Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- $ adb shell strace /data/executable
- execve("/data/executable", ["/data/executable"], [/* 9 vars */]) = 0
- syscall_983045(0xb0017900, 0xbe8d8d74, 0, 0x847c, 0xb000f448, 0xbe8d8d70, 0x8, 0xf0005, 0, 0, 0, 0, 0, 0xbe8d8d18, 0xb000194b, 0xb000228c, 0x80000010, 0xb0017900, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0) = 0
- getpid() = 278
- sigaction(SIGILL, {0xb0001d45, [], SA_RESTART}, {SIG_DFL}, 0) = 0
- sigaction(SIGABRT, {0xb0001d45, [], SA_RESTART}, {SIG_DFL}, 0) = 0
- sigaction(SIGBUS, {0xb0001d45, [], SA_RESTART}, {SIG_DFL}, 0) = 0
- sigaction(SIGFPE, {0xb0001d45, [], SA_RESTART}, {SIG_DFL}, 0) = 0
- sigaction(SIGSEGV, {0xb0001d45, [], SA_RESTART}, {SIG_DFL}, 0) = 0
- sigaction(SIGSTKFLT, {0xb0001d45, [], SA_RESTART}, {SIG_DFL}, 0) = 0
- sigaction(SIGPIPE, {0xb0001d45, [], SA_RESTART}, {SIG_DFL}, 0) = 0
- getuid32() = 0
- geteuid32() = 0
- getgid32() = 0
- getegid32() = 0
- stat64("/data/libshared-library.so", {st_mode=S_IFREG|0777, st_size=544480, ...}) = 0
- open("/data/libshared-library.so", O_RDONLY|O_LARGEFILE) = 3
- lseek(3, 0, SEEK_SET) = 0
- read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0(\0\1\0\0\0\10\227\0"..., 4096) = 4096
- lseek(3, -8, SEEK_END) = 544472
- read(3, "C1ERKSs\0", 8) = 8
- mmap2(0x80000000, 102400, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x80000000
- mmap2(0x80000000, 93572, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED, 3, 0) = 0x80000000
- mprotect(0x80000000, 94208, PROT_READ|PROT_WRITE|PROT_EXEC) = 0
- mmap2(0x80017000, 3768, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 0x16) = 0x80017000
- mmap2(0x80018000, 2256, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x80018000
- close(3) = 0
- stat64("/system/lib/libc.so", {st_mode=S_IFREG|0644, st_size=239972, ...}) = 0
- open("/system/lib/libc.so", O_RDONLY|O_LARGEFILE) = 3
- lseek(3, 0, SEEK_SET) = 0
- read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0(\0\1\0\0\0 ?\0\000"..., 4096) = 4096
- lseek(3, -8, SEEK_END) = 239964
- read(3, "\0\0?PRE ", 8) = 8
- mmap2(0xafe00000, 286720, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xafe00000
- mmap2(0xafe00000, 228532, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED, 3, 0) = 0xafe00000
- mprotect(0xafe00000, 229376, PROT_READ|PROT_WRITE|PROT_EXEC) = 0
- mmap2(0xafe38000, 8596, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 0x38) = 0xafe38000
- mmap2(0xafe3b000, 42160, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xafe3b000
- close(3) = 0
- mprotect(0xafe00000, 229376, PROT_READ|PROT_EXEC) = 0
- getuid32() = 0
- geteuid32() = 0
- getgid32() = 0
- getegid32() = 0
- SYS_224(0, 0xbe8b9000, 0x20000, 0) = 278
- syscall_983045(0xafe42ad4, 0xafe42a98, 0, 0x40, 0xafe38e08, 0xbe8d8d70, 0xbe8d8bb0, 0xf0005, 0, 0, 0, 0, 0, 0xbe8d8ba0, 0xafe1f721, 0xafe0d89c, 0x60000010, 0xafe42ad4, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0) = 0
- mmap2(NULL, 32768, PROT_READ, MAP_SHARED, 9, 0) = 0x40000000
- open("/dev/urandom", O_RDONLY|O_LARGEFILE) = 3
- read(3, "x?l?", 4) = 4
- close(3) = 0
- stat64("/system/lib/libm.so", {st_mode=S_IFREG|0644, st_size=132116, ...}) = 0
- open("/system/lib/libm.so", O_RDONLY|O_LARGEFILE) = 3
- lseek(3, 0, SEEK_SET) = 0
- read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0(\0\1\0\0\0@ \0\000"..., 4096) = 4096
- lseek(3, -8, SEEK_END) = 132108
- read(3, "\0\0??PRE ", 8) = 8
- mmap2(0xafc00000, 135168, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xafc00000
- mmap2(0xafc00000, 129828, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED, 3, 0) = 0xafc00000
- mprotect(0xafc00000, 131072, PROT_READ|PROT_WRITE|PROT_EXEC) = 0
- mmap2(0xafc20000, 280, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 0x20) = 0xafc20000
- close(3) = 0
- mprotect(0xafc00000, 131072, PROT_READ|PROT_EXEC) = 0
- getuid32() = 0
- geteuid32() = 0
- getgid32() = 0
- getegid32() = 0
- mprotect(0x80000000, 94208, PROT_READ|PROT_EXEC) = 0
- getuid32() = 0
- geteuid32() = 0
- getgid32() = 0
- getegid32() = 0
- mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40008000
- mprotect(0x40008000, 4096, PROT_READ) = 0
- mprotect(0x40008000, 4096, PROT_READ|PROT_WRITE) = 0
- mprotect(0x40008000, 4096, PROT_READ) = 0
- mprotect(0x8000, 86016, PROT_READ|PROT_EXEC) = 0
- getuid32() = 0
- geteuid32() = 0
- getgid32() = 0
- getegid32() = 0
- mprotect(0x40008000, 4096, PROT_READ|PROT_WRITE) = 0
- mprotect(0x40008000, 4096, PROT_READ) = 0
- mprotect(0x40008000, 4096, PROT_READ|PROT_WRITE) = 0
- mprotect(0x40008000, 4096, PROT_READ) = 0
- brk(0) = 0x1f000
- brk(0x1f000) = 0x1f000
- brk(0x20000) = 0x20000
- mprotect(0x40008000, 4096, PROT_READ|PROT_WRITE) = 0
- mprotect(0x40008000, 4096, PROT_READ) = 0
- fstat64(1, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 1), ...}) = 0
- mprotect(0x40008000, 4096, PROT_READ|PROT_WRITE) = 0
- mprotect(0x40008000, 4096, PROT_READ) = 0
- ioctl(1, TCGETS or SNDCTL_TMR_TIMEBASE, {B38400 opost isig icanon echo ...}) = 0
- write(1, "Calling sample_function_working."..., 77Calling sample_function_working... returned `Hello world from shared lib!!!`
- ) = 77
- write(1, "Calling sample_function_not_work"..., 51Calling sample_function_not_working... returned ``
- ) = 51
- sigprocmask(SIG_SETMASK, ~[ABRT SEGV], NULL) = 0
- --- SIGSEGV (Segmentation fault) @ 0 (deadbaad) ---
- sigaction(SIGUSR1, {SIG_IGN}, {SIG_DFL}, 0) = 0
- SYS_224(0, 0xbe8d89a0, 0xbe8d89a0, 0) = 278
- socket(PF_UNIX, SOCK_STREAM, 0) = 3
- connect(3, {sa_family=AF_UNIX, path=@android:debuggerd}, 20) = 0
- write(3, "\26\1\0\0", 4) = 4
- read(3, 0xbe8d89cc, 1) = ? ERESTARTSYS (To be restarted)
- read(3, "", 1) = 0
- close(3) = 0
- sigaction(SIGSEGV, {SIG_IGN}, {0xb0001d45, [], SA_RESTART}, 0) = 0
- sigreturn() = ? (mask now [HUP ILL])
- --- SIGSEGV (Segmentation fault) @ 0 (deadbaad) ---
- +++ killed by SIGSEGV +++
Advertisement
Add Comment
Please, Sign In to add comment