Guest User

Untitled

a guest
Apr 21st, 2018
77
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.74 KB | None | 0 0
  1. 04-13 08:53:07.604 1615 1624 F libc : Fatal signal 11 (SIGSEGV), code 1, fault addr 0x10 in tid 1624 (FinalizerDaemon), pid 1615 (system_server)
  2. 04-13 08:53:07.626 3587 5580 I Places : ?: PlacesBleScanner stop()
  3. 04-13 08:53:07.628 3587 3587 I BeaconBle: Scan canceled successfully.
  4. 04-13 08:53:07.652 3587 5580 I PlaceInferenceEngine: [anon] Changed inference mode: 0
  5. 04-13 08:53:07.665 3587 5580 I PlaceInferenceEngine: [anon] Changed inference mode: 0
  6. 04-13 08:53:07.709 7324 7324 I crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone
  7. 04-13 08:53:07.710 1175 1175 I /system/bin/tombstoned: received crash request for pid 1615
  8. 04-13 08:53:07.715 7324 7324 I crash_dump64: performing dump of process 1615 (target tid = 1624)
  9. 04-13 08:53:07.716 7324 7324 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
  10. 04-13 08:53:07.716 7324 7324 F DEBUG : Build fingerprint: 'razer/cheryl/cheryl:8.1.0/OPM1.171019.011/yghazi04121402:userdebug/test-keys'
  11. 04-13 08:53:07.716 7324 7324 F DEBUG : Revision: '0'
  12. 04-13 08:53:07.716 7324 7324 F DEBUG : ABI: 'arm64'
  13. 04-13 08:53:07.716 7324 7324 F DEBUG : pid: 1615, tid: 1624, name: FinalizerDaemon >>> system_server <<<
  14. 04-13 08:53:07.716 7324 7324 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x10
  15. 04-13 08:53:07.716 7324 7324 F DEBUG : Cause: null pointer dereference
  16. 04-13 08:53:07.716 7324 7324 F DEBUG : x0 00000073858c3b08 x1 0000000000000001 x2 fffffffffffffff3 x3 0000000000000000
  17. 04-13 08:53:07.716 7324 7324 F DEBUG : x4 00000073911ae2b8 x5 00000073911ae2e8 x6 0000000000cc0f08 x7 0000000000cc1208
  18. 04-13 08:53:07.716 7324 7324 F DEBUG : x8 0000000000000001 x9 0000000000000000 x10 0000000000000000 x11 00000074120328d8
  19. 04-13 08:53:07.716 7324 7324 F DEBUG : x12 ffffffffffffff98 x13 0000007412029000 x14 00000000001fffff x15 00000074120328a8
  20. 04-13 08:53:07.716 7324 7324 F DEBUG : x16 000000000000000d x17 0000000000000001 x18 0000000000000000 x19 00000073911ad800
  21. 04-13 08:53:07.716 7324 7324 F DEBUG : x20 0000000000000001 x21 00000073858c3b08 x22 0000000000000000 x23 00000074120328b8
  22. 04-13 08:53:07.716 7324 7324 F DEBUG : x24 0000000070c21638 x25 00000000148249c8 x26 0000000000002ac4 x27 0000000000000043
  23. 04-13 08:53:07.716 7324 7324 F DEBUG : x28 0000007390c6d160 x29 000000737abdbdb0 x30 0000007411fe99c0
  24. 04-13 08:53:07.716 7324 7324 F DEBUG : sp 000000737abdbd80 pc 0000007411fe93d0 pstate 0000000080000000
  25. 04-13 08:53:08.013 7324 7324 F DEBUG :
  26. 04-13 08:53:08.013 7324 7324 F DEBUG : backtrace:
  27. 04-13 08:53:08.013 7324 7324 F DEBUG : #00 pc 00000000000a93d0 /system/lib64/libc.so (ifree+88)
  28. 04-13 08:53:08.013 7324 7324 F DEBUG : #01 pc 00000000000a99bc /system/lib64/libc.so (je_free+120)
  29. 04-13 08:53:08.013 7324 7324 F DEBUG : #02 pc 0000000000037690 /system/lib64/libandroidfw.so (android::ResTable::uninit()+456)
  30. 04-13 08:53:08.013 7324 7324 F DEBUG : #03 pc 0000000000037464 /system/lib64/libandroidfw.so (android::ResTable::~ResTable()+16)
  31. 04-13 08:53:08.013 7324 7324 F DEBUG : #04 pc 000000000001d4b0 /system/lib64/libandroidfw.so (android::AssetManager::~AssetManager()+80)
  32. 04-13 08:53:08.013 7324 7324 F DEBUG : #05 pc 000000000001d544 /system/lib64/libandroidfw.so (android::AssetManager::~AssetManager()+16)
  33. 04-13 08:53:08.013 7324 7324 F DEBUG : #06 pc 0000000000123760 /system/lib64/libandroid_runtime.so (android::android_content_AssetManager_destroy(_JNIEnv*, _jobject*)+56)
  34. 04-13 08:53:08.013 7324 7324 F DEBUG : #07 pc 00000000006165cc /system/framework/arm64/boot-framework.oat (offset 0x616000) (android.os.Binder.destroyBinder [DEDUPED]+124)
  35. 04-13 08:53:08.013 7324 7324 F DEBUG : #08 pc 0000000000a9e39c /system/framework/arm64/boot-framework.oat (offset 0x616000) (android.content.res.AssetManager.finalize+44)
  36. 04-13 08:53:08.013 7324 7324 F DEBUG : #09 pc 00000000002cbcb4 /system/framework/arm64/boot-core-libart.oat (offset 0xd6000) (java.lang.Daemons$FinalizerDaemon.doFinalize+100)
  37. 04-13 08:53:08.013 7324 7324 F DEBUG : #10 pc 00000000002cbf3c /system/framework/arm64/boot-core-libart.oat (offset 0xd6000) (java.lang.Daemons$FinalizerDaemon.runInternal+492)
  38. 04-13 08:53:08.013 7324 7324 F DEBUG : #11 pc 00000000002cb6ec /system/framework/arm64/boot-core-libart.oat (offset 0xd6000) (java.lang.Daemons$Daemon.run+76)
  39. 04-13 08:53:08.013 7324 7324 F DEBUG : #12 pc 00000000001f97b8 /system/framework/arm64/boot-core-oj.oat (offset 0x1da000) (java.lang.Thread.run+72)
  40. 04-13 08:53:08.013 7324 7324 F DEBUG : #13 pc 000000000059d788 /system/lib64/libart.so (art_quick_invoke_stub+584)
  41. 04-13 08:53:08.013 7324 7324 F DEBUG : #14 pc 00000000000dd2c0 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+204)
  42. 04-13 08:53:08.013 7324 7324 F DEBUG : #15 pc 00000000004b4c88 /system/lib64/libart.so (art::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::ArgArray*, art::JValue*, char const*)+104)
  43. 04-13 08:53:08.013 7324 7324 F DEBUG : #16 pc 00000000004b645c /system/lib64/libart.so (art::InvokeVirtualOrInterfaceWithJValues(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, jvalue*)+1336)
  44. 04-13 08:53:08.013 7324 7324 F DEBUG : #17 pc 00000000004ded74 /system/lib64/libart.so (art::Thread::CreateCallback(void*)+1148)
  45. 04-13 08:53:08.013 7324 7324 F DEBUG : #18 pc 000000000007481c /system/lib64/libc.so (__pthread_start(void*)+36)
  46. 04-13 08:53:08.013 7324 7324 F DEBUG : #19 pc 000000000001fca4 /system/lib64/libc.so (__start_thread+68)
Add Comment
Please, Sign In to add comment