medusa
medusa copied to clipboard
Cipher modules break JNI libraries
I'm attempting to extract a Java cipher created by native code through JNI. The cipher 1 and 2 modules both crash the app with the following error:
09-10 02:47:00.087 15355 15355 F libc : Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 15355 (ockly.smartlock), pid 15355 (ockly.smartlock)
09-10 02:47:00.335 15460 15460 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
09-10 02:47:00.335 15460 15460 F DEBUG : Build fingerprint: 'Xiaomi/evolution_raphael/raphael:13/TP1A.220905.004/joey09070237:userdebug/release-keys'
09-10 02:47:00.335 15460 15460 F DEBUG : Revision: '0'
09-10 02:47:00.335 15460 15460 F DEBUG : ABI: 'arm64'
09-10 02:47:00.335 15460 15460 F DEBUG : Timestamp: 2022-09-10 02:47:00.150194701+1000
09-10 02:47:00.335 15460 15460 F DEBUG : Process uptime: 32s
09-10 02:47:00.335 15460 15460 F DEBUG : Cmdline: com.lockly.smartlock
09-10 02:47:00.335 15460 15460 F DEBUG : pid: 15355, tid: 15355, name: ockly.smartlock >>> com.lockly.smartlock <<<
09-10 02:47:00.335 15460 15460 F DEBUG : uid: 10142
09-10 02:47:00.335 15460 15460 F DEBUG : signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------
09-10 02:47:00.335 15460 15460 F DEBUG : Abort message: 'JNI DETECTED ERROR IN APPLICATION: java_array == null
09-10 02:47:00.335 15460 15460 F DEBUG : in call to GetArrayLength
09-10 02:47:00.335 15460 15460 F DEBUG : from java.lang.String com.pg.lockly.key.KeyManager.c(android.content.Context, java.lang.String)'
09-10 02:47:00.336 15460 15460 F DEBUG : x0 0000000000000000 x1 0000000000003bfb x2 0000000000000006 x3 0000007ff2d90cb0
09-10 02:47:00.336 15460 15460 F DEBUG : x4 5151441f43445342 x5 5151441f43445342 x6 5151441f43445342 x7 7f7f7f7f7f7f7f7f
09-10 02:47:00.336 15460 15460 F DEBUG : x8 00000000000000f0 x9 0000007883cc5b10 x10 0000000000000001 x11 0000007883d3abe0
09-10 02:47:00.336 15460 15460 F DEBUG : x12 000000788d34a430 x13 0000000007816658 x14 0000000007816518 x15 0004dd4d066d05fe
09-10 02:47:00.336 15460 15460 F DEBUG : x16 0000007883daba40 x17 0000007883d84c60 x18 0000000000000000 x19 0000000000003bfb
09-10 02:47:00.336 15460 15460 F DEBUG : x20 0000000000003bfb x21 00000000ffffffff x22 0000000000000000 x23 00000077e3bd3000
09-10 02:47:00.336 15460 15460 F DEBUG : x24 00000077c9b9ae50 x25 0000007ff2d90eb0 x26 00000077e39c7eb8 x27 00000077e39c80e8
09-10 02:47:00.336 15460 15460 F DEBUG : x28 000000788d5a6000 x29 0000007ff2d90d30
09-10 02:47:00.336 15460 15460 F DEBUG : lr 0000007883d2b788 sp 0000007ff2d90c90 pc 0000007883d2b7b4 pst 0000000000000000
09-10 02:47:00.336 15460 15460 F DEBUG : backtrace:
09-10 02:47:00.336 15460 15460 F DEBUG : #00 pc 000000000008d7b4 /apex/com.android.runtime/lib64/bionic/libc.so (abort+164) (BuildId: a43465f08784f70d77ac238baab9dee2)
09-10 02:47:00.336 15460 15460 F DEBUG : #01 pc 0000000000000108 <anonymous:786f330000>
thanks , I'll take a look on that