rofl0r

Results 896 comments of rofl0r

ok, and regular binaries, or systemwide-installed dylibs ?

*sigh*. i meant you run it on a .dylib that's provided by your OS itself. for example /lib/libc.dylib, libssl.dylib or whatever the equivalent in macos. and a regular binary, which...

> magic cputype cpusubtype caps filetype ncmds sizeofcmds flags > 0xfeedfacf 16777228 2 0x80 6 17 1728 0x02100085 that's interesting. can you find out which compiler flags gets us cpusubtype...

the output of the other arm64e binaries you showed have flags = 0x02100085. can you figure out what they mean?

well, what kind of output do you get ? i already mentioned a couple tips for debugging this in the other issue report; maybe you should try that and report...

according to your own log (when you used 32 bit version) it worked: > [2021-07-21 16:15:51] Downloading manifest: https://cdn.akamai.steamstatic.com/client/steam_client_ubuntu12 > Installing breakpad exception handler for appid(steam)/version(1626461631) > [proxychains] Strict chain...

the output is in the file called "log".

28543 is the (only) one doing a/the socket call ? if so check whether /home/pulsar/.local/share/Steam/ubuntu12_32/steam is a shell script, and if so add LD_PRELOAD=/path/to/32bit/libproxychains4.so somewhere close to the top

> LD_PRELOAD=/usr/lib32/libproxychains4.so /home/pulsar/.local/share/Steam/ubuntu12_32/steam that's not what i said. i said: > check whether /home/pulsar/.local/share/Steam/ubuntu12_32/steam is a shell script, and if so add LD_PRELOAD=/path/to/32bit/libproxychains4.so somewhere close to the top that means...

so which process is starting it (it's the process that owned or created that pid, just find previous execve for that pid, or if there's none a fork or clone...