Hey guys I have personal confirmation I am being targeted and that's why I got graphreneOS fully hardened with user profiles.
Here is the log:
type: crash
osVersion: google/shiba/shiba:14/AP1A.240505.005/2024060500:user/release-keys
uid: 1910171 (u:r:untrusted_app:s0:c171,c256,c531,c768)
cmdline: com.instagram.android:mqtt
processUptime: 404s
signal: 11 (SIGSEGV), code 8 (SEGV_MTEAERR)
threadName: am.android:mqtt
MTE: enabled
backtrace:
/apex/com.android.runtime/lib64/bionic/libc.so (__rt_sigprocmask+8, pc c2118)
/apex/com.android.runtime/lib64/bionic/libc.so (sigprocmask64+256, pc 78d40)
/apex/com.android.art/lib64/libsigchain.so (int art::__sigprocmask<sigset_t>(int, sigset_t const*, sigset_t*, int (*)(int, sigset_t const*, sigset_t*))+188, pc 662c)
/apex/com.android.art/lib64/libsigchain.so (sigprocmask64+124, pc 672c)
/apex/com.android.art/lib64/libsigchain.so (int art::__sigprocmask<sigset_t>(int, sigset_t const*, sigset_t*, int (*)(int, sigset_t const*, sigset_t*))+188, pc 662c)
/apex/com.android.art/lib64/libsigchain.so (sigprocmask+124, pc 653c)
/apex/com.android.runtime/lib64/bionic/libc.so (sigsetjmp+48, pc 636a0)
/data/user/19/com.instagram.android/lib-compressed/libdextricksmerged.so (pc 2cb2c)
[vdso] (pc 854)
/data/app/~~_8R9cKsatuz8fg8a5-tO2w==/com.instagram.android-FjPRXf1ACjo5Ue6YWneGdg==/lib/arm64/libsigmux.so (pc 12fc)
/data/app/~~_8R9cKsatuz8fg8a5-tO2w==/com.instagram.android-FjPRXf1ACjo5Ue6YWneGdg==/lib/arm64/libsigmux.so (sigmux_handle_signal+348, pc 1188)
/data/user/19/com.instagram.android/lib-compressed/libdextricksmerged.so (pc 2ca48)
[vdso] (pc 854)
/data/app/~~_8R9cKsatuz8fg8a5-tO2w==/com.instagram.android-FjPRXf1ACjo5Ue6YWneGdg==/lib/arm64/libsigmux.so (pc 12fc)
/data/app/~~_8R9cKsatuz8fg8a5-tO2w==/com.instagram.android-FjPRXf1ACjo5Ue6YWneGdg==/lib/arm64/libsigmux.so (sigmux_handle_signal+348, pc 1188)
/data/user/19/com.instagram.android/lib-compressed/libdextricksmerged.so (pc 2ca48)
[vdso] (pc 854)
/data/app/~~_8R9cKsatuz8fg8a5-tO2w==/com.instagram.android-FjPRXf1ACjo5Ue6YWneGdg==/lib/arm64/libsigmux.so (pc 12fc)
/data/app/~~_8R9cKsatuz8fg8a5-tO2w==/com.instagram.android-FjPRXf1ACjo5Ue6YWneGdg==/lib/arm64/libsigmux.so (sigmux_handle_signal+348, pc 1188)
/data/user/19/com.instagram.android/lib-compressed/libdextricksmerged.so (pc 2ca48)
[vdso] (pc 854)
/data/app/~~_8R9cKsatuz8fg8a5-tO2w==/com.instagram.android-FjPRXf1ACjo5Ue6YWneGdg==/lib/arm64/libsigmux.so (pc 12fc)
/data/app/~~_8R9cKsatuz8fg8a5-tO2w==/com.instagram.android-FjPRXf1ACjo5Ue6YWneGdg==/lib/arm64/libsigmux.so (sigmux_handle_signal+348, pc 1188)
/data/user/19/com.instagram.android/lib-compressed/libdextricksmerged.so (pc 2ca48)
[vdso] (pc 854)
/data/app/~~_8R9cKsatuz8fg8a5-tO2w==/com.instagram.android-FjPRXf1ACjo5Ue6YWneGdg==/lib/arm64/libsigmux.so (pc 12fc)
/data/app/~~_8R9cKsatuz8fg8a5-tO2w==/com.instagram.android-FjPRXf1ACjo5Ue6YWneGdg==/lib/arm64/libsigmux.so (sigmux_handle_signal+348, pc 1188)
/data/user/19/com.instagram.android/lib-compressed/libdextricksmerged.so (pc 2ca48)
[vdso] (pc 854)
/data/app/~~_8R9cKsatuz8fg8a5-tO2w==/com.instagram.android-FjPRXf1ACjo5Ue6YWneGdg==/lib/arm64/libsigmux.so (pc 12fc)
/data/app/~~_8R9cKsatuz8fg8a5-tO2w==/com.instagram.android-FjPRXf1ACjo5Ue6YWneGdg==/lib/arm64/libsigmux.so (sigmux_handle_signal+348, pc 1188)
/data/user/19/com.instagram.android/lib-compressed/libdextricksmerged.so (pc 2ca48)
[vdso] (pc 854)
/system/framework/arm64/boot.oat (java.io.FileDescriptor.<init>+16, pc 9d1e0)
/apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+612, pc 3e6774)
/apex/com.android.art/lib64/libart.so (art::JNI<false>::CallNonvirtualVoidMethodV(_JNIEnv*, _jobject*, _jclass*, _jmethodID*, std::__va_list)+828, pc 50f96c)
/apex/com.android.art/lib64/libart.so (art::JNI<false>::NewObjectV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+340, pc 50e854)
/apex/com.android.art/lib64/libart.so (art::JNI<false>::NewObject(_JNIEnv*, _jclass*, _jmethodID*, ...)+124, pc 50e69c)
/apex/com.android.art/lib64/libjavacore.so (Linux_open(_JNIEnv*, _jobject*, _jstring*, int, int)+340, pc 2d6d4)
/system/framework/arm64/boot-core-libart.oat (art_jni_trampoline+128, pc 134f0)
/system/framework/arm64/boot-core-libart.oat (libcore.io.BlockGuardOs.open+392, pc 49798)
/system/framework/arm64/boot-framework.oat (android.app.ActivityThread$AndroidOs.open+176, pc 225e30)
/system/framework/arm64/boot-core-libart.oat (libcore.io.IoBridge.open+104, pc 274d8)
/system/framework/arm64/boot.oat (java.io.FileOutputStream.<init>+464, pc 245e60)
/system/framework/arm64/boot.oat (java.io.FileOutputStream.<init>+48, pc 245c70)
/system/framework/arm64/boot-framework.oat (android.app.SharedPreferencesImpl.createFileOutputStream+80, pc 346e30)
/system/framework/arm64/boot-framework.oat (android.app.SharedPreferencesImpl.writeToFile+612, pc 347f24)
/system/framework/arm64/boot-framework.oat (android.app.SharedPreferencesImpl$1.run+120, pc 2577c8)
/system/framework/arm64/boot-framework.oat (android.app.QueuedWork.processPendingWork+436, pc 24de84)
/system/framework/arm64/boot-framework.oat (android.app.QueuedWork.waitToFinish+748, pc 24e3fc)
/system/framework/arm64/boot-framework.oat (android.app.ActivityThread.handleServiceArgs+904, pc 2fd638)
/system/framework/arm64/boot-framework.oat (android.app.ActivityThread$H.handleMessage+6452, pc 2f2534)
/system/framework/arm64/boot-framework.oat (android.os.Handler.dispatchMessage+152, pc 5360a8)
/system/framework/arm64/boot-framework.oat (android.os.Looper.loopOnce+980, pc 539114)
/system/framework/arm64/boot-framework.oat (android.os.Looper.loop+244, pc 538cc4)
/system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+1560, pc 301c98)
/apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640, pc 3e6a40)
/apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+708, pc 418c94)
/apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*) (.__uniq.165753521025965369065708152063621506277)+36, pc 4189b4)
/system/framework/arm64/boot.oat (art_jni_trampoline+120, pc 9ad28)
/system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116, pc 6f9bf4)
/apex/com.android.art/lib64/libart.so (nterp_helper+7636, pc 6f7214)
/system/framework/framework.jar (com.android.internal.os.ExecInit.main+88, pc 50f124)
/apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640, pc 3e6a40)
/apex/com.android.art/lib64/libart.so (art::JNI<false>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+484, pc 6b36b4)
/system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108, pc dbf4c)
/system/lib64/libandroid_runtime.so (android::AndroidRuntime::callMain(android::String8 const&, _jclass*, android::Vector<android::String8> const&)+340, pc e4a04)
/system/bin/app_process64 (android::AppRuntime::onStarted()+72, pc 29f8)
/system/framework/arm64/boot-framework.oat (art_jni_trampoline+108, pc 1ef27c)
/apex/com.android.art/lib64/libart.so (nterp_helper+152, pc 6f54d8)
/system/framework/framework.jar (com.android.internal.os.RuntimeInit.main+48, pc 51d940)
/apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640, pc 3e6a40)
/apex/com.android.art/lib64/libart.so (art::JNI<false>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+484, pc 6b36b4)
/system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+108, pc dbf4c)
/system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+844, pc e844c)
/system/bin/app_process64 (main+1232, pc 25b0)
/apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108, pc 5edcc)
```
`