I got a memory tag detection from an attack on whatsapp. My question is: it was just detected or the memory tagging was effective on blocking lhe hack attempt? The log is below:
type: crash
osVersion: google/komodo/komodo:15/BP1A.250505.005/2025062700:user/release-keys
userType: full.secondary
package: com.whatsapp:251880000, targetSdk 35
process: com.whatsapp
installer: com.android.vending
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0000000000001013
backtrace:
NOTE: Function names and BuildId information is missing for some frames due
NOTE: to unreadable libraries. For unwinds of apps, only shared libraries
NOTE: found under the lib/ directory are readable.
NOTE: On this device, run setenforce 0 to make the libraries readable.
NOTE: Unreadable libraries:
NOTE: /data/user/15/com.whatsapp/files/decompressed/libs.spo/libessential.so
#00 pc 0000000000023078 /data/user/15/com.whatsapp/files/decompressed/libs.spo/libessential.so
#01 pc 0000000000022b18 /data/user/15/com.whatsapp/files/decompressed/libs.spo/libessential.so
#02 pc 0000000000021e8c /data/user/15/com.whatsapp/files/decompressed/libs.spo/libessential.so
#03 pc 00000000000218b8 /data/user/15/com.whatsapp/files/decompressed/libs.spo/libessential.so
#04 pc 000000000000f200 /data/user/15/com.whatsapp/files/decompressed/libs.spo/libessential.so
#05 pc 0000000000394f00 /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+144) (BuildId: 74229eb3e4846c28b10d56ebbabe2198)
#06 pc 00000000034f2184 /data/app/xn3IVbKI7lISEz4wrs-gjg==/com.whatsapp-Err5Qh95jfGeXTEXYSi2A==/oat/arm64/base.odex (X.10R.A00+1156)
#07 pc 0000000002bb5364 /data/app/xn3IVbKI7lISEz4wrs-gjg==/com.whatsapp-Err5Qh95jfGeXTEXYSi2A==/oat/arm64/base.odex (X.00n.run+52)
#08 pc 00000000034f08f0 /data/app/xn3IVbKI7lISEz4wrs-gjg==/com.whatsapp-Err5Qh95jfGeXTEXYSi2A==/oat/arm64/base.odex (X.10Q.A01+1760)
#09 pc 00000000034f0f70 /data/app/xn3IVbKI7lISEz4wrs-gjg==/com.whatsapp-Err5Qh95jfGeXTEXYSi2A==/oat/arm64/base.odex (X.10Q.A03+48)
#10 pc 0000000002baa334 /data/app/xn3IVbKI7lISEz4wrs-gjg==/com.whatsapp-Err5Qh95jfGeXTEXYSi2A==/oat/arm64/base.odex (com.whatsapp.AbstractAppShellDelegate.installAnrDetector+452)
#11 pc 0000000002bae81c /data/app/xn3IVbKI7lISEz4wrs-gjg==/com.whatsapp-Err5Qh95jfGeXTEXYSi2A==/oat/arm64/base.odex (com.whatsapp.AbstractAppShellDelegate.onCreate+3196)
#12 pc 0000000002ba80f4 /data/app/xn3IVbKI7lISEz4wrs-gjg==/com.whatsapp-Err5Qh95jfGeXTEXYSi2A==/oat/arm64/base.odex (X.006.onCreateWithHiltReady+756)
#13 pc 0000000002ba8ed8 /data/app/xn3IVbKI7lISEz4wrs-gjg==/com.whatsapp-Err5Qh95jfGeXTEXYSi2A==/oat/arm64/base.odex (X.009.onCreate+312)
#14 pc 00000000002ade30 /system/framework/arm64/boot-framework.oat (android.app.Instrumentation.callApplicationOnCreate+48) (BuildId: 7c976f836a4f99302e38df49f289b32b55f4c9c2)
#15 pc 000000000022ea28 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.handleBindApplication+5256) (BuildId: 7c976f836a4f99302e38df49f289b32b55f4c9c2)
#16 pc 000000000022802c /system/framework/arm64/boot-framework.oat (android.app.ActivityThread$H.handleMessage+8220) (BuildId: 7c976f836a4f99302e38df49f289b32b55f4c9c2)
#17 pc 00000000004b8528 /system/framework/arm64/boot-framework.oat (android.os.Handler.dispatchMessage+152) (BuildId: 7c976f836a4f99302e38df49f289b32b55f4c9c2)
#18 pc 00000000004ed2a0 /system/framework/arm64/boot-framework.oat (android.os.Looper.loopOnce+976) (BuildId: 7c976f836a4f99302e38df49f289b32b55f4c9c2)
#19 pc 00000000004ece54 /system/framework/arm64/boot-framework.oat (android.os.Looper.loop+244) (BuildId: 7c976f836a4f99302e38df49f289b32b55f4c9c2)
#20 pc 00000000002377bc /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+1564) (BuildId: 7c976f836a4f99302e38df49f289b32b55f4c9c2)
#21 pc 000000000037de60 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 74229eb3e4846c28b10d56ebbabe2198)
#22 pc 000000000036c77c /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jobject, jobject, unsigned long)+892) (BuildId: 74229eb3e4846c28b10d56ebbabe2198)
#23 pc 00000000006c2504 /apex/com.android.art/lib64/libart.so (art::Method_invoke(JNIEnv, _jobject, _jobject, jobjectArray) (.uniq.165753521025965369065708152063621506277)+36) (BuildId: 74229eb3e4846c28b10d56ebbabe2198)
#24 pc 00000000002ce1a4 /system/framework/arm64/boot.oat (art_jni_trampoline+116) (BuildId: aa30d0107f68521d3d1b9c43ed9360fbd3a4498f)
#25 pc 000000000079d714 /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+116) (BuildId: 7c976f836a4f99302e38df49f289b32b55f4c9c2)
#26 pc 00000000007c9d44 /apex/com.android.art/lib64/libart.so (nterp_helper+7636) (BuildId: 74229eb3e4846c28b10d56ebbabe2198)
#27 pc 0000000000238ed0 /system/framework/framework.jar (com.android.internal.os.ExecInit.main+88)
#28 pc 000000000037de60 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 74229eb3e4846c28b10d56ebbabe2198)
#29 pc 000000000037c9a0 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<jmethodID>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, jmethodID, std::va_list)+784) (BuildId: 74229eb3e4846c28b10d56ebbabe2198)
#30 pc 0000000000740640 /apex/com.android.art/lib64/libart.so (art::JNI<false>::CallStaticVoidMethodV(JNIEnv, _jclass, jmethodID, std::va_list)+144) (BuildId: 74229eb3e4846c28b10d56ebbabe2198)
#31 pc 00000000000fb48c /system/lib64/libandroid_runtime.so (JNIEnv::CallStaticVoidMethod(_jclass, _jmethodID, ...)+108) (BuildId: 391f9b511678b8184389350e2a7a4a5c)
#32 pc 000000000011bda4 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::callMain(android::String8 const&, jclass, android::Vector<android::String8> const&)+340) (BuildId: 391f9b511678b8184389350e2a7a4a5c)
#33 pc 00000000000049e8 /system/bin/app_process64 (android::AppRuntime::onStarted()+72) (BuildId: 7e4d389e6aa317d3112b88b81bcf0451)
#34 pc 00000000007e4ed8 /system/framework/arm64/boot-framework.oat (art_jni_trampoline+104) (BuildId: 7c976f836a4f99302e38df49f289b32b55f4c9c2)
#35 pc 00000000007c8008 /apex/com.android.art/lib64/libart.so (nterp_helper+152) (BuildId: 74229eb3e4846c28b10d56ebbabe2198)
#36 pc 00000000002498f8 /system/framework/framework.jar (com.android.internal.os.RuntimeInit.main+48)
#37 pc 000000000037de60 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: 74229eb3e4846c28b10d56ebbabe2198)
#38 pc 000000000037c9a0 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<jmethodID>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, jmethodID, std::va_list)+784) (BuildId: 74229eb3e4846c28b10d56ebbabe2198)
#39 pc 0000000000740640 /apex/com.android.art/lib64/libart.so (art::JNI<false>::CallStaticVoidMethodV(JNIEnv, _jclass, jmethodID, std::va_list)+144) (BuildId: 74229eb3e4846c28b10d56ebbabe2198)
#40 pc 00000000000fb48c /system/lib64/libandroid_runtime.so (JNIEnv::CallStaticVoidMethod(_jclass, _jmethodID, ...)+108) (BuildId: 391f9b511678b8184389350e2a7a4a5c)
#41 pc 000000000012077c /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+908) (BuildId: 391f9b511678b8184389350e2a7a4a5c)
#42 pc 00000000000045b0 /system/bin/app_process64 (main+1232) (BuildId: 7e4d389e6aa317d3112b88b81bcf0451)
#43 pc 0000000000060688 /apex/com.android.runtime/lib64/bionic/libc.so (libc_init+120) (BuildId: 76b3eba33cd561e774657995ea2278a4)