-
Notifications
You must be signed in to change notification settings - Fork 279
Description
The following two information are what I need to fix the problem
Error with repacking kernel
[+] kernel image_size: 0x01cf0058
[+] kernel uefi header: false
[+] kernel load_offset: 0x00080000
[+] kernel kernel_size: 0x02307000
[+] kernel page_shift: 12
[+] new kernel image ...
[+] linux_banner 1: Linux version 4.14.355-openela-perf-g0d6f1d983df8 (build-user@build-host) (Android (12701618, +pgo, +bolt, +lto, +mlgo, based on r536225) clang version 19.0.1 (https://android.googlesource.com/toolchain/llvm-project b3a530ec6537146650e42be89f1089e9a3588460), LLD 19.0.1) #7 SMP PREEMPT Wed Jun 18 19:33:14 WIB 2025
[+] linux_banner offset: 0x109000f
[+] kernel version major: 4, minor: 14, patch: 255
[+] kallsyms_token_table offset: 0x01378700
[+] endian: little
[+] kallsyms_token_index offset: 0x01378b00
[+] find arm64 relocation kernel_va: 0xffffff8008082000
[+] find arm64 relocation table range: [0x0172f558, 0x01b20d70), count: 0x0002a101
[+] apply 0x0002a100 relocation entries
[+] kallsyms_markers range: [0x01377e00, 0x01378670), count: 0x0000010e
[?] find approximate kallsyms_offsets error
[+] approximate kallsyms_addresses range: [0x012136c0, 0x012981b0) count: 0x0001095e
[?] mismatch relo applied, subsequent operations may be undefined
[+] kallsyms_names offset: 0x0129a300
[-] kallsym.c:442/find_num_syms(); kallsyms_num_syms error
[+] find arm64 relocation kernel_va: 0xffffff8008082000, but try use: ffffff8008080000
[+] find arm64 relocation table range: [0x0172f558, 0x01b20d70), count: 0x0002a101
[+] apply 0x0002a100 relocation entries
[+] kallsyms_markers range: [0x01377e00, 0x01378670), count: 0x0000010e
[?] find approximate kallsyms_offsets error
[+] approximate kallsyms_addresses range: [0x01213700, 0x0129a1b0) count: 0x00010d56
[?] mismatch relo applied, subsequent operations may be undefined
[+] kallsyms_names offset: 0x0129a300
[+] kallsyms_num_syms offset: 0x0129a200, value: 0x00010d56
[?] no linux_banner? maybe CONFIG_KALLSYMS_ALL=n?
[+] names table vector index: 0x00000012, pid_vnr index: 0x000005a0
[+] pid_vnr verfied succeed, sp, insn: 0x910003fd
[+] vectors offset: 0x01079800
[+] pid_vnr offset: 0x0167384c
[+] kallsyms_addresses offset: 0x01295170
[+] layout kimg: 0x0,0x1cf0058, kpimg: 0x1cf1000,0x2c110, extra: 0x1d1d110,0x80, end: 0x1d1d190, start: 0x2307000
[+] kpimg version: b02
[+] kpimg compile time: 01:05:21 Feb 12 2025
[+] kpimg config: android, release
[+] tcp_init_sock: type: T, offset: 0x5a6142fb
[+] map_start: 0x5a614300, max_size: 0x800
[+] kallsyms_lookup_name: type: T, offset: 0x7051d70d
[+] printk: type: T, offset: 0x76a9c9d2
[+] memblock_reserve: type: T, offset: 0x6806be29
[+] memblock_free: type: T, offset: 0xe0d4db36
[-] symbol.c:47/get_symbol_offset_exit(); no symbol memblock_free
- The real symbol informations corresponding to your boot.img or kernel
It can be obtained through the following two commands under root.
echo 1 > /proc/sys/kernel/kptr_restrict
cat /proc/kallsyms