• Native进程之Trace原理(转)——可直接输出某进程的栈帧——debuggerd


    一. 概述

    当发生ANR(Application Not Response,对于Java进程可通过kill -3向目标进程发送信号SIGNAL_QUIT, 输出相应的traces信息保存到目录/data/anr/traces.txt;而对于Native进程可通过 debuggerd输出traces信息。

    可通过一条命令来获取指定Native进程的traces信息,例如输出pid=17529进程信息:

    adb shell debuggerd -b 17529 //可指定进程pid
    

    执行完该命令后直接输出traces信息到屏幕,如下:

    //【见小节2.2】
    ----- pid 17529 at 2016-11-12 22:22:22 -----
    Cmd line: /system/bin/mediaserver
    ABI: 'arm'
    
    //【见小节2.4】
    "mediaserver" sysTid=17529
      #00 pc 00042dac  /system/lib/libc.so (__ioctl+8)
      #01 pc 000498ad  /system/lib/libc.so (ioctl+14)
      #02 pc 0001ea5b  /system/lib/libbinder.so (_ZN7android14IPCThreadState14talkWithDriverEb+174)
      #03 pc 0001ef9f  /system/lib/libbinder.so (_ZN7android14IPCThreadState20getAndExecuteCommandEv+6)
      #04 pc 0001f0d7  /system/lib/libbinder.so (_ZN7android14IPCThreadState14joinThreadPoolEb+78)
      #05 pc 00001cf1  /system/bin/mediaserver
      #06 pc 0001667d  /system/lib/libc.so (__libc_init+44)
      #07 pc 00001f48  /system/bin/mediaserver
    
    "Binder_1" sysTid=17931
      #00 pc 00042dac  /system/lib/libc.so (__ioctl+8)
      #01 pc 000498ad  /system/lib/libc.so (ioctl+14)
      #02 pc 0001ea5b  /system/lib/libbinder.so (_ZN7android14IPCThreadState14talkWithDriverEb+174)
      #03 pc 0001ef9f  /system/lib/libbinder.so (_ZN7android14IPCThreadState20getAndExecuteCommandEv+6)
      #04 pc 0001f0d7  /system/lib/libbinder.so (_ZN7android14IPCThreadState14joinThreadPoolEb+78)
      #05 pc 00023bd1  /system/lib/libbinder.so
      #06 pc 00010115  /system/lib/libutils.so (_ZN7android6Thread11_threadLoopEPv+112)
      #07 pc 00041843  /system/lib/libc.so (_ZL15__pthread_startPv+30)
      #08 pc 000192a5  /system/lib/libc.so (__start_thread+6)
    ... //此处省略剩余的N个线程.
    ----- end 17529 -----
    

    接下来说说debuggerd是如何输出Native进程的trace.

    二. Debuggerd

    文章debuggerd守护进程详细介绍了Debuggerd的工作原理,此处当执行debuggerd -b命令后:

    1. Client进程调用send_request()方法向debuggerd服务端发出DEBUGGER_ACTION_DUMP_BACKTRACE命令;
    2. Debugggerd进程收到该命令,fork子进程中再执行worker_process()过程;
    3. 子进程通过perform_dump()方法来根据命令DEBUGGER_ACTION_DUMP_BACKTRACE,会调用到dump_backtrace()方法输出backtrace.

    接下来,从dump_backtrace()方法讲起:

    2.1 dump_backtrace

    [-> debuggerd/backtrace.cpp]

    void dump_backtrace(int fd, BacktraceMap* map, pid_t pid, pid_t tid,
                        const std::set<pid_t>& siblings, std::string* amfd_data) {
      log_t log;
      log.tfd = fd;
      log.amfd_data = amfd_data;
    
      dump_process_header(&log, pid); //【见小节2.2】
      dump_thread(&log, map, pid, tid);//【见小节2.3】
    
      for (pid_t sibling : siblings) {
        dump_thread(&log, map, pid, sibling);//【见小节2.3】
      }
    
      dump_process_footer(&log, pid);//【见小节2.4】
    }
    

    2.2 dump_process_header

    [-> debuggerd/backtrace.cpp]

    static void dump_process_header(log_t* log, pid_t pid) {
      char path[PATH_MAX];
      char procnamebuf[1024];
      char* procname = NULL;
      FILE* fp;
    
      //获取/proc/<pid>/cmdline节点的进程名
      snprintf(path, sizeof(path), "/proc/%d/cmdline", pid);
      if ((fp = fopen(path, "r"))) {
        procname = fgets(procnamebuf, sizeof(procnamebuf), fp);
        fclose(fp);
      }
    
      time_t t = time(NULL);
      struct tm tm;
      localtime_r(&t, &tm);
      char timestr[64];
      strftime(timestr, sizeof(timestr), "%F %T", &tm);
      _LOG(log, logtype::BACKTRACE, "
    
    ----- pid %d at %s -----
    ", pid, timestr);
    
      if (procname) {
        _LOG(log, logtype::BACKTRACE, "Cmd line: %s
    ", procname);
      }
      _LOG(log, logtype::BACKTRACE, "ABI: '%s'
    ", ABI_STRING);
    }
    

    例如:

    ----- pid 17529 at 2016-11-12 22:22:22 -----
    Cmd line: /system/bin/mediaserver
    ABI: 'arm'
    

    2.3 dump_thread

    [-> debuggerd/backtrace.cpp]

    static void dump_thread(log_t* log, BacktraceMap* map, pid_t pid, pid_t tid) {
      char path[PATH_MAX];
      char threadnamebuf[1024];
      char* threadname = NULL;
      FILE* fp;
    
      //获取/proc/<tid>/comm节点的线程名
      snprintf(path, sizeof(path), "/proc/%d/comm", tid);
      if ((fp = fopen(path, "r"))) {
        threadname = fgets(threadnamebuf, sizeof(threadnamebuf), fp);
        fclose(fp);
        if (threadname) {
          size_t len = strlen(threadname);
          if (len && threadname[len - 1] == '
    ') {
              threadname[len - 1] = '';
          }
        }
      }
      
      _LOG(log, logtype::BACKTRACE, "
    "%s" sysTid=%d
    ", threadname ? threadname : "<unknown>", tid);
    
      std::unique_ptr<Backtrace> backtrace(Backtrace::Create(pid, tid, map));
      if (backtrace->Unwind(0)) {
        //【见小节2.4】
        dump_backtrace_to_log(backtrace.get(), log, "  ");
      }
    }
    

    2.4 dump_backtrace_to_log

    [-> debuggerd/Backtrace.cpp]

    void dump_backtrace_to_log(Backtrace* backtrace, log_t* log, const char* prefix) {
      //NumFrames是backtrace中的栈帧数
      for (size_t i = 0; i < backtrace->NumFrames(); i++) {
        //【见小节2.5】
        _LOG(log, logtype::BACKTRACE, "%s%s
    ", prefix, backtrace->FormatFrameData(i).c_str());
      }
    }
    

    通过循环遍历输出整个backtrace中的每一栈帧FormatFrameData的信息.

    2.5 FormatFrameData

    [-> debuggerd/Backtrace.cpp]

    std::string Backtrace::FormatFrameData(size_t frame_num) {
      if (frame_num >= frames_.size()) {
        return "";
      }
      return FormatFrameData(&frames_[frame_num]);
    }
    
    std::string Backtrace::FormatFrameData(const backtrace_frame_data_t* frame) {
      const char* map_name;
      if (BacktraceMap::IsValid(frame->map) && !frame->map.name.empty()) {
        map_name = frame->map.name.c_str();
      } else {
        map_name = "<unknown>";
      }
      uintptr_t relative_pc = BacktraceMap::GetRelativePc(frame->map, frame->pc);
      
      //这是backtrace每一行的信息
      std::string line(StringPrintf("#%02zu pc %" PRIPTR "  %s", 
            frame->num, relative_pc, map_name));
      
      if (frame->map.offset != 0) {
        line += " (offset " + StringPrintf("0x%" PRIxPTR, frame->map.offset) + ")";
      }
      if (!frame->func_name.empty()) {
        //函数名,偏移量
        line += " (" + frame->func_name;
        if (frame->func_offset) {
          line += StringPrintf("+%" PRIuPTR, frame->func_offset);
        }
        line += ')';
      }
    
      return line;
    }
    

    例如:(这些map信息是由/proc/%d/maps解析出来的)

    #01 pc 000000000001cca4 /system/lib64/libc.so (epoll_pwait+32)

    帧号 pc指针 map_name (函数名+偏移量)
    #01 pc 000000000001cca4 /system/lib64/libc.so (epoll_pwait+32)

    [-> debuggerd/backtrace.cpp]

    static void dump_process_footer(log_t* log, pid_t pid) {
      _LOG(log, logtype::BACKTRACE, "
    ----- end %d -----
    ", pid);
    }
    

    例如:----- end 1789 -----

    三. 总结

    通过debuggerd -b [pid],可输出Native进程的调用栈,这些信息是通过解析/proc/[pid]/maps而来的。

    转自:http://gityuan.com/2016/11/27/native-traces/

  • 相关阅读:
    winform 通过 windows api 实现本机两个exe 消息推送
    winform ListView控件 绘制item和subitems颜色
    C# Windows Service创建和安装
    C# 解析xml文件(带命名空间 xmlns和 xmlns:xsi)
    H5+CSS3 实现分页功能
    C# HashTable Dictionary ConcurrentDictionary HashSet
    使用泛型返回类
    WPF的XAML注意点
    Http监听HttpListener接收请求的Nancy框架
    获取Windows后台进程
  • 原文地址:https://www.cnblogs.com/zl1991/p/6874180.html
Copyright © 2020-2023  润新知