逆向一个app的so文件,HEX工具修改B.EQ为B.NE之后,IDA查看程序结构没有问题,但是运行时报内存溢出,该怎么解决,求救?
08-23 16:35:25.856 14323 14323 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
08-23 16:35:25.856 14323 14323 F DEBUG : Build fingerprint: 'Xiaomi/sagit/sagit:8.0.0/OPR1.170623.027/V10.3.1.0.OCACNXM:user/release-keys'
08-23 16:35:25.856 14323 14323 F DEBUG : Revision: '0'
08-23 16:35:25.856 14323 14323 F DEBUG : ABI: 'arm64'
08-23 16:35:25.856 14323 14323 F DEBUG : pid: 14282, tid: 14312, name: Thread-3 >>>com.****.***** <<<
08-23 16:35:25.856 14323 14323 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
08-23 16:35:25.858 14323 14323 F DEBUG : Abort message: 'stack corruption detected (-fstack-protector)'
08-23 16:35:25.858 14323 14323 F DEBUG : x0 0000000000000000 x1 00000000000037e8 x2 0000000000000006 x3 0000000000000008
08-23 16:35:25.858 14323 14323 F DEBUG : x4 0000000000000000 x5 0000000000000000 x6 0000000000000000 x7 0000000000000030
08-23 16:35:25.858 14323 14323 F DEBUG : x8 0000000000000083 x9 a70bd4bda7cb7141 x10 0000000000000000 x11 0000000000000001
08-23 16:35:25.858 14323 14323 F DEBUG : x12 ffffffffffffffff x13 0000000000000001 x14 0030c4faa14ce616 x15 00008f611e69bfc1
08-23 16:35:25.858 14323 14323 F DEBUG : x16 000000705c19a2e8 x17 000000705c13bd2c x18 00000000704552f0 x19 00000000000037ca
08-23 16:35:25.858 14323 14323 F DEBUG : x20 00000000000037e8 x21 000000703f2f92cc x22 000000704e2d7940 x23 0000000000000051
08-23 16:35:25.858 14323 14323 F DEBUG : x24 0000000000000000 x25 00000070408bb898 x26 0000000000000000 x27 0000000000000006
08-23 16:35:25.858 14323 14323 F DEBUG : x28 0000000000000004 x29 000000703f2f9010 x30 000000705c0efe54
08-23 16:35:25.858 14323 14323 F DEBUG : sp 000000703f2f8fd0 pc 000000705c13bd34 pstate 0000000060000000
08-23 16:35:25.859 14323 14323 F DEBUG :
08-23 16:35:25.859 14323 14323 F DEBUG : backtrace:
08-23 16:35:25.859 14323 14323 F DEBUG : #00 pc 0000000000069d34 /system/lib64/libc.so (tgkill+8)
08-23 16:35:25.859 14323 14323 F DEBUG : #01 pc 000000000001de50 /system/lib64/libc.so (abort+88)
08-23 16:35:25.859 14323 14323 F DEBUG : #02 pc 0000000000025644 /system/lib64/libc.so (__libc_fatal+116)
08-23 16:35:25.859 14323 14323 F DEBUG : #03 pc 0000000000068bb8 /system/lib64/libc.so (__stack_chk_fail+16)
08-23 16:35:25.859 14323 14323 F DEBUG : #04 pc 000000000003f0fc /data/app/
com.****.*****
-EWVuNHA-u41f-u55-etdbA==/lib/arm64
libPOJava.so
.so
08-23 16:35:25.859 14323 14323 F DEBUG : #05 pc 000000000003f140 /data/app/
com.****.*****
-EWVuNHA-u41f-u55-etdbA==/lib/arm64/libPOJava.so (Java_
com.****.*****
Wrapper_interna
lPLibInit+64)
08-23 16:35:25.859 14323 14323 F DEBUG : #06 pc 000000000006975c /data/app/
com.****.*****
-EWVuNHA-u41f-u55-etdbA==/oat/arm64/base.odex (offset 0x1b000)