Hi,
Here my application "com.android.hello" calls a core library
"libvt.so" through JNI call. There is a segmentation fault in
"libvt.so". When executed I get the following log
/////////////////////////
************************************//////////////////////////////////////
01-01 00:01:48.440: INFO/ActivityManager(1645): Starting activity:
Intent { action=android.intent.action.MAIN categories=
{android.intent.category.LAUNCHER} flags=0x10200000 comp=
{com.android.hello/com.android.hello.HelloAndroid} }
01-01 00:01:48.860: INFO/ActivityManager(1645): Start proc
com.android.hello for activity com.android.hello/.HelloAndroid:
pid=1948 uid=10036 gids={}
01-01 00:01:48.900: INFO/jdwp(1948): received file descriptor 10 from
ADB
01-01 00:01:49.285: INFO/System.out(1948): Hello World 1.4
01-01 00:01:49.290: INFO/System.out(1948): For Vt stack Interface
class############true#########false######
01-01 00:01:49.300: INFO/System.out(1948): for VHello
class############0#########10######
01-01 00:01:49.430: INFO/ActivityManager(1645): Displayed activity
com.android.hello/.HelloAndroid: 981 ms
01-01 00:01:49.455: INFO/ARMAssembler(1645): generated
scanline__00000077:03545404_00000A04_00000000 [ 29 ipp] (51 ins) at
[0x1e9538:0x1e9604] in 0 ns
01-01 00:02:53.915: WARN/KeyCharacterMap(1948): Can't open keycharmap
file
01-01 00:02:53.915: WARN/KeyCharacterMap(1948): Error loading
keycharmap file '/system/usr/keychars/sec_keypad.kcm.bin'.
hw.keyboards.65537.devname='sec_keypad'
01-01 00:02:53.915: WARN/KeyCharacterMap(1948): Using default keymap: /
system/usr/keychars/qwerty.kcm.bin
01-01 00:02:57.615: INFO/ActivityManager(1645): Starting activity:
Intent { action=android.intent.action.MAIN categories=
{android.intent.category.LAUNCHER} flags=0x10200000 comp=
{com.android.hello/com.android.hello.HelloAndroid} }
01-01 00:02:57.655: INFO/System.out(1948): Hello World 1.4
01-01 00:02:57.675: INFO/DEBUG(1600): *** *** *** *** *** *** *** ***
*** *** *** *** *** *** *** ***
01-01 00:02:57.675: INFO/DEBUG(1600): Build fingerprint: 'sec/
sec_bigbang/bigbang/:1.0/TC3/eng.user.20090209.201442:eng/test-keys'
01-01 00:02:57.675: INFO/DEBUG(1600): pid: 1948, tid: 1948 >>>
com.android.hello <<<
01-01 00:02:57.675: INFO/DEBUG(1600): signal 11 (SIGSEGV), fault addr
0000079c
01-01 00:02:57.675: INFO/DEBUG(1600): r0 00000000 r1 0000000b r2
c2f81c1f r3 9fd014c5
01-01 00:02:57.675: INFO/DEBUG(1600): r4 0000000b r5 00000004 r6
ab800689 r7 00000025
01-01 00:02:57.675: INFO/DEBUG(1600): r8 bef2e608 r9 4104aca4 10
4104ac90 fp 00000000
01-01 00:02:57.675: INFO/DEBUG(1600): ip 9fd020d0 sp bef2e5b0 lr
afe1083b pc afe0d24c cpsr 00000010
01-01 00:02:57.720: INFO/DEBUG(1600): #00 pc afe0d24c /
system/lib/libc.so
01-01 00:02:57.720: INFO/DEBUG(1600): #01 pc afe10838 /
system/lib/libc.so
01-01 00:02:57.720: INFO/DEBUG(1600): #02 pc 9fd014c8 /
system/lib/libvt.so
01-01 00:02:57.725: INFO/DEBUG(1600): #03 pc 9fd014f6 /
system/lib/libvt.so
01-01 00:02:57.725: INFO/DEBUG(1600): #04 pc 9fd01522 /
system/lib/libvt.so
01-01 00:02:57.725: INFO/DEBUG(1600): #05 pc 9fd0154e /
system/lib/libvt.so
01-01 00:02:57.735: INFO/DEBUG(1600): #06 pc 9fd0157a /
system/lib/libvt.so
01-01 00:02:57.735: INFO/DEBUG(1600): #07 pc 9fd015a6 /
system/lib/libvt.so
01-01 00:02:57.735: INFO/DEBUG(1600): #08 pc ab80069e /
system/lib/libvideo_tel.so
01-01 00:02:57.740: INFO/DEBUG(1600): #09 pc ad00d9f4 /
system/lib/libdvm.so
01-01 00:02:57.740: INFO/DEBUG(1600): #10 pc ad04123e /
system/lib/libdvm.so
01-01 00:02:57.750: INFO/DEBUG(1600): #11 pc ad012748 /
system/lib/libdvm.so
01-01 00:02:57.750: INFO/DEBUG(1600): #12 pc ad02a92c /
system/lib/libdvm.so
01-01 00:02:57.755: INFO/DEBUG(1600): #13 pc ad0169d0 /
system/lib/libdvm.so
01-01 00:02:57.755: INFO/DEBUG(1600): #14 pc ad0520c6 /
system/lib/libdvm.so
01-01 00:02:57.755: INFO/DEBUG(1600): #15 pc ad03ccbc /
system/lib/libdvm.so
01-01 00:02:57.765: INFO/DEBUG(1600): #16 pc ad012748 /
system/lib/libdvm.so
01-01 00:02:57.765: INFO/DEBUG(1600): #17 pc ad02a92c /
system/lib/libdvm.so
01-01 00:02:57.765: INFO/DEBUG(1600): #18 pc ad0169d0 /
system/lib/libdvm.so
01-01 00:02:57.770: INFO/DEBUG(1600): #19 pc ad051f40 /
system/lib/libdvm.so
01-01 00:02:57.770: INFO/DEBUG(1600): #20 pc ad03f8aa /
system/lib/libdvm.so
01-01 00:02:57.780: INFO/DEBUG(1600): #21 pc ad030b96 /
system/lib/libdvm.so
01-01 00:02:57.785: INFO/DEBUG(1600): #22 pc ad326500 /
system/lib/libandroid_runtime.so
01-01 00:02:57.785: INFO/DEBUG(1600): #23 pc ad326f90 /
system/lib/libandroid_runtime.so
01-01 00:02:57.785: INFO/DEBUG(1600): #24 pc 00008bf2 /
system/bin/app_process
01-01 00:02:57.790: INFO/DEBUG(1600): #25 pc afe1e1a2 /
system/lib/libc.so
01-01 00:02:57.795: INFO/DEBUG(1600): #26 pc afe0b060 /
system/lib/libc.so
01-01 00:02:57.800: INFO/DEBUG(1600): #27 pc b0000d70 /
system/bin/linker
01-01 00:02:57.800: INFO/DEBUG(1600): stack:
01-01 00:02:57.800: INFO/DEBUG(1600): bef2e570 bef2e604 [stack]
01-01 00:02:57.810: INFO/DEBUG(1600): bef2e574 afe0a333 /system/
lib/libc.so
01-01 00:02:57.810: INFO/DEBUG(1600): bef2e578 ad07edf8
01-01 00:02:57.810: INFO/DEBUG(1600): bef2e57c 4349d9d8
01-01 00:02:57.810: INFO/DEBUG(1600): bef2e580 434a3c28
01-01 00:02:57.810: INFO/DEBUG(1600): bef2e584 434a3c28
01-01 00:02:57.815: INFO/DEBUG(1600): bef2e588 00000060
01-01 00:02:57.815: INFO/DEBUG(1600): bef2e58c ad048e9f /system/
lib/libdvm.so
01-01 00:02:57.815: INFO/DEBUG(1600): bef2e590 00000320
01-01 00:02:57.815: INFO/DEBUG(1600): bef2e594 400092c0
01-01 00:02:57.815: INFO/DEBUG(1600): bef2e598 434a3c28
01-01 00:02:57.830: INFO/DEBUG(1600): bef2e59c ad07edf8
01-01 00:02:57.830: INFO/DEBUG(1600): bef2e5a0 00000320
01-01 00:02:57.830: INFO/DEBUG(1600): bef2e5a4 ad048f91 /system/
lib/libdvm.so
01-01 00:02:57.830: INFO/DEBUG(1600): bef2e5a8 ad07edf8
01-01 00:02:57.835: INFO/DEBUG(1600): bef2e5ac c2f81c1f
01-01 00:02:57.835: INFO/DEBUG(1600): #00 bef2e5b0 0000000b
01-01 00:02:57.835: INFO/DEBUG(1600): bef2e5b4 00000004
01-01 00:02:57.835: INFO/DEBUG(1600): bef2e5b8 ab800689 /system/
lib/libvideo_tel.so
01-01 00:02:57.835: INFO/DEBUG(1600): bef2e5bc 4104acac
01-01 00:02:57.845: INFO/DEBUG(1600): bef2e5c0 9fd020d0
01-01 00:02:57.845: INFO/DEBUG(1600): bef2e5c4 afe1083b /system/
lib/libc.so
01-01 00:02:57.845: INFO/DEBUG(1600): #01 bef2e5c8 bef2e628 [stack]
01-01 00:02:57.845: INFO/DEBUG(1600): bef2e5cc 9fd014cb /system/
lib/libvt.so
01-01 00:02:58.125: INFO/System.out(1948): For Vt stack Interface
class############true#########false######
01-01 00:02:58.125: INFO/System.out(1948): for VHello
class############0#########10######
01-01 00:02:58.185: INFO/ActivityManager(1645): Displayed activity
com.android.hello/.HelloAndroid: 570 ms
/////////////////////////
************************************//////////////////////////////////////
What I see is some Hex value followed by a library name.
#00 pc afe0d24c /system/lib/libc.so
Also there is a Stack section
01-01 00:02:57.800: INFO/DEBUG(1600): stack:
01-01 00:02:57.800: INFO/DEBUG(1600): bef2e570 bef2e604 [stack]
01-01 00:02:57.810: INFO/DEBUG(1600): bef2e574 afe0a333 /system/
lib/libc.so
This too gives similar information.
I am looking for little more informations rather than Hex values.
Like the backtrace feature where the stack hex values is mapped to the
function names and function names are visible.
Please provide information how to see the function names in stack
rather than Hex values.
Is ther any compiler options needs to be updated?
Any makefile to be updated to enable backtrace?
Thanks in advance...
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en
-~----------~----~----~----~------~----~------~--~---