Android

call stack backtrace

aucd29 2015. 6. 8. 14:22
$ addr2line -f -e $your_library_name.so $crashed_address

example
$ addr2line -f -e libcontent_shell_content_view.so 3939d0