I want to use strace whit adb shell
but when I type Strace whit -o or -e option
no output get me
and only show "-" charachter for type!
and after mintus I type "Ctrl+C" and exit from adb!!
why??
can you explain using of strace at android step by step??
On Wednesday, September 26, 2012 8:32:55
t sure whether this is the actual output of strace or not.
>
> Hope you can give some guidance.
>
> Thank you.
>
>
>
>
> -Original Message-----
> From: Tim Bird [mailto:tim@am.sony.com ]
> Sent: Wednesday, September 26, 2012 9:40 PM
> To: android...@goo
om
Cc: Takuo Koguchi
Subject: Re: [android-kernel] system call log interpretation
On 09/26/2012 07:35 PM, Takuo Koguchi wrote:
> As already suggested by Glenn, syscall_983042 seems to be an ARM
> private cacheflush syscall. The number is assigned in
> arch/arm/include/asm/unistd.h In th
On 09/26/2012 07:35 PM, Takuo Koguchi wrote:
> As already suggested by Glenn, syscall_983042 seems to be an ARM private
> cacheflush syscall. The number is assigned in arch/arm/include/asm/unistd.h
> In the case of EABI, __ARM_NR_cacheflush is 0x0f0002(=982042)
> /*
> * The following SWIs are ARM
As already suggested by Glenn, syscall_983042 seems to be an ARM private
cacheflush syscall. The number is assigned in arch/arm/include/asm/unistd.h
In the case of EABI, __ARM_NR_cacheflush is 0x0f0002(=982042)
/*
* The following SWIs are ARM private.
*/
#define __ARM_NR_BASE (__NR_SYSCALL_BASE+0x0
On 09/26/2012 08:08 AM, sya...@gmail.com wrote:
> Hi,
>
> Thanks for responding to my email.
>
> Firstly, I've to admit that I'm new to this Android stuff. Hope you can bear
> with me.
>
> What I'm trying to do is to study on system call used by an application, in
> this case a SMS applicatio
On 09/25/2012 06:32 PM, syahaz wrote:
> Dear all,
>
> I would like to seek your help in interpreting the system call log file in
> android, if you have any experience in doing it. For your information, I�m
> using the strace to dump the log of an application.
> The example is as follows:
> sysc
Dear all,
I would like to seek your help in interpreting the system call log file in
android, if you have any experience in doing it. For your information, I’m
using the strace to dump the log of an application.
The example is as follows:
syscall_983042(0x47a8e074, 0x47a8e078, 0, 0xfff, 0x4