Giter Club home page Giter Club logo

fakexposed's People

Contributors

carlitos75 avatar sanfengandroid avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

fakexposed's Issues

App crash on AVD + Edxposed/LSPosed

Hello,

I've cloned source code then try to run on AVD emulator and app crash.

Could someone help me on this? Thank you!

AVD Emulator: Android 8, 64bit
Magisk 23
Riru 25.4.4
EdXposed 0.5.2.2

App crash after turn on Data Filter on EdXposed

I also tried with AVD Android 11, 64bit + Magisk Canary + LSPosed Zygisk and got crash too.

App logcat

2021-12-01 04:11:32.357 4921-4921/? I/zygote64: Late-enabling -Xcheck:jni
2021-12-01 04:11:32.376 4921-4921/? W/zygote64: Unexpected CPU variant for X86 using defaults: x86_64
2021-12-01 04:11:32.407 4921-4921/? I/EdXposed: Start to install inline hooks
2021-12-01 04:11:32.408 4921-4921/? I/EdXposed: Using api level 26
2021-12-01 04:11:32.408 4921-4921/? I/EdXposed: Start to install Riru hook
2021-12-01 04:11:32.455 4921-4921/? I/EdXposed: Riru hooks installed
2021-12-01 04:11:32.497 4921-4921/? I/EdXposed: ART hooks installed
2021-12-01 04:11:32.946 4921-4921/? I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:32.983 4921-4921/? I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:32.984 4921-4921/? I/EdXposed: Loading modules for com.sanfengandroid.datafilter
2021-12-01 04:11:32.990 4921-4921/? I/EdXposed-Bridge: Loading modules from /data/app/com.sanfengandroid.datafilter-k568Ao6evTCntWjl79ap_A==/base.apk
2021-12-01 04:11:32.997 4921-4921/? I/EdXposed-Bridge: Loading class com.sanfengandroid.xp.XposedEntry
2021-12-01 04:11:33.053 4921-4921/? W/Riru64: 383a is too old to hide so
2021-12-01 04:11:33.288 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.319 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedEntry: process: com.sanfengandroid.datafilter, package: com.sanfengandroid.datafilter
2021-12-01 04:11:33.327 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedEntry: hook myself
2021-12-01 04:11:33.433 4921-4921/com.sanfengandroid.datafilter D/com.sanfengandroid.fakelinker.FakeLinker: trying to load fake linker at : /data/app/com.sanfengandroid.datafilter-k568Ao6evTCntWjl79ap_A==/lib/x86_64/libfake-linker-2664.so
2021-12-01 04:11:33.451 4921-4921/com.sanfengandroid.datafilter E/HookLog: Current operating platform: x86_64
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL6solist, library: /linker64, address: 709e4931f7f8
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_ld_debug_verbosity, library: /linker64, address: 709e4931f800
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL10g_dl_mutex, library: /linker64, address: 709e4931d000
2021-12-01 04:11:33.471 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL19__linker_dl_err_buf, library: /linker64, address: 709e4931f4e0
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZN6soinfo10link_imageERK10LinkedListIS_19SoinfoListAllocatorES4_PK17android_dlextinfo, library: /linker64, address: 709e4921a880
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_default_namespace, library: /linker64, address: 709e4931f438
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl_g_soinfo_handles_map, library: /linker64, address: 709e4931f4b8
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__Z9do_dlopenPKciPK17android_dlextinfoPKv, library: /linker64, address: 709e49217d60
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: _dl__Z8do_dlsymPvPKcS1_PKvPS, library: /linker64, address: 709e49218690
2021-12-01 04:11:33.472 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__Z16create_namespacePKvPKcS2_S2_mS2_P19android_namespace_t, library: /linker64, address: 709e492192e0
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter V/HookLog: find linker soinfo: 0x709e4931f008, g_ld_debug_verbosity:0x709e4931f800, g_default_namespace: 0x709e4931f438, g_soinfo_handles_map: 0x709e4931f4b8, link_image: 0x709e4921a880
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter V/HookLog: linker __loader_android_dlopen_ext: 0x709e49214f40, __loader_dlsym: 0x709e49215180, __loader_android_create_namespace: 0x709e49215350
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter D/HookLog: found art method entrypoint jni offset: 4
2021-12-01 04:11:33.473 4921-4921/com.sanfengandroid.datafilter D/HookLog: found art method match access flags offset: 4
2021-12-01 04:11:33.491 4921-4921/com.sanfengandroid.datafilter D/HookLog: Init Hook module, cache path: /data/user/0/com.sanfengandroid.datafilter/cache
2021-12-01 04:11:33.491 4921-4921/com.sanfengandroid.datafilter D/HookLog: Registering com/sanfengandroid/fakeinterface/NativeHook's 19 native methods...
2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter D/HookLog: libc handle: 0x9bc071abf36df405, libc soinfo: 0x709e4911b890, self soinfo: 0x709e48b31670
2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: ro.build.version.sdk, value: 26"
2021-12-01 04:11:33.493 4921-4921/com.sanfengandroid.datafilter D/com.sanfengandroid.fakelinker.FakeLinker: initialization fake linker: true
2021-12-01 04:11:33.496 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: su
2021-12-01 04:11:33.498 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: /data/user/0/com.sanfengandroid.datafilter/cache/test_key
2021-12-01 04:11:33.500 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: ZUPERFAKEFILE
2021-12-01 04:11:33.502 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: daemonsu
2021-12-01 04:11:33.504 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: superuser.apk
2021-12-01 04:11:33.506 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type FILE_HIDE, keyword: xposed
2021-12-01 04:11:33.513 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native FILE_HIDE blacklist result: ERROR_NO
2021-12-01 04:11:33.515 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type SYMBOL_HIDE, keyword: riru_get_version
2021-12-01 04:11:33.516 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native filter type SYMBOL_HIDE, keyword: riru_is_zygote_methods_replaced
2021-12-01 04:11:33.518 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native SYMBOL_HIDE blacklist result: ERROR_NO
2021-12-01 04:11:33.521 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.build.tags, value: release-keys
2021-12-01 04:11:33.524 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.build.tags, value: release-keys, result: ERROR_NO
2021-12-01 04:11:33.524 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.zygote, value: android
2021-12-01 04:11:33.527 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.zygote, value: android, result: ERROR_NO
2021-12-01 04:11:33.527 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 0, name: ro.build.selinux, value: 1
2021-12-01 04:11:33.530 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native GLOBAL_SYSTEM_PROPERTY_HIDE string option name: ro.build.selinux, value: 1, result: ERROR_NO
2021-12-01 04:11:33.530 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 1, name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers
2021-12-01 04:11:33.533 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native LOAD_CLASS_HIDE string option name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers, result: ERROR_NO
2021-12-01 04:11:33.534 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 1, name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge
2021-12-01 04:11:33.536 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native LOAD_CLASS_HIDE string option name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge, result: ERROR_NO
2021-12-01 04:11:33.536 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 2, name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers
2021-12-01 04:11:33.539 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native STACK_ELEMENT_HIDE string option name: de.robv.android.xposed.XposedHelpers, value: de.robv.android.xposed.XposedHelpers, result: ERROR_NO
2021-12-01 04:11:33.540 4921-4921/com.sanfengandroid.datafilter D/HookLog: add string blacklist type: 2, name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge
2021-12-01 04:11:33.542 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native STACK_ELEMENT_HIDE string option name: de.robv.android.xposed.XposedBridge, value: de.robv.android.xposed.XposedBridge, result: ERROR_NO
2021-12-01 04:11:33.545 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add runtime option result: ERROR_NO
2021-12-01 04:11:33.547 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add runtime option result: ERROR_NO
2021-12-01 04:11:33.549 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r com.sanfengandroid.datafilter, result: ERROR_NO
2021-12-01 04:11:33.551 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r XposedBridge, result: ERROR_NO
2021-12-01 04:11:33.553 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add native maps rule: r libmemtrack_real.so, result: ERROR_NO
2021-12-01 04:11:33.555 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add file redirect path src: /data/user/0/com.sanfengandroid.datafilter/cache/test_keysanfeng, dst: /data/user/0/com.sanfengandroid.datafilter/cache/test_keyandroid, result: true
2021-12-01 04:11:33.559 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: add file access control path: /data/user/0/com.sanfengandroid.datafilter/cache/sanfengandroid, uid: -1, gid: -1, access: 400, result: true
2021-12-01 04:11:33.625 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.625 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedFilter: Original build tags: dev-keys
2021-12-01 04:11:33.626 4921-4921/com.sanfengandroid.datafilter V/HookLog_XposedFilter: New build tags: release-keys
2021-12-01 04:11:33.662 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.706 4921-4926/com.sanfengandroid.datafilter I/zygote64: Do partial code cache collection, code=29KB, data=20KB
2021-12-01 04:11:33.709 4921-4926/com.sanfengandroid.datafilter I/zygote64: After code cache collection, code=29KB, data=20KB
2021-12-01 04:11:33.709 4921-4926/com.sanfengandroid.datafilter I/zygote64: Increasing code cache capacity to 128KB
2021-12-01 04:11:33.743 4921-4921/com.sanfengandroid.datafilter V/HookLog_HookClassLoad: hide class load
2021-12-01 04:11:33.767 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.786 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.787 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: hook class loader success
2021-12-01 04:11:33.803 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: edxposed find class EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6
2021-12-01 04:11:33.805 4921-4921/com.sanfengandroid.datafilter I/chatty: uid=10080(u0_a80) com.sanfengandroid.datafilter identical 2 lines
2021-12-01 04:11:33.806 4921-4921/com.sanfengandroid.datafilter D/HookLog_HookClassLoad: edxposed find class EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6
2021-12-01 04:11:33.809 4921-4921/com.sanfengandroid.datafilter I/zygote64: Starting a blocking GC Alloc
2021-12-01 04:11:33.810 4921-4921/com.sanfengandroid.datafilter V/HookLog_HookNativeMethodChecked: Hook Method Native check success
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL18g_soinfo_allocator, library: /linker64, address: 709e4931f258
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL24g_soinfo_links_allocator, library: /linker64, address: 709e4931f270
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL21g_namespace_allocator, library: /linker64, address: 709e4931f288
2021-12-01 04:11:33.826 4921-4921/com.sanfengandroid.datafilter V/HookLog: found symbol: __dl__ZL26g_namespace_list_allocator, library: /linker64, address: 709e4931f2a0
2021-12-01 04:11:33.843 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libjavacore.so
2021-12-01 04:11:33.849 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:33.850 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:33.853 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950
2021-12-01 04:11:33.854 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat64, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lchown, original address: 0x709e452b5060, new address: 0x709e2a9a9700
2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: link, original address: 0x709e452b66e0, new address: 0x709e2a9a8a00
2021-12-01 04:11:33.855 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:33.856 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:33.856 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: symlink, original address: 0x709e452baca0, new address: 0x709e2a9a9070
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:33.857 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat64, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:33.858 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:33.858 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:33.860 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:33.898 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libnativehelper.so
2021-12-01 04:11:33.899 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0
2021-12-01 04:11:33.900 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300
2021-12-01 04:11:33.900 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:33.915 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libnativeloader.so
2021-12-01 04:11:33.916 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:33.916 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300
2021-12-01 04:11:33.917 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_create_namespace, original address: 0x709e47bec180, new address: 0x709e2a9a57b0
2021-12-01 04:11:33.917 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_dlopen_ext, original address: 0x709e47bec140, new address: 0x709e2a9a5610
2021-12-01 04:11:33.940 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libart.so
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:33.941 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:33.942 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlopen, original address: 0x709e47bec0b0, new address: 0x709e2a9a5300
2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:33.943 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950
2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:33.944 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readdir, original address: 0x709e452affa0, new address: 0x709e2a9a7600
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: android_dlopen_ext, original address: 0x709e47bec140, new address: 0x709e2a9a5610
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:33.946 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:33.947 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:33.948 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:33.949 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:33.949 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:33.964 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libopenjdkjvm.so
2021-12-01 04:11:33.964 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:33.965 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:33.978 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libandroid_runtime.so
2021-12-01 04:11:33.979 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol Typical ABSOLUTE: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:33.986 4921-4921/com.sanfengandroid.datafilter I/chatty: uid=10080(u0_a80) com.sanfengandroid.datafilter identical 82 lines
2021-12-01 04:11:33.986 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol Typical ABSOLUTE: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:34.028 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:34.028 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.029 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __cxa_pure_virtual, original address: 0x709e45929da0, new address: 0x709e2a9ee070
2021-12-01 04:11:34.035 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: utimes, original address: 0x709e452bb4c0, new address: 0x709e2a9a9f50
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:34.036 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:34.037 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.039 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:34.055 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readdir, original address: 0x709e452affa0, new address: 0x709e2a9a7600
2021-12-01 04:11:34.069 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:34.070 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.079 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0
2021-12-01 04:11:34.086 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.113 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.114 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statfs, original address: 0x709e452ba700, new address: 0x709e2a9b1ff0
2021-12-01 04:11:34.116 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:34.132 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libcutils.so
2021-12-01 04:11:34.133 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.133 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:34.134 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80
2021-12-01 04:11:34.134 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.135 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstatat, original address: 0x709e45300a30, new address: 0x709e2a9a7dd0
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdirat, original address: 0x709e45300eb0, new address: 0x709e2a9a7c10
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __openat_2, original address: 0x709e452b8390, new address: 0x709e2a9a6d90
2021-12-01 04:11:34.136 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.137 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_get, original address: 0x709e3cae1150, new address: 0x709e2a9c3dd0
2021-12-01 04:11:34.137 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_read_callback, original address: 0x709e452bc770, new address: 0x709e2a9c4200
2021-12-01 04:11:34.152 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libbase.so
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.154 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.155 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.155 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: readlink, original address: 0x709e452b9740, new address: 0x709e2a9a93f0
2021-12-01 04:11:34.156 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.157 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: strcasecmp, original address: 0x709e452fc720, new address: 0x709e2a9ac300
2021-12-01 04:11:34.157 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rmdir, original address: 0x709e452b97b0, new address: 0x709e2a9a8d00
2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_find, original address: 0x709e452bc540, new address: 0x709e2a9c3fd0
2021-12-01 04:11:34.158 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __system_property_read_callback, original address: 0x709e452bc770, new address: 0x709e2a9c4200
2021-12-01 04:11:34.174 4921-4921/com.sanfengandroid.datafilter V/HookLog: again relocation library: libopenjdk.so
2021-12-01 04:11:34.185 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fstat64, original address: 0x709e45300a10, new address: 0x709e2a9a80c0
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: __open_2, original address: 0x709e452b8260, new address: 0x709e2a9a7220
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chmod, original address: 0x709e452af8d0, new address: 0x709e2a9a7b40
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.186 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: open64, original address: 0x709e452b8150, new address: 0x709e2a9a6f10
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: stat64, original address: 0x709e452ba6c0, new address: 0x709e2a9a7ff0
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: access, original address: 0x709e452ae820, new address: 0x709e2a9a87b0
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mkdir, original address: 0x709e452b7760, new address: 0x709e2a9a7d00
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rename, original address: 0x709e452b9790, new address: 0x709e2a9a7910
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: utimes, original address: 0x709e452bb4c0, new address: 0x709e2a9a9f50
2021-12-01 04:11:34.187 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: statvfs64, original address: 0x709e452ba720, new address: 0x709e2a9b21d0
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: dlsym, original address: 0x709e47bec0d0, new address: 0x709e2a9a5400
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: syscall, original address: 0x709e452ae6e0, new address: 0x709e2a9aba80
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: fopen, original address: 0x709e4530bac0, new address: 0x709e2a9a73e0
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lstat64, original address: 0x709e452b6bc0, new address: 0x709e2a9a8190
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chown, original address: 0x709e452af8f0, new address: 0x709e2a9a9630
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: lchown, original address: 0x709e452b5060, new address: 0x709e2a9a9700
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: rmdir, original address: 0x709e452b97b0, new address: 0x709e2a9a8d00
2021-12-01 04:11:34.188 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: link, original address: 0x709e452b66e0, new address: 0x709e2a9a8a00
2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: unlink, original address: 0x709e452bdd90, new address: 0x709e2a9a8c30
2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: symlink, original address: 0x709e452baca0, new address: 0x709e2a9a9070
2021-12-01 04:11:34.189 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: mknod, original address: 0x709e452b77c0, new address: 0x709e2a9a83c0
2021-12-01 04:11:34.192 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: getenv, original address: 0x709e452faf10, new address: 0x709e2a9c3c80
2021-12-01 04:11:34.193 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: chdir, original address: 0x709e45300790, new address: 0x709e2a9a8dd0
2021-12-01 04:11:34.193 4921-4921/com.sanfengandroid.datafilter V/HookLog: Relocation symbol JumpTable: execve, original address: 0x709e453008f0, new address: 0x709e2a9a5950
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: call manual relink library
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: PATH=/sbin:/system/sbin:/system/bin:/system/xbin:/vendor/bin:/vendor/xbin
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: DOWNLOAD_CACHE=/data/cache
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_BOOTLOGO=1
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_ROOT=/system
2021-12-01 04:11:34.194 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_ASSETS=/system/app
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_DATA=/data
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_STORAGE=/storage
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: EXTERNAL_STORAGE=/sdcard
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ASEC_MOUNTPOINT=/mnt/asec
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: BOOTCLASSPATH=/system/framework/core-oj.jar:/system/framework/core-libart.jar:/system/framework/conscrypt.jar:/system/framework/okhttp.jar:/system/framework/legacy-test.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/framework/ims-common.jar:/system/framework/apache-xml.jar:/system/framework/org.apache.http.legacy.boot.jar:/system/framework/android.hidl.base-V1.0-java.jar:/system/framework/android.hidl.manager-V1.0-java.jar
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: SYSTEMSERVERCLASSPATH=/system/framework/services.jar:/system/framework/ethernet-service.jar:/system/framework/wifi-service.jar
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: ANDROID_SOCKET_zygote=9
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: environments: test_key=sanfengandroid
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: dalvik.system.VMDebug, method name: isDebuggerConnected, function signature: ()Z, register address: 0x709e2a9c67a0"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: register VMDebug result: 1
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.Throwable, method name: nativeGetStackTrace, function signature: (Ljava/lang/Object;)[Ljava/lang/StackTraceElement;, register address: 0x709e2a9c67f0"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: register Throwable result: 1
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.195 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.Class, method name: classForName, function signature: (Ljava/lang/String;ZLjava/lang/ClassLoader;)Ljava/lang/Class;, register address: 0x709e2a9c6d90"
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: register Throwable result: 1
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "start register native function 0x709e2aa6a756"
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: [JNICall HookJniRegisterNatives(0x709e2aa6a756)] "native register class: java.lang.UNIXProcess, method name: forkAndExec, function signature: ([B[BI[BI[B[IZ)I, register address: 0x709e2a9c6fc0"
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter D/HookLog: register UNIXProcess result: 1
2021-12-01 04:11:34.196 4921-4921/com.sanfengandroid.datafilter V/HookLog_NativeInit: native init result: 0
2021-12-01 04:11:34.200 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: debug.force_rtl, value: 0"
2021-12-01 04:11:34.201 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter, mode: 0\n"
2021-12-01 04:11:34.201 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter/cache, mode: 0\n"
2021-12-01 04:11:34.202 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter, mode: 0\n"
2021-12-01 04:11:34.202 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter/code_cache, mode: 0\n"
2021-12-01 04:11:34.203 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: ro.gfx.driver.0, value: "
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __open_2] "path /dev/ashmem, flags: 2"
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 257
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 257, result: 33
2021-12-01 04:11:34.204 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __system_property_get] "name: dalvik.vm.usejitprofiles, value: true"
2021-12-01 04:11:34.205 4921-4951/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 158
2021-12-01 04:11:34.205 4921-4951/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 158, result: 0
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: [Monitor __open_2] "path /dev/ashmem, flags: 2"
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: syscall invoke number: 257
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-12-01 04:11:34.253 4921-4921/com.sanfengandroid.datafilter V/HookLog: Monitor: 'syscall' invoke number: 257, result: 33
2021-12-01 04:11:39.637 4921-4921/com.sanfengandroid.datafilter D/AndroidRuntime: Shutting down VM

--------- beginning of crash

2021-12-01 04:11:39.758 4921-4921/com.sanfengandroid.datafilter E/AndroidRuntime: FATAL EXCEPTION: main
Process: com.sanfengandroid.datafilter, PID: 4921
java.lang.StackOverflowError: stack size 8MB
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:0)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
2021-12-01 04:11:39.770 4921-4921/com.sanfengandroid.datafilter E/AndroidRuntime: at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)
at java.lang.reflect.Method.getModifiers(Method.java:118)
at de.robv.android.xposed.MethodHooker.handleHookedMethod(MethodHooker.java:31)
at EdHooker_dd74bb562209ca26996958818c6d9c42bb9372f6.hook(Unknown Source:45)

没什么用

我就常用的检测方法,都跳不过去

oppo 7.1.1 错误Log

2021-06-13 18:32:05.746 20638-20638/? I/art: Starting a blocking GC AddRemoveAppImageSpace
2021-06-13 18:32:05.747 20638-20638/? W/System: ClassLoader referenced unknown path: /system/app/KeyChain/lib/arm64
2021-06-13 18:32:05.777 20638-20638/? I/Xposed: XposedEntry current data mode: APP_CALL
2021-06-13 18:32:05.788 20638-20638/? E/ActivityThread: Failed to find provider info for com.sanfengandroid.datafilter
2021-06-13 18:32:05.788 20638-20638/? I/Xposed: c: call remote system method error, uri: content://com.sanfengandroid.datafilter/xp
2021-06-13 18:32:05.789 20638-20638/? E/Xposed: java.lang.IllegalArgumentException: Unknown URI content://com.sanfengandroid.datafilter/xp
at android.content.ContentResolver.call(ContentResolver.java:1586)
at c.b.a.a.a.u(:3)

小米 7.12 datafilter崩溃

红米5 plus
android 7.12

日志如下:
021-06-13 07:01:27.541 5638-5638/? D/HookLog: environments: test_key=sanfengandroid
2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register VMDebug result: 1
2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register Throwable result: 1
2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register Throwable result: 1
2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register UNIXProcess result: 1
2021-06-13 07:01:27.543 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.543 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.543 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.543 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46
2021-06-13 07:01:27.544 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/data/com.zilia.john/shared_prefs/CustomizeApps.xml, mode: 0\n"
2021-06-13 07:01:27.545 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.force_rtl, value: 0"
2021-06-13 07:01:27.546 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.548 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.atrace.tags.enableflags, value: 0"
2021-06-13 07:01:27.548 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.debuggable, value: 0"
2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter, mode: 0\n"
2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter/cache, mode: 0\n"
2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter, mode: 0\n"
2021-06-13 07:01:27.550 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter/code_cache, mode: 0\n"
2021-06-13 07:01:27.550 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.gfx.driver.0, value: "
2021-06-13 07:01:27.551 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.551 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.551 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.551 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46
2021-06-13 07:01:27.551 5638-5663/? V/HookLog: [Monitor __system_property_get] "name: debug.egl.profiler, value: "
2021-06-13 07:01:27.552 5638-5663/? V/HookLog: [Monitor __system_property_get] "name: debug.prerotation.disable, value: "
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999"
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.559 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.559 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY'
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000037 second wait
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL]
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000131 seconds
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000828 seconds
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes)
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 401
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.002999 seconds
2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0
2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.565 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.566 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.566 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17
2021-06-13 07:01:27.567 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.567 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.568 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.568 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.568 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.568 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46
2021-06-13 07:01:27.568 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.570 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.571 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000b6000000
2021-06-13 07:01:27.572 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.573 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.text.PrecomputedText$Params"
2021-06-13 07:01:27.574 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000b6000000
2021-06-13 07:01:27.574 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.576 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.577 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.578 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.578 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.579 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.580 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.second-display.pkg, value: "
2021-06-13 07:01:27.581 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/framework-res, mode: 0\n"
2021-06-13 07:01:27.582 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/icons, mode: 0\n"
2021-06-13 07:01:27.582 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection==========
2021-06-13 07:01:27.582 5638-5638/? V/HookLog: [Monitor open] "path /system/media/theme/default/icons flags: 0"
2021-06-13 07:01:27.582 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.583 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /system/media/theme/default/icons, flags: 0, mode: 0"
2021-06-13 07:01:27.583 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46
2021-06-13 07:01:27.583 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0
2021-06-13 07:01:27.583 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already
2021-06-13 07:01:27.584 5638-5643/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.585 5638-5643/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.585 5638-5643/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.585 5638-5643/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 47
2021-06-13 07:01:27.598 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/lockscreen, mode: 0\n"
2021-06-13 07:01:27.599 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/framework-miui-res, mode: 0\n"
2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.core-1.apk, mode: 0\n"
2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.core-2.apk, mode: 0\n"
2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.system-1.apk, mode: 0\n"
2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.system-2.apk, mode: 0\n"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.force_rtl, value: 0"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.607 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.util.MemoryIntArray"
2021-06-13 07:01:27.607 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.os.ParcelFileDescriptor"
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY'
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000039 second wait
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL]
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000116 seconds
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.611 1577-1619/? I/Timeline: Timeline: App_transition_stopped time:98718
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000805 seconds
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes)
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 402
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.002926 seconds
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.614 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.graphics.Insets"
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] send(AppTransitionFinishedEvent)
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] -> ForcedResizableInfoActivityController [0x94b3e6f, P1] onBusEvent(AppTransitionFinishedEvent)
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] onBusEvent(AppTransitionFinishedEvent) duration: 17 microseconds, avg: 25
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] send(AppTransitionFinishedEvent)
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] -> ForcedResizableInfoActivityController [0x94b3e6f, P1] onBusEvent(AppTransitionFinishedEvent)
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] onBusEvent(AppTransitionFinishedEvent) duration: 5 microseconds, avg: 23
2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.615 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17
2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.616 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.617 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: interceptor.debug.on, value: "
2021-06-13 07:01:27.617 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: interceptor.enabled, value: "
2021-06-13 07:01:27.618 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.618 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.618 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.618 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 48
2021-06-13 07:01:27.618 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.619 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000bb000000
2021-06-13 07:01:27.620 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.621 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000bb000000
2021-06-13 07:01:27.621 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v25.Android_Os_Process_class"
2021-06-13 07:01:27.621 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v25.Android_Os_Process_class"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor getenv] "Monitor: getenv name: ANDROID_DATA"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor open] "path /data/dalvik-cache/arm/system@framework@[email protected] flags: 66"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /data/dalvik-cache/arm/system@framework@[email protected], flags: 66, mode: 438"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: -1
2021-06-13 07:01:27.622 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v24.Android_Os_Process_class"
2021-06-13 07:01:27.622 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v24.Android_Os_Process_class"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor android_dlopen_ext] "filename: /system/framework/oat/arm/volley.odex, flag: 0x0, extinfo: 0xe00dd0e0"
2021-06-13 07:01:27.623 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861

--------- beginning of crash

2021-06-13 07:01:27.623 5638-5664/? A/libc: Fatal signal 11 (SIGSEGV), code 1, fault addr 0x51 in tid 5664 (interceptor-thr)
2021-06-13 07:01:27.623 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v23.Android_Os_Process_class"
2021-06-13 07:01:27.623 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v23.Android_Os_Process_class"
2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v22.Android_Os_Process_class"
2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v22.Android_Os_Process_class"
2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v21.Android_Os_Process_class"
2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v21.Android_Os_Process_class"
2021-06-13 07:01:27.624 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.625 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v20.Android_Os_Process_class"
2021-06-13 07:01:27.625 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v20.Android_Os_Process_class"
2021-06-13 07:01:27.625 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.626 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.626 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.627 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection==========
2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0
2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY'
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000038 second wait
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL]
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000100 seconds
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000258 seconds
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes)
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 403
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.001427 seconds
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.661 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.662 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.663 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17
2021-06-13 07:01:27.663 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.665 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.666 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000c0000000
2021-06-13 07:01:27.666 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.667 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000c0000000
2021-06-13 07:01:27.668 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.669 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.670 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.674 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection==========
2021-06-13 07:01:27.674 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0
2021-06-13 07:01:27.675 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already
2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: Build fingerprint: 'xiaomi/vince/vince:7.1.2/N2G47H/V9.0.4.0.NEGCNEI:user/release-keys'
2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: Revision: '0'
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: ABI: 'arm'
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: pid: 5638, tid: 5664, name: interceptor-thr >>> com.sanfengandroid.datafilter <<<
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x51
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r0 00000051 r1 e00dd008 r2 00000003 r3 00039000
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r4 e821e008 r5 00000025 r6 00000000 r7 e00dd0c8
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r8 e017b000 r9 e7b50c63 sl 00000000 fp 00000001
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: ip e00dd0c8 sp e00dd008 lr e670fb2b pc e670fb44 cpsr 000f0030
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: backtrace:
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #00 pc 00009b44 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #1 pc 00009b27 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #2 pc 00009295 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #3 pc 00009277 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #4 pc 0000b59f /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so (call_namespace_function+418)
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #5 pc 0000392f /data/app/com.sanfengandroid.datafilter-2/lib/arm/libhookh.so (offset 0x11000)
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY'
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000037 second wait
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL]
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received

How can I hide check root and etc with fake xposed?

How can I hide rootcheck and etc with fake xposed?Because More applications check /proc/,sdcard,getapplication installed,query intent activity,query intent service and safety net(API) and /proc/ checks root in native level datat filter how can bypass /proc/ in check root?How datafilter can hook or bypass or spoof map scan(check /proc/,/proc/[pid]/) ,Api(safetynet) ,query intent activity,query intent service?

App crash, seems error while hook properties, orig___system_property_read_callback can't find in api 23

Env:
OPPO R9s
Android 6.1, API 23
Test App: https://github.com/vvb2060/MagiskDetector
Install with Magisk(Canary 22005) & Xposed(version 89):
https://github.com/topjohnwu/Magisk/
https://github.com/Magisk-Modules-Repo/xposed

build script: python build.py -vm api 23

03-21 16:40:29.554 8840-8840/? E/HookLog: Current operating platform: arm64
03-21 16:40:29.905 8862-8862/? E/HookLog: Current operating platform: arm64
03-21 16:40:29.928 8840-8840/io.github.vvb2060.magiskdetector E/HookLog: ERROR: find symbol failed, symbol name: __system_property_read_callback, error code: 0xffffffe0
03-21 16:40:29.928 8840-8840/io.github.vvb2060.magiskdetector E/HookLog: /Users/xxx/xxx/FakeXposed/app/src/main/cpp/hook/hook_properties.cpp:53: get_orig___system_property_read_callback CHECK 'orig___system_property_read_callback' failed
03-21 16:40:29.928 8840-8840/io.github.vvb2060.magiskdetector A/libc: Fatal signal 6 (SIGABRT), code -6 in tid 8840 (.magiskdetector)
03-21 16:40:29.982 686-686/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
03-21 16:40:29.982 686-686/? A/DEBUG: Build fingerprint: 'OPPO/R9s/R9s:6.0.1/MMB29M/1482468466:user/release-keys'
03-21 16:40:29.982 686-686/? A/DEBUG: Revision: '0'
03-21 16:40:29.982 686-686/? A/DEBUG: ABI: 'arm64'
03-21 16:40:29.983 686-686/? A/DEBUG: pid: 8840, tid: 8840, name: .magiskdetector  >>> io.github.vvb2060.magiskdetector <<<
03-21 16:40:29.983 686-686/? A/DEBUG: signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
03-21 16:40:29.997 686-686/? A/DEBUG:     x0   0000000000000000  x1   0000000000002288  x2   0000000000000006  x3   0000000000000000
03-21 16:40:29.997 686-686/? A/DEBUG:     x4   0000000000000000  x5   0000000000000001  x6   0000000000000000  x7   0000000000000000
03-21 16:40:29.997 686-686/? A/DEBUG:     x8   0000000000000083  x9   0000000000000000  x10  0000000000000000  x11  0000007fd4bd6078
03-21 16:40:29.997 686-686/? A/DEBUG:     x12  0000007fd4bd5f50  x13  00000000000000c2  x14  0000007fd4bd6138  x15  0000000000000000
03-21 16:40:29.998 686-686/? A/DEBUG:     x16  0000007f9004e568  x17  0000007f8ffe056c  x18  0000007f904109b4  x19  0000007f904a5088
03-21 16:40:29.998 686-686/? A/DEBUG:     x20  0000007f904a4fc8  x21  0000000000000058  x22  0000000000000006  x23  0000007fd4bd68b0
03-21 16:40:29.998 686-686/? A/DEBUG:     x24  0000000012d95c60  x25  0000000012c2ba40  x26  00000000700c9378  x27  0000000012cc40b0
03-21 16:40:29.998 686-686/? A/DEBUG:     x28  0000000070ffc3f2  x29  0000007fd4bd6530  x30  0000007f8ffddd08
03-21 16:40:29.998 686-686/? A/DEBUG:     sp   0000007fd4bd6530  pc   0000007f8ffe0574  pstate 0000000020000000
03-21 16:40:30.006 686-686/? A/DEBUG: backtrace:
03-21 16:40:30.006 686-686/? A/DEBUG:     #00 pc 0000000000069574  /system/lib64/libc.so (tgkill+8)
03-21 16:40:30.006 686-686/? A/DEBUG:     #01 pc 0000000000066d04  /system/lib64/libc.so (pthread_kill+68)
03-21 16:40:30.006 686-686/? A/DEBUG:     #02 pc 0000000000023878  /system/lib64/libc.so (raise+28)
03-21 16:40:30.006 686-686/? A/DEBUG:     #03 pc 000000000001e018  /system/lib64/libc.so (abort+60)
03-21 16:40:30.006 686-686/? A/DEBUG:     #04 pc 0000000000079d24  /data/app/com.sanfengandroid.datafilter-1/lib/arm/libhookl64.so (get_orig___system_property_read_callback+120)
03-21 16:40:30.006 686-686/? A/DEBUG:     #05 pc 0000000000079df8  /data/app/com.sanfengandroid.datafilter-1/lib/arm/libhookl64.so (__system_property_read_callback+192)
03-21 16:40:30.007 686-686/? A/DEBUG:     #06 pc 000000000000e8e8  /data/app/io.github.vvb2060.magiskdetector-2/base.apk (offset 0x1000)
03-21 16:40:30.007 686-686/? A/DEBUG:     #07 pc 0000000000025c70  /system/lib64/libc.so (_ZL16foreach_propertyP7prop_btPFvPK9prop_infoPvES4_+172)
03-21 16:40:30.007 686-686/? A/DEBUG:     #08 pc 0000000000025cb8  /system/lib64/libc.so (_ZL16foreach_propertyP7prop_btPFvPK9prop_infoPvES4_+244)
03-21 16:40:30.007 686-686/? A/DEBUG:     #09 pc 0000000000025c28  /system/lib64/libc.so (_ZL16foreach_propertyP7prop_btPFvPK9prop_infoPvES4_+100)
03-21 16:40:30.007 686-686/? A/DEBUG:     #10 pc 0000000000025c28  /system/lib64/libc.so (_ZL16foreach_propertyP7prop_btPFvPK9prop_infoPvES4_+100)
03-21 16:40:30.007 686-686/? A/DEBUG:     #11 pc 0000000000025c28  /system/lib64/libc.so (_ZL16foreach_propertyP7prop_btPFvPK9prop_infoPvES4_+100)
03-21 16:40:30.007 686-686/? A/DEBUG:     #12 pc 0000000000025cb8  /system/lib64/libc.so (_ZL16foreach_propertyP7prop_btPFvPK9prop_infoPvES4_+244)
03-21 16:40:30.007 686-686/? A/DEBUG:     #13 pc 000000000000e6f0  /data/app/io.github.vvb2060.magiskdetector-2/base.apk (offset 0x1000)
03-21 16:40:30.007 686-686/? A/DEBUG:     #14 pc 00000000005ce958  /data/app/io.github.vvb2060.magiskdetector-2/oat/arm64/base.odex (offset 0x219000) (java.lang.String io.github.vvb2060.magiskdetector.Native.getPropsHash()+124)
03-21 16:40:30.007 686-686/? A/DEBUG:     #15 pc 00000000005cc348  /data/app/io.github.vvb2060.magiskdetector-2/oat/arm64/base.odex (offset 0x219000) (int io.github.vvb2060.magiskdetector.MainActivity.props()+2060)
03-21 16:40:30.007 686-686/? A/DEBUG:     #16 pc 00000000005ce5a4  /data/app/io.github.vvb2060.magiskdetector-2/oat/arm64/base.odex (offset 0x219000) (void io.github.vvb2060.magiskdetector.MainActivity.onStart()+760)
03-21 16:40:30.008 686-686/? A/DEBUG:     #17 pc 0000000073018a88  /data/dalvik-cache/arm64/system@[email protected] (offset 0x2274000)
03-21 16:40:30.181 686-686/? A/DEBUG: Tombstone written to: /data/tombstones/tombstone_05
03-21 16:40:30.181 686-686/? E/DEBUG: AM write failed: Broken pipe

Can't Bypass XposedDetector from vvb2060

I found a XposedDetector from vvb2060, and test in:
Device : OPPO R9s, Android 6.1, API 23 , Build Number R9s_11_A.11_170160
Others: Xposed 89, DataFilter 1.5, Xposed Detector 1.1
Here is the XposedDetector source code:

https://github.com/vvb2060/XposedDetector

The XposedDetector shows antied xposed which means fake xposed has failed.

https://github.com/vvb2060/XposedDetector/issues/3 this issue may help how to bypass the detector.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.