Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SEGV_MAPERR on emulator x86 api 28 #54

Open
c3ph3us opened this issue Feb 7, 2020 · 0 comments
Open

SEGV_MAPERR on emulator x86 api 28 #54

c3ph3us opened this issue Feb 7, 2020 · 0 comments

Comments

@c3ph3us
Copy link

c3ph3us commented Feb 7, 2020

A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x17b468 in tid 6159 (xxx), pid 6159 (xxxx)
 *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
 Build fingerprint: 'google/sdk_gphone_x86_arm/generic_x86_arm:9/PSR1.180720.117/5875966:userdebug/dev-keys'
 Revision: '0'
 ABI: 'x86'
 pid: 6159, tid: 6159, name: xxxx  >>> xxxxx <<<
 signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x17b468
     eax ffcfde18  ebx eec6c85c  ecx 70d5db38  edx ffcfde18
     edi 0017b468  esi 8f2a24c8
     ebp ffcfddc8  esp ffcfdd90  eip ee9043e9
 backtrace:
     #00 pc 003443e9  /system/lib/libart.so (art::CodeInfoEncoding::CodeInfoEncoding(void const*)+121)
     #01 pc 0046c0cb  /system/lib/libart.so (offset 0x460000) (art::OatQuickMethodHeader::ToDexPc(art::ArtMethod*, unsigned int, bool) const+107)
     #02 pc 00114157  /system/framework/x86/boot.oat (offset 0x114000)

while exec hook method and then System.loadLibrary("whale");

@c3ph3us c3ph3us changed the title SEGV_MAPERR on emulator x86 api 29 SEGV_MAPERR on emulator x86 api 28 Feb 7, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant