调试步骤如下:
1/ 将异常的地址信息存到文本文件,并存放在项目根目录;
2/ 使用panic.py解析该文件;
3/ 根据返回的信息(文件名;行号;方法名)调试程序。
以操作第三方的Touch input 输入法为例,过程如下:
# 该输入法的英文和手写OK,操作中文输入法时,出现异常,软键盘消失,异常日志如下
02-05 06:41:19.834 D/dalvikvm( 751): Trying to load lib /system/lib/libimezi.so 0x43e2a788
02-05 06:41:19.874 D/dalvikvm( 751): Added shared lib /system/lib/libimezi.so 0x43e2a788
02-05 06:41:20.035 I/DEBUG ( 551): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
02-05 06:41:20.035 I/DEBUG ( 551): Build fingerprint: 'unknown'
02-05 06:41:20.035 I/DEBUG ( 551): pid: 751, tid: 751 >>> com.htc.android.cime <<<
02-05 06:41:20.045 I/DEBUG ( 551): signal 11 (SIGSEGV), fault addr 00000003
02-05 06:41:20.045 I/DEBUG ( 551): r0 00000000 r1 00000000 r2 807248ec r3 807248ec
02-05 06:41:20.055 I/DEBUG ( 551): r4 00252d80 r5 00000004 r6 00000001 r7 00000000
02-05 06:41:20.055 I/DEBUG ( 551): r8 beff8550 r9 41459d28 10 41459d18 fp 00000000
02-05 06:41:20.055 I/DEBUG ( 551): ip 8072430c sp beff84f0 lr 80716b4f pc 80717bce cpsr 60000030
02-05 06:41:20.135 I/DEBUG ( 551): #00 pc 00017bce /system/lib/libimezi.so
02-05 06:41:20.135 I/DEBUG ( 551): #01 pc 00010f80 /system/lib/libimezi.so
02-05 06:41:20.145 I/DEBUG ( 551): stack:
02-05 06:41:20.155 I/DEBUG ( 551): beff84b0 ad083e10
02-05 06:41:20.155 I/DEBUG ( 551): beff84b4 ad05d44f /system/lib/libdvm.so
02-05 06:41:20.155 I/DEBUG ( 551): beff84b8 ad06b8a0 /system/lib/libdvm.so
02-05 06:41:20.155 I/DEBUG ( 551): beff84bc ad083e10
02-05 06:41:20.167 I/DEBUG ( 551): beff84c0 43e2aa90
02-05 06:41:20.175 I/DEBUG ( 551): beff84c4 00000003
02-05 06:41:20.175 I/DEBUG ( 551): beff84c8 00000014
02-05 06:41:20.185 I/DEBUG ( 551): beff84cc 80716b4f /system/lib/libimezi.so
# 保存异常日志,存为文件: 20100205_ime.txt
02-05 06:41:20.045 I/DEBUG ( 551): r0 00000000 r1 00000000 r2 807248ec r3 807248ec
02-05 06:41:20.055 I/DEBUG ( 551): r4 00252d80 r5 00000004 r6 00000001 r7 00000000
02-05 06:41:20.055 I/DEBUG ( 551): r8 beff8550 r9 41459d28 10 41459d18 fp 00000000
02-05 06:41:20.055 I/DEBUG ( 551): ip 8072430c sp beff84f0 lr 80716b4f pc 80717bce cpsr 60000030
02-05 06:41:20.135 I/DEBUG ( 551): #00 pc 00017bce /system/lib/libimezi.so
02-05 06:41:20.135 I/DEBUG ( 551): #01 pc 00010f80 /system/lib/libimezi.so
# 执行脚本
xujianxiang@wingdroid-clone:~/workspace/xujx/wing15$ ./panic.py 20100205_ime.txt
read file ok
/home/xujianxiang/workspace/xujx/wing15/prebuilt/linux-x86/toolchain/arm-eabi-4.2.1/bin/arm-eabi-addr2line: '/home/xujianxiang/workspace/xujx/wing15/out/target/product/generic/symbols/system/lib/libimezi.so': No such file
Traceback (most recent call last):
File "./panic.py", line 69, in
print "%-30s%s" % (list[1],list[0])
IndexError: list index out of range
# 没找到库文件,因为这个文件是第三方的,只存放在/out/target/product/generic/system/lib /libimezi.so,拷贝一份存到/out/target/product/generic/symbols/system/lib /libimezi.so,再次执行脚本
xujianxiang@wingdroid-clone:~/workspace/xujx/wing15$ ./panic.py 20100205_ime.txt
read file ok
zi81keyd.c:0 Zi8GetTableData
zi81keyd.c:0 Zi8InitializeDynamic
# 成功解析异常,没有zi8库文件所致,更新如下库文件,输入法支持中文拼音。
/system/lib/zi/Zi8DatPYP_CN.z8d
/system/lib/zi/Zi8DatPYS_CN.z8d
/system/lib/zi/Zi8DatZHA_CN.z8d
/system/lib/zi/Zi8DatZHA_HK.z8d
/system/lib/zi/Zi8DatZHA_TW.z8d
/system/lib/zi/Zi8DatZYP_TW.z8d
/system/lib/zi/Zi8DatZYS_TW.z8d
附 panic.py:
1
#!/usr/bin/python2
#stack symbol parser3
4
importos5
importstring6
importsys7
8
#define android product name9
#ANDROID_PRODUCT_NAME = 'generic'10
ANDROID_PRODUCT_NAME='smdk6410'11
12
ANDROID_WORKSPACE=os.getcwd()+"/"13
14
#addr2line tool path and symbol path15
addr2line_tool=ANDROID_WORKSPACE+'prebuilt/linux-x86/toolchain/arm-eabi-4.2.1/bin/arm-eabi-addr2line'16
symbol_dir=ANDROID_WORKSPACE+'out/target/product/'+ANDROID_PRODUCT_NAME+'/symbols'17
symbol_bin=symbol_dir+'/system/bin/'18
symbol_lib=symbol_dir+'/system/lib/'19
20
classReadLog:21
def__init__(self,filename):22
self.logname=filename23
defparse(self):24
f=file(self.logname,'r')25
lines=f.readlines()26
iflines!=[]:27
print'read file ok'28
else:29
print'read file failed'30
result=[]31
forlineinlines:32
ifline.find('stack')!=-1:33
print'stop search'34
break35
elifline.find('system')!=-1:36
#print 'find one item' + line37
result.append(line)38
returnresult39
40
classParseContent:41
def__init__(self,addr,lib):42
self.address=addr#pc address43
self.exename=lib#executable or shared library44
defaddr2line(self):45
cmd=addr2line_tool+"-C -f -s -e"+symbol_dir+self.exename+""+self.address46
#print cmd47
stream=os.popen(cmd)48
lines=stream.readlines();49
list=map(string.strip,lines)50
returnlist51
52
inputarg=sys.argv53
iflen(inputarg)<2:54
print'Please input panic log'55
exit()56
57
filename=inputarg[1]58
readlog=ReadLog(filename)59
inputlist=readlog.parse()60
61
foritemininputlist:62
itemsplit=item.split()63
test=ParseContent(itemsplit[-2],itemsplit[-1])64
list=test.addr2line()65
print"%-30s%s"%(list[1],list[0])66
posted on 2010-03-06 12:56 Xu Jianxiang 阅读(3645) 评论(0) 编辑 收藏 所属分类: Android