feng504x

Results 11 comments of feng504x

更新一下, 现在重写了方法, 修正了之前的异常: ` @Override public DvmObject callStaticObjectMethodV(BaseVM vm, DvmClass dvmClass, String signature, VaList varArg) { if ("java/lang/System->getProperty(Ljava/lang/String;)Ljava/lang/String;".equals(signature)) { StringObject string = varArg.getObjectArg(0); return new StringObject(vm, System.getProperty(string.getValue())); } if ("java/lang/Thread->currentThread()Ljava/lang/Thread;".equals(signature))...

好像是run.py里面的join方法阻塞了app.run(),我注释了之后就可以了,但是这会有其他的影响吗?

> 使用 VirtualModule 请教一下VirtualModule是怎么用????

[ 7939.904376] [-] KP E unknown symbol: fp_wrap_syscalln [ 7939.904377] [-] KP E unknown symbol: fp_unwrap_syscalln [ 7939.904378] [-] KP E unknown symbol: inline_unwrap_syscalln [ 7939.904379] [-] KP E unknown...

> > 我今天也遇到了这个问题,编译器优化会自动插入memcpy调用,无论你如何手动避免它。不幸的是我的内核符号表里memcpy的标识是W,并且我尝试使用编译选项禁用内置函数修改Makefile,为gcc添加-fno-builtin-memcpy选项但是仍然: > > ``` > > /mnt/e/KernelPatch-0.10.7/kpms/12345# aarch64-linux-gnu-nm show_vma_perm.kpm | grep memcpy > > U memcpy > > > > /mnt/e/KernelPatch-0.10.7/kpms/12345# aarch64-linux-gnu-objdump -d show_vma_perm.kpm | grep -A5 -B5...

> > > > 我今天也遇到了这个问题,编译器优化会自动插入memcpy调用,无论你如何手动避免它。不幸的是我的内核符号表里memcpy的标识是W,并且我尝试使用编译选项禁用内置函数修改Makefile,为gcc添加-fno-builtin-memcpy选项但是仍然: > > > > ``` > > > > /mnt/e/KernelPatch-0.10.7/kpms/12345# aarch64-linux-gnu-nm show_vma_perm.kpm | grep memcpy > > > > U memcpy > > > >...

我也遇到了,UBUNTU20.04 提示GLIBC_2.38' not found

reason : ![Image](https://github.com/user-attachments/assets/cd6e06d3-ec10-4979-a5c4-b731067870c2)