JingMatrix / ChromeXt

UserScript and DevTools supports for Chromium based and WebView based browsers
https://jingmatrix.github.io/ChromeXt/
GNU General Public License v3.0
700 stars 39 forks source link

Samsung internet Beta (27.0.0.26) crashes with LSPatch #184

Closed mvevitsis closed 3 months ago

mvevitsis commented 3 months ago

Using latest version of lsposed manager and chromext as of today (August 6)

I use Samsung internet beta because regular Internet is a system app and cannot be uninstalled.

JingMatrix commented 3 months ago

Here is the crash log:

--------- beginning of main
08-07 08:33:43.779 10019 10019 D LSPosed : magisk_loader.cpp:227#void lspd::MagiskLoader::OnNativeForkAndSpecializePost(JNIEnv *, jstring, jstring): skipped com.sec.android.app.sbrowser.beta
08-07 08:33:44.062 10019 10019 I LSPatch-MetaLoader: Bootstrap loader from manager
08-07 08:33:44.068 10019 10019 D LSPlant : art_method.cxx:193: ArtMethod size: 32
08-07 08:33:44.068 10019 10019 D LSPlant : art_method.cxx:247: ArtMethod::declaring_class offset: 0
08-07 08:33:44.068 10019 10019 D LSPlant : art_method.cxx:248: ArtMethod::entrypoint offset: 24
08-07 08:33:44.068 10019 10019 D LSPlant : art_method.cxx:249: ArtMethod::data offset: 16
08-07 08:33:44.068 10019 10019 D LSPlant : art_method.cxx:250: ArtMethod::access_flags offset: 4
08-07 08:33:44.068 10019 10019 D LSPosed : elf_util.cpp:385#bool SandHook::ElfImg::findModuleBase(): found: 7519b1a000-7519c92000 r--p 00000000 fe:19 85                             /apex/com.android.art/lib64/libart.so
08-07 08:33:44.068 10019 10019 D LSPosed : elf_util.cpp:391#bool SandHook::ElfImg::findModuleBase(): update path: /apex/com.android.art/lib64/libart.so
08-07 08:33:44.068 10019 10019 D LSPosed : elf_util.cpp:411#bool SandHook::ElfImg::findModuleBase(): get module base /apex/com.android.art/lib64/libart.so: 0x7519b1a000
08-07 08:33:44.068 10019 10019 D LSPosed : elf_util.cpp:86#void SandHook::ElfImg::parse(Elf64_Ehdr *): dynsym header 0x2f8 size 62736
08-07 08:33:44.068 10019 10019 D LSPosed : elf_util.cpp:106#void SandHook::ElfImg::parse(Elf64_Ehdr *): strtab header 0x1438c size 152786
08-07 08:33:44.068 10019 10019 D LSPosed : elf_util.cpp:117#void SandHook::ElfImg::parse(Elf64_Ehdr *): gnu_debugdata header 0xc0305a size 331960
08-07 08:33:44.103 10019 10019 D LSPosed : elf_util.cpp:97#void SandHook::ElfImg::parse(Elf64_Ehdr *): symtab header 0x1f115d size 462456 found in gnu_debugdata
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:331#Elf64_Addr SandHook::ElfImg::PrefixLookupFirst(std::string_view) const: found prefix _ZN3artL15GetMethodShortyEP7_JNIEnvP10_jmethodID of _ZN3artL15GetMethodShortyEP7_JNIEnvP10_jmethodID.__uniq.224004613612541769487030999398936232930 0x90e4b0 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art9ArtMethod12PrettyMethodEPS0_b 0x80fd9c in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art6Thread14CurrentFromGdbEv 0x940338 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art11ClassLinker22FixupStaticTrampolinesEPNS_6ThreadENS_6ObjPtrINS_6mirror5ClassEEE 0x813900 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking _ZN3art11ClassLinker22FixupStaticTrampolinesEPNS_6ThreadENS_6ObjPtrINS_6mirror5ClassEEE (0x751a32d900) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art11ClassLinker14RegisterNativeEPNS_6ThreadEPNS_9ArtMethodEPKv 0x5ed900 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking _ZN3art11ClassLinker14RegisterNativeEPNS_6ThreadEPNS_9ArtMethodEPKv (0x751a107900) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art11ClassLinker16UnregisterNativeEPNS_6ThreadEPNS_9ArtMethodE 0x813be0 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking _ZN3art11ClassLinker16UnregisterNativeEPNS_6ThreadEPNS_9ArtMethodE (0x751a32dbe0) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:360#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art11ClassLinker26VisiblyInitializedCallback22MarkVisiblyInitializedEPNS_6ThreadE 0x5f4a34 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
08-07 08:33:44.109 10019 10019 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking (unknown symbol) (0x0) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:360#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found art_quick_to_interpreter_bridge 0x379240 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:360#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found art_quick_generic_jni_trampoline 0x3790e0 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
08-07 08:33:44.109 10019 10019 D LSPlant : class_linker.cxx:182: art_quick_to_interpreter_bridge = 0x7519e93240
08-07 08:33:44.109 10019 10019 D LSPlant : class_linker.cxx:183: art_quick_generic_jni_trampoline = 0x7519e930e0
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art6mirror5Class13GetDescriptorEPNSt3__112basic_stringIcNS2_11char_traitsIcEENS2_9allocatorIcEEEE 0x28ef50 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art6mirror5Class11GetClassDefEv 0x8f2eb8 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art6mirror5Class9SetStatusENS_6HandleIS1_EENS_11ClassStatusEPNS_6ThreadE 0x5f6458 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking _ZN3art6mirror5Class9SetStatusENS_6HandleIS1_EENS_11ClassStatusEPNS_6ThreadE (0x751a110458) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art16ScopedSuspendAllC2EPKcb 0x552f98 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art16ScopedSuspendAllD2Ev 0x552fa8 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art2gc23ScopedGCCriticalSectionC2EPNS_6ThreadENS0_7GcCauseENS0_13CollectorTypeE 0x6cefe8 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art2gc23ScopedGCCriticalSectionD2Ev 0x6beb34 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art3jit12JitCodeCache18MoveObsoleteMethodEPNS_9ArtMethodES3_ 0x8782bc in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art3jit12JitCodeCache12DoCollectionEPNS_6ThreadE 0x67e198 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking _ZN3art3jit12JitCodeCache12DoCollectionEPNS_6ThreadE (0x751a198198) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:331#Elf64_Addr SandHook::ElfImg::PrefixLookupFirst(std::string_view) const: found prefix _ZN3artL18DexFile_setTrustedEP7_JNIEnvP7_jclassP8_jobject of _ZN3artL18DexFile_setTrustedEP7_JNIEnvP7_jclassP8_jobject.__uniq.325793859780145791435928139633802341359 0x8fb3b0 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
08-07 08:33:44.109 10019 10019 D LSPlant : common.cxx:112: java runtime debuggable false
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art7Runtime9instance_E 0xc0d228 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPlant : runtime.cxx:61: runtime instance = 0xb40000758dd63560
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art7Runtime20SetRuntimeDebugStateENS0_17RuntimeDebugStateE 0x9302fc in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:44.109 10019 10019 D LSPlant : runtime.cxx:83: found debug_state at offset 1364
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:360#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art12ProfileSaver20ProcessProfilingInfoEbbPt 0x2ef564 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
08-07 08:33:44.109 10019 10019 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking (unknown symbol) (0x0) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:44.109 10019 10019 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking execve (0x77cb562740) from /apex/com.android.runtime/lib64/bionic/libc.so (0x77cb500000)
08-07 08:33:44.109 10019 10019 D LSPosed : elf_util.cpp:360#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art14OatFileManager25RunBackgroundVerificationERKNSt3__16vectorIPKNS_7DexFileENS1_9allocatorIS5_EEEEP8_jobject 0x6d4500 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
08-07 08:33:44.109 10019 10019 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking (unknown symbol) (0x0) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:44.114 10019 10019 D LSPosed : oat_file_manager.h:48#static void art::(anonymous struct)::replace(void *, const std::vector<const void *> &, jobject): Disabled background verification
08-07 08:33:44.114 10019 10019 D LSPosed : resources_hook.cpp:56#std::string lspd::GetXResourcesClassName(): android/content/res/XResources
08-07 08:33:44.119 10019 10019 I LSPatch : Use manager: true
08-07 08:33:44.119 10019 10019 I LSPatch : Signature bypass level: 2
08-07 08:33:44.122 10019 10019 I LSPatch : hooked app initialized: android.app.LoadedApk@64968d
08-07 08:33:44.124 10019 10019 D LSPatch : Initialize service client
08-07 08:33:44.125 10019 10019 I LSPatch : Request manager binder
08-07 08:33:44.128 10019 10035 I LSPatch : Manager binder received
08-07 08:33:44.129 10019 10019 D LSPatch : Processing /data/misc/profiles/cur/0/com.sec.android.app.sbrowser.beta/primary.prof
08-07 08:33:44.129 10019 10019 D LSPatch : Skip profile /data/misc/profiles/cur/0/com.sec.android.app.sbrowser.beta/primary.prof
08-07 08:33:44.132 10019 10019 D LSPosed : deoptimizing public android.app.Application android.app.Instrumentation.newApplication(java.lang.ClassLoader,java.lang.String,android.content.Context) throws java.lang.InstantiationException,java.lang.IllegalAccessException,java.lang.ClassNotFoundException: pkg=com.sec.android.app.sbrowser.beta, prc=com.sec.android.app.sbrowser.beta
08-07 08:33:44.132 10019 10019 V LSPlant : class_linker.cxx:203: deoptimize method android.app.Application android.app.Instrumentation.newApplication(java.lang.ClassLoader, java.lang.String, android.content.Context) from 0x72827740 to 0x7519e93240
08-07 08:33:44.132 10019 10019 D LSPosed : deoptimizing public java.io.File android.app.ContextImpl.getSharedPreferencesPath(java.lang.String): pkg=com.sec.android.app.sbrowser.beta, prc=com.sec.android.app.sbrowser.beta
08-07 08:33:44.132 10019 10019 V LSPlant : class_linker.cxx:203: deoptimize method java.io.File android.app.ContextImpl.getSharedPreferencesPath(java.lang.String) from 0x7290f8d0 to 0x7519e93240
08-07 08:33:44.132 10019 10019 D LSPosed : startBootstrapHook starts: isSystem = false
08-07 08:33:44.133 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = void java.lang.Thread.dispatchUncaughtException(java.lang.Throwable)(0x70f56970), hook = void LSPHooker_.dispatchUncaughtException(java.lang.Object, java.lang.Object)(0x7440087050), backup = void LSPHooker_.backup(java.lang.Object, java.lang.Object)(0x7440087030)
08-07 08:33:44.133 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 0, address = 77dd90e000, target = 77dd90e000
08-07 08:33:44.133 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e000
08-07 08:33:44.133 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x70f56970:0x2380011) -> 0x77dd90e000; backup(0x7440087030:0x42380012) -> 0x751a28f240; hook(0x7440087050:0x12380009) -> 0x7519e92fb0
08-07 08:33:44.133 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 630us
08-07 08:33:44.133 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = java.lang.Object dalvik.system.DexFile.openDexFile(java.lang.String, java.lang.String, int, java.lang.ClassLoader, dalvik.system.DexPathList$Element[])(0x7102e248), hook = java.lang.Object LSPHooker_.openDexFile(java.lang.Object, java.lang.Object, int, java.lang.Object, java.lang.Object)(0x74400a8050), backup = java.lang.Object LSPHooker_.backup(java.lang.Object, java.lang.Object, int, java.lang.Object, java.lang.Object)(0x74400a8030)
08-07 08:33:44.133 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 1, address = 77dd90e000, target = 77dd90e018
08-07 08:33:44.133 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e018
08-07 08:33:44.133 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x7102e248:0x228000a) -> 0x77dd90e018; backup(0x74400a8030:0x4228000a) -> 0x72511320; hook(0x74400a8050:0x12280009) -> 0x7519e92fb0
08-07 08:33:44.133 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 277us
08-07 08:33:44.133 10019 10025 V LSPlant : class.cxx:55: Backup deoptimized method 0x74400a8030 because of initialization
08-07 08:33:44.133 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = java.lang.Object dalvik.system.DexFile.openInMemoryDexFiles(java.nio.ByteBuffer[], java.lang.ClassLoader, dalvik.system.DexPathList$Element[])(0x7102e288), hook = java.lang.Object LSPHooker_.openInMemoryDexFiles(java.lang.Object, java.lang.Object, java.lang.Object)(0x74400c9050), backup = java.lang.Object LSPHooker_.backup(java.lang.Object, java.lang.Object, java.lang.Object)(0x74400c9030)
08-07 08:33:44.133 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 2, address = 77dd90e000, target = 77dd90e030
08-07 08:33:44.133 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e030
08-07 08:33:44.133 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x7102e288:0x238000a) -> 0x77dd90e030; backup(0x74400c9030:0x4238000a) -> 0x751a28f240; hook(0x74400c9050:0x12380009) -> 0x7519e92fb0
08-07 08:33:44.133 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 242us
08-07 08:33:44.134 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = void android.app.LoadedApk.<init>(android.app.ActivityThread, android.content.pm.ApplicationInfo, android.content.res.CompatibilityInfo, java.lang.ClassLoader, boolean, boolean, boolean)(0x717f6d88), hook = void LSPHooker_.constructor(java.lang.Object, java.lang.Object, java.lang.Object, java.lang.Object, java.lang.Object, boolean, boolean, boolean)(0x74400ea050), backup = void LSPHooker_.backup(java.lang.Object, java.lang.Object, java.lang.Object, java.lang.Object, java.lang.Object, boolean, boolean, boolean)(0x74400ea030)
08-07 08:33:44.134 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 3, address = 77dd90e000, target = 77dd90e048
08-07 08:33:44.134 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e048
08-07 08:33:44.134 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x717f6d88:0x2290001) -> 0x77dd90e048; backup(0x74400ea030:0x42290002) -> 0x7282a9b0; hook(0x74400ea050:0x12280009) -> 0x7519e92fb0
08-07 08:33:44.134 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 343us
08-07 08:33:44.134 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = void android.app.LoadedApk.createOrUpdateClassLoaderLocked(java.util.List)(0x717f6ec8), hook = void LSPHooker_.createOrUpdateClassLoaderLocked(java.lang.Object, java.lang.Object)(0x744010b050), backup = void LSPHooker_.backup(java.lang.Object, java.lang.Object)(0x744010b030)
08-07 08:33:44.134 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 4, address = 77dd90e000, target = 77dd90e060
08-07 08:33:44.134 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e060
08-07 08:33:44.134 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x717f6ec8:0x2380002) -> 0x77dd90e060; backup(0x744010b030:0x42380002) -> 0x7282bc30; hook(0x744010b050:0x12380009) -> 0x7519e92fb0
08-07 08:33:44.134 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 263us
08-07 08:33:44.135 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = void android.app.ActivityThread.attach(boolean, long)(0x71b4eeb8), hook = void LSPHooker_.attach(java.lang.Object, boolean, long)(0x744012c030), backup = void LSPHooker_.backup(java.lang.Object, boolean, long)(0x744012c050)
08-07 08:33:44.135 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 5, address = 77dd90e000, target = 77dd90e078
08-07 08:33:44.135 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e078
08-07 08:33:44.135 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x71b4eeb8:0x2000002) -> 0x77dd90e078; backup(0x744012c050:0x42000002) -> 0x728df8f0; hook(0x744012c030:0x12080009) -> 0x7519e92fb0
08-07 08:33:44.135 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 297us
08-07 08:33:44.139 10019 10019 I LSPosed-Bridge: Loading legacy module org.matrix.chromext from /data/app/~~86uSfGMwk0Bz7Y-Oj83GgA==/org.matrix.chromext-2MX_q793bTZqKNX3fmNtqA==/base.apk
08-07 08:33:44.151 10019 10019 I LSPosed-Bridge:   Loading class org.matrix.chromext.MainHook
08-07 08:33:44.153 10019 10019 I LSPatch : Load modules
08-07 08:33:44.300 10019 10019 D ChromeXt: com.sec.android.app.sbrowser.beta started
08-07 08:33:44.300 10019 10019 V LSPlant : class.cxx:55: Backup deoptimized method 0x74400c9030 because of initialization
08-07 08:33:44.313 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = void org.chromium.ui.base.WindowAndroid.<init>(android.content.Context, org.chromium.ui.base.IntentRequestTracker)(0x7440195c30), hook = void LSPHooker_.constructor(java.lang.Object, java.lang.Object, java.lang.Object)(0x74401cf050), backup = void LSPHooker_.backup(java.lang.Object, java.lang.Object, java.lang.Object)(0x74401cf030)
08-07 08:33:44.313 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 6, address = 77dd90e000, target = 77dd90e090
08-07 08:33:44.313 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e090
08-07 08:33:44.313 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x7440195c30:0x12310001) -> 0x77dd90e090; backup(0x74401cf030:0x12310002) -> 0x7519e93240; hook(0x74401cf050:0x12380009) -> 0x7519e92fb0
08-07 08:33:44.313 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 562us
08-07 08:33:44.313 10019 10019 I LSPatch : Modules initialized
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = android.content.pm.PackageInfo android.content.pm.PackageParser.generatePackageInfo(android.content.pm.PackageParser$Package, android.apex.ApexInfo, int)(0x71b36d78), hook = java.lang.Object LSPHooker_.generatePackageInfo(java.lang.Object, java.lang.Object, int)(0x74401f0050), backup = java.lang.Object LSPHooker_.backup(java.lang.Object, java.lang.Object, int)(0x74401f0030)
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 7, address = 77dd90e000, target = 77dd90e0a8
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e0a8
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x71b36d78:0x2280009) -> 0x77dd90e0a8; backup(0x74401f0030:0x42280009) -> 0x751a28f240; hook(0x74401f0050:0x12280009) -> 0x7519e92fb0
08-07 08:33:44.314 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 381us
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = android.content.pm.PackageInfo android.content.pm.PackageParser.generatePackageInfo(android.content.pm.PackageParser$Package, android.apex.ApexInfo, int[], int, long, long, java.util.Set, android.content.pm.pkg.FrameworkPackageUserState, int)(0x71b36d98), hook = java.lang.Object LSPHooker_.generatePackageInfo(java.lang.Object, java.lang.Object, java.lang.Object, int, long, long, java.lang.Object, java.lang.Object, int)(0x7440211050), backup = java.lang.Object LSPHooker_.backup(java.lang.Object, java.lang.Object, java.lang.Object, int, long, long, java.lang.Object, java.lang.Object, int)(0x7440211030)
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 8, address = 77dd90e000, target = 77dd90e0c0
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e0c0
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x71b36d98:0x208000a) -> 0x77dd90e0c0; backup(0x7440211030:0x4208000a) -> 0x751a28f240; hook(0x7440211050:0x12080009) -> 0x7519e92fb0
08-07 08:33:44.314 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 305us
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = android.content.pm.PackageInfo android.content.pm.PackageParser.generatePackageInfo(android.content.pm.PackageParser$Package, int[], int, long, long, java.util.Set, android.content.pm.pkg.FrameworkPackageUserState)(0x71b36db8), hook = java.lang.Object LSPHooker_.generatePackageInfo(java.lang.Object, java.lang.Object, int, long, long, java.lang.Object, java.lang.Object)(0x7440232050), backup = java.lang.Object LSPHooker_.backup(java.lang.Object, java.lang.Object, int, long, long, java.lang.Object, java.lang.Object)(0x7440232030)
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 9, address = 77dd90e000, target = 77dd90e0d8
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e0d8
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x71b36db8:0x2080009) -> 0x77dd90e0d8; backup(0x7440232030:0x42080009) -> 0x751a28f240; hook(0x7440232050:0x12080009) -> 0x7519e92fb0
08-07 08:33:44.314 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 258us
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = android.content.pm.PackageInfo android.content.pm.PackageParser.generatePackageInfo(android.content.pm.PackageParser$Package, int[], int, long, long, java.util.Set, android.content.pm.pkg.FrameworkPackageUserState, int)(0x71b36dd8), hook = java.lang.Object LSPHooker_.generatePackageInfo(java.lang.Object, java.lang.Object, int, long, long, java.lang.Object, java.lang.Object, int)(0x7440253050), backup = java.lang.Object LSPHooker_.backup(java.lang.Object, java.lang.Object, int, long, long, java.lang.Object, java.lang.Object, int)(0x7440253030)
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 10, address = 77dd90e000, target = 77dd90e0f0
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e0f0
08-07 08:33:44.314 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x71b36dd8:0x2080009) -> 0x77dd90e0f0; backup(0x7440253030:0x42080009) -> 0x751a28f240; hook(0x7440253050:0x12080009) -> 0x7519e92fb0
08-07 08:33:44.314 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 250us
08-07 08:33:44.315 10019 10019 V LSPlant : class.cxx:55: Backup deoptimized method 0x74401f0030 because of initialization
08-07 08:33:44.315 10019 10019 V LSPlant : class.cxx:55: Backup deoptimized method 0x7440211030 because of initialization
08-07 08:33:44.315 10019 10019 V LSPlant : class.cxx:55: Backup deoptimized method 0x7440232030 because of initialization
08-07 08:33:44.315 10019 10019 V LSPlant : class.cxx:55: Backup deoptimized method 0x7440253030 because of initialization
08-07 08:33:44.318 10019 10019 D LSPosed : elf_util.cpp:385#bool SandHook::ElfImg::findModuleBase(): found: 77cb500000-77cb544000 r--p 00000000 07:e0 41                             /apex/com.android.runtime/lib64/bionic/libc.so
08-07 08:33:44.318 10019 10019 D LSPosed : elf_util.cpp:391#bool SandHook::ElfImg::findModuleBase(): update path: /apex/com.android.runtime/lib64/bionic/libc.so
08-07 08:33:44.318 10019 10019 D LSPosed : elf_util.cpp:411#bool SandHook::ElfImg::findModuleBase(): get module base /apex/com.android.runtime/lib64/bionic/libc.so: 0x77cb500000
08-07 08:33:44.318 10019 10019 D LSPosed : elf_util.cpp:86#void SandHook::ElfImg::parse(Elf64_Ehdr *): dynsym header 0x2f8 size 35424
08-07 08:33:44.318 10019 10019 D LSPosed : elf_util.cpp:106#void SandHook::ElfImg::parse(Elf64_Ehdr *): strtab header 0xc734 size 18172
08-07 08:33:44.318 10019 10019 D LSPosed : elf_util.cpp:97#void SandHook::ElfImg::parse(Elf64_Ehdr *): symtab header 0xdd670 size 170232 found in orgin elf
08-07 08:33:44.319 10019 10019 D LSPosed : elf_util.cpp:360#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found __openat 0xc8a80 in /apex/com.android.runtime/lib64/bionic/libc.so in symtab by linear lookup
08-07 08:33:44.319 10019 10019 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking (unknown symbol) (0x0) from /apex/com.android.runtime/lib64/bionic/libc.so (0x77cb500000)
08-07 08:33:44.319 10019 10019 D LSPosed : bypass_sig.cpp:40#void lspd::Java_org_lsposed_lspd_nativebridge_SigBypass_enableOpenatHook(JNIEnv *, jclass, jstring, jstring): apkPath %s
08-07 08:33:44.319 10019 10019 D LSPosed : bypass_sig.cpp:41#void lspd::Java_org_lsposed_lspd_nativebridge_SigBypass_enableOpenatHook(JNIEnv *, jclass, jstring, jstring): redirectPath %s
08-07 08:33:44.319 10019 10019 I LSPatch : LSPatch bootstrap completed
08-07 08:33:44.389 10019 10019 I ChromeXt: Package: com.sec.android.app.sbrowser.beta, v27.0.0.26
08-07 08:33:44.389 10019 10019 I LSPosed-Bridge: ChromeXt logging: Package: com.sec.android.app.sbrowser.beta, v27.0.0.26
08-07 08:33:44.390 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = com.android.okhttp.Request com.android.okhttp.internal.http.HttpEngine.followUpRequest()(0x7105a3d8), hook = java.lang.Object LSPHooker_.followUpRequest(java.lang.Object)(0x744039d050), backup = java.lang.Object LSPHooker_.backup(java.lang.Object)(0x744039d030)
08-07 08:33:44.390 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 11, address = 77dd90e000, target = 77dd90e108
08-07 08:33:44.390 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e108
08-07 08:33:44.390 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x7105a3d8:0x2380001) -> 0x77dd90e108; backup(0x744039d030:0x42380002) -> 0x7257a7a0; hook(0x744039d050:0x12380009) -> 0x7519e92fb0
08-07 08:33:44.390 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 551us
08-07 08:33:44.395 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = void com.sec.android.app.sbrowser.tab.Tab.onDidFinishNavigation(boolean, boolean, boolean)(0x7440366840), hook = void LSPHooker_.onDidFinishNavigation(java.lang.Object, boolean, boolean, boolean)(0x74403bd050), backup = void LSPHooker_.backup(java.lang.Object, boolean, boolean, boolean)(0x74403bd030)
08-07 08:33:44.395 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 12, address = 77dd90e000, target = 77dd90e120
08-07 08:33:44.395 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e120
08-07 08:33:44.395 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x7440366840:0x1a200001) -> 0x77dd90e120; backup(0x74403bd030:0x1a200002) -> 0x7519e93240; hook(0x74403bd050:0x12280009) -> 0x7519e92fb0
08-07 08:33:44.396 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 542us
08-07 08:33:44.396 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = boolean com.samsung.android.sdk.scs.base.connection.ConnectionManager.connectToService(android.content.Context, android.content.Intent)(0x7440374a20), hook = boolean LSPHooker_.connectToService(java.lang.Object, java.lang.Object, java.lang.Object)(0x74403dd050), backup = boolean LSPHooker_.backup(java.lang.Object, java.lang.Object, java.lang.Object)(0x74403dd030)
08-07 08:33:44.396 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 13, address = 77dd90e000, target = 77dd90e138
08-07 08:33:44.396 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e138
08-07 08:33:44.396 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x7440374a20:0x12300001) -> 0x77dd90e138; backup(0x74403dd030:0x12300002) -> 0x7519e93240; hook(0x74403dd050:0x12380009) -> 0x7519e92fb0
08-07 08:33:44.396 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 313us
08-07 08:33:44.396 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = void com.sec.terrace.Terrace.onUpdateUrl(java.lang.String)(0x74403688c0), hook = void LSPHooker_.onUpdateUrl(java.lang.Object, java.lang.Object)(0x74403fd050), backup = void LSPHooker_.backup(java.lang.Object, java.lang.Object)(0x74403fd030)
08-07 08:33:44.396 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 14, address = 77dd90e000, target = 77dd90e150
08-07 08:33:44.396 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e150
08-07 08:33:44.396 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x74403688c0:0x12300002) -> 0x77dd90e150; backup(0x74403fd030:0x12300002) -> 0x7519e93240; hook(0x74403fd050:0x12380009) -> 0x7519e92fb0
08-07 08:33:44.396 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 296us
08-07 08:33:44.397 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = boolean com.sec.android.app.sbrowser.tab.Tab.onAddMessageToConsole(int, java.lang.String, int, java.lang.String)(0x74403667c0), hook = boolean LSPHooker_.onAddMessageToConsole(java.lang.Object, int, java.lang.Object, int, java.lang.Object)(0x744041e050), backup = boolean LSPHooker_.backup(java.lang.Object, int, java.lang.Object, int, java.lang.Object)(0x744041e030)
08-07 08:33:44.397 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 15, address = 77dd90e000, target = 77dd90e168
08-07 08:33:44.397 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e168
08-07 08:33:44.397 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x74403667c0:0x1a200001) -> 0x77dd90e168; backup(0x744041e030:0x1a200002) -> 0x7519e93240; hook(0x744041e050:0x12280009) -> 0x7519e92fb0
08-07 08:33:44.397 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 291us
08-07 08:33:44.397 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = org.chromium.content_public.browser.NavigationHandle org.chromium.content.browser.framehost.NavigationControllerImpl.loadUrl(org.chromium.content_public.browser.LoadUrlParams)(0x7440367c30), hook = java.lang.Object LSPHooker_.loadUrl(java.lang.Object, java.lang.Object)(0x744043f050), backup = java.lang.Object LSPHooker_.backup(java.lang.Object, java.lang.Object)(0x744043f030)
08-07 08:33:44.397 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 16, address = 77dd90e000, target = 77dd90e180
08-07 08:33:44.397 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e180
08-07 08:33:44.397 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x7440367c30:0x1a300001) -> 0x77dd90e180; backup(0x744043f030:0x1a300002) -> 0x7519e93240; hook(0x744043f050:0x12380009) -> 0x7519e92fb0
08-07 08:33:44.397 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 258us
08-07 08:33:44.398 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = void com.sec.terrace.TerraceActivity.onResume()(0x74402ef8a0), hook = void LSPHooker_.onResume(java.lang.Object)(0x7440460050), backup = void LSPHooker_.backup(java.lang.Object)(0x7440460030)
08-07 08:33:44.398 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 17, address = 77dd90e000, target = 77dd90e198
08-07 08:33:44.398 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e198
08-07 08:33:44.398 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x74402ef8a0:0x12300001) -> 0x77dd90e198; backup(0x7440460030:0x12300002) -> 0x751a28f240; hook(0x7440460050:0x12380009) -> 0x7519e92fb0
08-07 08:33:44.398 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 273us
08-07 08:33:44.398 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = void com.sec.terrace.TerraceActivity.onStop()(0x74402ef8e0), hook = void LSPHooker_.onStop(java.lang.Object)(0x7440481050), backup = void LSPHooker_.backup(java.lang.Object)(0x7440481030)
08-07 08:33:44.398 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 18, address = 77dd90e000, target = 77dd90e1b0
08-07 08:33:44.398 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e1b0
08-07 08:33:44.398 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x74402ef8e0:0x12300001) -> 0x77dd90e1b0; backup(0x7440481030:0x12300002) -> 0x751a28f240; hook(0x7440481050:0x12380009) -> 0x7519e92fb0
08-07 08:33:44.398 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 246us
08-07 08:33:44.398 10019 10019 D ChromeXt: UserScriptHook hooked
08-07 08:33:44.402 10019 10019 V LSPlant : lsplant.cc:586: Hooking: target = boolean com.sec.terrace.content.browser.TinActionModeCallback.onCreateActionMode(android.view.ActionMode, android.view.Menu)(0x74403756c0), hook = boolean LSPHooker_.onCreateActionMode(java.lang.Object, java.lang.Object, java.lang.Object)(0x74404c2050), backup = boolean LSPHooker_.backup(java.lang.Object, java.lang.Object, java.lang.Object)(0x74404c2030)
08-07 08:33:44.402 10019 10019 V LSPlant : lsplant.cc:567: trampoline: count = 19, address = 77dd90e000, target = 77dd90e1c8
08-07 08:33:44.402 10019 10019 V LSPlant : lsplant.cc:593: Generated trampoline 0x77dd90e1c8
08-07 08:33:44.402 10019 10019 V LSPlant : lsplant.cc:609: Done hook: target(0x74403756c0:0x1a300001) -> 0x77dd90e1c8; backup(0x74404c2030:0x1a300002) -> 0x7519e93240; hook(0x74404c2050:0x12380009) -> 0x7519e92fb0
08-07 08:33:44.402 10019 10019 V LSPosed : hook_bridge.cpp:86#lspd::Java_org_lsposed_lspd_nativebridge_HookBridge_hookMethod(JNIEnv *, jclass, jboolean, jobject, jclass, jint, jobject)::finally::~finally(): New hook took 326us
08-07 08:33:44.402 10019 10019 D ChromeXt: ContextMenuHook hooked
08-07 08:33:44.504 10080 10080 I LSPosed : skip injecting into com.sec.android.app.sbrowser.beta:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:0 because it's isolated
08-07 08:33:44.512 10080 10080 D LSPosed : magisk_loader.cpp:227#void lspd::MagiskLoader::OnNativeForkAndSpecializePost(JNIEnv *, jstring, jstring): skipped com.sec.android.app.sbrowser.beta:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:0
08-07 08:33:44.611 10019 10019 D LSPosed : LoadedApk#<init> starts: pkg=com.sec.android.app.sbrowser.beta, prc=com.sec.android.app.sbrowser.beta
08-07 08:33:44.611 10019 10019 D LSPosed : LoadedApk#<init> ends: /data/app/~~IfNXGhDw4ex38wpZBitpnA==/com.sec.android.app.sbrowser.beta-q-AAMA1HezojLKgsZHOJcg==/base.apk: pkg=com.sec.android.app.sbrowser.beta, prc=com.sec.android.app.sbrowser.beta
08-07 08:33:44.611 10019 10019 D LSPosed : LoadedApk#<init> has been loaded before, skip: /data/app/~~IfNXGhDw4ex38wpZBitpnA==/com.sec.android.app.sbrowser.beta-q-AAMA1HezojLKgsZHOJcg==/base.apk: pkg=com.sec.android.app.sbrowser.beta, prc=com.sec.android.app.sbrowser.beta
08-07 08:33:45.532 10080 10080 I LSPatch-MetaLoader: Bootstrap loader from manager
08-07 08:33:45.542 10080 10080 D LSPlant : art_method.cxx:193: ArtMethod size: 32
08-07 08:33:45.542 10080 10080 D LSPlant : art_method.cxx:247: ArtMethod::declaring_class offset: 0
08-07 08:33:45.542 10080 10080 D LSPlant : art_method.cxx:248: ArtMethod::entrypoint offset: 24
08-07 08:33:45.542 10080 10080 D LSPlant : art_method.cxx:249: ArtMethod::data offset: 16
08-07 08:33:45.542 10080 10080 D LSPlant : art_method.cxx:250: ArtMethod::access_flags offset: 4
08-07 08:33:45.543 10080 10080 D LSPosed : elf_util.cpp:385#bool SandHook::ElfImg::findModuleBase(): found: 7519b1a000-7519c92000 r--p 00000000 fe:19 85                             /apex/com.android.art/lib64/libart.so
08-07 08:33:45.543 10080 10080 D LSPosed : elf_util.cpp:391#bool SandHook::ElfImg::findModuleBase(): update path: /apex/com.android.art/lib64/libart.so
08-07 08:33:45.543 10080 10080 D LSPosed : elf_util.cpp:411#bool SandHook::ElfImg::findModuleBase(): get module base /apex/com.android.art/lib64/libart.so: 0x7519b1a000
08-07 08:33:45.543 10080 10080 D LSPosed : elf_util.cpp:86#void SandHook::ElfImg::parse(Elf64_Ehdr *): dynsym header 0x2f8 size 62736
08-07 08:33:45.543 10080 10080 D LSPosed : elf_util.cpp:106#void SandHook::ElfImg::parse(Elf64_Ehdr *): strtab header 0x1438c size 152786
08-07 08:33:45.543 10080 10080 D LSPosed : elf_util.cpp:117#void SandHook::ElfImg::parse(Elf64_Ehdr *): gnu_debugdata header 0xc0305a size 331960
08-07 08:33:45.592 10080 10080 D LSPosed : elf_util.cpp:97#void SandHook::ElfImg::parse(Elf64_Ehdr *): symtab header 0x1f115d size 462456 found in gnu_debugdata
08-07 08:33:45.601 10080 10080 D LSPosed : elf_util.cpp:331#Elf64_Addr SandHook::ElfImg::PrefixLookupFirst(std::string_view) const: found prefix _ZN3artL15GetMethodShortyEP7_JNIEnvP10_jmethodID of _ZN3artL15GetMethodShortyEP7_JNIEnvP10_jmethodID.__uniq.224004613612541769487030999398936232930 0x90e4b0 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
08-07 08:33:45.601 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art9ArtMethod12PrettyMethodEPS0_b 0x80fd9c in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.601 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art6Thread14CurrentFromGdbEv 0x940338 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.601 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art11ClassLinker22FixupStaticTrampolinesEPNS_6ThreadENS_6ObjPtrINS_6mirror5ClassEEE 0x813900 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.601 10080 10080 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking _ZN3art11ClassLinker22FixupStaticTrampolinesEPNS_6ThreadENS_6ObjPtrINS_6mirror5ClassEEE (0x751a32d900) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:45.601 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art11ClassLinker14RegisterNativeEPNS_6ThreadEPNS_9ArtMethodEPKv 0x5ed900 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.601 10080 10080 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking _ZN3art11ClassLinker14RegisterNativeEPNS_6ThreadEPNS_9ArtMethodEPKv (0x751a107900) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:45.601 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art11ClassLinker16UnregisterNativeEPNS_6ThreadEPNS_9ArtMethodE 0x813be0 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.601 10080 10080 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking _ZN3art11ClassLinker16UnregisterNativeEPNS_6ThreadEPNS_9ArtMethodE (0x751a32dbe0) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:45.601 10080 10080 D LSPosed : elf_util.cpp:360#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art11ClassLinker26VisiblyInitializedCallback22MarkVisiblyInitializedEPNS_6ThreadE 0x5f4a34 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
08-07 08:33:45.601 10080 10080 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking (unknown symbol) (0x0) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:45.601 10080 10080 D LSPosed : elf_util.cpp:360#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found art_quick_to_interpreter_bridge 0x379240 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
08-07 08:33:45.601 10080 10080 D LSPosed : elf_util.cpp:360#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found art_quick_generic_jni_trampoline 0x3790e0 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
08-07 08:33:45.601 10080 10080 D LSPlant : class_linker.cxx:182: art_quick_to_interpreter_bridge = 0x7519e93240
08-07 08:33:45.601 10080 10080 D LSPlant : class_linker.cxx:183: art_quick_generic_jni_trampoline = 0x7519e930e0
08-07 08:33:45.601 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art6mirror5Class13GetDescriptorEPNSt3__112basic_stringIcNS2_11char_traitsIcEENS2_9allocatorIcEEEE 0x28ef50 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.601 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art6mirror5Class11GetClassDefEv 0x8f2eb8 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.601 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art6mirror5Class9SetStatusENS_6HandleIS1_EENS_11ClassStatusEPNS_6ThreadE 0x5f6458 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.601 10080 10080 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking _ZN3art6mirror5Class9SetStatusENS_6HandleIS1_EENS_11ClassStatusEPNS_6ThreadE (0x751a110458) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:45.602 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art16ScopedSuspendAllC2EPKcb 0x552f98 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.602 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art16ScopedSuspendAllD2Ev 0x552fa8 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.602 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art2gc23ScopedGCCriticalSectionC2EPNS_6ThreadENS0_7GcCauseENS0_13CollectorTypeE 0x6cefe8 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.602 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art2gc23ScopedGCCriticalSectionD2Ev 0x6beb34 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.602 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art3jit12JitCodeCache18MoveObsoleteMethodEPNS_9ArtMethodES3_ 0x8782bc in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.602 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art3jit12JitCodeCache12DoCollectionEPNS_6ThreadE 0x67e198 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.602 10080 10080 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking _ZN3art3jit12JitCodeCache12DoCollectionEPNS_6ThreadE (0x751a198198) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:45.602 10080 10080 D LSPosed : elf_util.cpp:331#Elf64_Addr SandHook::ElfImg::PrefixLookupFirst(std::string_view) const: found prefix _ZN3artL18DexFile_setTrustedEP7_JNIEnvP7_jclassP8_jobject of _ZN3artL18DexFile_setTrustedEP7_JNIEnvP7_jclassP8_jobject.__uniq.325793859780145791435928139633802341359 0x8fb3b0 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
08-07 08:33:45.602 10080 10080 D LSPlant : common.cxx:112: java runtime debuggable false
08-07 08:33:45.602 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art7Runtime9instance_E 0xc0d228 in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.602 10080 10080 D LSPlant : runtime.cxx:61: runtime instance = 0xb40000758dd63560
08-07 08:33:45.602 10080 10080 D LSPosed : elf_util.cpp:354#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art7Runtime20SetRuntimeDebugStateENS0_17RuntimeDebugStateE 0x9302fc in /apex/com.android.art/lib64/libart.so in dynsym by gnuhash
08-07 08:33:45.602 10080 10080 D LSPlant : runtime.cxx:83: found debug_state at offset 1364
08-07 08:33:45.602 10080 10080 D LSPosed : elf_util.cpp:360#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art12ProfileSaver20ProcessProfilingInfoEbbPt 0x2ef564 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
08-07 08:33:45.602 10080 10080 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking (unknown symbol) (0x0) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:45.602 10080 10080 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking execve (0x77cb562740) from /apex/com.android.runtime/lib64/bionic/libc.so (0x77cb500000)
08-07 08:33:45.602 10080 10080 D LSPosed : elf_util.cpp:360#Elf64_Addr SandHook::ElfImg::getSymbOffset(std::string_view, uint32_t, uint32_t) const: found _ZN3art14OatFileManager25RunBackgroundVerificationERKNSt3__16vectorIPKNS_7DexFileENS1_9allocatorIS5_EEEEP8_jobject 0x6d4500 in /apex/com.android.art/lib64/libart.so in symtab by linear lookup
08-07 08:33:45.602 10080 10080 D LSPosed : native_util.h:84#int lspd::HookFunction(void *, void *, void **): Hooking (unknown symbol) (0x0) from /apex/com.android.art/lib64/libart.so (0x7519b1a000)
08-07 08:33:45.610 10080 10080 D LSPosed : oat_file_manager.h:48#static void art::(anonymous struct)::replace(void *, const std::vector<const void *> &, jobject): Disabled background verification
08-07 08:33:45.610 10080 10080 D LSPosed : resources_hook.cpp:56#std::string lspd::GetXResourcesClassName(): android/content/res/XResources
08-07 08:33:45.616 10080 10080 D LSPatch : Skip isolated process
08-07 08:33:45.653 10019 10079 I LSPosed-Bridge: Crash unexpectedly: org.chromium.base.process_launcher.ChildProcessConnection$ChildProcessMismatchException: Child process's classpath doesn't match, and main process's package has been updated since process launch; process needs restarting!
08-07 08:33:45.653 10019 10079 I LSPosed-Bridge:    at org.chromium.base.process_launcher.ChildProcessConnection.onServiceConnectedOnLauncherThread(Unknown Source:163)
08-07 08:33:45.653 10019 10079 I LSPosed-Bridge:    at org.chromium.base.process_launcher.ChildProcessConnection$2.onServiceConnected(Unknown Source:18)
08-07 08:33:45.653 10019 10079 I LSPosed-Bridge:    at org.chromium.base.process_launcher.ChildServiceConnectionImpl.onServiceConnected(Unknown Source:24)
08-07 08:33:45.653 10019 10079 I LSPosed-Bridge:    at android.app.LoadedApk$ServiceDispatcher.doConnected(LoadedApk.java:2210)
08-07 08:33:45.653 10019 10079 I LSPosed-Bridge:    at android.app.LoadedApk$ServiceDispatcher$RunConnection.run(LoadedApk.java:2243)
08-07 08:33:45.653 10019 10079 I LSPosed-Bridge:    at android.os.Handler.handleCallback(Handler.java:959)
08-07 08:33:45.653 10019 10079 I LSPosed-Bridge:    at android.os.Handler.dispatchMessage(Handler.java:100)
08-07 08:33:45.653 10019 10079 I LSPosed-Bridge:    at android.os.Looper.loopOnce(Looper.java:232)
08-07 08:33:45.653 10019 10079 I LSPosed-Bridge:    at android.os.Looper.loop(Looper.java:317)
08-07 08:33:45.653 10019 10079 I LSPosed-Bridge:    at android.os.HandlerThread.run(HandlerThread.java:85)
--------- beginning of crash
08-07 08:33:45.653 10019 10079 E AndroidRuntime: FATAL EXCEPTION: Chrome_ProcessLauncherThread
08-07 08:33:45.653 10019 10079 E AndroidRuntime: Process: com.sec.android.app.sbrowser.beta, PID: 10019
08-07 08:33:45.653 10019 10079 E AndroidRuntime: org.chromium.base.process_launcher.ChildProcessConnection$ChildProcessMismatchException: Child process's classpath doesn't match, and main process's package has been updated since process launch; process needs restarting!
08-07 08:33:45.653 10019 10079 E AndroidRuntime:    at org.chromium.base.process_launcher.ChildProcessConnection.onServiceConnectedOnLauncherThread(Unknown Source:163)
08-07 08:33:45.653 10019 10079 E AndroidRuntime:    at org.chromium.base.process_launcher.ChildProcessConnection$2.onServiceConnected(Unknown Source:18)
08-07 08:33:45.653 10019 10079 E AndroidRuntime:    at org.chromium.base.process_launcher.ChildServiceConnectionImpl.onServiceConnected(Unknown Source:24)
08-07 08:33:45.653 10019 10079 E AndroidRuntime:    at android.app.LoadedApk$ServiceDispatcher.doConnected(LoadedApk.java:2210)
08-07 08:33:45.653 10019 10079 E AndroidRuntime:    at android.app.LoadedApk$ServiceDispatcher$RunConnection.run(LoadedApk.java:2243)
08-07 08:33:45.653 10019 10079 E AndroidRuntime:    at android.os.Handler.handleCallback(Handler.java:959)
08-07 08:33:45.653 10019 10079 E AndroidRuntime:    at android.os.Handler.dispatchMessage(Handler.java:100)
08-07 08:33:45.653 10019 10079 E AndroidRuntime:    at android.os.Looper.loopOnce(Looper.java:232)
08-07 08:33:45.653 10019 10079 E AndroidRuntime:    at android.os.Looper.loop(Looper.java:317)
08-07 08:33:45.653 10019 10079 E AndroidRuntime:    at android.os.HandlerThread.run(HandlerThread.java:85)

Thanks for reporting this bug, I will fix it soon.

Update: Fixed now.