Android tombstone

当Android发生crash时,可以到/data/tombstones下面找到相关的文件,比如想查询第一个tombstone时,

mahakala:/data/tombstones # head -50 tombstone_00
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'generic/mahakala_hdp/mahakala:15/AP3A.240905.015.A2/eng.spikel.00000000.000000:userdebug/test-keys'
Revision: '0'
ABI: 'arm64'
Timestamp: 2000-01-01 00:11:58.700341556+0000
Process uptime: 42s
Cmdline: com.microsoft.emmx
pid: 2542, tid: 3035, name: mali-compiler  >>> com.microsoft.emmx <<<
uid: 10098
tagged_addr_ctrl: 000000000007fff1 (PR_TAGGED_ADDR_ENABLE, mask 0xfffe)
pac_enabled_keys: 000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY)
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0000000000000028
Cause: null pointer dereference
    x0  0000000000000000  x1  0000000000000089  x2  0000000000000000  x3  0000000000000000
    x4  0000000000000000  x5  00000000ffffffff  x6  00000000ffffffff  x7  0000000000000000
    x8  0000000000000000  x9  0000000000000001  x10 0000000000000000  x11 0000000000030403
    x12 0000000000000030  x13 0000000000033e86  x14 0000000000000000  x15 000000000000000c
    x16 000000709edd2ee0  x17 000000709ed65640  x18 0000006d46894000  x19 0000006dd133da80
    x20 0000006dc2dac000  x21 0000006dc2dac000  x22 0000000000000000  x23 0000006dd133d7cc
    x24 0000006dd133d730  x25 0000006dd133d730  x26 0000006dd133da70  x27 00000000000fc000
    x28 0000006dd1245000  x29 0000006dd133d6a0
    lr  0000006dc1bf5fb0  sp  0000006dd133d680  pc  0000006dc1bf5fcc  pst 0000000020001000

3 total frames
backtrace:
      #00 pc 00000000019d8fcc  /vendor/lib64/egl/libGLES_mali.so (BuildId: c4de9bdab807d18b)
      #01 pc 00000000000741a8  /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+200) (BuildId: f3d23eec13cbcd723c07d38a66ee4a12)
      #02 pc 00000000000656d4  /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+68) (BuildId: f3d23eec13cbcd723c07d38a66ee4a12)

memory near x16 (/apex/com.android.runtime/lib64/bionic/libc.so):
    000000709edd2ec0 00000070a3eea020 00000070a3eea050   ...p...P...p...
    000000709edd2ed0 000000709ed393b0 000000709ed39450  ....p...P...p...
    000000709edd2ee0 000000709ed65640 000000709ed65b00  @V..p....[..p...
    000000709edd2ef0 000000709ed39690 000000709ed39950  ....p...P...p...
    000000709edd2f00 000000709ed39a50 000000709ed92050  P...p...P ..p...
    000000709edd2f10 00000070a3eea130 00000070a3eea0f0  0...p.......p...
    000000709edd2f20 000000709ed73e70 000000709edb1220  p>..p... ...p...
    000000709edd2f30 000000709ed6e380 000000709edbbff0  ....p.......p...
    000000709edd2f40 000000709ed74cf0 000000709ed3a570  .L..p...p...p...
    000000709edd2f50 00000070b61cedb0 00000070b61cf0c0  ....p.......p...
    000000709edd2f60 000000709ed519f0 000000709ed51990  ....p.......p...
    000000709edd2f70 000000709ed60fd0 000000709ed92490  ....p....$..p...
    000000709edd2f80 000000709ed519b0 000000709ed58940  ....p...@...p...

 

然后直接反汇编就可以找到具体挂在哪里。

posted @ 2025-04-15 16:46  青山牧云人  阅读(89)  评论(0)    收藏  举报