/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 158
2021-12-01 04:11:34.205 4921-4951/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 158, result: 0
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __open_2] "path /dev/ashmem, flags: 2"
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 257
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 257, result: 33
2021-12-01 04:11:39.637 4921-4921/com.sanfengandroid.datafilter D/AndroidRuntime: Shutting down VM
--------- beginning of crash
2021-12-01 04:11:39.758 4921-4921/com.sanfengandroid.datafilter E/AndroidRuntime: FATAL EXCEPTION: main
Process: com.sanfengandroid.datafilter, PID: 4921
java.lang.StackOverflowError: stack size 8MB
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:0)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
2021-12-01 04:11:39.770 4921-4921/com.sanfengandroid.datafilter E/AndroidRuntime: at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
The text was updated successfully, but these errors were encountered:
Hello,
I've cloned source code then try to run on AVD emulator and app crash.
Could someone help me on this? Thank you!
AVD Emulator: Android 8, 64bit
Magisk 23
Riru 25.4.4
EdXposed 0.5.2.2
App crash after turn on Data Filter on EdXposed
I also tried with AVD Android 11, 64bit + Magisk Canary + LSPosed Zygisk and got crash too.
App logcat
2021-12-01 04:11:32.357 4921-4921/? I/zygote64: Late-enabling -Xcheck:jni
2021-12-01 04:11:32.376 4921-4921/? W/zygote64: Unexpected CPU variant for X86 using defaults: x86_64
2021-12-01 04:11:32.407 4921-4921/? I/EdXposed: Start to install inline hooks
2021-12-01 04:11:32.408 4921-4921/? I/EdXposed: Using api level 26
2021-12-01 04:11:32.408 4921-4921/? I/EdXposed: Start to install Riru hook
2021-12-01 04:11:32.455 4921-4921/? I/EdXposed: Riru hooks installed
2021-12-01 04:11:32.497 4921-4921/? I/EdXposed: ART hooks installed
2021-12-01 04:11:32.946 4921-4921/? I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:32.983 4921-4921/? I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:32.984 4921-4921/? I/EdXposed: Loading modules for com.sanfengandroid.datafilter
2021-12-01 04:11:32.990 4921-4921/? I/EdXposed-Bridge: Loading modules from /data/app/com.sanfengandroid.datafilter-k568Ao6evTCntWjl79ap_A==/base.apk
2021-12-01 04:11:32.997 4921-4921/? I/EdXposed-Bridge: Loading class com.sanfengandroid.xp.XposedEntry
2021-12-01 04:11:33.053 4921-4921/? W/Riru64: 383a is too old to hide so
2021-12-01 04:11:33.288 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.319 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedEntry: process: com.sanfengandroid.datafilter, package: com.sanfengandroid.datafilter
2021-12-01 04:11:33.327 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedEntry: hook myself
2021-12-01 04:11:33.433 4921-4921/com.sanfengandroid.datafilter D/com.sanfengandroid.fakelinker.FakeLinker: trying to load fake linker at : /data/app/com.sanfengandroid.datafilter-k568Ao6evTCntWjl79ap_A==/lib/x86_64/libfake-linker-2664.so
2021-12-01 04:11:33.451 4921-4921/com.sanfengandroid.datafilter E/HookLog: Current operating platform: x86_64
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL6solist, library: /linker64, address: 709e4931f7f8
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_ld_debug_verbosity, library: /linker64, address: 709e4931f800
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL10g_dl_mutex, library: /linker64, address: 709e4931d000
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL19__linker_dl_err_buf, library: /linker64, address: 709e4931f4e0
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZN6soinfo10link_imageERK10LinkedListIS_19SoinfoListAllocatorES4_PK17android_dlextinfo, library: /linker64, address: 709e4921a880
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_default_namespace, library: /linker64, address: 709e4931f438
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_soinfo_handles_map, library: /linker64, address: 709e4931f4b8
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__Z9do_dlopenPKciPK17android_dlextinfoPKv, library: /linker64, address: 709e49217d60
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: _dl__Z8do_dlsymPvPKcS1_PKvPS, library: /linker64, address: 709e49218690
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__Z16create_namespacePKvPKcS2_S2_mS2_P19android_namespace_t, library: /linker64, address: 709e492192e0
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter V/HookLog: find linker soinfo: 0x709e4931f008, g_ld_debug_verbosity:0x709e4931f800, g_default_namespace: 0x709e4931f438, g_soinfo_handles_map: 0x709e4931f4b8, link_image: 0x709e4921a880
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter V/HookLog: linker __loader_android_dlopen_ext: 0x709e49214f40, __loader_dlsym: 0x709e49215180, __loader_android_create_namespace: 0x709e49215350
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter D/HookLog: found art method entrypoint jni offset: 4
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter D/HookLog: found art method match access flags offset: 4
2021-12-01 04:11:33.491 4921-4921/com.sanfengandroid.datafilter D/HookLog: Init Hook module, cache path: /data/user/0/com.sanfengandroid.datafilter/cache
2021-12-01 04:11:33.491 4921-4921/com.sanfengandroid.datafilter D/HookLog: Registering com/sanfengandroid/fakeinterface/NativeHook's 19 native methods...
2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter D/HookLog: libc handle: 0x9bc071abf36df405, libc soinfo: 0x709e4911b890, self soinfo: 0x709e48b31670
2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: ro.build.version.sdk, value: 26"
2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter D/com.sanfengandroid.fakelinker.FakeLinker: initialization fake linker: true
2021-12-01 04:11:33.496 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: su
2021-12-01 04:11:33.498 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: /data/user/0/com.sanfengandroid.datafilter/cache/test_key
2021-12-01 04:11:33.500 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: ZUPERFAKEFILE
2021-12-01 04:11:33.502 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: daemonsu
2021-12-01 04:11:33.504 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: superuser.apk
2021-12-01 04:11:33.506 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: xposed
2021-12-01 04:11:33.513 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native FILE_HIDE blacklist result: ERROR_NO
2021-12-01 04:11:33.515 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type SYMBOL_HIDE, keyword: riru_get_version
2021-12-01 04:11:33.516 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type SYMBOL_HIDE, keyword: riru_is_zygote_methods_replaced
2021-12-01 04:11:33.518 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native SYMBOL_HIDE blacklist result: ERROR_NO
2021-12-01 04:11:33.521 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.build.tags, value: release-keys
2021-12-01 04:11:33.524 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.build.tags, value: release-keys, result: ERROR_NO
2021-12-01 04:11:33.524 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.zygote, value: android
2021-12-01 04:11:33.527 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.zygote, value: android, result: ERROR_NO
2021-12-01 04:11:33.527 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.build.selinux, value: 1
2021-12-01 04:11:33.530 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.build.selinux, value: 1, result: ERROR_NO
2021-12-01 04:11:33.530 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 1, name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers
2021-12-01 04:11:33.533 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native LOAD_CLASS_HIDE string option name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers, result: ERROR_NO
2021-12-01 04:11:33.534 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 1, name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge
2021-12-01 04:11:33.536 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native LOAD_CLASS_HIDE string option name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge, result: ERROR_NO
2021-12-01 04:11:33.536 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 2, name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers
2021-12-01 04:11:33.539 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native STACK_ELEMENT_HIDE string option name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers, result: ERROR_NO
2021-12-01 04:11:33.540 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 2, name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge
2021-12-01 04:11:33.542 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native STACK_ELEMENT_HIDE string option name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge, result: ERROR_NO
2021-12-01 04:11:33.545 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add runtime option result: ERROR_NO
2021-12-01 04:11:33.547 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add runtime option result: ERROR_NO
2021-12-01 04:11:33.549 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r com.sanfengandroid.datafilter, result: ERROR_NO
2021-12-01 04:11:33.551 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r XposedBridge, result: ERROR_NO
2021-12-01 04:11:33.553 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r libmemtrack_real.so, result: ERROR_NO
2021-12-01 04:11:33.555 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add file redirect path src: /data/user/0/com.sanfengandroid.datafilter/cache/test_keysanfeng, dst: /data/user/0/com.sanfengandroid.datafilter/cache/test_keyandroid, result: true
2021-12-01 04:11:33.559 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add file access control path: /data/user/0/com.sanfengandroid.datafilter/cache/sanfengandroid, uid: -1, gid: -1, access: 400, result: true
2021-12-01 04:11:33.625 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.625 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedFilter: Original build tags: dev-keys
2021-12-01 04:11:33.626 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedFilter: New build tags: release-keys
2021-12-01 04:11:33.662 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.706 4921-4926/com.sanfengandroid.datafilter I/zygote64: Do partial code cache collection, code=29KB, data=20KB
2021-12-01 04:11:33.709 4921-4926/com.sanfengandroid.datafilter I/zygote64: After code cache collection, code=29KB, data=20KB
2021-12-01 04:11:33.709 4921-4926/com.sanfengandroid.datafilter I/zygote64: Increasing code cache capacity to 128KB
2021-12-01 04:11:33.743 4921-4921/com.sanfengandroid.datafilter V/HookLog_HookClassLoad: hide class load
2021-12-01 04:11:33.767 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.786 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.787 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: hook class loader success
2021-12-01 04:11:33.803 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: edxposed find class EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6
2021-12-01 04:11:33.805 4921-4921/com.sanfengandroid.datafilter I/chatty: uid=10080(u0_a80) com.sanfengandroid.datafilter identical 2 lines
2021-12-01 04:11:33.806 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: edxposed find class EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6
2021-12-01 04:11:33.809 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.810 4921-4921/com.sanfengandroid.datafilter V/HookLog_HookNativeMethodChecked: Hook Method Native check success
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL18g_soinfo_allocator, library: /linker64, address: 709e4931f258
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL24g_soinfo_links_allocator, library: /linker64, address: 709e4931f270
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL21g_namespace_allocator, library: /linker64, address: 709e4931f288
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL26g_namespace_list_allocator, library: /linker64, address: 709e4931f2a0
2021-12-01 04:11:33.843 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libjavacore.so
2021-12-01 04:11:33.849 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:33.853 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat64, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lchown, original address: 0x709e452b5060, new address: 0x709e2a9a9700
2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: link, original address: 0x709e452b66e0, new address: 0x709e2a9a8a00
2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:33.856 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:33.856 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: symlink, original address: 0x709e452baca0, new address: 0x709e2a9a9070
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat64, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:33.858 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:33.858 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:33.860 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:33.898 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libnativehelper.so
2021-12-01 04:11:33.899 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0
2021-12-01 04:11:33.900 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300
2021-12-01 04:11:33.900 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:33.915 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libnativeloader.so
2021-12-01 04:11:33.916 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:33.916 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300
2021-12-01 04:11:33.917 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_create_namespace, original address: 0x709e47bec180, new address: 0x709e2a9a57b0
2021-12-01 04:11:33.917 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_dlopen_ext, original address: 0x709e47bec140, new address: 0x709e2a9a5610
2021-12-01 04:11:33.940 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libart.so
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300
2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950
2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readdir, original address: 0x709e452affa0, new address: 0x709e2a9a7600
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_dlopen_ext, original address: 0x709e47bec140, new address: 0x709e2a9a5610
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:33.947 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:33.948 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:33.949 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:33.949 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:33.964 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libopenjdkjvm.so
2021-12-01 04:11:33.964 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:33.965 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:33.978 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libandroid_runtime.so
2021-12-01 04:11:33.979 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol Typical ABSOLUTE: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:33.986 4921-4921/com.sanfengandroid.datafilter I/chatty: uid=10080(u0_a80) com.sanfengandroid.datafilter identical 82 lines
2021-12-01 04:11:33.986 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol Typical ABSOLUTE: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:34.028 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:34.028 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.029 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:34.035 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: utimes, original address: 0x709e452bb4c0, new address: 0x709e2a9a9f50
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:34.037 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.039 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:34.055 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readdir, original address: 0x709e452affa0, new address: 0x709e2a9a7600
2021-12-01 04:11:34.069 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:34.070 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.079 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0
2021-12-01 04:11:34.086 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.113 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statfs, original address: 0x709e452ba700, new address: 0x709e2a9b1ff0
2021-12-01 04:11:34.116 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:34.132 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libcutils.so
2021-12-01 04:11:34.133 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.133 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:34.134 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80
2021-12-01 04:11:34.134 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstatat, original address: 0x709e45300a30, new address: 0x709e2a9a7dd0
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdirat, original address: 0x709e45300eb0, new address: 0x709e2a9a7c10
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __openat_2, original address: 0x709e452b8390, new address: 0x709e2a9a6d90
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.137 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0
2021-12-01 04:11:34.137 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_read_callback, original address: 0x709e452bc770, new address: 0x709e2a9c4200
2021-12-01 04:11:34.152 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libbase.so
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.155 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.155 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:34.156 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.157 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:34.157 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rmdir, original address: 0x709e452b97b0, new address: 0x709e2a9a8d00
2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_find, original address: 0x709e452bc540, new address: 0x709e2a9c3fd0
2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_read_callback, original address: 0x709e452bc770, new address: 0x709e2a9c4200
2021-12-01 04:11:34.174 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libopenjdk.so
2021-12-01 04:11:34.185 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat64, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open64, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat64, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: utimes, original address: 0x709e452bb4c0, new address: 0x709e2a9a9f50
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs64, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lchown, original address: 0x709e452b5060, new address: 0x709e2a9a9700
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rmdir, original address: 0x709e452b97b0, new address: 0x709e2a9a8d00
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: link, original address: 0x709e452b66e0, new address: 0x709e2a9a8a00
2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: symlink, original address: 0x709e452baca0, new address: 0x709e2a9a9070
2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mknod, original address: 0x709e452b77c0, new address: 0x709e2a9a83c0
2021-12-01 04:11:34.192 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.193 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chdir, original address: 0x709e45300790, new address: 0x709e2a9a8dd0
2021-12-01 04:11:34.193 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: call manual relink library
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: PATH=/sbin:/system/sbin:/system/bin:/system/xbin:/vendor/bin:/vendor/xbin
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: DOWNLOAD_CACHE=/data/cache
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_BOOTLOGO=1
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_ROOT=/system
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_ASSETS=/system/app
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_DATA=/data
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_STORAGE=/storage
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: EXTERNAL_STORAGE=/sdcard
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ASEC_MOUNTPOINT=/mnt/asec
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: BOOTCLASSPATH=/system/framework/core-oj.jar:/system/framework/core-libart.jar:/system/framework/conscrypt.jar:/system/framework/okhttp.jar:/system/framework/legacy-test.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/framework/ims-common.jar:/system/framework/apache-xml.jar:/system/framework/org.apache.http.legacy.boot.jar:/system/framework/android.hidl.base-V1.0-java.jar:/system/framework/android.hidl.manager-V1.0-java.jar
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: SYSTEMSERVERCLASSPATH=/system/framework/services.jar:/system/framework/ethernet-service.jar:/system/framework/wifi-service.jar
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_SOCKET_zygote=9
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: test_key=sanfengandroid
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: dalvik.system.VMDebug, method name: isDebuggerConnected, function signature: ()Z, register address: 0x709e2a9c67a0"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: register VMDebug result: 1
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.Throwable, method name: nativeGetStackTrace, function signature: (Ljava/lang/Object;)[Ljava/lang/StackTraceElement;, register address: 0x709e2a9c67f0"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: register Throwable result: 1
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.Class, method name: classForName, function signature: (Ljava/lang/String;ZLjava/lang/ClassLoader;)Ljava/lang/Class;, register address: 0x709e2a9c6d90"
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: register Throwable result: 1
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.UNIXProcess, method name: forkAndExec, function signature: ([B[BI[BI[B[IZ)I, register address: 0x709e2a9c6fc0"
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: register UNIXProcess result: 1
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native init result: 0
2021-12-01 04:11:34.200 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: debug.force_rtl, value: 0"
2021-12-01 04:11:34.201 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter, mode: 0\n"
2021-12-01 04:11:34.201 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter/cache, mode: 0\n"
2021-12-01 04:11:34.202 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter, mode: 0\n"
2021-12-01 04:11:34.202 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter/code_cache, mode: 0\n"
2021-12-01 04:11:34.203 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: ro.gfx.driver.0, value: "
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __open_2] "path /dev/ashmem, flags: 2"
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 257
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 257, result: 33
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: dalvik.vm.usejitprofiles, value: true"
2021-12-01 04:11:34.205 4921-4951/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 158
2021-12-01 04:11:34.205 4921-4951/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 158, result: 0
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __open_2] "path /dev/ashmem, flags: 2"
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 257
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 257, result: 33
2021-12-01 04:11:39.637 4921-4921/com.sanfengandroid.datafilter D/AndroidRuntime: Shutting down VM
2021-12-01 04:11:39.758 4921-4921/com.sanfengandroid.datafilter E/AndroidRuntime: FATAL EXCEPTION: main
Process: com.sanfengandroid.datafilter, PID: 4921
java.lang.StackOverflowError: stack size 8MB
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:0)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
2021-12-01 04:11:39.770 4921-4921/com.sanfengandroid.datafilter E/AndroidRuntime: at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
The text was updated successfully, but these errors were encountered: