-
Notifications
You must be signed in to change notification settings - Fork 34
Open
Description
I did a some modify to prepare inject into a app, get this Segmentation fault 👍
10-11 18:11:45.546 1221 1599 D WifiStateMachine: updateCapabilities for config:LTTfalse,false
10-11 18:11:46.472 1892 1983 W QCNEJ : |CORE| CNE received unexpected action: android.intent.action.BATTERY_CHANGED
10-11 18:11:46.935 17598 17598 I magiskd : type=1400 audit(0.0:427): avc: denied { associate } for name="UNIX" dev="sockfs" ino=164041 scontext=u:object_r:magisk_file:s0 tcontext=u:object_r:sockfs:s0 tclass=filesystem permissive=1
10-11 18:11:47.805 328 328 I auditd : type=1403 audit(0.0:428): policy loaded auid=4294967295 ses=4294967295
10-11 18:11:48.554 1838 1838 D wpa_supplicant: wlan0: Control interface command 'SIGNAL_POLL'
10-11 18:11:48.557 1838 1838 D wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=9 sndbuf=229376 outq=768 send_len=48
10-11 18:11:48.890 17591 17591 F libc : Fatal signal 11 (SIGSEGV), code 1, fault addr 0x7f89e54108 in tid 17591 (victim)
10-11 18:11:48.891 330 330 W : debuggerd: handling request: pid=17591 uid=10071 gid=10071 tid=17591
10-11 18:11:48.885 330 330 I debuggerd64: type=1400 audit(0.0:429): avc: denied { read } for name="victim" dev="mmcblk0p49" ino=527666 scontext=u:r:debuggerd:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=1
10-11 18:11:48.885 330 330 I debuggerd64: type=1400 audit(0.0:430): avc: denied { open } for path="/data/data/com.termux/files/home/test/victim" dev="mmcblk0p49" ino=527666 scontext=u:r:debuggerd:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=1
10-11 18:11:48.885 17614 17614 I debuggerd64: type=1400 audit(0.0:431): avc: denied { getattr } for path="/data/data/com.termux/files/home/test/victim" dev="mmcblk0p49" ino=527666 scontext=u:r:debuggerd:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=file permissive=1
10-11 18:11:48.906 17614 17614 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
10-11 18:11:48.906 17614 17614 F DEBUG : LineageOS Version: '14.1-20180307-UNOFFICIAL-rolex'
10-11 18:11:48.906 17614 17614 F DEBUG : Build fingerprint: 'Xiaomi/rolex/rolex:6.0.1/MMB29M/V8.5.1.0.MCCMIED:user/release-keys'
10-11 18:11:48.907 17614 17614 F DEBUG : Revision: '0'
10-11 18:11:48.907 17614 17614 F DEBUG : ABI: 'arm64'
10-11 18:11:48.907 17614 17614 F DEBUG : pid: 17591, tid: 17591, name: victim >>> ./victim <<<
10-11 18:11:48.907 17614 17614 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x7f89e54108
10-11 18:11:48.907 17614 17614 F DEBUG : x0 0000007f89e540e0 x1 0000007fc4cc6648 x2 0000007fc4cc6748 x3 0000007fc4cc67d0
10-11 18:11:48.907 17614 17614 F DEBUG : x4 000000559476d6ef x5 0000007f8648d01e x6 000000000000000a x7 000000000000000a
10-11 18:11:48.907 17614 17614 F DEBUG : x8 0000000000000000 x9 000000559476d6fb x10 0000000000004001 x11 0000000000000000
10-11 18:11:48.907 17614 17614 F DEBUG : x12 000000000ccccccc x13 000000008000002f x14 0000007f869a3fd8 x15 0000007f869a3c7c
10-11 18:11:48.907 17614 17614 F DEBUG : x16 0000007f89e41000 x17 0000007f89e540e0 x18 0000007f87965e92 x19 0000007fc4cc6648
10-11 18:11:48.908 17614 17614 F DEBUG : x20 0000007f89e540e0 x21 0000007fc4cc67d0 x22 0000007fc4cc6878 x23 0000000000000000
10-11 18:11:48.908 17614 17614 F DEBUG : x24 0000000000000000 x25 0000000000000000 x26 0000000000000000 x27 0000000000000000
10-11 18:11:48.908 17614 17614 F DEBUG : x28 0000007f89e54108 x29 0000007fc4cc6630 x30 0000007f89e41070
10-11 18:11:48.908 17614 17614 F DEBUG : sp 0000007fc4cc65a0 pc 0000007f8627f0f8 pstate 0000000000000000
10-11 18:11:48.910 17614 17614 F DEBUG :
10-11 18:11:48.910 17614 17614 F DEBUG : backtrace:
10-11 18:11:48.910 17614 17614 F DEBUG : #00 pc 00000000001d20f8 /data/local/tmp/libhello.so (offset 0x188000)
10-11 18:11:48.910 17614 17614 F DEBUG : #01 pc 000000000000006c <anonymous:0000007f89e41000>Is there a way to debug the victim process ? what cause this Segmentation fault?
Metadata
Metadata
Assignees
Labels
No labels