medusa icon indicating copy to clipboard operation
medusa copied to clipboard

Cipher modules break JNI libraries

Open hacker1024 opened this issue 2 years ago • 1 comments

I'm attempting to extract a Java cipher created by native code through JNI. The cipher 1 and 2 modules both crash the app with the following error:

09-10 02:47:00.087 15355 15355 F libc    : Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 15355 (ockly.smartlock), pid 15355 (ockly.smartlock)
09-10 02:47:00.335 15460 15460 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
09-10 02:47:00.335 15460 15460 F DEBUG   : Build fingerprint: 'Xiaomi/evolution_raphael/raphael:13/TP1A.220905.004/joey09070237:userdebug/release-keys'
09-10 02:47:00.335 15460 15460 F DEBUG   : Revision: '0'
09-10 02:47:00.335 15460 15460 F DEBUG   : ABI: 'arm64'
09-10 02:47:00.335 15460 15460 F DEBUG   : Timestamp: 2022-09-10 02:47:00.150194701+1000
09-10 02:47:00.335 15460 15460 F DEBUG   : Process uptime: 32s
09-10 02:47:00.335 15460 15460 F DEBUG   : Cmdline: com.lockly.smartlock
09-10 02:47:00.335 15460 15460 F DEBUG   : pid: 15355, tid: 15355, name: ockly.smartlock  >>> com.lockly.smartlock <<<
09-10 02:47:00.335 15460 15460 F DEBUG   : uid: 10142
09-10 02:47:00.335 15460 15460 F DEBUG   : signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------
09-10 02:47:00.335 15460 15460 F DEBUG   : Abort message: 'JNI DETECTED ERROR IN APPLICATION: java_array == null
09-10 02:47:00.335 15460 15460 F DEBUG   :     in call to GetArrayLength
09-10 02:47:00.335 15460 15460 F DEBUG   :     from java.lang.String com.pg.lockly.key.KeyManager.c(android.content.Context, java.lang.String)'
09-10 02:47:00.336 15460 15460 F DEBUG   :     x0  0000000000000000  x1  0000000000003bfb  x2  0000000000000006  x3  0000007ff2d90cb0
09-10 02:47:00.336 15460 15460 F DEBUG   :     x4  5151441f43445342  x5  5151441f43445342  x6  5151441f43445342  x7  7f7f7f7f7f7f7f7f
09-10 02:47:00.336 15460 15460 F DEBUG   :     x8  00000000000000f0  x9  0000007883cc5b10  x10 0000000000000001  x11 0000007883d3abe0
09-10 02:47:00.336 15460 15460 F DEBUG   :     x12 000000788d34a430  x13 0000000007816658  x14 0000000007816518  x15 0004dd4d066d05fe
09-10 02:47:00.336 15460 15460 F DEBUG   :     x16 0000007883daba40  x17 0000007883d84c60  x18 0000000000000000  x19 0000000000003bfb
09-10 02:47:00.336 15460 15460 F DEBUG   :     x20 0000000000003bfb  x21 00000000ffffffff  x22 0000000000000000  x23 00000077e3bd3000
09-10 02:47:00.336 15460 15460 F DEBUG   :     x24 00000077c9b9ae50  x25 0000007ff2d90eb0  x26 00000077e39c7eb8  x27 00000077e39c80e8
09-10 02:47:00.336 15460 15460 F DEBUG   :     x28 000000788d5a6000  x29 0000007ff2d90d30
09-10 02:47:00.336 15460 15460 F DEBUG   :     lr  0000007883d2b788  sp  0000007ff2d90c90  pc  0000007883d2b7b4  pst 0000000000000000
09-10 02:47:00.336 15460 15460 F DEBUG   : backtrace:
09-10 02:47:00.336 15460 15460 F DEBUG   :       #00 pc 000000000008d7b4  /apex/com.android.runtime/lib64/bionic/libc.so (abort+164) (BuildId: a43465f08784f70d77ac238baab9dee2)
09-10 02:47:00.336 15460 15460 F DEBUG   :       #01 pc 0000000000000108  <anonymous:786f330000>

hacker1024 avatar Sep 09 '22 16:09 hacker1024

thanks , I'll take a look on that

Ch0pin avatar Sep 12 '22 09:09 Ch0pin