Android Question crash with experiaZ, experiaT, experia z1

hookshy

Well-Known Member
Licensed User
Longtime User
Is there an known isuses with those phones i have 8 craches with only on those models
I am using as libraries:
accelerated surface
clipboard
TTS
Voice recognitions
Http,jwwifi,json,location manager,phone,reflection,serial,string utils ,tehnis,xmlsax


Build fingerprint: 'Sony/C6903/C6903:4.3/14.2.A.0.290/eng.hudsonslave:user/release-keys'
Revision: '0'
pid: 16167, tid: 16167, name: hs.easy.romt >>> hs.easy.romt <<<
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0000005c
r0 415bb170 r1 a750001d r2 00000000 r3 00000000
r4 6d72d830 r5 415bc658 r6 00000000 r7 6d472cfc
r8 bed78478 r9 6d472cf4 sl 415bc668 fp bed7848c
ip 72def109 sp bed78470 lr 4092b390 pc 72def10a cpsr 80000030
d0 0000000000000000 d1 0000000000000000
d2 0000000000000000 d3 0000000000000000
d4 fe8000003f000001 d5 000122e800000000
d6 0000000000000000 d7 00000000000022ec
d8 0000000000000000 d9 0000000000000000
d10 0000000000000000 d11 0000000000000000
d12 0000000000000000 d13 0000000000000000
d14 0000000000000000 d15 0000000000000000
d16 00720064006e0061 d17 002e00640069006f
d18 002e006900750067 d19 0070007300690044
d20 004500790061006c d21 0074006e00650076
d22 006e006e006f0043 d23 0069007400630065
d24 0078007700760074 d25 007a0078007a0079
d26 0000000000000000 d27 0000000000000000
d28 0048004700460044 d29 004a0048004a0049
d30 007a007a007a007a d31 0000000000000000
scr 68000013

backtrace:
#00 pc 0027110a /system/lib/libwebcore.so
#01 pc 0002038c /system/lib/libdvm.so (dvmPlatformInvoke+112)
#02 pc 00050b87 /system/lib/libdvm.so (dvmCallJNIMethod(unsigned int const*, JValue*, Method const*, Thread*)+398)
#03 pc 00029820 /system/lib/libdvm.so
#04 pc 0002e1d8 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#05 pc 00062e9f /system/lib/libdvm.so (dvmInvokeMethod(Object*, Method const*, ArrayObject*, ArrayObject*, ClassObject*, bool)+350)
#06 pc 0006ab63 /system/lib/libdvm.so
#07 pc 00029820 /system/lib/libdvm.so
#08 pc 0002e1d8 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#09 pc 00062be1 /system/lib/libdvm.so (dvmCallMethodV(Thread*, Method const*, Object*, bool, JValue*, std::__va_list)+292)
#10 pc 0004c8b3 /system/lib/libdvm.so
#11 pc 0004f3ab /system/lib/libandroid_runtime.so
#12 pc 0005003b /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, char const*)+378)
#13 pc 0000105b /system/bin/app_process
#14 pc 0000dd2f /system/lib/libc.so (__libc_init+50)
#15 pc 00000d7c /system/bin/app_process

code around pc:
72def0e8 f503b153 aa027050 e902c803 f89d0003
72def0f8 b1091004 e0019800 30fff04f 4770b002
72def108 6dd0b508 429865d3 b110d003 68596803
72def118 bd084788 b9126dd2 0001f1d3 331ae004
72def128 0023f852 0001f1d0 2000bf38 00004770
72def138 b5104b04 4604447b 60033308 ef82f672
72def148 bd104620 0033a6e0 b1306ed0 b1206e50
72def158 bf181c19 f70a2101 2000b8af 33004770
72def168 bf186c90 f8822301 b1183044 0101f083
72def178 bab6f7f7 b5084770 fa9af711 063cf8d0
72def188 b510bd08 f7114614 220cfa93 f8d04354
72def198 59183640 b508bd10 fa8af711 22002101
72def1a8 4008e8bd bc54f711 4614b538 4a154b14
72def1b8 589b447b b3086818 fa7af711 46052c3b
72def1c8 f711dd04 b158f871 dc092c4f 46282c14
72def1d8 2100bfd4 22012101 4038e8bd bc38f711

code around lr:
4092b370 3497c004 3488c004 3afffff9 e2888004
4092b380 eafffff9 e899000c e59bc00c e12fff3c
4092b390 e3560000 159bc010 e24bd014 188c0003
4092b3a0 e8bd8bc0 e1a0ce22 e59b6008 e2866001
4092b3b0 e3a02000 e4d6c001 e35c0000 0a000007
4092b3c0 e2822001 e35c0044 135c004a 1afffff8
4092b3d0 e3120001 12822001 02822002 eafffff4
4092b3e0 e2522002 43b02000 0affffe5 e04dd102
4092b3f0 e3cdd004 e1a07009 e1a0800d e59b6008
4092b400 e2866001 e2877008 e4d6c001 e35c0044
4092b410 135c004a 0a000004 e4d6c001 e35c0044
4092b420 135c004a 02477004 0a000000 e4d6c001
4092b430 e35c0000 0affffd2 e35c0044 135c004a
4092b440 0a000002 e497c004 e488c004 eafffff6
4092b450 e2888007 e497c004 e3c88007 e4972004
4092b460 e488c004 e4882004 eaffffef 00000000
 

hookshy

Well-Known Member
Licensed User
Longtime User
please find page 2

Build fingerprint: 'Sony/C6903/C6903:4.3/14.2.A.0.290/eng.hudsonslave:user/release-keys'
Revision: '0'
pid: 22073, tid: 22073, name: hs.easy.romt >>> hs.easy.romt <<<
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0000005c
r0 41573170 r1 ebe0001d r2 00000000 r3 00000000
r4 6d6e5830 r5 41574658 r6 00000000 r7 6d42acfc
r8 beeed478 r9 6d42acf4 sl 41574668 fp beeed48c
ip 72dba109 sp beeed470 lr 408e3390 pc 72dba10a cpsr 80000030
d0 0000000100000003 d1 0000000000000000
d2 0000000000000000 d3 000000006d6e2dc0
d4 fe8000003f000001 d5 000122e800000000
d6 0000000000000000 d7 00000000000022ec
d8 0000000000000000 d9 0000000000000000
d10 0000000000000000 d11 0000000000000000
d12 0000000000000000 d13 0000000000000000
d14 0000000000000000 d15 0000000000000000
d16 00720064006e0061 d17 002e00640069006f
d18 002e006900750067 d19 0070007300690044
d20 004500790061006c d21 0074006e00650076
d22 006e006e006f0043 d23 0069007400630065
d24 0078007700760074 d25 007a0078007a0079
d26 0000000000000000 d27 0000000000000000
d28 0048004700460044 d29 004a0048004a0049
d30 007a007a007a007a d31 0000000000000000
scr 68000013

backtrace:
#00 pc 0027110a /system/lib/libwebcore.so
#01 pc 0002038c /system/lib/libdvm.so (dvmPlatformInvoke+112)
#02 pc 00050b87 /system/lib/libdvm.so (dvmCallJNIMethod(unsigned int const*, JValue*, Method const*, Thread*)+398)
#03 pc 00029820 /system/lib/libdvm.so
#04 pc 0002e1d8 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#05 pc 00062e9f /system/lib/libdvm.so (dvmInvokeMethod(Object*, Method const*, ArrayObject*, ArrayObject*, ClassObject*, bool)+350)
#06 pc 0006ab63 /system/lib/libdvm.so
#07 pc 00029820 /system/lib/libdvm.so
#08 pc 0002e1d8 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#09 pc 00062be1 /system/lib/libdvm.so (dvmCallMethodV(Thread*, Method const*, Object*, bool, JValue*, std::__va_list)+292)
#10 pc 0004c8b3 /system/lib/libdvm.so
#11 pc 0004f3ab /system/lib/libandroid_runtime.so
#12 pc 0005003b /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, char const*)+378)
#13 pc 0000105b /system/bin/app_process
#14 pc 0000dd2f /system/lib/libc.so (__libc_init+50)
#15 pc 00000d7c /system/bin/app_process

code around pc:
72dba0e8 f503b153 aa027050 e902c803 f89d0003
72dba0f8 b1091004 e0019800 30fff04f 4770b002
72dba108 6dd0b508 429865d3 b110d003 68596803
72dba118 bd084788 b9126dd2 0001f1d3 331ae004
72dba128 0023f852 0001f1d0 2000bf38 00004770
72dba138 b5104b04 4604447b 60033308 ef82f672
72dba148 bd104620 0033a6e0 b1306ed0 b1206e50
72dba158 bf181c19 f70a2101 2000b8af 33004770
72dba168 bf186c90 f8822301 b1183044 0101f083
72dba178 bab6f7f7 b5084770 fa9af711 063cf8d0
72dba188 b510bd08 f7114614 220cfa93 f8d04354
72dba198 59183640 b508bd10 fa8af711 22002101
72dba1a8 4008e8bd bc54f711 4614b538 4a154b14
72dba1b8 589b447b b3086818 fa7af711 46052c3b
72dba1c8 f711dd04 b158f871 dc092c4f 46282c14
72dba1d8 2100bfd4 22012101 4038e8bd bc38f711

code around lr:
408e3370 3497c004 3488c004 3afffff9 e2888004
408e3380 eafffff9 e899000c e59bc00c e12fff3c
408e3390 e3560000 159bc010 e24bd014 188c0003
408e33a0 e8bd8bc0 e1a0ce22 e59b6008 e2866001
408e33b0 e3a02000 e4d6c001 e35c0000 0a000007
408e33c0 e2822001 e35c0044 135c004a 1afffff8
408e33d0 e3120001 12822001 02822002 eafffff4
408e33e0 e2522002 43b02000 0affffe5 e04dd102
408e33f0 e3cdd004 e1a07009 e1a0800d e59b6008
408e3400 e2866001 e2877008 e4d6c001 e35c0044
408e3410 135c004a 0a000004 e4d6c001 e35c0044
408e3420 135c004a 02477004 0a000000 e4d6c001
408e3430 e35c0000 0affffd2 e35c0044 135c004a
408e3440 0a000002 e497c004 e488c004 eafffff6
408e3450 e2888007 e497c004 e3c88007 e4972004
408e3460 e488c004 e4882004 eaffffef 00000000
 
Upvote 0
Top