reverse engineering - ida pro sigstop android mediaserver -


i have debug libmedia.so on android 5.1 (lg g4) kernel 3.10. use ida pro 6.8. after i'm attached mediaserver process, in segment view, ida shows code segment of libmedia.so exact starting , ending addresses (controlled in /proc/pid/maps) routine's addresses of libmedia.so outside code segment of libmedia.so. ignoring , going on debugging, set breakpoint @ startinput routine, called when microphone needed. after setting breakpoint, ida returns:

f75ec260: got sigstop signal (stop unblockable) (exc.code 13, tid 8552)

the address 0xf75ec260 in libc.so , corresponds instruction:

svc 0

has encountered problem? there anti-debug protection in android 5.1? in previous versions of android, there no problems debugging.


Comments

Popular posts from this blog

PySide and Qt Properties: Connecting signals from Python to QML -

c# - DevExpress.Wpf.Grid.InfiniteGridSizeException was unhandled -

scala - 'wrong top statement declaration' when using slick in IntelliJ -