11-10 21:35:44.938 14335 14335 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
11-10 21:35:44.938 14335 14335 F DEBUG : Build fingerprint: 'google/cheetah/cheetah:14/UP1A.231005.007/10754064:user/release-keys'
11-10 21:35:44.938 14335 14335 F DEBUG : Revision: 'MP1.0'
11-10 21:35:44.938 14335 14335 F DEBUG : ABI: 'arm64'
11-10 21:35:44.938 14335 14335 F DEBUG : Timestamp: 2023-11-10 21:35:44.695333303-0500
11-10 21:35:44.938 14335 14335 F DEBUG : Process uptime: 1s
11-10 21:35:44.938 14335 14335 F DEBUG : Cmdline: zygote64
11-10 21:35:44.938 14335 14335 F DEBUG : pid: 14311, tid: 14311, name: id.gms.unstable >>> zygote64 <<<
11-10 21:35:44.938 14335 14335 F DEBUG : uid: 10164
11-10 21:35:44.938 14335 14335 F DEBUG : tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE)
11-10 21:35:44.938 14335 14335 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x5a6100003059eab2
11-10 21:35:44.938 14335 14335 F DEBUG : x0 000000001c15faac x1 5a61000000020002 x2 000000765ef6f640 x3 0000007ff64c4938
11-10 21:35:44.938 14335 14335 F DEBUG : x4 0000000073139474 x5 0000007ff64c4928 x6 797469726f697250 x7 0000007657ca6c68
11-10 21:35:44.938 14335 14335 F DEBUG : x8 0000000000000068 x9 0000000000000007 x10 0000000000000000 x11 000000791a0d8000
11-10 21:35:44.938 14335 14335 F DEBUG : x12 0000000073139450 x13 0000000000000007 x14 b40000785efed2b0 x15 b40000775efcf670
11-10 21:35:44.938 14335 14335 F DEBUG : x16 000000000c15faac x17 000000003fffffff x18 000000791a382000 x19 b40000775efcf650
11-10 21:35:44.938 14335 14335 F DEBUG : x20 b4000076befde6f0 x21 000000791a0d8000 x22 0000007ff64c4b7c x23 0000000000000000
11-10 21:35:44.938 14335 14335 F DEBUG : x24 00000000703d79b0 x25 0000007ff64c4ea8 x26 0000007ff64c4ef8 x27 0000007ff64c4ea8
11-10 21:35:44.938 14335 14335 F DEBUG : x28 0000007ff64c4f50 x29 0000007ff64c4ca0
11-10 21:35:44.938 14335 14335 F DEBUG : lr 000000765cd3a1cc sp 0000007ff64c4af0 pc 000000765cd3a6a8 pst 0000000020001000
11-10 21:35:44.938 14335 14335 F DEBUG : 21 total frames
11-10 21:35:44.938 14335 14335 F DEBUG : backtrace:
11-10 21:35:44.938 14335 14335 F DEBUG : #00 pc 000000000033a6a8 /apex/com.android.art/lib64/libart.so (art::Object_internalClone(_JNIEnv*, _jobject*) (.__uniq.93429965329032005513714586366871002690)+1376) (BuildId: b221ddf9493596dec8a84b0692083bef)
11-10 21:35:44.938 14335 14335 F DEBUG : #01 pc 000000000009b1dc /system/framework/arm64/boot.oat (art_jni_trampoline+92) (BuildId: 62fc68c27e58cc4127778fe0fd1815427d050b5a)
11-10 21:35:44.938 14335 14335 F DEBUG : #02 pc 00000000000a2bd0 /system/framework/arm64/boot.oat (java.lang.Object.clone+336) (BuildId: 62fc68c27e58cc4127778fe0fd1815427d050b5a)
11-10 21:35:44.938 14335 14335 F DEBUG : #03 pc 000000000015f2c4 /system/framework/arm64/boot.oat (java.lang.Thread.getState+68) (BuildId: 62fc68c27e58cc4127778fe0fd1815427d050b5a)
11-10 21:35:44.938 14335 14335 F DEBUG : #04 pc 000000000015f984 /system/framework/arm64/boot.oat (java.lang.Thread.setPriority+68) (BuildId: 62fc68c27e58cc4127778fe0fd1815427d050b5a)
11-10 21:35:44.938 14335 14335 F DEBUG : #05 pc 000000000058ab30 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: b221ddf9493596dec8a84b0692083bef)
11-10 21:35:44.938 14335 14335 F DEBUG : #06 pc 0000000000513dec /system/framework/framework.jar (com.android.internal.os.Zygote.specializeAppProcess+56)
11-10 21:35:44.938 14335 14335 F DEBUG : #07 pc 000000000058a364 /apex/com.android.art/lib64/libart.so (nterp_helper+2020) (BuildId: b221ddf9493596dec8a84b0692083bef)
11-10 21:35:44.938 14335 14335 F DEBUG : #08 pc 000000000051375c /system/framework/framework.jar (com.android.internal.os.Zygote.childMain+728)
11-10 21:35:44.938 14335 14335 F DEBUG : #09 pc 0000000000589bb4 /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: b221ddf9493596dec8a84b0692083bef)
11-10 21:35:44.938 14335 14335 F DEBUG : #10 pc 00000000005138e4 /system/framework/framework.jar (com.android.internal.os.Zygote.forkSimpleApps+16)
11-10 21:35:44.938 14335 14335 F DEBUG : #11 pc 0000000000756190 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteConnection.processCommand+1104) (BuildId: 4f98e15322c58b22e9630bb1efbf0633eb3f0536)
11-10 21:35:44.938 14335 14335 F DEBUG : #12 pc 000000000075ca38 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteServer.runSelectLoop+2136) (BuildId: 4f98e15322c58b22e9630bb1efbf0633eb3f0536)
11-10 21:35:44.938 14335 14335 F DEBUG : #13 pc 0000000000758e28 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+3080) (BuildId: 4f98e15322c58b22e9630bb1efbf0633eb3f0536)
11-10 21:35:44.938 14335 14335 F DEBUG : #14 pc 0000000000360680 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: b221ddf9493596dec8a84b0692083bef)
11-10 21:35:44.938 14335 14335 F DEBUG : #15 pc 00000000004942a0 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+516) (BuildId: b221ddf9493596dec8a84b0692083bef)
11-10 21:35:44.938 14335 14335 F DEBUG : #16 pc 0000000000553310 /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+112) (BuildId: b221ddf9493596dec8a84b0692083bef)
11-10 21:35:44.938 14335 14335 F DEBUG : #17 pc 00000000000d9ca8 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+104) (BuildId: 13df5aafcce6ced5850008051295413b)
11-10 21:35:44.938 14335 14335 F DEBUG : #18 pc 00000000000e5e2c /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+860) (BuildId: 13df5aafcce6ced5850008051295413b)
11-10 21:35:44.938 14335 14335 F DEBUG : #19 pc 000000000000254c /system/bin/app_process64 (main+1260) (BuildId: e8762c072e6c37bb8093e340cc42e9f2)
11-10 21:35:44.938 14335 14335 F DEBUG : #20 pc 00000000000546e8 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104) (BuildId: 19c32900d9d702c303d2b4164fbba76c)
11-10 21:35:44.488 14311 14311 I id.gms.unstable: Using CollectorTypeCC GC.
11-10 21:35:44.491 13775 13775 W CrashLoopRemedyLog: unable to delete remedy log, instaCrash: false
11-10 21:35:44.492 13775 13775 W CrashLoopRemedyLog: unable to delete remedy log, instaCrash: true
11-10 21:35:44.493 14311 14311 E id.gms.unstable: Not starting debugger since process cannot load the jdwp agent.
11-10 21:35:44.496 1523 2205 V StorageRedirect: requestCheckProcess: pid=14311, uid=10164, pkg=com.google.android.gms
11-10 21:35:44.499 1523 2686 V StorageRedirect: requestCheckProcess: pid=14311, uid=10164, pkg=com.google.android.gms, proc=com.google.android.gms.unstable
11-10 21:35:44.500 1523 2205 V StorageRedirect: requestCheckProcess: []
11-10 21:35:44.502 14311 14311 D PIF/Native: Starting to hook...
11-10 21:35:44.502 14311 14311 W shadowhook_tag: shadowhook version 1.0.8: shadowhook init(mode: UNIQUE, debuggable: true), return: 0, real-init: yes
11-10 21:35:44.502 14311 14311 I shadowhook_tag: shadowhook: hook_sym_name(libc.so, __system_property_read_callback, 0x7648330814) ...
11-10 21:35:44.502 14311 14311 I shadowhook_tag: exit: gap, 78f8d6e900 - 78f8d6f000 (load_bias 78f8c9a000, d4900 - d5000), NFZ 1, READABLE 1
11-10 21:35:44.502 14311 14311 I shadowhook_tag: exit: gap, 78f91cf120 - 78f91d0000 (load_bias 78f8c9a000, 535120 - 536000), NFZ 0, READABLE 1
11-10 21:35:44.502 14311 14311 I shadowhook_tag: exit: gap fill zero, 78f8d6e900 - 78f8d6f000 (load_bias 78f8c9a000, d4900 - d5000), READABLE 1
11-10 21:35:44.502 14311 14311 I shadowhook_tag: exit: gap resize, 78f8d6e900 - 78f8d6eff0 (load_bias 78f8c9a000, d4900 - d4ff0)
11-10 21:35:44.502 14311 14311 I shadowhook_tag: exit: in-library alloc, at 78f8d6e910 (load_bias 78f8c9a000, d4910), len 16
11-10 21:35:44.502 14311 14311 I shadowhook_tag: exit: alloc in library, exit 78f8d6e910, pc 78f8d09af0, distance 64e20, range [-8000000, 7fffffc]
11-10 21:35:44.502 14311 14311 I shadowhook_tag: a64 rewrite: type 0, inst aa0003e8
11-10 21:35:44.502 14311 14311 I shadowhook_tag: a64: hook (WITH EXIT) OK. target 78f8d09af0 -> exit 78f8d6e910 -> new 7648330814 -> enter 7919c33000 -> remaining 78f8d09af4
11-10 21:35:44.502 14311 14311 I shadowhook_tag: switch: hook in UNIQUE mode OK: target_addr 78f8d09af0, new_addr 7648330814
11-10 21:35:44.502 14311 14311 I shadowhook_tag: shadowhook: hook_sym_name(libc.so, __system_property_read_callback, 0x7648330814) OK. return: 0xb40000770efd7460. 0 - OK
11-10 21:35:44.502 14311 14311 D PIF/Native: Got __system_property_read_callback handle and hooked it at 0xb40000770efd7460
11-10 21:35:44.502 14311 14311 D PIF/Native: get system classloader
11-10 21:35:44.502 14311 14311 D PIF/Native: create buffer
11-10 21:35:44.503 14311 14311 D PIF/Native: create class loader
11-10 21:35:44.505 1731 2298 D ConnectivityService: NetReassign [no changes] [c 1] [a 1] [i 7]
11-10 21:35:44.505 14311 14311 D PIF/Native: load class
11-10 21:35:44.505 14311 14311 D PIF/Native: call init
11-10 21:35:44.451 14179 14179 I CdoRouter: ServiceLoader init cost 7 ms
11-10 21:35:44.506 14311 14311 D PIF/Java: [PRODUCT] -> [cheetah] is now: [WW_Phone]
11-10 21:35:44.506 14311 14311 D PIF/Java: [DEVICE] -> [cheetah] is now: [ASUS_X00HD_4]
11-10 21:35:44.506 14311 14311 D PIF/Java: [MANUFACTURER] -> [Google] is now: [Asus]
11-10 21:35:44.506 14311 14311 D PIF/Java: [BRAND] -> [google] is now: [Asus]
11-10 21:35:44.506 14311 14311 D PIF/Java: [MODEL] -> [Pixel 7 Pro] is now: [ASUS_X00HD]
11-10 21:35:44.506 14311 14311 D PIF/Java: [FINGERPRINT] -> [google/cheetah/cheetah:14/UP1A.231005.007/10754064:user/release-keys] is now: [asus/WW_Phone/ASUS_X00HD_4:7.1.1/NMF26F/14.2016.1801.372-20180119:user/release-keys]
11-10 21:35:44.506 14179 14179 I CdoRouter: [ProviderPool] >>> find provider with reflection: class a.a.a.xx2
11-10 21:35:44.507 14179 14179 I CdoRouter: [ServiceLoader] [SingletonPool] >>> create instance: class a.a.a.xx2, result = a.a.a.xx2@59295ff, initializer = com.heytap.cdo.component.service.e$b@b57bfcc
11-10 21:35:44.507 14311 14311 D PIF/Java: Spoof KeyStoreSpi and Provider done!
11-10 21:35:44.508 14311 14311 D PIF/Native: clean
11-10 21:35:44.513 1731 5528 I ActivityManager: Process com.heytap.market (pid 13684) has died: cch+5 CEM
11-10 21:35:44.514 1731 1985 I libprocessgroup: Successfully killed process cgroup uid 10291 pid 13684 in 0ms
11-10 21:35:44.518 1161 1161 I Zygote : Process 13684 exited due to signal 9 (Killed)
11-10 21:35:44.522 14311 14311 F libc : Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x5a6100003059eab2 in tid 14311 (id.gms.unstable), pid 14311 (id.gms.unstable)