美文网首页
gdb 解析NE

gdb 解析NE

作者: 超__越 | 来源:发表于2018-07-25 15:03 被阅读73次

    1.例如:

    如下log

    7-24 19:53:39.572849 9258 9258 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***

    07-24 19:53:39.573010 9258 9258 F DEBUG : Build fingerprint: 'Gigaset/GS270_plus/Gigaset_GS270_plus:8.1.0/O11019/1532324320:user/release-keys'

    -24 19:53:39.573042 9258 9258 F DEBUG : Revision: '0'

    07-24 19:53:39.573076 9258 9258 F DEBUG : ABI: 'arm64'

    07-24 19:53:39.573109 9258 9258 F DEBUG : pid: 6840, tid: 6880, name: RenderThread >>> com.google.android.contacts <<<

    07-24 19:53:39.573147 9258 9258 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------

    07-24 19:53:39.581264 9258 9258 F DEBUG : Abort message: 'Failed to set damage region on surface 0x79981eaa40, error=EGL_SUCCESS'

    07-24 19:53:39.581406 9258 9258 F DEBUG : x0 0000000000000000 x1 0000000000001ae0 x2 0000000000000006 x3 0000000000000008

    07-24 19:53:39.581446 9258 9258 F DEBUG : x4 003c232f3e0e0402 x5 003c232f3e0e0402 x6 003c232f3e0e0402 x7 02040e3e2f233c00

    07-24 19:53:39.581469 9258 9258 F DEBUG : x8 0000000000000083 x9 0000000010000000 x10 0000007997ffe6a0 x11 0000000000000001

    07-24 19:53:39.581491 9258 9258 F DEBUG : x12 0000007997ffe7c0 x13 0000000000000000 x14 ff00000000000000 x15 003c232f3e0e0402

    07-24 19:53:39.581532 9258 9258 F DEBUG : x16 0000007a35992fa8 x17 0000007a337396ac x18 0000000000000438 x19 0000000000001ab8

    07-24 19:53:39.581557 9258 9258 F DEBUG : x20 0000000000001ae0 x21 0000000000000083 x22 00000079995e0b70 x23 00000079982213d8

    07-24 19:53:39.581579 9258 9258 F DEBUG : x24 000000799821d688 x25 000000799821d61c x26 0000007997fff1f8 x27 0000007997fff1e0

    07-24 19:53:39.581599 9258 9258 F DEBUG : x28 0000007997fff300 x29 0000007997ffe6e0 x30 0000007a336ee76c

    07-24 19:53:39.581619 9258 9258 F DEBUG : sp 0000007997ffe6a0 pc 0000007a336ee794 pstate 0000000060000000

    07-24 19:53:39.641034 9258 9258 F DEBUG : 07-24 19:53:39.641034 9258 9258 F DEBUG : backtrace:

    07-24 19:53:39.641125 9258 9258 F DEBUG : #00 pc 000000000001d794 /system/lib64/libc.so (abort+120)

    07-24 19:53:39.641150 9258 9258 F DEBUG : #01 pc 0000000000007f08 /system/lib64/liblog.so (__android_log_assert+296)

    07-24 19:53:39.641178 9258 9258 F DEBUG : #02 pc 000000000006ca70 /system/lib64/libhwui.so (android::uirenderer::renderthread::EglManager::damageFrame(android::uirenderer::renderthread::Frame const&, SkRect const&)+252)

    07-24 19:53:39.641221 9258 9258 F DEBUG : #03 pc 00000000000697ac /system/lib64/libhwui.so (android::uirenderer::renderthread::OpenGLPipeline::draw(android::uirenderer::renderthread::Frame const&, SkRect const&, SkRect const&, android::uirenderer::FrameBuilder::LightGeometry const&, android::uirenderer::LayerUpdateQueue*, android::uirenderer::Rect const&, bool, bool, android::uirenderer::BakedOpRenderer::LightInfo const&, std::__1::vector, std::__1::allocator

    2 找到对应版本的symbols 文件

    3 用gdb 一行的解析

    file 文件(window 注意 路径为 ./Desktop/release/libc.so. )

    disassemble 地址(转换为0X

    info line 

    相关文章

      网友评论

          本文标题:gdb 解析NE

          本文链接:https://www.haomeiwen.com/subject/tvbpmftx.html