-
Notifications
You must be signed in to change notification settings - Fork 142
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hook dex2oat functions to remove LSPosed traces #152
Conversation
Since |
The above problem is solved by directly passing file descriptor to LD_PRELOAD |
82388c6
to
d2bb29e
Compare
Now this pull-request is finished, please tell me your test results. |
Testing with:
Getting alot of: And in Manager' window: |
For symbols not found, please do the following to upload your symbols for me to add
If you are using NeoZygisk and LSPosed by me, the second step can be skipped. Have a look at your |
|
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
It seems the symbol names have no problems. I have updated the log printing, please record logs while
And upload your |
|
@EbananLinfal Please upload again your symbols |
Ok |
For full compatibility of all Android version, I think I have to use LSPlt to hook those symbols. |
|
EDIT:
|
@mehgancangweh Thanks for reporting, it is related to #149 (comment)_, fixed now. |
Optimization failed: return value is empty |
Same again |
We use the env LD_PRELOAD to hook the execution of `dex2oat`, which can be directly set to be a file descriptor.
It is strange that LSPlt gave a lot of runtime crashes for totally unknown reason. After adding some workarounds in LSPlt, those issues disappeared.
I am using LSPlt to provide compatibility support for all Android versions. |
Ok tested, no more error 👍 |
Tested with A13 and NeoZygisk, now Native Detector ( |
Tested #12661652493 A12 & ZygiskNext 1.2.5. |
@mehgancangweh Please report your issues on NeoZygisk properly, thanks! |
Normal in native test and native detector. But showed something wrong in holmes with latest zygisk next |
We use LD_PRELOAD to hook the execution of
dex2oat
. To do so, we first overwrite the output file byliboat_hook.so
, which is given by the parameter--oat-location
. However, we always get permission error of opening the targetbase.odex
file in functionsave_fd_to_file
.