使用arm-eabi-addr2line工具跟蹤Android調用堆棧
做者:liangshengyang
轉自:http://www.linuxidc.com/Linux/2011-01/31803.htm
在一般的C/C++代碼中,能夠經過響應對內存操做不當引發的Segmentation Fault錯誤即信號SIGSEGV(11)作出響應處理。只要在程序中設置SIGSEGV的handler中,調用libc的backtrace,打出對應的堆棧信息,很快就能找到問題所在。但在Android中,bionic並不提供相似功能,並且log信息是走的loger,經過logcat才能夠看到。可是android也會輸出log信息,象下面這樣:
02-08 10:36:32.076: INFO/DEBUG(1261): pid: 1959, tid: 1959 >>> Android.radio <<<
02-08 10:36:32.076: INFO/DEBUG(1261): signal 11 (SIGSEGV), fault addr 00198080
02-08 10:36:32.076: INFO/DEBUG(1261): r0 00198080 r1 81116dac r2 ffffffea r3 00000000
02-08 10:36:32.086: INFO/DEBUG(1261): r4 8111a9f0 r5 0000000a r6 00000888 r7 0000000a
02-08 10:36:32.086: INFO/DEBUG(1261): r8 735f6d66 r9 525f6474 10 4104bcd8 fp 00000000
02-08 10:36:32.086: INFO/DEBUG(1261): ip a0000000 sp bec1a300 lr 81112561 pc 81109124 cpsr 80010010
02-08 10:36:32.306: INFO/DEBUG(1261): #00 pc 00009124 /system/lib/libfmradio_jni.so
02-08 10:36:32.306: INFO/DEBUG(1261): #01 pc 0001255c /system/lib/libfmradio_jni.so
02-08 10:36:32.306: INFO/DEBUG(1261): #02 pc 0000c93e /system/lib/libfmradio_jni.so
02-08 10:36:32.316: INFO/DEBUG(1261): #03 pc 0000ae14 /system/lib/libfmradio_jni.so
02-08 10:36:32.316: INFO/DEBUG(1261): #04 pc 00008a72 /system/lib/libfmradio_jni.so
02-08 10:36:32.316: INFO/DEBUG(1261): #05 pc 00006c22 /system/lib/libfmradio_jni.so
02-08 10:36:32.326: INFO/DEBUG(1261): #06 pc 00004d92 /system/lib/libfmradio_jni.so
02-08 10:36:32.326: INFO/DEBUG(1261): #07 pc 0000e434 /system/lib/libdvm.so
一般編譯Android代碼時,出於size的考慮,剔除了符號信息。但咱們能夠使用編譯時生成的二進制文件(轉註:含有符號信息的文件,一般位於./out/target/product/[PROJECT]/symbols/system/lib/目錄),獲取其符號信息,從而獲得調用堆棧:
$ ./prebuilt/linux-x86/toolchain/arm-eabi-4.4.3/bin/arm-eabi-addr2line -f -e ./out/target/product/[PROJECT]/symbols/system/lib/libfmradio_jni.so 0000960c 000129ec 0000cdce 0000b2a4 00009496 00008258 000054f6
non_congruent
bionic/libc/arch-arm/bionic/memcpy.S:229
__sfvwrite
bionic/libc/stdio/fvwrite.c:151
__sprint
bionic/libc/stdio/vfprintf.c:71
printf
bionic/libc/stdio/printf.c:44
fm_std_Power
frameworks/base/fmradio/jni/../../../../external/.../fmradio/fmapi/fm_std_api.c:144
_Z11fm_SwitchOnv
frameworks/base/fmradio/jni/fm_functions.cpp:95
radio_SwitchOn
frameworks/base/fmradio/jni/native.cpp:41
yang@Ubuntu$ c++filt _Z11fm_SwitchOnv
fm_SwitchOn()
python
經過這種方式,便可獲得調用堆棧信息,找出問題所在。linux
-------------------------------------------------------------------------------------------------------------------
方法二
-------------------------------------------------------------------------------------------------------------------
cat logcat_3.log | ndk-stack -sym ~/[SOURCE-DIR]/out/target/product/[PROJECT]/symbols/system/lib/
-------------------------------------------------------------------------------------------------------------------
方法三
-------------------------------------------------------------------------------------------------------------------
轉自:http://www.cppblog.com/fwxjj/archive/2011/09/30/157242.aspx
google提供了一個python腳本,能夠從 http://code.google.com/p/android-ndk-stacktrace-analyzer/ 下載這個python腳本,而後使用
adb logcat -d > logfile 導出 crash 的log,
使用 arm-eabi-objdump (位於build/prebuilt/linux-x86/arm-eabi-4.2.1/bin下面)把so或exe轉換成彙編代碼,如:
arm-eabi-objdump -S mylib.so > mylib.asm,
而後使用腳本
python parse_stack.py <asm-file> <logcat-file>
android