如何设置llvm-symbolizer?

use*_*265 5 android symbols stack-trace llvm-clang address-sanitizer

我能够使用位于“Android/sdk/ndk-bundle/toolchains/llvm/prebuilt/darwin-x86_64/lib64/clang/7.0.2/bin”中的脚本“asan_device_setup”推送位于ANDROID_SDK中的ASAN相关库我的 macOS。

但是,我无法获得 Address Sanitizer 调用堆栈的任何符号信息。我将位于“/Android/sdk/ndk-bundle/toolchains/llvm/prebuilt/darwin-x86_64/bin”内的文件“llvm-symbolizer”推送到Android设备上的“/system/bin/”。

当我尝试从终端执行“adb shell /system/bin/llvm-symbolizer --help”时,我收到一些奇怪的错误消息。显然 llvm-symbolizer 没有按预期方式运行。

因此,我看到此警告消息:

==6937==WARNING: external symbolizer didn't start up correctly!
==6937==WARNING: Can't write to symbolizer at fd 56
==6937==WARNING: external symbolizer didn't start up correctly!
==6937==WARNING: Failed to use and restart external symbolizer!
Run Code Online (Sandbox Code Playgroud)

除了 .so+offset 和 Address Sanitizer 相关崩溃的内存地址之外,没有任何符号信息。

我真的不确定我哪里出错了。除了 llvm-symbolizer 之外,有没有办法获取 ASAN 相关崩溃的符号信息。请帮忙。谢谢。

小智 0

我还试图找到一种使用 llvm-symbolizer 的方法。不幸的是没有成功。但是,我发现ndk-stack脚本对于从堆栈跟踪中获取符号很有用。我运行的是 Android 8.1。

C:\Users\wierzmar\AppData\Local\Android\Sdk\ndk\21.0.6113669>ndk-stack.cmd -sym <my_project_path>\app\build\intermediates\cmake\debug\obj\armeabi-v7a -dump C:\Users\wierzmar\stack.txt
********** Crash dump: **********
Build fingerprint: 'samsung/xcover4ltexx/xcover4lte:8.1.0/M1AJQ/G390FXXU3BRL1:user/release-keys'
Abort message: '=================================================================
#00 0x0001a528 /system/lib/libc.so (abort+63)
#01 0x000389e0 /data/app/com.company.myservice.debug-6r8Uxo3uZSJMR0ESz8bKkg==/lib/arm/libclang_rt.asan-arm-android.so (offset 0x2d000)
#02 0x00037754 /data/app/com.company.myservice.debug-6r8Uxo3uZSJMR0ESz8bKkg==/lib/arm/libclang_rt.asan-arm-android.so (offset 0x2d000)
#03 0x000a15b8 /data/app/com.company.myservice.debug-6r8Uxo3uZSJMR0ESz8bKkg==/lib/arm/libclang_rt.asan-arm-android.so (offset 0x2d000)
#04 0x000a16cc /data/app/com.company.myservice.debug-6r8Uxo3uZSJMR0ESz8bKkg==/lib/arm/libclang_rt.asan-arm-android.so (offset 0x2d000)
#05 0x00044fa0 /data/app/com.company.myservice.debug-6r8Uxo3uZSJMR0ESz8bKkg==/lib/arm/libclang_rt.asan-arm-android.so (offset 0x2d000)
#06 0x0009ce00 /data/app/com.company.myservice.debug-6r8Uxo3uZSJMR0ESz8bKkg==/lib/arm/libclang_rt.asan-arm-android.so (offset 0x2d000) (__interceptor_free+248)
#07 0x000285e7 /data/app/com.company.myservice.debug-6r8Uxo3uZSJMR0ESz8bKkg==/lib/arm/libxxx.so
my_free
armeabi-v7a\../../../../src/main/c/libxxx/src\data.c:6985:9
#08 0x00049db5 /data/app/com.company.myservice.debug-6r8Uxo3uZSJMR0ESz8bKkg==/lib/arm/libxxx.so (send_data+2636)
                                                                                                send_data
                                                                                                <my_project_path>\app\.cxx\cmake\debug\armeabi-v7a\../../../../src/main/c/libxxx/src\connection.c:1783:9
#09 0x000470ab /data/app/com.company.myservice.debug-6r8Uxo3uZSJMR0ESz8bKkg==/lib/arm/libxxx.so
client_fun
armeabi-v7a\../../../../src/main/c/libxxx/src\connection.c:960:25
#10 0x00088930 /data/app/com.company.myservice.debug-6r8Uxo3uZSJMR0ESz8bKkg==/lib/arm/libclang_rt.asan-arm-android.so (offset 0x2d000)
#11 0x00048811 /system/lib/libc.so (__pthread_start(void*)+24)
#12 0x0001b369 /system/lib/libc.so (__start_thread+32)
Run Code Online (Sandbox Code Playgroud)