It happens every time.

On Jan 21, 2:35 pm, fadden <[email protected]> wrote:
> On Jan 21, 10:18 am, Robert Green <[email protected]> wrote:
>
> > Is there any way to track down the function segfaulting using those
> > memory addresses?
>
> I have half an answer, which is more than I used to have. :-)
>
> build/tools/adbs is a front-end shell script that watches for native
> crashes in logcat and converts the addresses to symbols for you.  This
> only works if you have copies of the libraries with symbols, so it's
> not much help with the SDK.  But if you're building the full Android
> source, you'll have what you need.  And it's a fully-functional
> example of how addr2line is applied.
>
>  http://android.git.kernel.org/?p=platform/build.git;a=blob_plain;f=to...
>
> I can get symbols for DRC83 kila-user, but it doesn't say much:
>
> Stack Trace:
>   RELADDR   FUNCTION            FILE:LINE
>   00004408  android_atomic_dec  /usr/local/google/buildbot/
> repo_clients/git_donut-release/system/core/libcutils/atomic-android-
> arm.S:115
>   v------>  ??                  ??:0
>   ad32d6a3  (unknown)           ??:0
>
> Unfortunately the atomic ops, written in assembly, lack the assembler
> pseudo-ops required to appease the stack unroller.  As a result it
> can't figure out who the next caller in the stack is.  (This will be
> corrected in a future release.)  It's crashing at a near-null address
> in the atomic ops, suggesting somebody is passing a null pointer
> around when they shouldn't be.
>
> How easy is this to replicate?
-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to