Native堆栈解析addr2line
来源:互联网 发布:淘宝上古着店推荐 编辑:程序博客网 时间:2024/06/06 05:40
命令:
aarch64-linux-android-addr2line.exe –f –C –e libAddress address
举例如下:
F:\tools\GAT_exe_v3.1552.5\GATv3.1552.5\gat-win32-x86_64-3\prebuilt\android-sdk\bin>aarch64-linux-android-addr2line.exe
-f -C -e F:\Share\home\system4\MTK_5.1\CPY803_8_Volte_5.1_Int\mydroid\out\target\product\CPY803_8\symbols\system\lib64\l
ibsurfaceflinger.so 000000000001e98c
android::DisplayDevice::swapBuffers(android::HWComposer&) const /home/system4/MTK_5.1/CPY803_8_Volte_5.1_Int/mydroid/frameworks/native/services/surfaceflinger/DisplayDevice.cpp:285
F:\tools\GAT_exe_v3.1552.5\GATv3.1552.5\gat-win32-x86_64-3\prebuilt\android-sdk\bin>aarch64-linux-android-addr2line.exe
-f -C -e F:\Share\home\system4\MTK_5.1\CPY803_8_Volte_5.1_Int\mydroid\out\target\product\CPY803_8\symbols\system\lib64\l
ibcutils.so 000000000000d5a4
__android_log_assert/home/system4/MTK_5.1/MTK_5.1_Volte_Dev/mydroid/system/core/liblog/logd_write_kern.c:438
Build fingerprint: 'Coolpad/Y803-8/Y803-8:5.1/LMY47D/5.1.033.P2.160602.Y803_8-LC:user/release-keys'
Revision: '0'
ABI: 'arm64'
pid: 10476, tid: 10476, name: surfaceflinger >>> /system/bin/surfaceflinger <<<
signal 5 (SIGTRAP), code 1 (TRAP_BRKPT), fault addr 0x3e8000028ec
Abort message: 'eglSwapBuffers(0x1, 0x7f956a0040) failed with 0x00003003'
ALOGE("eglSwapBuffers(%p, %p) failed with 0x%08x", mDisplay, mSurface, error);
backtrace:
#00 pc 000000000000d5a4 /system/lib64/libcutils.so (__android_log_assert+236)
#01 pc 000000000001e98c /system/lib64/libsurfaceflinger.so
#02 pc 0000000000030304 /system/lib64/libsurfaceflinger.so
#03 pc 000000000002eb14 /system/lib64/libsurfaceflinger.so
#04 pc 000000000002d12c /system/lib64/libsurfaceflinger.so
#05 pc 000000000002cde8 /system/lib64/libsurfaceflinger.so
#06 pc 000000000001b600 /system/lib64/libutils.so (_ZN7android6Looper9pollInnerEi+300)
#07 pc 000000000001b91c /system/lib64/libutils.so (_ZN7android6Looper8pollOnceEiPiS1_PPv+76)
#08 pc 00000000000291c0 /system/lib64/libsurfaceflinger.so
#09 pc 000000000002c868 /system/lib64/libsurfaceflinger.so (_ZN7android14SurfaceFlinger3runEv+20)
#10 pc 0000000000000f5c /system/bin/surfaceflinger
#11 pc 00000000000196cc /system/lib64/libc.so (__libc_init+96)
#12 pc 0000000000001048 /system/bin/surfaceflinger
aarch64-linux-android-addr2line.exe –f –C –e libAddress address
举例如下:
F:\tools\GAT_exe_v3.1552.5\GATv3.1552.5\gat-win32-x86_64-3\prebuilt\android-sdk\bin>aarch64-linux-android-addr2line.exe
-f -C -e F:\Share\home\system4\MTK_5.1\CPY803_8_Volte_5.1_Int\mydroid\out\target\product\CPY803_8\symbols\system\lib64\l
ibsurfaceflinger.so 000000000001e98c
android::DisplayDevice::swapBuffers(android::HWComposer&) const /home/system4/MTK_5.1/CPY803_8_Volte_5.1_Int/mydroid/frameworks/native/services/surfaceflinger/DisplayDevice.cpp:285
F:\tools\GAT_exe_v3.1552.5\GATv3.1552.5\gat-win32-x86_64-3\prebuilt\android-sdk\bin>aarch64-linux-android-addr2line.exe
-f -C -e F:\Share\home\system4\MTK_5.1\CPY803_8_Volte_5.1_Int\mydroid\out\target\product\CPY803_8\symbols\system\lib64\l
ibcutils.so 000000000000d5a4
__android_log_assert/home/system4/MTK_5.1/MTK_5.1_Volte_Dev/mydroid/system/core/liblog/logd_write_kern.c:438
Build fingerprint: 'Coolpad/Y803-8/Y803-8:5.1/LMY47D/5.1.033.P2.160602.Y803_8-LC:user/release-keys'
Revision: '0'
ABI: 'arm64'
pid: 10476, tid: 10476, name: surfaceflinger >>> /system/bin/surfaceflinger <<<
signal 5 (SIGTRAP), code 1 (TRAP_BRKPT), fault addr 0x3e8000028ec
Abort message: 'eglSwapBuffers(0x1, 0x7f956a0040) failed with 0x00003003'
ALOGE("eglSwapBuffers(%p, %p) failed with 0x%08x", mDisplay, mSurface, error);
backtrace:
#00 pc 000000000000d5a4 /system/lib64/libcutils.so (__android_log_assert+236)
#01 pc 000000000001e98c /system/lib64/libsurfaceflinger.so
#02 pc 0000000000030304 /system/lib64/libsurfaceflinger.so
#03 pc 000000000002eb14 /system/lib64/libsurfaceflinger.so
#04 pc 000000000002d12c /system/lib64/libsurfaceflinger.so
#05 pc 000000000002cde8 /system/lib64/libsurfaceflinger.so
#06 pc 000000000001b600 /system/lib64/libutils.so (_ZN7android6Looper9pollInnerEi+300)
#07 pc 000000000001b91c /system/lib64/libutils.so (_ZN7android6Looper8pollOnceEiPiS1_PPv+76)
#08 pc 00000000000291c0 /system/lib64/libsurfaceflinger.so
#09 pc 000000000002c868 /system/lib64/libsurfaceflinger.so (_ZN7android14SurfaceFlinger3runEv+20)
#10 pc 0000000000000f5c /system/bin/surfaceflinger
#11 pc 00000000000196cc /system/lib64/libc.so (__libc_init+96)
#12 pc 0000000000001048 /system/bin/surfaceflinger
0 0
- Native堆栈解析addr2line
- addr2line命令解析native backtrace
- addr2line解析栈信息
- shell解析addr2line文件
- addr2line解析墓碑工具
- addr2line
- addr2line
- Addr2line
- addr2line
- 使用arm-eabi-addr2line工具跟踪Android调用堆栈
- arm-eabi-addr2line 使用解析crash位置
- Android中使用addr2line来分析native信息
- Android Native Crash 堆栈转换
- 使用 Addr2line 将函数地址解析为函数名
- 用 Addr2line 将函数地址解析为函数名
- 用 Addr2line 将函数地址解析为函数名
- 使用 Addr2line 将函数地址解析为函数名
- 用 Addr2line 将函数地址解析为函数名
- Telephony之GsmCallTracker
- FZU
- (转)李嘉诚:成功源于花90%时间考虑失败
- mac下设置python2.7编码格式
- sizeof和strlen的区别
- Native堆栈解析addr2line
- 奇异值分解(SVD)原理及详解
- poj3360
- Android Studio常用的快捷键
- 计算机图形(Computer Graphics)经典书籍推荐(1)
- 面试经典动态规划问题
- JSON
- app更新版本下载文件,然后安装
- 算法训练 输出商品总价