| #!/usr/bin/env python |
| |
| # Copyright (C) 2009 The Android Open Source Project |
| # |
| # Licensed under the Apache License, Version 2.0 (the 'License'); |
| # you may not use this file except in compliance with the License. |
| # You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an 'AS IS' BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| |
| import os |
| import re |
| import string |
| import sys |
| |
| ############################################################################### |
| # match "#00 pc 0003f52e /system/lib/libdvm.so" for example |
| ############################################################################### |
| trace_line = re.compile("(.*)(\#[0-9]+) (..) ([0-9a-f]{8}) ([^\r\n \t]*)") |
| |
| # returns a list containing the function name and the file/lineno |
| def CallAddr2Line(lib, addr): |
| global symbols_dir |
| global addr2line_cmd |
| global cppfilt_cmd |
| |
| if lib != "": |
| cmd = addr2line_cmd + \ |
| " -f -e " + symbols_dir + lib + " 0x" + addr |
| stream = os.popen(cmd) |
| lines = stream.readlines() |
| list = map(string.strip, lines) |
| else: |
| list = [] |
| if list != []: |
| # Name like "move_forward_type<JavaVMOption>" causes troubles |
| mangled_name = re.sub('<', '\<', list[0]); |
| mangled_name = re.sub('>', '\>', mangled_name); |
| cmd = cppfilt_cmd + " " + mangled_name |
| stream = os.popen(cmd) |
| list[0] = stream.readline() |
| stream.close() |
| list = map(string.strip, list) |
| else: |
| list = [ "(unknown)", "(unknown)" ] |
| return list |
| |
| |
| ############################################################################### |
| # similar to CallAddr2Line, but using objdump to find out the name of the |
| # containing function of the specified address |
| ############################################################################### |
| def CallObjdump(lib, addr): |
| global objdump_cmd |
| global symbols_dir |
| |
| unknown = "(unknown)" |
| uname = os.uname()[0] |
| if uname == "Darwin": |
| proc = os.uname()[-1] |
| if proc == "i386": |
| uname = "darwin-x86" |
| else: |
| uname = "darwin-ppc" |
| elif uname == "Linux": |
| uname = "linux-x86" |
| if lib != "": |
| next_addr = string.atoi(addr, 16) + 1 |
| cmd = objdump_cmd \ |
| + " -C -d --start-address=0x" + addr + " --stop-address=" \ |
| + str(next_addr) \ |
| + " " + symbols_dir + lib |
| stream = os.popen(cmd) |
| lines = stream.readlines() |
| map(string.strip, lines) |
| stream.close() |
| else: |
| return unknown |
| |
| # output looks like |
| # |
| # file format elf32-littlearm |
| # |
| # Disassembly of section .text: |
| # |
| # 0000833c <func+0x4>: |
| # 833c: 701a strb r2, [r3, #0] |
| # |
| # we want to extract the "func" part |
| num_lines = len(lines) |
| if num_lines < 2: |
| return unknown |
| func_name = lines[num_lines-2] |
| func_regexp = re.compile("(^.*\<)(.*)(\+.*\>:$)") |
| components = func_regexp.match(func_name) |
| if components is None: |
| return unknown |
| return components.group(2) |
| |
| ############################################################################### |
| # determine the symbols directory in the local build |
| ############################################################################### |
| def FindSymbolsDir(): |
| global symbols_dir |
| |
| try: |
| path = os.environ['ANDROID_PRODUCT_OUT'] + "/symbols" |
| except: |
| cmd = "CALLED_FROM_SETUP=true BUILD_SYSTEM=build/core " \ |
| + "SRC_TARGET_DIR=build/target make -f build/core/config.mk " \ |
| + "dumpvar-abs-TARGET_OUT_UNSTRIPPED" |
| stream = os.popen(cmd) |
| str = stream.read() |
| stream.close() |
| path = str.strip() |
| |
| if (not os.path.exists(path)): |
| print path + " not found!" |
| sys.exit(1) |
| |
| symbols_dir = path |
| |
| ############################################################################### |
| # determine the path of binutils |
| ############################################################################### |
| def SetupToolsPath(): |
| global addr2line_cmd |
| global objdump_cmd |
| global cppfilt_cmd |
| global symbols_dir |
| |
| uname = os.uname()[0] |
| if uname == "Darwin": |
| uname = "darwin-x86" |
| elif uname == "Linux": |
| uname = "linux-x86" |
| prefix = "./prebuilts/gcc/" + uname + "/arm/arm-linux-androideabi-4.6/bin/" |
| addr2line_cmd = prefix + "arm-linux-androideabi-addr2line" |
| |
| if (not os.path.exists(addr2line_cmd)): |
| try: |
| prefix = os.environ['ANDROID_BUILD_TOP'] + "/prebuilts/gcc/" + \ |
| uname + "/arm/arm-linux-androideabi-4.6/bin/" |
| except: |
| prefix = ""; |
| |
| addr2line_cmd = prefix + "arm-linux-androideabi-addr2line" |
| if (not os.path.exists(addr2line_cmd)): |
| print addr2line_cmd + " not found!" |
| sys.exit(1) |
| |
| objdump_cmd = prefix + "arm-linux-androideabi-objdump" |
| cppfilt_cmd = prefix + "arm-linux-androideabi-c++filt" |
| |
| ############################################################################### |
| # look up the function and file/line number for a raw stack trace line |
| # groups[0]: log tag |
| # groups[1]: stack level |
| # groups[2]: "pc" |
| # groups[3]: code address |
| # groups[4]: library name |
| ############################################################################### |
| def SymbolTranslation(groups): |
| lib_name = groups[4] |
| code_addr = groups[3] |
| caller = CallObjdump(lib_name, code_addr) |
| func_line_pair = CallAddr2Line(lib_name, code_addr) |
| |
| # If a callee is inlined to the caller, objdump will see the caller's |
| # address but addr2line will report the callee's address. So the printed |
| # format is desgined to be "caller<-callee file:line" |
| if (func_line_pair[0] != caller): |
| print groups[0] + groups[1] + " " + caller + "<-" + \ |
| ' '.join(func_line_pair[:]) + " " |
| else: |
| print groups[0] + groups[1] + " " + ' '.join(func_line_pair[:]) + " " |
| |
| ############################################################################### |
| |
| if __name__ == '__main__': |
| # pass the options to adb |
| adb_cmd = "adb " + ' '.join(sys.argv[1:]) |
| |
| # setup addr2line_cmd and objdump_cmd |
| SetupToolsPath() |
| |
| # setup the symbols directory |
| FindSymbolsDir() |
| |
| # invoke the adb command and filter its output |
| stream = os.popen(adb_cmd) |
| while (True): |
| line = stream.readline() |
| |
| # EOF reached |
| if (line == ''): |
| break |
| |
| # remove the trailing \n |
| line = line.strip() |
| |
| # see if this is a stack trace line |
| match = trace_line.match(line) |
| if (match): |
| groups = match.groups() |
| # translate raw address into symbols |
| SymbolTranslation(groups) |
| else: |
| print line |
| sys.stdout.flush() |
| |
| # adb itself aborts |
| stream.close() |