Android應用自殺之謎

2021-08-13 11:24:25 字數 2676 閱讀 5171

12-12 04:46:29.041 29622 29622 i aee_aed : pid: 29618, tid: 29618, name: dex2oat  >>> /system/bin/dex2oat <<<

12-12 04:46:29.041 29622 29622 i aee_aed : signal 6 (sigabrt), code -6 (si_tkill), fault addr --------

12-12 04:46:29.046 28604 28675 i camap_storage: no sd

12-12 04:46:29.046 29622 29622 i aee_aed : abort message: 'fortify: read: prevented write past end of buffer'

12-12 04:46:29.046 28604 28675 i storagemanagerex: current system default path = /storage/emulated/0

12-12 04:46:29.046 28604 28675 i camap_storage: updatesmountpoint(),smountpoint:/storage/emulated/0

12-12 04:46:29.046 29622 29622 i aee_aed :     r0 00000000  r1 000073b2  r2 00000006  r3 00000008

12-12 04:46:29.046 28604 28675 i camap_storage: getfiledirectory(),smountpoint1:/storage/emulated/0

12-12 04:46:29.046 29622 29622 i aee_aed :     r4 a865958c  r5 00000006  r6 a8659534  r7 0000010c

12-12 04:46:29.046 29622 29622 i aee_aed :     r8 00000001  r9 004ee310  sl a78c2899  fp ffffffff

12-12 04:46:29.046 29622 29622 i aee_aed :     ip 00000000  sp bebf3718  lr a78ba4d7  pc a78bcd34  cpsr 200e0010

12-12 04:46:29.070 29622 29622 i aee_aed : 

12-12 04:46:29.070 29622 29622 i aee_aed : backtrace:

12-12 04:46:29.071 29622 29622 i aee_aed :     #00 pc 0004ad34  /system/lib/libc.so (tgkill+12)

12-12 04:46:29.071 29622 29622 i aee_aed :     #01 pc 000484d3  /system/lib/libc.so (pthread_kill+34)

12-12 04:46:29.071 29622 29622 i aee_aed :     #02 pc 0001d485  /system/lib/libc.so (raise+10)

12-12 04:46:29.071 29622 29622 i aee_aed :     #03 pc 00018fc1  /system/lib/libc.so (__libc_android_abort+34)

12-12 04:46:29.071 29622 29622 i aee_aed :     #04 pc 00017024  /system/lib/libc.so (abort+4)

12-12 04:46:29.071 29622 29622 i aee_aed :     #05 pc 0001b47f  /system/lib/libc.so (__libc_fatal+22)

12-12 04:46:29.071 29622 29622 i aee_aed :     #06 pc 0001b45f  /system/lib/libc.so (__fortify_chk_fail+26)

12-12 04:46:29.071 29622 29622 i aee_aed :     #07 pc 000508bd  /system/lib/libc.so (__read_chk+36)

12-12 04:46:29.071 29622 29622 i aee_aed :     #08 pc 0003c923  

12-12 04:46:29.124  1131  1356 w nativecrashlistener: couldn't find processrecord for pid 29618

12-12 04:46:29.125 29622 29622 i aee_aed : request.action: 0

12-12 04:46:29.125 29622 29622 v aee_aed : dashboard_record_update() : rec->module = /system/bin/dex2oat 

'fortify: read: prevented write past end of buffer'

說明read  函式讀入buffer 的字元長度超多了buffer 大小。

「少定義,動態分」方法曾經是一種比較常用的程式設計技巧,但這個技術確實與fortify機制有了衝突。

d_fortify_source

android高階應用

android activity service broadcaster三大元件之間互相呼叫 service實時向activity傳遞資料案例 android service獲取當前位置 gps 基站 四十七 實現呼叫android手機的拍照功能 四十六 android中的bitmap 四十五 an...

Android應用入口

用eclipse開發android應用程式,在新建乙個工程時通常很多配置已經自動生成,故很多剛入門的程式設計師只知道程式的入口是activitythread,activity的入口是oncreate方法,而不太清楚程式到底是從哪個activity進去的。action節點中的android.inten...

Android 應用安全

2.簽名和金鑰 3.android許可權 xmlns android package com.aaptl.security android versioncode 1 android versionname 1.0 android name com.aaptl.security.read data ...