diff --git a/pdk/docs/guide/debugging_gdb.jd b/pdk/docs/guide/debugging_gdb.jd new file mode 100755 index 000000000..fe633071f --- /dev/null +++ b/pdk/docs/guide/debugging_gdb.jd @@ -0,0 +1,143 @@ +page.title=Debugging with GDB +pdk.version=1.0 +@jd:body + + +
+ +The current version of envsetup.sh has a gdbclient command that handles much of the setup. For example, to attach to the
+ already-running globaltime application, execute the following, making sure that: 1) you do this from the same window used to build the software on the device you are debugging and 2) verify that the symbols in the object files in the build tree match up with what is installed on the device or emulator.
+gdbclient app_process :5039 globaltime ++ +
Android runs gdbserver on the device and an ARM aware gdb, named arm-eabi-gdb, on the desktop machine.
gdbserver on the device:+ gdbserver :5039 /system/bin/executable ++
:5039 tells gdbserver to listen on port 5039 on the localhost, which adb bridges from the host to the device. executable represents the command to debug, a common one being runtime -s which starts the entire system all running in a single process. gdb on the desktop.
+ This can be
+ done easily with the following command in the shell from which you built:
+ +gdbclient executable ++
At this point gdb will connect with your device
+ and you should be
+ able to enter c to have the device start executing inside of the
+ desktop gdb session.
If the short instructions don't work, these detailed instructions should: +
gdbserver :5039 /system/bin/executable+ or attach to an existing process: +
gdbserver :5039 --attach pid+
adb forward tcp:5039 tcp:5039+
gdb that lives in the "prebuilt" area of the source tree: prebuilt/Linux/toolchain-eabi-4.2.1/bin/arm-eabi-gdb (for Linux) prebuilt/darwin-x86/toolchain-eabi-4.2.1/bin/arm-eabi-gdb (for Darwin) gdb, run find prebuilt -name arm-eabi-gdb in your source tree to find and run the latest version:
+ +prebuilt/Linux/toolchain-eabi-4.2.1/bin/arm-eabi-gdb out/target/product/product-name/symbols/system/bin/executable ++
sooner),
+ and executable is the program to debug (usually app_process for an application).gdb, Tell gdb where to find the shared libraries that will get loaded:
+ +set solib-absolute-prefix /absolute-source-path/out/target/product/product-name/symbols +set solib-search-path /absolute-source-path/out/target/product/product-name/symbols/system/lib ++
/work/device or /Users/hoser/android/device.sooner. gdb may not tell you if you make a mistake.gdb command:+target remote :5039 ++
:5039 tells gdb to connect to the localhost port 5039, which is bridged to the device by adb.shared+
You should be connected and able to debug as you normally would. You can ignore the error about not
+ finding the location for the thread creation breakpoint. It will be found when
+ the linker loads libc into your process before hitting main(). Also note that
+ the gdb remote protocol doesn't have a way for the device to
+ tell the host about
+ newly created threads so you will not always see notifications about newly
+ created threads. Info about other threads will be queried from the
+ device when a
+ breakpoint is hit or you ask for it by running info thread.
+
+adb shell setprop debug.db.uid 10000 ++and all processes with a
uid <= 10000 will be trapped in this
+manner. When one of them crashes, the tombstone is processed as usual, an explicit message is printed into the log, and the red LED starts
+flashing waiting for the Home key to be depressed (in which case it
+continues execution as usual).
++I/DEBUG ( 27): ******************************************************** +I/DEBUG ( 27): * process 82 crashed. debuggerd waiting for gdbserver +I/DEBUG ( 27): * +I/DEBUG ( 27): * adb shell gdbserver :port --attach 82 & +I/DEBUG ( 27): * +I/DEBUG ( 27): * and press the HOME key. +I/DEBUG ( 27): ******************************************************** ++
When you see the entry above, make sure adb is forwarding port 5039 (you only need to do this once,
+ unless the ADB server dies) and execute:
% adb forward tcp:5039 tcp:5039+Execute the line shown in the debug output, substituting 5039 for the proper
port:
++% adb shell gdbserver :5039 --attach 82 & ++
If the crashing process is based off zygote (that is, system_server and all
+ applications), the default values for the gdbclient command, app_process binary and port 5039, are correct, so you can execute:
+% cd <top of device source tree> +% gdbclient ++
Otherwise you need to determine the path of the crashing binary and follow the
+ steps as mentioned above (for example, gdbclient hoser :5039 if
+ the hoser command has failed).
To capture log output:
+ps (ps -t if you want verbose thread feedback).dmesg.logcat '*:v' & (running in bg with & is important).+ # command to device shell (via adb) + % command to host pc shell ++
+
+ ++>>> gtalk app crashed but did not actually exit or seems stuck +>>> let's check the debug logs and see if there's anything to see: + +# logcat & + +... +E/WindowManager( 182): Window client android.util.BinderProxy@4089f948 has died!! Removing window. +W/WindowManager( 182): **** WINDOW CLIENT android.view.WindowProxy@40882248 DIED! +W/ActivityManager( 182): **** APPLICATION com.google.android.gtalk DIED! +I/ServiceManager( 257): Executing: /android/bin/app_process (link=/tmp/android-servicemanager/com.google.android.gtalk, wrapper=/tmp/android-servi +cemanager/com.google.android.gtalk) +I/appproc ( 257): App process is starting with pid=257, class=android/activity/ActivityThread. +I/ ( 257): java.io.FileDescriptor: class initialization +I/SurfaceFlinger.HW( 182): About to give-up screen +I/SurfaceFlinger.HW( 182): screen given-up +I/SurfaceFlinger.HW( 182): Screen about to return +I/SurfaceFlinger.HW( 182): screen returned +I/SurfaceFlinger.HW( 182): About to give-up screen +I/SurfaceFlinger.HW( 182): screen given-up +I/SurfaceFlinger.HW( 182): Screen about to return +... + +>>> looks like the system launched a replacement gtalk process +>>> but it is stuck somehow + +# ps +PID PPID VSIZE RSS WCHAN PC NAME +257 181 45780 5292 ffffffff 53030cb4 S com.google.andr + +>>> gtalk's PC is at 53030cb4 +>>> look at the memory map to find out what lib is 0x53...... + +# cat /proc/257/maps +... +51000000-5107c000 rwxp 00000000 1f:03 619 /android/lib/libutils.so +52000000-52013000 rwxp 00000000 1f:03 639 /android/lib/libz.so +53000000-53039000 rwxp 00000000 1f:03 668 /android/lib/libc.so +53039000-53042000 rw-p 53039000 00:00 0 +54000000-54002000 rwxp 00000000 1f:03 658 /android/lib/libstdc++.so +... + +>>> let's disassemble libc and find out where we are?! + +% prebuilt/Linux/toolchain-eabi-4.2.1/bin/arm-elf-objdump -d out/target/product/sooner/symbols/android/lib/libc.so + +00030ca4 <__futex_wait>: + 30ca4: e1a03002 mov r3, r2 + 30ca8: e1a02001 mov r2, r1 + 30cac: e3a01000 mov r1, #0 ; 0x0 + 30cb0: ef9000f0 swi 0x009000f0 + 30cb4: e12fff1e bx lr ++ +
+>>> we're blocked in a syscall, let's see what gdb can show us +>>> (we could have done this first if we wanted to) + +>>> tell adb to forward the GDB port +% adb forward tcp:5039 tcp:5039 + +>>> start gdb server and attach to process 257 (from example above) +# gdbserver :5039 --attach 257 & +Attached; pid = 257 +Listening on port 5039 + +% prebuilt/Linux/toolchain-eabi-4.2.1/bin/arm-elf-gdb out/target/product/sooner/system/bin/app_process +(gdb) set solib-absolute-prefix /work/android/device/out/target/product/sooner/symbols +(gdb) set solib-search-path /work/android/device/out/target/product/sooner/symbols/android/lib +(gdb) target remote :5039 +Remote debugging using :5039 +0x53030cb4 in ?? () +Current language: auto; currently asm + +>>> Don't let other threads get scheduled while we're debugging. +>>> You should "set scheduler-locking off" before issuing a "continue", +>>> or else your thread may get stuck on a futex or other +>>> spinlock because no other thread can release it. +(gdb) set scheduler-locking on + +>>> Ignore SIGUSR1 if you're using JamVM. Shouldn't hurt if you're not. +(gdb) handle SIGUSR1 noprint + +(gdb) where +#0 __futex_wait () at system/klibc/android/atomics_arm.S:88 +#1 0x53010eb8 in pthread_cond_timedwait (cond=0x12081c, mutex=0x120818, abstime=0xffffffff) + at system/klibc/android/pthread.c:490 +#2 0x6b01c848 in monitorWait (mon=0x120818, self=0x6b039ba4, ms=0, ns=0) at extlibs/jamvm-1.4.1/src/lock.c:194 +#3 0x6b01d1d8 in objectWait (obj=0x408091c0, ms=0, ns=0) at extlibs/jamvm-1.4.1/src/lock.c:420 +#4 0x6b01d4c8 in jamWait (clazz=0xfffffffc, mb=0x0, ostack=0x2e188) at extlibs/jamvm-1.4.1/src/natives.c:91 +#5 0x6b013b2c in resolveNativeWrapper (clazz=0x408001d0, mb=0x41798, ostack=0x2e188) at extlibs/jamvm-1.4.1/src/dll.c:236 +#6 0x6b015c04 in executeJava () at extlibs/jamvm-1.4.1/src/interp.c:2614 +#7 0x6b01471c in executeMethodVaList (ob=0x0, clazz=0x40808f20, mb=0x12563c, jargs=0xbe9229f4) + at extlibs/jamvm-1.4.1/src/execute.c:91 +#8 0x6b01bcd0 in Jam_CallStaticVoidMethod (env=0xfffffffc, klass=0x0, methodID=0x12563c) + at extlibs/jamvm-1.4.1/src/jni.c:1063 +#9 0x58025b2c in android::AndroidRuntime::callStatic (this=0xfffffffc, + className=0xbe922f0a "android/activity/ActivityThread", methodName=0x57000b7c "main") + at libs/android_runtime/AndroidRuntime.cpp:215 +#10 0x57000504 in android::app_init (className=0xbe922f0a "android/activity/ActivityThread") + at servers/app/library/app_init.cpp:20 +#11 0x000089b0 in android::sp<android::ProcessState>::~sp () +#12 0x000089b0 in android::sp<android::ProcessState>::~sp () +Previous frame identical to this frame (corrupt stack?) + +(gdb) info threads + 7 thread 263 __ioctl () at system/klibc/syscalls/__ioctl.S:12 + 6 thread 262 accept () at system/klibc/syscalls/accept.S:12 + 5 thread 261 __futex_wait () at system/klibc/android/atomics_arm.S:88 + 4 thread 260 __futex_wait () at system/klibc/android/atomics_arm.S:88 + 3 thread 259 __futex_wait () at system/klibc/android/atomics_arm.S:88 + 2 thread 258 __sigsuspend () at system/klibc/syscalls/__sigsuspend.S:12 + 1 thread 257 __futex_wait () at system/klibc/android/atomics_arm.S:88 + + +(gdb) thread 7 +[Switching to thread 7 (thread 263)]#0 __ioctl () at system/klibc/syscalls/__ioctl.S:12 +12 movs r0, r0 +(gdb) bt +#0 __ioctl () at system/klibc/syscalls/__ioctl.S:12 +#1 0x53010704 in ioctl (fd=-512, request=-1072143871) at system/klibc/android/ioctl.c:22 +#2 0x51040ac0 in android::IPCThreadState::talkWithDriver (this=0x1207b8, doReceive=true) at RefBase.h:83 +#3 0x510418a0 in android::IPCThreadState::joinThreadPool (this=0x1207b8, isMain=false) + at libs/utils/IPCThreadState.cpp:343 +#4 0x51046004 in android::PoolThread::threadLoop (this=0xfffffe00) at libs/utils/ProcessState.cpp:52 +#5 0x51036428 in android::Thread::_threadLoop (user=0xfffffe00) at libs/utils/Threads.cpp:1100 +#6 0x58025c68 in android::AndroidRuntime::javaThreadShell (args=0x105ffe28) at libs/android_runtime/AndroidRuntime.cpp:540 + +(gdb) thread 6 +[Switching to thread 6 (thread 262)]#0 accept () at system/klibc/syscalls/accept.S:12 +12 movs r0, r0 +(gdb) bt +#0 accept () at system/klibc/syscalls/accept.S:12 +#1 0x6b0334e4 in jdwpAcceptConnection (state=0xfffffe00) at extlibs/jamvm-1.4.1/jdwp/JdwpNet.c:213 +#2 0x6b032660 in jdwpThreadEntry (self=0x4d020) at extlibs/jamvm-1.4.1/jdwp/JdwpMain.c:37 +#3 0x6b022c2c in shell (args=0x4d960) at extlibs/jamvm-1.4.1/src/thread.c:629 + +(gdb) thread 5 +[Switching to thread 5 (thread 261)]#0 __futex_wait () at system/klibc/android/atomics_arm.S:88 +88 bx lr +(gdb) bt +#0 __futex_wait () at system/klibc/android/atomics_arm.S:88 +#1 0x53010f48 in pthread_cond_timeout (cond=0x6b039b64, mutex=0x6b039b60, msecs=0) at system/klibc/android/pthread.c:513 +#2 0x6b01c8d0 in monitorWait (mon=0x6b039b60, self=0x4d400, ms=1000, ns=272629312) at extlibs/jamvm-1.4.1/src/lock.c:183 +#3 0x6b022084 in threadSleep (thread=0x4d400, ms=1000, ns=272629312) at extlibs/jamvm-1.4.1/src/thread.c:215 +#4 0x6b00d4fc in asyncGCThreadLoop (self=0x4d400) at extlibs/jamvm-1.4.1/src/alloc.c:1179 +#5 0x6b022c2c in shell (args=0x4d480) at extlibs/jamvm-1.4.1/src/thread.c:629 + +(gdb) thread 4 +[Switching to thread 4 (thread 260)]#0 __futex_wait () at system/klibc/android/atomics_arm.S:88 +88 bx lr +(gdb) bt +#0 __futex_wait () at system/klibc/android/atomics_arm.S:88 +#1 0x53010eb8 in pthread_cond_timedwait (cond=0x6b039934, mutex=0x6b039930, abstime=0x0) + at system/klibc/android/pthread.c:490 +#2 0x6b00b3ec in referenceHandlerThreadLoop (self=0x4d360) at extlibs/jamvm-1.4.1/src/alloc.c:1247 +#3 0x6b022c2c in shell (args=0x4d960) at extlibs/jamvm-1.4.1/src/thread.c:629 + +(gdb) thread 3 +[Switching to thread 3 (thread 259)]#0 __futex_wait () at system/klibc/android/atomics_arm.S:88 +88 bx lr +(gdb) bt +#0 __futex_wait () at system/klibc/android/atomics_arm.S:88 +#1 0x53010eb8 in pthread_cond_timedwait (cond=0x6b03992c, mutex=0x6b039928, abstime=0x0) + at system/klibc/android/pthread.c:490 +#2 0x6b00b1dc in finalizerThreadLoop (self=0x4d8e0) at extlibs/jamvm-1.4.1/src/alloc.c:1238 +#3 0x6b022c2c in shell (args=0x4d960) at extlibs/jamvm-1.4.1/src/thread.c:629 + +(gdb) thread 2 +[Switching to thread 2 (thread 258)]#0 __sigsuspend () at system/klibc/syscalls/__sigsuspend.S:12 +12 movs r0, r0 +(gdb) bt +#0 __sigsuspend () at system/klibc/syscalls/__sigsuspend.S:12 +#1 0x6b023814 in dumpThreadsLoop (self=0x51b98) at extlibs/jamvm-1.4.1/src/thread.c:1107 +#2 0x6b022c2c in shell (args=0x51b58) at extlibs/jamvm-1.4.1/src/thread.c:629 ++ +
If it crashes, connect with aproto and run logcat on the device. You should see output like this:
+I/ActivityManager( 188): Starting activity: Intent { component=com.android.calendar.MonthScreen }
+I/ActivityManager( 188): Starting application com.android.calendar to host activity com.android.calendar.MonthScree
+n
+I/ServiceManager( 417): Executing: /android/bin/app_process (link=/android/bin/app_process, wrapper=/android/bin/app_process)
+I/DEBUG: -- observer of pid 417 starting --
+I/appproc ( 417): App process is starting with pid=417, class=android/activity/ActivityThread.
+I/DEBUG: -- observer of pid 417 exiting --
+I/DEBUG: -- observer of pid 420 starting --
+I/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
+I/DEBUG: pid: 373, tid: 401 >>> android.content.providers.pim <<<
+I/DEBUG: signal 11 (SIGSEGV), fault addr 00000000
+I/DEBUG: r0 ffffffff r1 00000000 r2 00000454 r3 002136d4
+I/DEBUG: r4 002136c0 r5 40804810 r6 0022dc70 r7 00000010
+I/DEBUG: r8 0020a258 r9 00000014 10 6b039074 fp 109ffcf8
+I/DEBUG: ip 6b039e90 sp 109ffc0c lr 580239f0 pc 6b0156a0
+I/DEBUG: #01 pc 6b0156a0 /android/lib/libjamvm.so
+I/DEBUG: #01 lr 580239f0 /android/lib/libandroid_runtime.so
+I/DEBUG: #02 pc 6b01481c /android/lib/libjamvm.so
+I/DEBUG: #03 pc 6b0148a4 /android/lib/libjamvm.so
+I/DEBUG: #04 pc 6b00ebc0 /android/lib/libjamvm.so
+I/DEBUG: #05 pc 6b02166c /android/lib/libjamvm.so
+I/DEBUG: #06 pc 6b01657c /android/lib/libjamvm.so
+I/DEBUG: #07 pc 6b01481c /android/lib/libjamvm.so
+I/DEBUG: #08 pc 6b0148a4 /android/lib/libjamvm.so
+I/DEBUG: #09 pc 6b0235c0 /android/lib/libjamvm.so
+I/DEBUG: #10 pc 5300fac4 /android/lib/libc.so
+I/DEBUG: #11 pc 5300fc5c /android/lib/libc.so
+I/DEBUG: -- observer of pid 373 exiting --
+I/DEBUG: -- observer of pid 423 starting --
+
+
+If debugging output indicates an error in C or C++ code, the addresses aren't particularly useful, but the debugging symbols aren't present on the device. Use the "stack" tool to convert these addresses to files and line numbers, for example:
+ ++pid: 373, tid: 401 >>> android.content.providers.pim <<< + + signal 11 (SIGSEGV), fault addr 00000000 + r0 ffffffff r1 00000000 r2 00000454 r3 002136d4 + r4 002136c0 r5 40804810 r6 0022dc70 r7 00000010 + r8 0020a258 r9 00000014 10 6b039074 fp 109ffcf8 + r8 0020a258 r9 00000014 10 6b039074 fp 109ffcf8 + + ADDR FUNCTION FILE:LINE + 6b0156a0 executeJava extlibs/jamvm-1.4.1/src/interp.c:2674 + 580239f0 android_util_Parcel_freeBuffer libs/android_runtime/android_util_Binder.cpp:765 + 6b01481c executeMethodVaList extlibs/jamvm- 1.4.1/src/execute.c:91 + 6b0148a4 executeMethodArgs extlibs/jamvm-1.4.1/src/execute.c:67 + 6b00ebc0 initClass extlibs/jamvm-1.4.1/src/class.c:1124 + 6b02166c resolveMethod extlibs/jamvm- 1.4.1/src/resolve.c:197 + 6b01657c executeJava extlibs/jamvm-1.4.1/src/interp.c:2237 + 6b01481c executeMethodVaList extlibs/jamvm-1.4.1/src/execute.c:91 + 6b0148a4 executeMethodArgs extlibs/jamvm- 1.4.1/src/execute.c:67 + 6b0235c0 threadStart extlibs/jamvm-1.4.1/src/thread.c:355 + 5300fac4 __thread_entry system/klibc/android/pthread.c:59 + 5300fc5c pthread_create system/klibc/android/pthread.c:182 ++ +
If you save the debug spew into a file called out.txt, you can pass that to the tool, like this:
+
+./tools/stack out.txt ++ +
Or you can run logcat without any parameters and it will read from stdin. You can then paste output into the terminal or pipe it. Run logcat from the top of the tree in the environment in which you do builds so that the application can determine relative paths to the toolchain to use to decode the object files.
+