reverse engineering - ida pro sigstop android mediaserver -
i have debug libmedia.so on android 5.1 (lg g4) kernel 3.10. use ida pro 6.8. after i'm attached mediaserver process, in segment view, ida shows code segment of libmedia.so exact starting , ending addresses (controlled in /proc/pid/maps) routine's addresses of libmedia.so outside code segment of libmedia.so. ignoring , going on debugging, set breakpoint @ startinput routine, called when microphone needed. after setting breakpoint, ida returns:
f75ec260: got sigstop signal (stop unblockable) (exc.code 13, tid 8552)
the address 0xf75ec260 in libc.so , corresponds instruction:
svc 0
has encountered problem? there anti-debug protection in android 5.1? in previous versions of android, there no problems debugging.
Comments
Post a Comment