Android tombstone
当Android发生crash时,可以到/data/tombstones下面找到相关的文件,比如想查询第一个tombstone时,
mahakala:/data/tombstones # head -50 tombstone_00 *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** Build fingerprint: 'generic/mahakala_hdp/mahakala:15/AP3A.240905.015.A2/eng.spikel.00000000.000000:userdebug/test-keys' Revision: '0' ABI: 'arm64' Timestamp: 2000-01-01 00:11:58.700341556+0000 Process uptime: 42s Cmdline: com.microsoft.emmx pid: 2542, tid: 3035, name: mali-compiler >>> com.microsoft.emmx <<< uid: 10098 tagged_addr_ctrl: 000000000007fff1 (PR_TAGGED_ADDR_ENABLE, mask 0xfffe) pac_enabled_keys: 000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY) signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0000000000000028 Cause: null pointer dereference x0 0000000000000000 x1 0000000000000089 x2 0000000000000000 x3 0000000000000000 x4 0000000000000000 x5 00000000ffffffff x6 00000000ffffffff x7 0000000000000000 x8 0000000000000000 x9 0000000000000001 x10 0000000000000000 x11 0000000000030403 x12 0000000000000030 x13 0000000000033e86 x14 0000000000000000 x15 000000000000000c x16 000000709edd2ee0 x17 000000709ed65640 x18 0000006d46894000 x19 0000006dd133da80 x20 0000006dc2dac000 x21 0000006dc2dac000 x22 0000000000000000 x23 0000006dd133d7cc x24 0000006dd133d730 x25 0000006dd133d730 x26 0000006dd133da70 x27 00000000000fc000 x28 0000006dd1245000 x29 0000006dd133d6a0 lr 0000006dc1bf5fb0 sp 0000006dd133d680 pc 0000006dc1bf5fcc pst 0000000020001000 3 total frames backtrace: #00 pc 00000000019d8fcc /vendor/lib64/egl/libGLES_mali.so (BuildId: c4de9bdab807d18b) #01 pc 00000000000741a8 /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+200) (BuildId: f3d23eec13cbcd723c07d38a66ee4a12) #02 pc 00000000000656d4 /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+68) (BuildId: f3d23eec13cbcd723c07d38a66ee4a12) memory near x16 (/apex/com.android.runtime/lib64/bionic/libc.so): 000000709edd2ec0 00000070a3eea020 00000070a3eea050 ...p...P...p... 000000709edd2ed0 000000709ed393b0 000000709ed39450 ....p...P...p... 000000709edd2ee0 000000709ed65640 000000709ed65b00 @V..p....[..p... 000000709edd2ef0 000000709ed39690 000000709ed39950 ....p...P...p... 000000709edd2f00 000000709ed39a50 000000709ed92050 P...p...P ..p... 000000709edd2f10 00000070a3eea130 00000070a3eea0f0 0...p.......p... 000000709edd2f20 000000709ed73e70 000000709edb1220 p>..p... ...p... 000000709edd2f30 000000709ed6e380 000000709edbbff0 ....p.......p... 000000709edd2f40 000000709ed74cf0 000000709ed3a570 .L..p...p...p... 000000709edd2f50 00000070b61cedb0 00000070b61cf0c0 ....p.......p... 000000709edd2f60 000000709ed519f0 000000709ed51990 ....p.......p... 000000709edd2f70 000000709ed60fd0 000000709ed92490 ....p....$..p... 000000709edd2f80 000000709ed519b0 000000709ed58940 ....p...@...p...
然后直接反汇编就可以找到具体挂在哪里。
浙公网安备 33010602011771号