12-12 04:46:29.041 29622 29622 i aee_aed : pid: 29618, tid: 29618, name: dex2oat >>> /system/bin/dex2oat <<<
12-12 04:46:29.041 29622 29622 i aee_aed : signal 6 (sigabrt), code -6 (si_tkill), fault addr --------
12-12 04:46:29.046 28604 28675 i camap_storage: no sd
12-12 04:46:29.046 29622 29622 i aee_aed : abort message: 'fortify: read: prevented write past end of buffer'
12-12 04:46:29.046 28604 28675 i storagemanagerex: current system default path = /storage/emulated/0
12-12 04:46:29.046 28604 28675 i camap_storage: updatesmountpoint(),smountpoint:/storage/emulated/0
12-12 04:46:29.046 29622 29622 i aee_aed : r0 00000000 r1 000073b2 r2 00000006 r3 00000008
12-12 04:46:29.046 28604 28675 i camap_storage: getfiledirectory(),smountpoint1:/storage/emulated/0
12-12 04:46:29.046 29622 29622 i aee_aed : r4 a865958c r5 00000006 r6 a8659534 r7 0000010c
12-12 04:46:29.046 29622 29622 i aee_aed : r8 00000001 r9 004ee310 sl a78c2899 fp ffffffff
12-12 04:46:29.046 29622 29622 i aee_aed : ip 00000000 sp bebf3718 lr a78ba4d7 pc a78bcd34 cpsr 200e0010
12-12 04:46:29.070 29622 29622 i aee_aed :
12-12 04:46:29.070 29622 29622 i aee_aed : backtrace:
12-12 04:46:29.071 29622 29622 i aee_aed : #00 pc 0004ad34 /system/lib/libc.so (tgkill+12)
12-12 04:46:29.071 29622 29622 i aee_aed : #01 pc 000484d3 /system/lib/libc.so (pthread_kill+34)
12-12 04:46:29.071 29622 29622 i aee_aed : #02 pc 0001d485 /system/lib/libc.so (raise+10)
12-12 04:46:29.071 29622 29622 i aee_aed : #03 pc 00018fc1 /system/lib/libc.so (__libc_android_abort+34)
12-12 04:46:29.071 29622 29622 i aee_aed : #04 pc 00017024 /system/lib/libc.so (abort+4)
12-12 04:46:29.071 29622 29622 i aee_aed : #05 pc 0001b47f /system/lib/libc.so (__libc_fatal+22)
12-12 04:46:29.071 29622 29622 i aee_aed : #06 pc 0001b45f /system/lib/libc.so (__fortify_chk_fail+26)
12-12 04:46:29.071 29622 29622 i aee_aed : #07 pc 000508bd /system/lib/libc.so (__read_chk+36)
12-12 04:46:29.071 29622 29622 i aee_aed : #08 pc 0003c923
12-12 04:46:29.124 1131 1356 w nativecrashlistener: couldn't find processrecord for pid 29618
12-12 04:46:29.125 29622 29622 i aee_aed : request.action: 0
12-12 04:46:29.125 29622 29622 v aee_aed : dashboard_record_update() : rec->module = /system/bin/dex2oat
'fortify: read: prevented write past end of buffer'
說明read 函式讀入buffer 的字元長度超多了buffer 大小。
「少定義,動態分」方法曾經是一種比較常用的程式設計技巧,但這個技術確實與fortify機制有了衝突。
d_fortify_source
android高階應用
android activity service broadcaster三大元件之間互相呼叫 service實時向activity傳遞資料案例 android service獲取當前位置 gps 基站 四十七 實現呼叫android手機的拍照功能 四十六 android中的bitmap 四十五 an...
Android應用入口
用eclipse開發android應用程式,在新建乙個工程時通常很多配置已經自動生成,故很多剛入門的程式設計師只知道程式的入口是activitythread,activity的入口是oncreate方法,而不太清楚程式到底是從哪個activity進去的。action節點中的android.inten...
Android 應用安全
2.簽名和金鑰 3.android許可權 xmlns android package com.aaptl.security android versioncode 1 android versionname 1.0 android name com.aaptl.security.read data ...