Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ClassLoader referenced unknown path #159

Open
1 task done
JingMatrix opened this issue Jan 17, 2025 · 3 comments
Open
1 task done

ClassLoader referenced unknown path #159

JingMatrix opened this issue Jan 17, 2025 · 3 comments
Assignees
Labels
bug Something isn't working

Comments

@JingMatrix
Copy link
Owner

Steps to reproduce/复现步骤

  1. Put an app into the scope of some Xposed module
  2. Read logs for the hooked app using adb
  3. Find the following log line:
W System  : ClassLoader referenced unknown path:

Expected behaviour/预期行为

There should be no warning with tag System in the logs

Actual behaviour/实际行为

We found the following log line:

01-17 21:35:44.414 13278 13278 D LSPosed : startBootstrapHook starts: isSystem = false
01-17 21:35:44.415 13278 13278 W System  : ClassLoader referenced unknown path: 

Xposed Module List/Xposed 模块列表

1. ChromeXt

Magisk Module List/Magisk 模块列表

1. NeoZygisk
2. Zygisk-LSPosed

LSPosed version/LSPosed 版本

v1.10.1 (7165)

Android version/Android 版本

Android 16 DP (BP21.241121.009)

Magisk version/Magisk 版本

Magisk 28.1 (28100)

Riru version/Riru 版本

N/A

Version requirement/版本要求

  • I am using latest debug CI version of LSPosed and enable verbose log/我正在使用最新 CI 调试版本且启用详细日志

Logs/日志

01-17 21:35:44.245   918   918 D Zygote  : Forked child process 13278
01-17 21:35:44.246  2362  2820 V WindowManagerShell:  animated by firstHandler
01-17 21:35:44.246  1477  1811 I ActivityManager: Start proc 13278:org.matrix.demo/u0a226 for next-top-activity {org.matrix.demo/org.matrix.demo.MainActivity}
01-17 21:35:44.247  3022  3022 D BaseDepthController: mSurface is null and mCurrentBlur is: 0
01-17 21:35:44.247  3022  3022 D BaseDepthController: mSurface is null and mCurrentBlur is: 0
01-17 21:35:44.247  3022  3022 D BaseDepthController: mSurface is null and mCurrentBlur is: 0
01-17 21:35:44.248 13278 13278 V zygisk-core64: module.cpp:364#void ZygiskContext::nativeSpecializeAppProcess_pre(): pre specialize [org.matrix.demo]
01-17 21:35:44.248   919   919 V zygiskd64: zygiskd::zygiskd: New daemon action GetProcessFlags
01-17 21:35:44.248  1477  2818 W UserManagerService: Requested status bar icon for non-badged user 0
01-17 21:35:44.256  3022  3022 D BaseDepthController: mSurface is null and mCurrentBlur is: 0
01-17 21:35:44.262   567   567 I BpBinder: onLastStrongRef automatically unlinking death recipients: 
01-17 21:35:44.280   569   569 W HwBinder:569_2: type=1400 audit(0.0:725): avc:  denied  { search } for  name="log" dev="dm-53" ino=372 scontext=u:r:hal_graphics_composer_default:s0 tcontext=u:object_r:vendor_log_file:s0 tclass=dir permissive=0
01-17 21:35:44.285   569   619 E hwc-display: [PrimaryDisplay] resetColorMappingInfoForClientComp:: resetColorMappingInfo() idx=2 error(-22)
01-17 21:35:44.285   569   619 E hwc-display: Fail to open file /data/vendor/log/hwc/PrimaryDisplay_hwc_error_log0.txt, error: Permission denied
01-17 21:35:44.285   569   619 E hwc-display: Fail to open file /data/log/PrimaryDisplay_hwc_error_log0.txt, error: No such file or directory
01-17 21:35:44.285   569   619 E hwc-display: Unable to open log file for PrimaryDisplay_hwc_error_log0.txt
01-17 21:35:44.280   569   569 W HwBinder:569_2: type=1400 audit(0.0:726): avc:  denied  { search } for  name="log" dev="dm-53" ino=372 scontext=u:r:hal_graphics_composer_default:s0 tcontext=u:object_r:vendor_log_file:s0 tclass=dir permissive=0
01-17 21:35:44.295  1477  1915 D HintManagerService: Starts cleaning for 10226
01-17 21:35:44.297   959   979 D CHRE.HAL: Received a nanoapp message from 0x476f6f676c001019 endpoint 0x1: Type 0x1f4 size 11 
01-17 21:35:44.301   959   979 D CHRE.HAL: Received a nanoapp message from 0x476f6f676c001019 endpoint 0x1: Type 0x1f4 size 11 
01-17 21:35:44.311  3022  3022 D BaseDepthController: mSurface is null and mCurrentBlur is: 0
01-17 21:35:44.333   919 13279 V zygiskd64: zygiskd::zygiskd: Uid 10226 granted root: false
01-17 21:35:44.333   919 13279 V zygiskd64: zygiskd::zygiskd: Uid 10226 on denylist: true
01-17 21:35:44.333 13278 13278 I zygisk-core64: [org.matrix.demo] is on the denylist
01-17 21:35:44.334   919   919 V zygiskd64: zygiskd::zygiskd: New daemon action ReadModules
01-17 21:35:44.335 13278 13278 I Dobby   : ================================
01-17 21:35:44.335 13278 13278 I Dobby   : Dobby
01-17 21:35:44.335 13278 13278 I Dobby   : dobby in debug log mode, disable with cmake flag "-DDOBBY_DEBUG=OFF"
01-17 21:35:44.335 13278 13278 I Dobby   : ================================
01-17 21:35:44.335 13278 13278 V zygisk-core64: dl.cpp:56#void *DlopenMem(int, int): dlopen fd 82: 0x2c74cdd984af8a2b
01-17 21:35:44.336 13278 13278 V zygisk-core64: dl.cpp:56#void *DlopenMem(int, int): dlopen fd 83: 0x4a364aa2df36cf85
01-17 21:35:44.343 13278 13278 I org.matrix.demo: Late-enabling -Xcheck:jni
01-17 21:35:44.344  3022  3022 D BaseDepthController: mSurface is null and mCurrentBlur is: 0
01-17 21:35:44.361 13278 13278 I org.matrix.demo: Using CollectorTypeCMC GC.
01-17 21:35:44.364 13278 13278 V zygisk-core64: module.cpp:371#void ZygiskContext::nativeSpecializeAppProcess_post(): post specialize [org.matrix.demo]
01-17 21:35:44.364  1300  1388 I adbd    : jdwp connection from 13278
01-17 21:35:44.365 13278 13278 W org.matrix.demo: Thread Pool max thread count is 0. Cannot cache binder as linkToDeath cannot be implemented. serviceName: activity
01-17 21:35:44.365  1477  9158 D LSPosed-Bridge: onTransact: action=ACTION_GET_BINDER, callingUid=10226, callingPid=13278
01-17 21:35:44.366  1393  1630 D LSPosedService: returned service
01-17 21:35:44.366  1393  1630 D LSPosedService: register ProcessInfo{uid=10226, pid=13278, processName='org.matrix.demo', heartBeat=android.os.BinderProxy@e72d965}
01-17 21:35:44.366  1477  9158 D LSPosed-Bridge: got binder is android.os.BinderProxy@a130b32
01-17 21:35:44.366  1393  1630 D LSPosedService: LSPApplicationService.onTransact: code=1310096052
01-17 21:35:44.366  3022  3022 D BaseDepthController: mSurface is null and mCurrentBlur is: 0
01-17 21:35:44.367 13278 13278 D LSPosed : service.cpp:359#std::tuple<int, size_t> lspd::Service::RequestLSPDex(JNIEnv *, const ScopedLocalRef<jobject> &): fd=91, size=1123712
01-17 21:35:44.367  1393  1630 D LSPosedService: LSPApplicationService.onTransact: code=724533732
01-17 21:35:44.367 13278 13278 D LSPosed : service.cpp:389#std::map<std::string, std::string> lspd::Service::RequestObfuscationMap(JNIEnv *, const ScopedLocalRef<jobject> &): android.app.AndroidApp => pq.hjmBA.C.VVrAXSvUjN.
01-17 21:35:44.367 13278 13278 D LSPosed : service.cpp:389#std::map<std::string, std::string> lspd::Service::RequestObfuscationMap(JNIEnv *, const ScopedLocalRef<jobject> &): android.content.res.XModule => Wy.VCVrX.iMGcaVW.DpYY.SCfw.
01-17 21:35:44.367 13278 13278 D LSPosed : service.cpp:389#std::map<std::string, std::string> lspd::Service::RequestObfuscationMap(JNIEnv *, const ScopedLocalRef<jobject> &): android.content.res.XRes => nqL.sR.Adz.A.eEIVw.UlVJ.
01-17 21:35:44.367 13278 13278 D LSPosed : service.cpp:389#std::map<std::string, std::string> lspd::Service::RequestObfuscationMap(JNIEnv *, const ScopedLocalRef<jobject> &): de.robv.android.xposed. => mNBqv.RN.FjtqN.MMyLRgm.
01-17 21:35:44.367 13278 13278 D LSPosed : service.cpp:389#std::map<std::string, std::string> lspd::Service::RequestObfuscationMap(JNIEnv *, const ScopedLocalRef<jobject> &): org.lsposed.lspd.core. => i.eCN.p.Pfg.WZSlvA.Hh.
01-17 21:35:44.367 13278 13278 D LSPosed : service.cpp:389#std::map<std::string, std::string> lspd::Service::RequestObfuscationMap(JNIEnv *, const ScopedLocalRef<jobject> &): org.lsposed.lspd.nativebridge. => wQpsUWj.Kogv.HlNokXm.hNRMMRGq.
01-17 21:35:44.367 13278 13278 D LSPosed : service.cpp:389#std::map<std::string, std::string> lspd::Service::RequestObfuscationMap(JNIEnv *, const ScopedLocalRef<jobject> &): org.lsposed.lspd.service. => GVWshiKPCqqLdsEuILjrJSXV.
01-17 21:35:44.367 13278 13278 D LSPosed : context.cpp:40#lspd::Context::PreloadedDex::PreloadedDex(int, std::size_t): Context::PreloadedDex::PreloadedDex: fd=91, size=1123712
01-17 21:35:44.371 13278 13278 D LSPlant : art_method.cxx:221: ArtMethod size: 32
01-17 21:35:44.371 13278 13278 D LSPlant : art_method.cxx:275: ArtMethod::declaring_class offset: 0
01-17 21:35:44.371 13278 13278 D LSPlant : art_method.cxx:276: ArtMethod::entrypoint offset: 24
01-17 21:35:44.371 13278 13278 D LSPlant : art_method.cxx:277: ArtMethod::data offset: 16
01-17 21:35:44.371 13278 13278 D LSPlant : art_method.cxx:278: ArtMethod::access_flags offset: 4
01-17 21:35:44.372 13278 13278 D LSPosed : elf_util.cpp:389#bool SandHook::ElfImg::findModuleBase(): found: 757b7b4000-757b92b000 r--p 00000000 fe:31 85                             /apex/com.android.art/lib64/libart.so
01-17 21:35:44.372 13278 13278 D LSPosed : elf_util.cpp:395#bool SandHook::ElfImg::findModuleBase(): update path: /apex/com.android.art/lib64/libart.so
01-17 21:35:44.372 13278 13278 D LSPosed : elf_util.cpp:415#bool SandHook::ElfImg::findModuleBase(): get module base /apex/com.android.art/lib64/libart.so: 0x757b7b4000
01-17 21:35:44.372 13278 13278 D LSPosed : elf_util.cpp:88#void SandHook::ElfImg::parse(Elf64_Ehdr *): dynsym header 0x2f8 size 60072
01-17 21:35:44.372 13278 13278 D LSPosed : elf_util.cpp:109#void SandHook::ElfImg::parse(Elf64_Ehdr *): strtab header 0x1360c size 142710
01-17 21:35:44.372 13278 13278 D LSPosed : elf_util.cpp:121#void SandHook::ElfImg::parse(Elf64_Ehdr *): gnu_debugdata header 0xc0310a size 288980
01-17 21:35:44.388  3022  3022 D BaseDepthController: mSurface is null and mCurrentBlur is: 0
01-17 21:35:44.401 13278 13278 D LSPosed : elf_util.cpp:100#void SandHook::ElfImg::parse(Elf64_Ehdr *): symtab header 0x172c6e size 361824 found in gnu_debugdata
01-17 21:35:44.405 13278 13278 D LSPosed : elf_util.cpp:337#Elf64_Addr SandHook::ElfImg::PrefixLookupFirst(std::string_view) const: found prefix _ZN3artL15GetMethodShortyEP7_JNIEnvP10_jmethodID of _ZN3artL15GetMethodShortyEP7_JNIEnvP10_jmethodID.__uniq.224004613612541769487030999398936232930 0x8db9a0 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
01-17 21:35:44.405 13278 13278 D LSPosed : elf_util.cpp:359#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art9ArtMethod12PrettyMethodEPS0_b 0x2adf30 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
01-17 21:35:44.405 13278 13278 D LSPosed : elf_util.cpp:359#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art6Thread14CurrentFromGdbEv 0x904fe0 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
01-17 21:35:44.405 13278 13278 D LSPosed : elf_util.cpp:365#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art11ClassLinker22FixupStaticTrampolinesEPNS_6ThreadENS_6ObjPtrINS_6mirror5ClassEEE 0x2b7e80 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
01-17 21:35:44.405 13278 13278 D LSPosed : native_api.h:62#int lspd::HookInline(void *, void *, void **): Dobby hooking (unknown symbol) (0x757ba6be80) from /apex/com.android.art/lib64/libart.so (0x757b7b4000)
01-17 21:35:44.405 13278 13278 I Dobby   : ----- [DobbyHook:0x757ba6be80] -----
01-17 21:35:44.405 13278 13278 I Dobby   : [trampoline] use [adrp, add, br]
01-17 21:35:44.405 13278 13278 I Dobby   : [memory allocator] allocate exec memory at: 0x783b4d7000, size: 0x1c
01-17 21:35:44.405 13278 13278 I Dobby   : [insn relocate] origin 0x757ba6be80 - 12
01-17 21:35:44.405 13278 13278 I Dobby   : fd7bbaa9fc6f01a9fa6702a9
01-17 21:35:44.405 13278 13278 I Dobby   : [insn relocate] relocated 0x783b4d7000 - 28
01-17 21:35:44.405 13278 13278 I Dobby   : fd7bbaa9fc6f01a9fa6702a95100005820021fd68cbea67b75000000
01-17 21:35:44.405 13278 13278 I Dobby   : [intercept routing] active
01-17 21:35:44.405 13278 13278 D LSPosed : elf_util.cpp:365#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art11ClassLinker14RegisterNativeEPNS_6ThreadEPNS_9ArtMethodEPKv 0x4c7220 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
01-17 21:35:44.405 13278 13278 D LSPosed : native_api.h:62#int lspd::HookInline(void *, void *, void **): Dobby hooking (unknown symbol) (0x757bc7b220) from /apex/com.android.art/lib64/libart.so (0x757b7b4000)
01-17 21:35:44.405 13278 13278 I Dobby   : ----- [DobbyHook:0x757bc7b220] -----
01-17 21:35:44.405 13278 13278 I Dobby   : [trampoline] use [adrp, add, br]
01-17 21:35:44.405 13278 13278 I Dobby   : [memory allocator] allocate exec memory at: 0x783b4d701c, size: 0x1c
01-17 21:35:44.405 13278 13278 I Dobby   : [insn relocate] origin 0x757bc7b220 - 12
01-17 21:35:44.405 13278 13278 I Dobby   : ffc301d1fd7b03a9f85f04a9
01-17 21:35:44.405 13278 13278 I Dobby   : [insn relocate] relocated 0x783b4d701c - 28
01-17 21:35:44.405 13278 13278 I Dobby   : ffc301d1fd7b03a9f85f04a95100005820021fd62cb2c77b75000000
01-17 21:35:44.405 13278 13278 I Dobby   : [intercept routing] active
01-17 21:35:44.405 13278 13278 D LSPosed : elf_util.cpp:365#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art11ClassLinker16UnregisterNativeEPNS_6ThreadEPNS_9ArtMethodE 0x8105a0 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
01-17 21:35:44.405 13278 13278 D LSPosed : native_api.h:62#int lspd::HookInline(void *, void *, void **): Dobby hooking (unknown symbol) (0x757bfc45a0) from /apex/com.android.art/lib64/libart.so (0x757b7b4000)
01-17 21:35:44.405 13278 13278 I Dobby   : ----- [DobbyHook:0x757bfc45a0] -----
01-17 21:35:44.405 13278 13278 I Dobby   : [trampoline] use [adrp, add, br]
01-17 21:35:44.405 13278 13278 I Dobby   : [memory allocator] allocate exec memory at: 0x783b4d7038, size: 0x1c
01-17 21:35:44.405 13278 13278 I Dobby   : [insn relocate] origin 0x757bfc45a0 - 12
01-17 21:35:44.405 13278 13278 I Dobby   : ffc301d1fd7b03a9f72300f9
01-17 21:35:44.405 13278 13278 I Dobby   : [insn relocate] relocated 0x783b4d7038 - 28
01-17 21:35:44.405 13278 13278 I Dobby   : ffc301d1fd7b03a9f72300f95100005820021fd6ac45fc7b75000000
01-17 21:35:44.405 13278 13278 I Dobby   : [intercept routing] active
01-17 21:35:44.405 13278 13278 D LSPosed : elf_util.cpp:365#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art11ClassLinker26VisiblyInitializedCallback22MarkVisiblyInitializedEPNS_6ThreadE 0x2b8550 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
01-17 21:35:44.405 13278 13278 D LSPosed : native_api.h:62#int lspd::HookInline(void *, void *, void **): Dobby hooking (unknown symbol) (0x757ba6c550) from /apex/com.android.art/lib64/libart.so (0x757b7b4000)
01-17 21:35:44.405 13278 13278 I Dobby   : ----- [DobbyHook:0x757ba6c550] -----
01-17 21:35:44.405 13278 13278 I Dobby   : [trampoline] use [adrp, add, br]
01-17 21:35:44.405 13278 13278 I Dobby   : [memory allocator] allocate exec memory at: 0x783b4d7054, size: 0x1c
01-17 21:35:44.405 13278 13278 I Dobby   : [insn relocate] origin 0x757ba6c550 - 12
01-17 21:35:44.405 13278 13278 I Dobby   : ff4304d1fd7b0ba9fc6f0ca9
01-17 21:35:44.406 13278 13278 I Dobby   : [insn relocate] relocated 0x783b4d7054 - 28
01-17 21:35:44.406 13278 13278 I Dobby   : ff4304d1fd7b0ba9fc6f0ca95100005820021fd65cc5a67b75000000
01-17 21:35:44.406 13278 13278 I Dobby   : [intercept routing] active
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:365#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found art_quick_to_interpreter_bridge 0x68b3e0 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:365#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found art_quick_generic_jni_trampoline 0x68b270 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
01-17 21:35:44.406 13278 13278 D LSPlant : class_linker.cxx:197: art_quick_to_interpreter_bridge = 0x757be3f3e0
01-17 21:35:44.406 13278 13278 D LSPlant : class_linker.cxx:198: art_quick_generic_jni_trampoline = 0x757be3f270
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:359#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art6mirror5Class13GetDescriptorEPNSt3__112basic_stringIcNS2_11char_traitsIcEENS2_9allocatorIcEEEE 0x262d90 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:359#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art6mirror5Class11GetClassDefEv 0x35db20 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:359#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art6mirror5Class9SetStatusENS_6HandleIS1_EENS_11ClassStatusEPNS_6ThreadE 0x2b9120 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
01-17 21:35:44.406 13278 13278 D LSPosed : native_api.h:62#int lspd::HookInline(void *, void *, void **): Dobby hooking _ZN3art6mirror5Class9SetStatusENS_6HandleIS1_EENS_11ClassStatusEPNS_6ThreadE (0x757ba6d120) from /apex/com.android.art/lib64/libart.so (0x757b7b4000)
01-17 21:35:44.406 13278 13278 I Dobby   : ----- [DobbyHook:0x757ba6d120] -----
01-17 21:35:44.406 13278 13278 I Dobby   : [trampoline] use [adrp, add, br]
01-17 21:35:44.406 13278 13278 I Dobby   : [memory allocator] allocate exec memory at: 0x783b4d7070, size: 0x1c
01-17 21:35:44.406 13278 13278 I Dobby   : [insn relocate] origin 0x757ba6d120 - 12
01-17 21:35:44.406 13278 13278 I Dobby   : ff4302d1fd7b03a9fc6f04a9
01-17 21:35:44.406 13278 13278 I Dobby   : [insn relocate] relocated 0x783b4d7070 - 28
01-17 21:35:44.406 13278 13278 I Dobby   : ff4302d1fd7b03a9fc6f04a95100005820021fd62cd1a67b75000000
01-17 21:35:44.406 13278 13278 I Dobby   : [intercept routing] active
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:359#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art16ScopedSuspendAllC2EPKcb 0x5bee40 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:359#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art16ScopedSuspendAllD2Ev 0x5bee30 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:359#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art2gc23ScopedGCCriticalSectionC2EPNS_6ThreadENS0_7GcCauseENS0_13CollectorTypeE 0x5be770 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:359#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art2gc23ScopedGCCriticalSectionD2Ev 0x5be750 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:359#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art3jit12JitCodeCache18MoveObsoleteMethodEPNS_9ArtMethodES3_ 0x85f9d0 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:359#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art3jit12JitCodeCache12DoCollectionEPNS_6ThreadE 0x85ff30 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
01-17 21:35:44.406 13278 13278 D LSPosed : native_api.h:62#int lspd::HookInline(void *, void *, void **): Dobby hooking _ZN3art3jit12JitCodeCache12DoCollectionEPNS_6ThreadE (0x757c013f30) from /apex/com.android.art/lib64/libart.so (0x757b7b4000)
01-17 21:35:44.406 13278 13278 I Dobby   : ----- [DobbyHook:0x757c013f30] -----
01-17 21:35:44.406 13278 13278 I Dobby   : [trampoline] use [adrp, add, br]
01-17 21:35:44.406 13278 13278 I Dobby   : [memory allocator] allocate exec memory at: 0x783b4d708c, size: 0x1c
01-17 21:35:44.406 13278 13278 I Dobby   : [insn relocate] origin 0x757c013f30 - 12
01-17 21:35:44.406 13278 13278 I Dobby   : ff0303d1fd7b06a9fb3b00f9
01-17 21:35:44.406 13278 13278 I Dobby   : [insn relocate] relocated 0x783b4d708c - 28
01-17 21:35:44.406 13278 13278 I Dobby   : ff0303d1fd7b06a9fb3b00f95100005820021fd63c3f017c75000000
01-17 21:35:44.406 13278 13278 I Dobby   : [intercept routing] active
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:337#Elf64_Addr SandHook::ElfImg::PrefixLookupFirst(std::string_view) const: found prefix _ZN3artL18DexFile_setTrustedEP7_JNIEnvP7_jclassP8_jobject of _ZN3artL18DexFile_setTrustedEP7_JNIEnvP7_jclassP8_jobject.__uniq.325793859780145791435928139633802341359 0x8cd390 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
01-17 21:35:44.406 13278 13278 D LSPlant : common.cxx:112: java runtime debuggable true
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:359#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art15instrumentation15Instrumentation21InitializeMethodsCodeEPNS_9ArtMethodEPKv 0x34edb0 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
01-17 21:35:44.406 13278 13278 D LSPosed : native_api.h:62#int lspd::HookInline(void *, void *, void **): Dobby hooking _ZN3art15instrumentation15Instrumentation21InitializeMethodsCodeEPNS_9ArtMethodEPKv (0x757bb02db0) from /apex/com.android.art/lib64/libart.so (0x757b7b4000)
01-17 21:35:44.406 13278 13278 I Dobby   : ----- [DobbyHook:0x757bb02db0] -----
01-17 21:35:44.406 13278 13278 I Dobby   : [trampoline] use [adrp, add, br]
01-17 21:35:44.406 13278 13278 I Dobby   : [memory allocator] allocate exec memory at: 0x783b4d70a8, size: 0x1c
01-17 21:35:44.406 13278 13278 I Dobby   : [insn relocate] origin 0x757bb02db0 - 12
01-17 21:35:44.406 13278 13278 I Dobby   : ff0301d1fd7b01a9f65702a9
01-17 21:35:44.406 13278 13278 I Dobby   : [insn relocate] relocated 0x783b4d70a8 - 28
01-17 21:35:44.406 13278 13278 I Dobby   : ff0301d1fd7b01a9f65702a95100005820021fd6bc2db07b75000000
01-17 21:35:44.406 13278 13278 I Dobby   : [intercept routing] active
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:365#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art3jni12JniIdManager15EncodeGenericIdINS_9ArtMethodEEEmNS_16ReflectiveHandleIT_EE 0x596030 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
01-17 21:35:44.406 13278 13278 D LSPosed : native_api.h:62#int lspd::HookInline(void *, void *, void **): Dobby hooking (unknown symbol) (0x757bd4a030) from /apex/com.android.art/lib64/libart.so (0x757b7b4000)
01-17 21:35:44.406 13278 13278 I Dobby   : ----- [DobbyHook:0x757bd4a030] -----
01-17 21:35:44.406 13278 13278 I Dobby   : [trampoline] use [adrp, add, br]
01-17 21:35:44.406 13278 13278 I Dobby   : [memory allocator] allocate exec memory at: 0x783b4d70c4, size: 0x1c
01-17 21:35:44.406 13278 13278 I Dobby   : [insn relocate] origin 0x757bd4a030 - 12
01-17 21:35:44.406 13278 13278 I Dobby   : ff8303d1fd7b08a9fc6f09a9
01-17 21:35:44.406 13278 13278 I Dobby   : [insn relocate] relocated 0x783b4d70c4 - 28
01-17 21:35:44.406 13278 13278 I Dobby   : ff8303d1fd7b08a9fc6f09a95100005820021fd63ca0d47b75000000
01-17 21:35:44.406 13278 13278 I Dobby   : [intercept routing] active
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:359#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art7Runtime9instance_E 0xc0d308 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
01-17 21:35:44.406 13278 13278 D LSPlant : runtime.cxx:59: runtime instance = 0xb4000076dce9d4a0
01-17 21:35:44.406 13278 13278 D LSPosed : elf_util.cpp:359#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art7Runtime20SetRuntimeDebugStateENS0_17RuntimeDebugStateE 0x5bdbc0 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
01-17 21:35:44.406 13278 13278 D LSPlant : runtime.cxx:77: found debug_state at offset 1364
01-17 21:35:44.406 13278 13278 D LSPosed : resources_hook.cpp:56#std::string lspd::GetXResourcesClassName(): nqL/sR/Adz/A/eEIVw/UlVJ/ources
01-17 21:35:44.406 13278 13278 D LSPosed : magisk_loader.cpp:187#void lspd::MagiskLoader::OnNativeForkAndSpecializePost(JNIEnv *, jstring, jstring): Done prepare
01-17 21:35:44.407  1393  1630 D LSPosedService: LSPApplicationService.onTransact: code=1598968902
01-17 21:35:44.407 13278 13278 W BpBinder: Linking to death on org.lsposed.lspd.service.ILSPApplicationService but there are no threads (yet?) listening to incoming transactions. See ProcessState::startThreadPool and ProcessState::setThreadPoolMaxThreadCount. Generally you should setup the binder threadpool before other initialization steps.
01-17 21:35:44.411  3022  3022 D BaseDepthController: mSurface is null and mCurrentBlur is: 0
01-17 21:35:44.413 13278 13278 D LSPosed : deoptimizing public android.app.Application android.app.Instrumentation.newApplication(java.lang.ClassLoader,java.lang.String,android.content.Context) throws java.lang.InstantiationException,java.lang.IllegalAccessException,java.lang.ClassNotFoundException: pkg=null, prc=null
01-17 21:35:44.413 13278 13278 V LSPlant : class_linker.cxx:218: deoptimize method android.app.Application android.app.Instrumentation.newApplication(java.lang.ClassLoader, java.lang.String, android.content.Context) from 0x757be3f3e0 to 0x757be3f3e0
01-17 21:35:44.414 13278 13278 D LSPosed : deoptimizing public java.io.File android.app.ContextImpl.getSharedPreferencesPath(java.lang.String): pkg=null, prc=null
01-17 21:35:44.414 13278 13278 V LSPlant : class_linker.cxx:218: deoptimize method java.io.File android.app.ContextImpl.getSharedPreferencesPath(java.lang.String) from 0x72709ff0 to 0x757be3f3e0
01-17 21:35:44.414  1393  1630 D LSPosedService: LSPApplicationService.onTransact: code=1
01-17 21:35:44.414 13278 13278 I LSPosed : Loading xposed for org.matrix.demo/10226
01-17 21:35:44.414 13278 13278 D LSPosed : startBootstrapHook starts: isSystem = false
01-17 21:35:44.415 13278 13278 W System  : ClassLoader referenced unknown path: 
01-17 21:35:44.416 13278 13278 V LSPlant : lsplant.cc:586: Hooking: target = void java.lang.Thread.dispatchUncaughtException(java.lang.Throwable)(0x70de4b58), hook = void LSPHooker_.dispatchUncaughtException(java.lang.Object, java.lang.Object)(0x7480066050), backup = void LSPHooker_.backup(java.lang.Object, java.lang.Object)(0x7480066030)
01-17 21:35:44.416 13278 13278 V LSPlant : lsplant.cc:567: trampoline: count = 0, address = 783b4d4000, target = 783b4d4000
01-17 21:35:44.416 13278 13278 V LSPlant : lsplant.cc:593: Generated trampoline 0x783b4d4000
01-17 21:35:44.416 13278 13278 V LSPlant : lsplant.cc:603: Done hook: target(0x70de4b58:0x2380011) -> 0x783b4d4000; backup(0x7480066030:0x2380012) -> 0x757bf266c0; hook(0x7480066050:0x12380009) -> 0x757be3f130
01-17 21:35:44.416 13278 13278 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 814us
01-17 21:35:44.416 13278 13278 W System  : ClassLoader referenced unknown path: 
01-17 21:35:44.417 13278 13278 V LSPlant : lsplant.cc:586: Hooking: target = java.lang.Object dalvik.system.DexFile.openDexFile(java.lang.String, java.lang.String, int, java.lang.ClassLoader, dalvik.system.DexPathList$Element[])(0x70ecdf60), hook = java.lang.Object LSPHooker_.openDexFile(java.lang.Object, java.lang.Object, int, java.lang.Object, java.lang.Object)(0x7480087050), backup = java.lang.Object LSPHooker_.backup(java.lang.Object, java.lang.Object, int, java.lang.Object, java.lang.Object)(0x7480087030)
01-17 21:35:44.417 13278 13278 V LSPlant : lsplant.cc:567: trampoline: count = 1, address = 783b4d4000, target = 783b4d4018
01-17 21:35:44.417 13278 13278 V LSPlant : lsplant.cc:593: Generated trampoline 0x783b4d4018
01-17 21:35:44.417 13278 13278 V LSPlant : lsplant.cc:603: Done hook: target(0x70ecdf60:0x228000a) -> 0x783b4d4018; backup(0x7480087030:0x228000a) -> 0x757be3f3e0; hook(0x7480087050:0x12280009) -> 0x757be3f130
01-17 21:35:44.417 13278 13278 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 457us
01-17 21:35:44.417 13278 13278 W System  : ClassLoader referenced unknown path: 
01-17 21:35:44.417 13278 13278 V LSPlant : lsplant.cc:586: Hooking: target = java.lang.Object dalvik.system.DexFile.openInMemoryDexFiles(java.nio.ByteBuffer[], java.lang.ClassLoader, dalvik.system.DexPathList$Element[])(0x70ecdfa0), hook = java.lang.Object LSPHooker_.openInMemoryDexFiles(java.lang.Object, java.lang.Object, java.lang.Object)(0x74800a8050), backup = java.lang.Object LSPHooker_.backup(java.lang.Object, java.lang.Object, java.lang.Object)(0x74800a8030)
01-17 21:35:44.417 13278 13278 V LSPlant : lsplant.cc:567: trampoline: count = 2, address = 783b4d4000, target = 783b4d4030
01-17 21:35:44.417 13278 13278 V LSPlant : lsplant.cc:593: Generated trampoline 0x783b4d4030
01-17 21:35:44.417 13278 13278 V LSPlant : lsplant.cc:603: Done hook: target(0x70ecdfa0:0x238000a) -> 0x783b4d4030; backup(0x74800a8030:0x238000a) -> 0x757bf266c0; hook(0x74800a8050:0x12380009) -> 0x757be3f130
01-17 21:35:44.417 13278 13278 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 391us
01-17 21:35:44.418 13278 13278 W System  : ClassLoader referenced unknown path: 
01-17 21:35:44.418 13278 13278 V LSPlant : lsplant.cc:586: Hooking: target = void android.app.LoadedApk.<init>(android.app.ActivityThread, android.content.pm.ApplicationInfo, android.content.res.CompatibilityInfo, java.lang.ClassLoader, boolean, boolean, boolean)(0x716ebcc8), hook = void LSPHooker_.constructor(java.lang.Object, java.lang.Object, java.lang.Object, java.lang.Object, java.lang.Object, boolean, boolean, boolean)(0x74800c9050), backup = void LSPHooker_.backup(java.lang.Object, java.lang.Object, java.lang.Object, java.lang.Object, java.lang.Object, boolean, boolean, boolean)(0x74800c9030)
01-17 21:35:44.418 13278 13278 V LSPlant : lsplant.cc:567: trampoline: count = 3, address = 783b4d4000, target = 783b4d4048
01-17 21:35:44.418 13278 13278 V LSPlant : lsplant.cc:593: Generated trampoline 0x783b4d4048
01-17 21:35:44.418 13278 13278 V LSPlant : lsplant.cc:603: Done hook: target(0x716ebcc8:0x2290001) -> 0x783b4d4048; backup(0x74800c9030:0x2290002) -> 0x757be3f3e0; hook(0x74800c9050:0x12280009) -> 0x757be3f130
01-17 21:35:44.418 13278 13278 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 528us
01-17 21:35:44.418 13278 13278 W System  : ClassLoader referenced unknown path: 
01-17 21:35:44.418 13278 13278 V LSPlant : lsplant.cc:586: Hooking: target = void android.app.LoadedApk.createOrUpdateClassLoaderLocked(java.util.List)(0x716ebe08), hook = void LSPHooker_.createOrUpdateClassLoaderLocked(java.lang.Object, java.lang.Object)(0x74800ea050), backup = void LSPHooker_.backup(java.lang.Object, java.lang.Object)(0x74800ea030)
01-17 21:35:44.418 13278 13278 V LSPlant : lsplant.cc:567: trampoline: count = 4, address = 783b4d4000, target = 783b4d4060
01-17 21:35:44.418 13278 13278 V LSPlant : lsplant.cc:593: Generated trampoline 0x783b4d4060
01-17 21:35:44.418 13278 13278 V LSPlant : lsplant.cc:603: Done hook: target(0x716ebe08:0x2380002) -> 0x783b4d4060; backup(0x74800ea030:0x2380002) -> 0x757be3f3e0; hook(0x74800ea050:0x12380009) -> 0x757be3f130
01-17 21:35:44.418 13278 13278 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 411us
01-17 21:35:44.419 13278 13278 V LSPlant : class.cxx:53: Backup deoptimized method 0x7480087030 because of initialization
01-17 21:35:44.419 13278 13278 V LSPlant : class.cxx:53: Backup deoptimized method 0x74800a8030 because of initialization
01-17 21:35:44.419 13278 13278 V LSPlant : class_linker.cxx:115: re-deoptimize for 0x7480087030
01-17 21:35:44.419 13278 13278 V LSPlant : class_linker.cxx:218: deoptimize method java.lang.Object dalvik.system.DexFile.openDexFile(java.lang.String, java.lang.String, int, java.lang.ClassLoader, dalvik.system.DexPathList$Element[]) from 0x757be3f3e0 to 0x757be3f3e0
01-17 21:35:44.419 13278 13278 V LSPlant : class_linker.cxx:115: re-deoptimize for 0x74800a8030
01-17 21:35:44.419 13278 13278 V LSPlant : class_linker.cxx:218: deoptimize method java.lang.Object dalvik.system.DexFile.openInMemoryDexFiles(java.nio.ByteBuffer[], java.lang.ClassLoader, dalvik.system.DexPathList$Element[]) from 0x757bf266c0 to 0x757be3f3e0
01-17 21:35:44.419 13278 13278 W System  : ClassLoader referenced unknown path: 
01-17 21:35:44.420 13278 13278 V LSPlant : lsplant.cc:586: Hooking: target = void android.app.ActivityThread.attach(boolean, long)(0x719f4dd8), hook = void LSPHooker_.attach(java.lang.Object, boolean, long)(0x748010b030), backup = void LSPHooker_.backup(java.lang.Object, boolean, long)(0x748010b050)
01-17 21:35:44.420 13278 13278 V LSPlant : lsplant.cc:567: trampoline: count = 5, address = 783b4d4000, target = 783b4d4078
01-17 21:35:44.420 13278 13278 V LSPlant : lsplant.cc:593: Generated trampoline 0x783b4d4078
01-17 21:35:44.420 13278 13278 V LSPlant : lsplant.cc:603: Done hook: target(0x719f4dd8:0x2000002) -> 0x783b4d4078; backup(0x748010b050:0x2000002) -> 0x757be3f3e0; hook(0x748010b030:0x12080009) -> 0x757be3f130
01-17 21:35:44.420 13278 13278 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 545us
01-17 21:35:44.420  1393  1630 D LSPosedService: LSPApplicationService.onTransact: code=2
01-17 21:35:44.422  3022  3022 D BaseDepthController: mSurface is null and mCurrentBlur is: 0
01-17 21:35:44.422 13278 13278 I LSPosed-Bridge: Loading legacy module org.matrix.chromext from /data/app/~~PtFmGE2T8rjLOgRcl5W4lA==/org.matrix.chromext-pMwkSbiq6ku72komX40t-A==/base.apk
01-17 21:35:44.432 13278 13278 W org.matrix.demo: Unsupported class loader
01-17 21:35:44.435 13278 13278 I LSPosed-Bridge:   Loading class org.matrix.chromext.MainHook
01-17 21:35:44.438 13278 13278 D LSPosed : magisk_loader.cpp:191#void lspd::MagiskLoader::OnNativeForkAndSpecializePost(JNIEnv *, jstring, jstring): injected xposed into org.matrix.demo
01-17 21:35:44.440 13278 13278 D zygisk-core64: module.cpp:321#void ZygiskContext::run_modules_post(): modules unloaded: 1/2
01-17 21:35:44.440 13278 13278 D zygisk-core64: clean.cpp:12#void clean_trace(const char *, size_t, size_t, bool): cleaning trace for path jit-cache-zygisk
01-17 21:35:44.440 13278 13278 D zygisk-core64: clean.cpp:168#void SoList::resetCounters(size_t, size_t): reset g_module_load_counter to 347
01-17 21:35:44.440 13278 13278 D zygisk-core64: clean.cpp:172#void SoList::resetCounters(size_t, size_t): reset g_module_unload_counter to 0
01-17 21:35:44.440 13278 13278 D zygisk-core64: clean.cpp:144#bool SoList::dropSoPath(const char *): dropping solist record for liblspd.so loaded at /memfd:jit-cache-zygisk (deleted) with size 1089536
01-17 21:35:44.440 13278 13278 D zygisk-core64: clean.cpp:18#void clean_trace(const char *, size_t, size_t, bool): spoofing virtual maps for jit-cache-zygisk
01-17 21:35:44.440 13278 13278 W LSPlt   : Reading file /proc/self/maps is detectable by the process
01-17 21:35:44.444  3022  3022 D BaseDepthController: mSurface is null and mCurrentBlur is: 0
01-17 21:35:44.444 13278 13278 V zygisk-core64: hook.cpp:314#void HookContext::hook_jni_methods(JNIEnv *, const char *, JNIMethods): replaced com/android/internal/os/Zygote nativeForkAndSpecialize orig 0x757c900030
01-17 21:35:44.444 13278 13278 V zygisk-core64: hook.cpp:314#void HookContext::hook_jni_methods(JNIEnv *, const char *, JNIMethods): replaced com/android/internal/os/Zygote nativeSpecializeAppProcess orig 0x757c900d18
01-17 21:35:44.444 13278 13278 V zygisk-core64: hook.cpp:314#void HookContext::hook_jni_methods(JNIEnv *, const char *, JNIMethods): replaced com/android/internal/os/Zygote nativeForkSystemServer orig 0x757c901094
01-17 21:35:44.444 13278 13278 V LSPlt   : lsplt.cc:298#bool lsplt::RegisterHook(dev_t, ino_t, std::string_view, void *, void **): RegisterHook 85 pthread_attr_setstacksize
01-17 21:35:44.446 13278 13278 V LSPlt   : lsplt.cc:94#void (anonymous namespace)::HookInfos::Filter(const std::list<RegisterInfo> &): Match hook info /apex/com.android.art/lib64/libart.so:85 757c3b4000 757c3b7000-c00000
01-17 21:35:44.446 13278 13278 V LSPlt   : lsplt.cc:94#void (anonymous namespace)::HookInfos::Filter(const std::list<RegisterInfo> &): Match hook info /apex/com.android.art/lib64/libart.so:85 757c1b4000 757c1d9000-a00000
01-17 21:35:44.446 13278 13278 V LSPlt   : lsplt.cc:94#void (anonymous namespace)::HookInfos::Filter(const std::list<RegisterInfo> &): Match hook info /apex/com.android.art/lib64/libart.so:85 757b9b4000 757c105000-200000
01-17 21:35:44.446 13278 13278 V LSPlt   : lsplt.cc:94#void (anonymous namespace)::HookInfos::Filter(const std::list<RegisterInfo> &): Match hook info /apex/com.android.art/lib64/libart.so:85 757b7b4000 757b92b000-0
01-17 21:35:44.446 13278 13278 D LSPlt   : lsplt.cc:194#bool (anonymous namespace)::HookInfos::DoHook(std::list<RegisterInfo> &): Hooking pthread_attr_setstacksize
01-17 21:35:44.446 13278 13278 V LSPlt   : lsplt.cc:117#bool (anonymous namespace)::HookInfos::DoHook(uintptr_t, uintptr_t, uintptr_t *): Hooking 0x757c1d8248
01-17 21:35:44.446 13278 13278 D LSPlt   : lsplt.cc:127#bool (anonymous namespace)::HookInfos::DoHook(uintptr_t, uintptr_t, uintptr_t *): Backup 0x757c1d8248 to 0x7830bbe000
01-17 21:35:44.446 13278 13278 V zygisk-core64: hook.cpp:126#int new_pthread_attr_setstacksize(void *, size_t): pthread_attr_setstacksize called in [tid, pid]: 13278, 13278
01-17 21:35:44.446 13278 13278 V LSPlt   : lsplt.cc:298#bool lsplt::RegisterHook(dev_t, ino_t, std::string_view, void *, void **): RegisterHook 2527 fork
01-17 21:35:44.447 13278 13278 V LSPlt   : lsplt.cc:298#bool lsplt::RegisterHook(dev_t, ino_t, std::string_view, void *, void **): RegisterHook 2527 unshare
01-17 21:35:44.447 13278 13278 V LSPlt   : lsplt.cc:298#bool lsplt::RegisterHook(dev_t, ino_t, std::string_view, void *, void **): RegisterHook 2527 strdup
01-17 21:35:44.447 13278 13278 V LSPlt   : lsplt.cc:298#bool lsplt::RegisterHook(dev_t, ino_t, std::string_view, void *, void **): RegisterHook 85 pthread_attr_setstacksize
01-17 21:35:44.447 13278 13278 V LSPlt   : lsplt.cc:94#void (anonymous namespace)::HookInfos::Filter(const std::list<RegisterInfo> &): Match hook info /system/lib64/libandroid_runtime.so:2527 783b845000 783b865000-274000
01-17 21:35:44.448 13278 13278 V LSPlt   : lsplt.cc:94#void (anonymous namespace)::HookInfos::Filter(const std::list<RegisterInfo> &): Match hook info /system/lib64/libandroid_runtime.so:2527 7830bb8000 7830bb9000-294000
01-17 21:35:44.448 13278 13278 V LSPlt   : lsplt.cc:94#void (anonymous namespace)::HookInfos::Filter(const std::list<RegisterInfo> &): Match hook info /system/lib64/libandroid_runtime.so:2527 78309fa000 7830b98000-d6000
01-17 21:35:44.448 13278 13278 V LSPlt   : lsplt.cc:94#void (anonymous namespace)::HookInfos::Filter(const std::list<RegisterInfo> &): Match hook info /system/lib64/libandroid_runtime.so:2527 7830924000 78309fa000-0
01-17 21:35:44.448 13278 13278 V LSPlt   : lsplt.cc:94#void (anonymous namespace)::HookInfos::Filter(const std::list<RegisterInfo> &): Match hook info /apex/com.android.art/lib64/libart.so:85 757c3b4000 757c3b7000-c00000
01-17 21:35:44.448 13278 13278 V LSPlt   : lsplt.cc:94#void (anonymous namespace)::HookInfos::Filter(const std::list<RegisterInfo> &): Match hook info /apex/com.android.art/lib64/libart.so:85 757c1b4000 757c1d9000-a00000
01-17 21:35:44.448 13278 13278 V LSPlt   : lsplt.cc:94#void (anonymous namespace)::HookInfos::Filter(const std::list<RegisterInfo> &): Match hook info /apex/com.android.art/lib64/libart.so:85 757b9b4000 757c105000-200000
01-17 21:35:44.448 13278 13278 V LSPlt   : lsplt.cc:94#void (anonymous namespace)::HookInfos::Filter(const std::list<RegisterInfo> &): Match hook info /apex/com.android.art/lib64/libart.so:85 757b7b4000 757b92b000-0
01-17 21:35:44.448 13278 13278 D LSPlt   : lsplt.cc:194#bool (anonymous namespace)::HookInfos::DoHook(std::list<RegisterInfo> &): Hooking pthread_attr_setstacksize
01-17 21:35:44.448 13278 13278 V LSPlt   : lsplt.cc:117#bool (anonymous namespace)::HookInfos::DoHook(uintptr_t, uintptr_t, uintptr_t *): Hooking 0x757c1d8248
01-17 21:35:44.448 13278 13278 D LSPlt   : lsplt.cc:168#bool (anonymous namespace)::HookInfos::DoHook(uintptr_t, uintptr_t, uintptr_t *): Restore 0x757c1b4000 from 0x7830bbe000
01-17 21:35:44.448 13278 13278 D LSPlt   : lsplt.cc:194#bool (anonymous namespace)::HookInfos::DoHook(std::list<RegisterInfo> &): Hooking fork
01-17 21:35:44.448 13278 13278 V LSPlt   : lsplt.cc:117#bool (anonymous namespace)::HookInfos::DoHook(uintptr_t, uintptr_t, uintptr_t *): Hooking 0x7830bb74a0
01-17 21:35:44.448 13278 13278 D LSPlt   : lsplt.cc:194#bool (anonymous namespace)::HookInfos::DoHook(std::list<RegisterInfo> &): Hooking unshare
01-17 21:35:44.448 13278 13278 V LSPlt   : lsplt.cc:117#bool (anonymous namespace)::HookInfos::DoHook(uintptr_t, uintptr_t, uintptr_t *): Hooking 0x7830bb7580
01-17 21:35:44.448 13278 13278 D LSPlt   : lsplt.cc:194#bool (anonymous namespace)::HookInfos::DoHook(std::list<RegisterInfo> &): Hooking strdup
01-17 21:35:44.448 13278 13278 V LSPlt   : lsplt.cc:117#bool (anonymous namespace)::HookInfos::DoHook(uintptr_t, uintptr_t, uintptr_t *): Hooking 0x7830bb33b8
01-17 21:35:44.448 13278 13278 D LSPlt   : lsplt.cc:168#bool (anonymous namespace)::HookInfos::DoHook(uintptr_t, uintptr_t, uintptr_t *): Restore 0x7830b98000 from 0x783b845000
01-17 21:35:44.449 13278 13278 D zygisk-core64: hook.cpp:141#int new_pthread_attr_setstacksize(void *, size_t): unmap libzygisk.so loaded at 0x757c8a9000 with size 786432
01-17 21:35:44.451 13278 13278 D nativeloader: Load libframework-connectivity-tiramisu-jni.so using APEX ns com_android_tethering for caller /apex/com.android.tethering/javalib/framework-connectivity-t.jar: ok
@JingMatrix JingMatrix added the bug Something isn't working label Jan 17, 2025
@JingMatrix
Copy link
Owner Author

@JingMatrix JingMatrix self-assigned this Jan 18, 2025
@JingMatrix
Copy link
Owner Author

To fix this warning, the perfect solution is to make the method splitPaths return an empty list.
However, this not possible, we may thus simply add an accessible directory.

@JingMatrix
Copy link
Owner Author

JingMatrix commented Jan 18, 2025

We should also try remove the warning log

Unsupported class loader

which is found in class_loader_context.cc.

This requires to change the class https://github.com/JingMatrix/LSPosed/blob/master/core/src/main/java/org/lsposed/lspd/util/LspModuleClassLoader.java

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant