-
Notifications
You must be signed in to change notification settings - Fork 418
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Target process killed by injection #4
Comments
I have not tried Android 4.4.4 but I don't see a reason why this should the empty log file is strange. did you try the strmon example? the log Collin On 09/18/2014 06:47 PM, t0kt0ckus wrote:
Collin R. Mulliner [email protected] KeyID 0x5D89EEED |
I think I've eventually figured this out: it's now required to This is because the injected code runs in the As this issue causes a segmentation violation during the
As a side note, recent NDK toolchains use by default
This is easily solved by adding the following line to the module's Android.mk:
Again, I thank you for sharing your work. Regards, |
Fixed! Original issue fixed in cb1f71b If this doesn't address your problems, let us know. If it does, please close this bug out =) Fixing the logging properly is a bit tricky. I think we could open the log file at injection time (using the hijack program)... Thanks for your bug reports! |
Thank you for your quick answers. Commit Commit For this reason, I still think it's worth adding a I do not close the issue right now, just to let you think about whether to update the adbi/README or not. Thank you for your work and support. Regards, |
I'll leave this part for the ever busy @crmulliner. I think there's a formatting issue with the README too. Looks like not so good markdown. |
First, I'm very interested by this tool's possibilities, and would like to thank you for sharing your work.
I'm testing with a KitKat 4.4.4 device, kernel 3.4.42. Android NDK tools are the latest (r10, toolchains 4.6 and 4.8). GNU Make 3.81 et GCC 4.8.2.
I'm simply following the example included in the README.
Compilation and invocation go smooth:
But, the adbi_example.log file is empty, and remains empty for ever.
Reading logcat, it seems that the target process (in this case com.android.phone, as suggested) is killed as soon as injected code begins execution:
Could you confirm that this is supposed to work on KitKat 4.4.4, or should I look for some recent Android OS changes that may affect this software behavior ?
(I've already tried
setenforce 0
before launching the hijack tool, but result is identical)Am I missing something ?
Thank you for your help.
The text was updated successfully, but these errors were encountered: