Hi I want to use strace but I can not
How do you do this ?
"strace" with -e or -o option not work at adb shell
and "-" I must to type "Ctrl+C" and exit from adb
why?



On Wednesday, September 26, 2012 8:08:56 AM UTC-7, syahaz wrote:
>
> Hi, 
>
> Thanks for responding to my email. 
>
> Firstly, I've to admit that I'm new to this Android stuff.  Hope you can 
> bear with me. 
>
> What I'm trying to do is to study on system call used by an application, 
> in this case a SMS application that I installed in an emulator.   
> I want to know the what are the system calls involved when I use the 
> application to send and receive the SMS. 
>
> What I've done : 
>
> 1) I installed the android sdk together with a third party  SMS 
> application 
> 2) I used the adb shell to get the PID and dump the strace output to a 
> file.  The command I used: 
>      " strace -e trace=open,read -p 834  -v -o handcent2.txt" 
>
> The full strace dump is as attached. 
>
> I've difficulty in understanding the output and now based on your feedback 
> I'm not sure whether this is the actual output of strace or not. 
>
> Hope you can give some guidance. 
>
> Thank you. 
>
>
>
>
> -----Original Message----- 
> From: Tim Bird [mailto:[email protected] <javascript:>] 
> Sent: Wednesday, September 26, 2012 9:40 PM 
> To: [email protected] <javascript:> 
> Cc: syahaz 
> Subject: Re: [android-kernel] system call log interpretation 
>
> On 09/25/2012 06:32 PM, syahaz wrote: 
> > Dear all, 
> > 
> > I would like to seek your help in interpreting the system call log 
> > file in android, if you have any experience in doing it.  For your 
> > information, I m using the strace to dump the log of an application. 
> > The example is as follows: 
> > syscall_983042(0x47a8e074, 0x47a8e078, 0, 0xfff, 0x4086d118, 
> > 0x47a8e074, 0x47a4a905, 0xf0002, 0, 0x47a8e078, 0xfc46f7bc, 
> > 0x413d4630, 0, 0xbeb43678, 0x40841ac3, 0x40011454, 0x40000010, 
> > 0x47a8e074, 0xb691, 0, 0x7461642f, 0x61642f61, 0x632f6174, 0x682e6d6f, 
> > 0x63646e61, 0x2e746e65, 0x7478656e, 0x2f736d73, 0x755f6368, 0x61, 0, 
> > 0) = 0 Appreciate your feedback. 
> > Thank you. 
>
> This doesn't make any sense.  You are using a bunch of words together that 
> correspond to different systems.  I have no idea what a "system call log 
> file" is. 
>
> You can get an strace dump, using the strace command (which uses the 
> ptrace system call.  You could get the log from the kernel, which might be 
> instrumented to return system call information. 
> You can obtain syscall call information from ftrace.  Finally, you could 
> be getting the Android logs for the processes on your system. 
>
> However, the output above bears no resemblance to any of these 
> 4 different sources of system information.  In particular it doesn't look 
> like strace output. 
>
> One does not use strace to dumo the log of an application. 
> One uses strace to trace the system calls of an application. 
> One uses logcat to dumo the log of an application, and dmesg to dump the 
> log of the kernel. 
>
> Can you describe what you are doing (or trying to do) in greater detail? 
>  -- Tim 
>
> ============================= 
> Tim Bird 
> Architecture Group Chair, CE Workgroup of the Linux Foundation Senior 
> Staff Engineer, Sony Network Entertainment ============================= 
>

-- 
-- 
unsubscribe: [email protected]
website: http://groups.google.com/group/android-kernel
--- 
You received this message because you are subscribed to the Google Groups 
"Android Linux Kernel Development" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to